ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-3gm7-v7vw-866c
|
XML External Entity (XXE) Injection in Apache Solr
|
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
|
{'CVE-2019-0193'}
|
2021-08-31T21:17:20Z
|
2019-08-01T19:17:35Z
|
HIGH
| 7.2
|
{'CWE-94'}
|
{'https://lists.apache.org/thread.html/9b0e7a7e3e18d0724f511403b364fc082ff56e3134d84cfece1c82fc@%3Cissues.lucene.apache.org%3E', 'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7', 'https://lists.apache.org/thread.html/rb34d820c21f1708c351f9035d6bc7daf80bfb6ef99b34f7af1d2f699@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/e85f735fad06a0fb46e74b7e6e9ce7ded20b59637cd9f993310f814d@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://github.com/advisories/GHSA-3gm7-v7vw-866c', 'https://issues.apache.org/jira/browse/SOLR-13669', 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00013.html', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00025.html', 'https://lists.apache.org/thread.html/55880d48e38ba9e8c41a3b9e41051dbfdef63b86b0cfeb32967edf03@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/7143983363f0ba463475be4a8b775077070a08dbf075449b7beb51ee@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0193', 'https://lists.apache.org/thread.html/6f2d61bd8732224c5fd3bdd84798f8e01e4542d3ee2f527a52a81b83@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/42cc4d334ba33905b872a0aa00d6a481391951c8b1450f01b077ce74@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/a6e3c09dba52b86d3a1273f82425973e1b0623c415d0e4f121d89eab@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r33aed7ad4ee9833c4190a44e2b106efd2deb19504b85e012175540f6@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/1addbb49a1fc0947fb32ca663d76d93cfaade35a4848a76d4b4ded9c@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESOLR-536063'}
| null |
GHSA
|
GHSA-9w8f-7wgr-2h7g
|
kimai2 is vulnerable to Improper Access Control
|
kimai2 is vulnerable to Improper Access Control
|
{'CVE-2021-3992'}
|
2021-12-03T20:42:59Z
|
2021-12-03T20:42:59Z
|
MODERATE
| 6.5
|
{'CWE-863', 'CWE-284'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3992', 'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5', 'https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93', 'https://github.com/advisories/GHSA-9w8f-7wgr-2h7g'}
| null |
GHSA
|
GHSA-484q-784p-8m5h
|
Cross-site Scripting in keycloak
|
A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack.
|
{'CVE-2020-10776'}
|
2022-02-09T00:58:15Z
|
2022-02-09T00:58:15Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-484q-784p-8m5h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10776', 'https://bugzilla.redhat.com/show_bug.cgi?id=1847428'}
| null |
GHSA
|
GHSA-vfxj-qg93-7wwc
|
Sessions could be hijacked due to tracking contacts by an auto-incremented ID in Mautic
|
### Impact
An issue was discovered in Mautic 1.x and 2.x before 2.13.0. It is possible to systematically emulate tracking cookies per contact due to tracking the contact by their auto-incremented ID. Thus, a third party can manipulate the cookie value with +1 to systematically assume being tracked as each contact in Mautic. It is then possible to retrieve information about the contact through forms that have progressive profiling enabled.
### Patches
Update to 2.13.0 or later
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2018-10189'}
|
2022-04-19T19:02:45Z
|
2021-01-19T21:16:21Z
|
MODERATE
| 7.5
|
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-10189', 'https://github.com/mautic/mautic/releases/tag/2.13.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-vfxj-qg93-7wwc', 'https://github.com/advisories/GHSA-vfxj-qg93-7wwc'}
| null |
GHSA
|
GHSA-9ccv-p7fg-m73x
|
XML Injection in python-libnmap
|
python-libnmap is affected by: XML Injection. The impact is: Denial of service (DoS) by consuming resources. The component is: XML Parsing. The attack vector is: Specially crafted XML payload.
|
{'CVE-2019-1010017'}
|
2021-08-17T18:24:43Z
|
2019-07-18T15:38:41Z
|
HIGH
| 7.5
|
{'CWE-91'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1010017', 'https://github.com/savon-noir/python-libnmap/issues/87', 'https://github.com/advisories/GHSA-9ccv-p7fg-m73x'}
| null |
GHSA
|
GHSA-g95f-p29q-9xw4
|
Regular Expression Denial of Service in braces
|
Versions of `braces` prior to 2.3.1 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
## Recommendation
Upgrade to version 2.3.1 or higher.
| null |
2021-08-04T21:35:07Z
|
2019-06-06T15:30:30Z
|
LOW
| 3.7
|
{'CWE-400', 'CWE-185'}
|
{'https://snyk.io/vuln/npm:braces:20180219', 'https://www.npmjs.com/advisories/786', 'https://github.com/advisories/GHSA-g95f-p29q-9xw4', 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'}
| null |
GHSA
|
GHSA-59hh-656j-3p7v
|
DoS via maliciously crafted p2p message
|
### Impact
A vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer, via the `snap/1` protocol. The crash can be triggered by sending a malicious `snap/1` `GetTrieNodes` package.
### Details
On September 21, 2021, geth-team member Gary Rong (@rjl493456442) found a way to crash the snap request handler .
By using this vulnerability, a peer connected on the `snap/1` protocol could cause a vulnerable node to crash with a `panic`.
In the `trie.TryGetNode` implementation, if the requested path is reached, the associated node will be returned. However the nilness is
not checked there.
```golang
func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) {
// If we reached the requested path, return the current node
if pos >= len(path) {
// Although we most probably have the original node expanded, encoding
// that into consensus form can be nasty (needs to cascade down) and
// time consuming. Instead, just pull the hash up from disk directly.
var hash hashNode
if node, ok := origNode.(hashNode); ok {
hash = node
} else {
hash, _ = origNode.cache()
}
```
More specifically the `origNode` can be nil(e.g. the child of fullnode) and system can panic at line `hash, _ = origNode.cache()`.
When investigating this, @holiman tried to find it via fuzzing, which uncovered a second crasher, also related to the snap `GetTrieNodes` package. If the caller requests a storage trie:
```golang
// Storage slots requested, open the storage trie and retrieve from there
account, err := snap.Account(common.BytesToHash(pathset[0]))
loads++ // always account database reads, even for failures
if account == nil {
break
}
stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb)
```
The code assumes that `snap.Account` returns _either_ a non-nil response unless `error` is also provided. This is however not the case, since `snap.Account` can return `nil, nil`.
### Patches
```diff
--- a/eth/protocols/snap/handler.go
+++ b/eth/protocols/snap/handler.go
@@ -469,7 +469,7 @@ func handleMessage(backend Backend, peer *Peer) error {
// Storage slots requested, open the storage trie and retrieve from there
account, err := snap.Account(common.BytesToHash(pathset[0]))
loads++ // always account database reads, even for failures
- if err != nil {
+ if err != nil || account == nil {
break
}
stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb)
diff --git a/trie/trie.go b/trie/trie.go
index 7ea7efa835..d0f0d4e2bc 100644
--- a/trie/trie.go
+++ b/trie/trie.go
@@ -174,6 +174,10 @@ func (t *Trie) TryGetNode(path []byte) ([]byte, int, error) {
}
func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) {
+ // If non-existent path requested, abort
+ if origNode == nil {
+ return nil, nil, 0, nil
+ }
// If we reached the requested path, return the current node
if pos >= len(path) {
// Although we most probably have the original node expanded, encoding
@@ -193,10 +197,6 @@ func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, new
}
// Path still needs to be traversed, descend into children
switch n := (origNode).(type) {
- case nil:
- // Non-existent path requested, abort
- return nil, nil, 0, nil
-
case valueNode:
// Path prematurely ended, abort
return nil, nil, 0, nil
```
The fixes were merged into [#23657](https://github.com/ethereum/go-ethereum/pull/23657), with commit [f1fd963](https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8), and released as part of Geth [v1.10.9](https://github.com/ethereum/go-ethereum/tree/v1.10.9) on Sept 29, 2021.
### Workarounds
Apply the patch above or upgrade to a version which is not vulnerable.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum/)
* Email us at [security@ethereum.org](mailto:security@ethereum.org)
|
{'CVE-2021-41173'}
|
2022-04-19T19:03:12Z
|
2021-10-25T19:42:57Z
|
MODERATE
| 5.7
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41173', 'https://github.com/ethereum/go-ethereum/pull/23801', 'https://github.com/advisories/GHSA-59hh-656j-3p7v', 'https://github.com/ethereum/go-ethereum/releases/tag/v1.10.9', 'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v'}
| null |
GHSA
|
GHSA-4fqg-89cc-5pv5
|
Malicious Package in sj-labc
|
All versions of `sj-labc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T17:21:39Z
|
2020-09-04T14:58:44Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1315', 'https://github.com/advisories/GHSA-4fqg-89cc-5pv5'}
| null |
GHSA
|
GHSA-pfwg-rxf4-97c3
|
Open Redirect in Apache Superset
|
Apache Superset up to and including 1.0.1 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link.
|
{'CVE-2021-28125'}
|
2021-10-06T17:47:53Z
|
2021-10-06T17:47:53Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'http://www.openwall.com/lists/oss-security/2021/04/27/2', 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434@%3Cdev.superset.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28125', 'https://github.com/advisories/GHSA-pfwg-rxf4-97c3', 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434%40%3Cdev.superset.apache.org%3E'}
| null |
GHSA
|
GHSA-vqcq-mrmw-mcmg
|
Rubyzip gem contains a Directory Traversal vulnerability in zip file component
|
rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem..
This is similar to CVE-2017-5946 which was patched in 1.2.1 but the fix in that case was incomplete.
|
{'CVE-2018-1000544'}
|
2022-04-26T18:30:20Z
|
2018-09-06T03:27:18Z
|
CRITICAL
| 9.8
|
{'CWE-59', 'CWE-434'}
|
{'https://github.com/rubyzip/rubyzip/issues/369', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000544', 'https://github.com/advisories/GHSA-vqcq-mrmw-mcmg', 'https://lists.debian.org/debian-lts-announce/2018/08/msg00013.html', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00002.html', 'https://access.redhat.com/errata/RHSA-2018:3466'}
| null |
GHSA
|
GHSA-jqmc-79gx-7g8p
|
Incorrect Permission Assignment for Critical Resource in CRI-O
|
An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.
|
{'CVE-2022-0532'}
|
2022-02-23T22:00:52Z
|
2022-02-11T00:00:54Z
|
MODERATE
| 4.2
|
{'CWE-732'}
|
{'https://github.com/cri-o/cri-o/pull/5610', 'https://github.com/advisories/GHSA-jqmc-79gx-7g8p', 'https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#enabling-unsafe-sysctls', 'https://github.com/cri-o/cri-o/releases/tag/v1.23.1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0532', 'https://bugzilla.redhat.com/show_bug.cgi?id=2051730'}
| null |
GHSA
|
GHSA-rcwj-2hj2-vmjj
|
Insufficient Session Expiration in Apache NiFi Registry
|
If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi Registry.
|
{'CVE-2020-9482'}
|
2022-02-09T00:23:21Z
|
2022-02-09T00:23:06Z
|
MODERATE
| 6.5
|
{'CWE-613'}
|
{'https://github.com/advisories/GHSA-rcwj-2hj2-vmjj', 'https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9482', 'https://nifi.apache.org/registry-security.html#CVE-2020-9482', 'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'}
| null |
GHSA
|
GHSA-4xfp-4pfp-89wg
|
Reference binding to nullptr in `RaggedTensorToSparse`
|
### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToSparse`:
```python
import tensorflow as tf
tf.raw_ops.RaggedTensorToSparse(
rt_nested_splits=[[0, 38, 0]],
rt_dense_values=[])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/ragged_tensor_to_sparse_kernel.cc#L30) has an incomplete validation of the splits values: it does not check that they are in increasing order.
### Patches
We have patched the issue in GitHub commit [1071f554dbd09f7e101324d366eec5f4fe5a3ece](https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37656'}
|
2021-08-25T14:42:55Z
|
2021-08-25T14:42:55Z
|
HIGH
| 7.1
|
{'CWE-824'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37656', 'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece', 'https://github.com/advisories/GHSA-4xfp-4pfp-89wg', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg'}
| null |
GHSA
|
GHSA-w9q5-mvc6-5cw3
|
Malicious Package in bufder-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:56:44Z
|
2020-09-03T21:45:13Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1235', 'https://github.com/advisories/GHSA-w9q5-mvc6-5cw3'}
| null |
GHSA
|
GHSA-mm4f-47ch-f7hx
|
Arbitrary code execution in kill-by-port
|
This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23363'}
|
2021-04-13T15:32:43Z
|
2021-04-13T15:32:43Z
|
MODERATE
| 6.3
|
{'CWE-77'}
|
{'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23363', 'https://github.com/advisories/GHSA-mm4f-47ch-f7hx', 'https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531', 'https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8'}
| null |
GHSA
|
GHSA-j9m2-6hq2-4r3c
|
Cross-site Scripting in invenio-previewer
|
## Cross-Site Scripting (XSS) vulnerability in JSON, Markdown and iPython Notebook previewers
### Impact
Several Cross-Site Scripting (XSS) vulnerabilities have been found in the JSON, Markdown and iPython Notebook previewers. The vulnerabilities would allow a malicous user to upload a JSON, Markdown or Notebook file with embedded scripts that would be executed by a victims browser.
### Patches
Invenio-Previewer v1.0.0a12 fixes the issue.
### Workarounds
You can remediate the vulnerability without upgrading by disabling the affected previewers. You do this by adding the following to your configuration:
```python
PREVIEWER_PREFERENCE = [
'csv_dthreejs',
'simple_image',
# 'json_prismjs',
'xml_prismjs',
# 'mistune',
'pdfjs',
# 'ipynb',
'zip',
]
```
Afterwards, you should not be able to preview JSON, Markdown or iPython Notebook files.
### For more information
If you have any questions or comments about this advisory:
* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org)
|
{'CVE-2019-1020019'}
|
2021-04-12T21:57:29Z
|
2019-07-16T00:52:22Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-j9m2-6hq2-4r3c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020019', 'https://github.com/inveniosoftware/invenio-previewer/security/advisories/GHSA-j9m2-6hq2-4r3c'}
| null |
GHSA
|
GHSA-4p7j-5ppx-rfhm
|
Downloads Resources over HTTP in apk-parser3
|
Affected versions of `apk-parser3` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser3`.
## Recommendation
Update to version 0.1.3 or greater.
|
{'CVE-2016-10574'}
|
2021-01-07T23:32:43Z
|
2020-09-01T16:06:49Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/245', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10574', 'https://github.com/advisories/GHSA-4p7j-5ppx-rfhm', 'https://www.npmjs.com/advisories/245'}
| null |
GHSA
|
GHSA-6h7f-qwqm-35pp
|
Arbitrary File Read in phantom-html-to-pdf
|
This affects the package phantom-html-to-pdf before 0.6.1.
|
{'CVE-2020-7763'}
|
2021-07-29T20:38:33Z
|
2020-11-06T18:06:16Z
|
HIGH
| 7.5
|
{'CWE-200', 'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7763', 'https://www.npmjs.com/package/phantom-html-to-pdf', 'https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598', 'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259', 'https://github.com/advisories/GHSA-6h7f-qwqm-35pp'}
| null |
GHSA
|
GHSA-25v4-mcx4-hh35
|
Cross-Site Scripting in atlasboard-atlassian-package
|
All versions of `atlasboard-atlassian-package` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize user input that is rendered as HTML, which may allow attackers to execute arbitrary JavaScript in a victim's browser. This requires attackers being able to change issue summaries in Jira tickets.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-04T20:45:45Z
|
2020-09-04T17:28:28Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1449', 'https://hackerone.com/reports/456702', 'https://github.com/advisories/GHSA-25v4-mcx4-hh35'}
| null |
GHSA
|
GHSA-x6mj-w4jf-jmgw
|
Server Side Request Forgery (SSRF) in Kubernetes
|
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services).
|
{'CVE-2020-8555'}
|
2022-04-12T22:54:16Z
|
2022-02-15T01:57:18Z
|
LOW
| 6.3
|
{'CWE-918'}
|
{'https://github.com/kubernetes/kubernetes/pull/89794', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/', 'https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion', 'https://github.com/advisories/GHSA-x6mj-w4jf-jmgw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8555', 'https://security.netapp.com/advisory/ntap-20200724-0005/', 'http://www.openwall.com/lists/oss-security/2020/06/01/4', 'https://github.com/kubernetes/kubernetes/issues/91542', 'http://www.openwall.com/lists/oss-security/2021/05/04/8'}
| null |
GHSA
|
GHSA-qrx8-8545-4wg2
|
XStream is vulnerable to an Arbitrary Code Execution attack
|
### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39148](https://x-stream.github.io/CVE-2021-39148.html).
### Credits
wh1t3p1g from TSRC (Tencent Security Response Center) found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-39148'}
|
2022-04-22T15:42:09Z
|
2021-08-25T14:47:38Z
|
HIGH
| 8.5
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://x-stream.github.io/CVE-2021-39148.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39148', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/advisories/GHSA-qrx8-8545-4wg2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-m9hp-7r99-94h5
|
Critical security issues in XML encoding in github.com/dexidp/dex
|
### Impact
The following vulnerabilities have been disclosed, which impact users leveraging the SAML connector:
Signature Validation Bypass (CVE-2020-15216): https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7
`encoding/xml` instabilities:
- [Element namespace prefix instability (CVE-2020-29511)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md)
- [Attribute namespace prefix instability (CVE-2020-29509)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md)
- [Directive comment instability (CVE-2020-29510)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md)
### Patches
Immediately update to [Dex v2.27.0](https://github.com/dexidp/dex/releases/tag/v2.27.0).
### Workarounds
There are no known workarounds.
|
{'CVE-2020-26290'}
|
2022-04-19T19:02:43Z
|
2021-12-20T17:53:53Z
|
CRITICAL
| 9.3
|
{'CWE-347'}
|
{'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md', 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md', 'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8', 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/', 'https://github.com/dexidp/dex/releases/tag/v2.27.0', 'https://github.com/advisories/GHSA-m9hp-7r99-94h5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26290', 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5', 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md'}
| null |
GHSA
|
GHSA-p5wr-vp8g-q5p4
|
Moderate severity vulnerability that affects Plone
|
Plone 4.x through 4.3.11 and 5.x through 5.0.6 allow remote attackers to bypass a sandbox protection mechanism and obtain sensitive information by leveraging the Python string format method.
|
{'CVE-2017-5524'}
|
2021-06-10T22:12:49Z
|
2018-07-12T14:45:15Z
|
MODERATE
| 4.3
|
{'CWE-134'}
|
{'https://github.com/advisories/GHSA-p5wr-vp8g-q5p4', 'http://www.openwall.com/lists/oss-security/2017/01/18/6', 'https://plone.org/security/hotfix/20170117/sandbox-escape', 'http://www.securityfocus.com/bid/95679', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5524'}
| null |
GHSA
|
GHSA-6qgx-f452-7699
|
Malicious Package in superhappyfuntime
|
All versions of `superhappyfuntime` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T17:08:43Z
|
2020-09-03T23:28:39Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-6qgx-f452-7699', 'https://www.npmjs.com/advisories/1314'}
| null |
GHSA
|
GHSA-rvjg-gxwx-j5gf
|
OIDC Logout redirect in keycloak
|
A flaw was found in keycloak. The OIDC logout endpoint does not have CSRF protection. The highest threat from this vulnerability is to system availability.
|
{'CVE-2020-10734'}
|
2022-04-28T17:13:59Z
|
2022-04-28T17:13:58Z
|
LOW
| 3.3
|
{'CWE-601'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=1831662', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-rvjg-gxwx-j5gf', 'https://issues.redhat.com/browse/KEYCLOAK-13653', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10734', 'https://github.com/advisories/GHSA-rvjg-gxwx-j5gf'}
| null |
GHSA
|
GHSA-wqg7-vrj7-v82h
|
High severity vulnerability that affects mosca
|
This vulnerability allows remote attackers to deny service on vulnerable installations of npm mosca 2.8.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of topics. A crafted regular expression can cause the broker to crash. An attacker can leverage this vulnerability to deny access to the target system.
|
{'CVE-2018-11615'}
|
2021-01-08T01:48:06Z
|
2018-08-31T06:22:50Z
|
HIGH
| 0
|
{'CWE-20'}
|
{'https://zerodayinitiative.com/advisories/ZDI-18-583', 'https://github.com/advisories/GHSA-wqg7-vrj7-v82h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11615'}
| null |
GHSA
|
GHSA-4xc7-x2jr-cr74
|
Improper Authorization in dolibarr/dolibarr
|
Dolibarr allows improper access control issues in the userphoto modulepart. The impact could lead to data exposure as the attached files and documents may contain sensitive information of relevant parties such as contacts, suppliers, invoices, orders, stocks, agenda, accounting and more.
|
{'CVE-2022-0731'}
|
2022-03-04T14:46:06Z
|
2022-02-24T00:00:52Z
|
MODERATE
| 6.5
|
{'CWE-863'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0731', 'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a', 'https://github.com/advisories/GHSA-4xc7-x2jr-cr74', 'https://huntr.dev/bounties/e242ab4e-fc70-4b2c-a42d-5b3ee4895de8'}
| null |
GHSA
|
GHSA-hrgx-7j6v-xj82
|
Reflected cross-site scripting (XSS) vulnerability
|
This security advisory relates to a capability for an attacker to exploit a reflected cross-site scripting vulnerability when using the `@keystone-6/auth` package.
#### Impact
The vulnerability can impact users of the administration user interface when following an untrusted link to the `signin` or `init` page.
This is a targeted attack and may present itself in the form of phishing and or chained in conjunction with some other vulnerability.
## Vulnerability mitigation
Please upgrade to `@keystone-6/auth >= 1.0.2`, where this vulnerability has been closed.
If you are using `@keystone-next/auth`, we **strongly** recommend you upgrade to `@keystone-6`.
### Workarounds
If for some reason you cannot upgrade the dependencies in software, you could alternatively
- disable the administration user interface, or
- if using a reverse-proxy, strip query parameters when accessing the administration interface
### References
https://owasp.org/www-community/attacks/xss/
Thanks to Shivansh Khari (@Shivansh-Khari) for discovering and reporting this vulnerability
|
{'CVE-2022-0087'}
|
2022-04-19T19:03:19Z
|
2022-01-12T21:55:40Z
|
HIGH
| 7.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-hrgx-7j6v-xj82', 'https://huntr.dev/bounties/c9d7374f-2cb9-4bac-9c90-a965942f413e', 'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365cf394467a943cc481b38', 'https://github.com/keystonejs/keystone/security/advisories/GHSA-hrgx-7j6v-xj82', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0087'}
| null |
GHSA
|
GHSA-6675-wwqr-jhmf
|
Cross-site Scripting in GilaCMS
|
A stored cross-site scripting (XSS) vulnerability in GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.
|
{'CVE-2020-20695'}
|
2021-10-04T13:52:09Z
|
2021-09-30T17:12:56Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-20695', 'https://github.com/advisories/GHSA-6675-wwqr-jhmf', 'https://github.com/GilaCMS/gila/issues/52'}
| null |
GHSA
|
GHSA-qcx9-j53g-ccgf
|
Remote Code Execution via unsafe classes in otherwise permitted modules
|
### Impact
The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects.
The policies defined in `AccessControl` severely restrict access to Python modules and only exempt a few that are deemed safe, such as Python's `string` module. However, full access to the `string` module also allows access to the class `Formatter`, which can be overridden and extended within `Script (Python)` in a way that provides access to other unsafe Python libraries. Those unsafe Python libraries can be used for remote code execution.
By default, you need to have the admin-level Zope "Manager" role to add or edit `Script (Python)` objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk.
### Patches
The problem has been fixed in AccessControl 4.3 and 5.2.
Only AccessControl versions 4 and 5 are vulnerable, and only on Python 3, not Python 2.7.
### Workarounds
A site administrator can restrict adding/editing `Script (Python)` objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [AccessControl issue tracker](https://github.com/zopefoundation/AccessControl/issues)
* Email us at [security@plone.org](mailto:security@plone.org)
|
{'CVE-2021-32807'}
|
2021-08-30T23:27:56Z
|
2021-08-05T17:01:30Z
|
MODERATE
| 4.4
|
{'CWE-915'}
|
{'https://github.com/zopefoundation/AccessControl/blob/master/CHANGES.rst#51-2021-07-30', 'https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf', 'https://github.com/advisories/GHSA-qcx9-j53g-ccgf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32807', 'https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c'}
| null |
GHSA
|
GHSA-25pc-85qf-6j69
|
Deserialization of Untrusted Data in Apache Storm
|
In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class.
|
{'CVE-2018-11779'}
|
2021-08-17T20:24:23Z
|
2019-08-01T19:17:53Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://lists.apache.org/thread.html/3e4f704c4bd9296405a07a0290b8cbb6cbf5046e277efe6d93280a98@%3Cuser.storm.apache.org%3E', 'https://github.com/advisories/GHSA-25pc-85qf-6j69', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11779'}
| null |
GHSA
|
GHSA-mm57-9j6q-rxm2
|
High severity vulnerability that affects com.typesafe.akka:akka-actor_2.11 and com.typesafe.akka:akka-actor_2.12
|
Akka versions <=2.4.16 and 2.5-M1 are vulnerable to a java deserialization attack in its Remoting component resulting in remote code execution in the context of the ActorSystem.
|
{'CVE-2017-1000034'}
|
2021-09-15T20:23:29Z
|
2018-10-22T20:52:38Z
|
HIGH
| 8.1
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000034', 'https://github.com/advisories/GHSA-mm57-9j6q-rxm2', 'http://doc.akka.io/docs/akka/2.4/security/2017-02-10-java-serialization.html'}
| null |
GHSA
|
GHSA-q759-hwvc-m3jg
|
Moderate severity vulnerability that affects actionpack
|
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
|
{'CVE-2013-1855'}
|
2021-09-16T19:36:22Z
|
2017-10-24T18:33:37Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1855', 'https://github.com/advisories/GHSA-q759-hwvc-m3jg', 'http://rhn.redhat.com/errata/RHSA-2013-0698.html', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'http://support.apple.com/kb/HT5784', 'https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}
| null |
GHSA
|
GHSA-mj9r-wwm8-7q52
|
Open Redirect in github.com/AndrewBurian/powermux
|
### Impact
Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link.
### Patches
The issue is resolved in v1.1.1
### Workarounds
There are no existing workarounds.
You may detect attempts to craft urls that exploit this feature by looking for request paths containing pairs of forward slashes in sequence combined with a trailing slash e.g. `https://example.com//foo/`
|
{'CVE-2021-32721'}
|
2021-07-01T17:00:32Z
|
2021-07-01T17:00:32Z
|
MODERATE
| 4.7
|
{'CWE-601'}
|
{'https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52', 'https://github.com/advisories/GHSA-mj9r-wwm8-7q52', 'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32721'}
| null |
GHSA
|
GHSA-w5hr-jm4j-9jvq
|
Sandbox escape through template_object in smarty
|
Sandbox protection could be bypassed through access to an internal Smarty object that should have been blocked. Sites that rely on [Smarty Security features](https://www.smarty.net/docs/en/advanced.features.tpl) should upgrade as soon as possible. Please upgrade to 3.1.39 or higher.
|
{'CVE-2021-26119'}
|
2022-05-03T03:42:06Z
|
2021-03-02T02:57:23Z
|
HIGH
| 7.5
| null |
{'https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html', 'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26119', 'https://github.com/smarty-php/smarty/security/advisories/GHSA-w5hr-jm4j-9jvq', 'https://srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-escape-vulnerabilities.html', 'https://github.com/advisories/GHSA-w5hr-jm4j-9jvq', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html', 'https://security.gentoo.org/glsa/202105-06'}
| null |
GHSA
|
GHSA-g87r-23vw-7f87
|
Use After Free in rusqlite
|
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. update_hook has a use-after-free.
|
{'CVE-2021-45719'}
|
2022-01-06T22:00:21Z
|
2022-01-06T22:00:21Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://github.com/advisories/GHSA-g87r-23vw-7f87', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45719', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
| null |
GHSA
|
GHSA-ghgj-3xqr-6jfm
|
Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server
|
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
|
{'CVE-2015-2080'}
|
2021-06-10T23:37:12Z
|
2018-11-09T17:50:00Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2080', 'https://github.com/advisories/GHSA-ghgj-3xqr-6jfm', 'http://www.securityfocus.com/archive/1/534755/100/1600/threaded', 'https://security.netapp.com/advisory/ntap-20190307-0005/', 'http://seclists.org/fulldisclosure/2015/Mar/12', 'https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md', 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00075.html', 'http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html', 'http://www.securityfocus.com/bid/72768', 'https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151804.html', 'http://www.securitytracker.com/id/1031800'}
| null |
GHSA
|
GHSA-f3pg-qwvg-p99c
|
Lenient Parsing of Content-Length Header When Prefixed with Plus Sign
|
### Summary
hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn't parse such `Content-Length` headers, but forwards them, can result in "request smuggling" or "desync attacks".
### Vulnerability
The flaw exists in all prior versions of hyper, if built with [`rustc` v1.5.0 or newer](https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739).
Example:
```
GET / HTTP/1.1
Host: example.com
Content-Length: +3
abc
```
This request gets accepted and hyper reads the body as abc. The request _should_ be rejected, according to RFC 7230, since the ABNF for `Content-Length` only allows for `DIGIT`s. This is due to using the `FromStr` implementation for `u64` in the standard library. By differing from the spec, it is possible to send requests like these to endpoints that have different HTTP implementations, with different interpretations of the payload semantics, and cause "desync attacks".
In this particular case, an upstream proxy would need to error when parsing the `Content-Length`, but _not_ reject the request (swallowing its own error), and forwarding the request as-is with the `Content-Length` still included. _Then_ the upstream proxy and hyper would disagree on the length of the request body. The combination of these factors would be extremely rare.
Read more about desync attacks: https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
### Impact
To determine if vulnerable, all these things must be true:
- **Using hyper as an HTTP server**. While the lenient decoder also exists in the client, a vulnerability does not exist around _responses_.
- **Using HTTP/1**. The HTTP/2 code uses a stricter parser.
- **Using a vulnerable HTTP proxy upstream to hyper**. If an upstream proxy correctly rejects the illegal `Content-Length` header, *OR* can parse the length with the plus sign, the desync attack cannot succeed.
### Patches
We have released the following patch versions:
- v0.14.10 (to be released when this advisor is published)
### Workarounds
Besides upgrading hyper, you can take the following options:
- Reject requests manually that contain a plus sign prefix in the `Content-Length` header.
- Ensure any upstream proxy handles `Content-Length` headers with a plus sign prefix.
### Credits
This issue was initially reported by [Mattias Grenfeldt](https://grenfeldt.dev/) and Asta Olofsson.
|
{'CVE-2021-32715'}
|
2022-04-19T19:03:01Z
|
2021-07-12T16:54:20Z
|
LOW
| 3.1
|
{'CWE-444'}
|
{'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739', 'https://github.com/hyperium/hyper/security/advisories/GHSA-f3pg-qwvg-p99c', 'https://rustsec.org/advisories/RUSTSEC-2021-0078.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32715', 'https://github.com/advisories/GHSA-f3pg-qwvg-p99c'}
| null |
GHSA
|
GHSA-35c4-f3rq-f9g3
|
Moderate severity vulnerability that affects activesupport
|
Withdrawn, accidental duplicate publish.
The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
| null |
2021-12-03T14:23:39Z
|
2018-09-17T21:57:23Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-35c4-f3rq-f9g3', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3227'}
| null |
GHSA
|
GHSA-gmv4-r438-p67f
|
Leading white space bypasses protocol validation
|
### Impact
Whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly and protocol validation mechanisms may fail.
### Patches
Patched in 1.19.9
### Workarounds
Remove leading whitespace from values before passing them to URI.parse (e.g. via `.href(value)` or `new URI(value)`), e.g. by using
```js
function remove_whitespace(url){
const whitespace = /^[\x00-\x20\u00a0\u1680\u2000-\u200a\u2028\u2029\u202f\u205f\u3000\ufeff]+/;
url = url.replace(whitespace, '')
return url
}
```
### References
* https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [medialize/URI.js](https://github.com/medialize/URI.js/)
|
{'CVE-2022-24723'}
|
2022-04-19T19:03:25Z
|
2022-03-03T19:23:36Z
|
MODERATE
| 5.3
|
{'CWE-20'}
|
{'https://github.com/medialize/URI.js/releases/tag/v1.19.9', 'https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24723', 'https://github.com/advisories/GHSA-gmv4-r438-p67f', 'https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/', 'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316'}
| null |
GHSA
|
GHSA-m833-jv95-mfjh
|
Memory safety violation in crayon
|
An issue was discovered in the crayon crate through 2020-08-31 for Rust. A TOCTOU issue has a resultant memory safety violation via HandleLike.
|
{'CVE-2020-35889'}
|
2021-08-25T20:48:50Z
|
2021-08-25T20:48:50Z
|
HIGH
| 8.1
|
{'CWE-367'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35889', 'https://github.com/shawnscode/crayon/issues/87', 'https://github.com/advisories/GHSA-m833-jv95-mfjh', 'https://rustsec.org/advisories/RUSTSEC-2020-0037.html'}
| null |
GHSA
|
GHSA-f263-c949-w85g
|
Improper Authorization in Google OAuth Client
|
PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.
|
{'CVE-2020-7692'}
|
2022-05-04T02:18:41Z
|
2021-09-28T16:16:52Z
|
HIGH
| 7.4
|
{'CWE-862', 'CWE-863'}
|
{'https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E', 'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824', 'https://tools.ietf.org/html/rfc7636%23section-1', 'https://github.com/googleapis/google-oauth-java-client/issues/469', 'https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276', 'https://tools.ietf.org/html/rfc8252%23section-8.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7692', 'https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-f263-c949-w85g'}
| null |
GHSA
|
GHSA-fpjm-rp2g-3r4c
|
Django Rest Framework jwt allows obtaining new token from notionally invalidated token
|
An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained.
|
{'CVE-2020-10594'}
|
2022-03-21T22:21:38Z
|
2020-06-05T16:09:34Z
|
CRITICAL
| 9.1
|
{'CWE-287'}
|
{'https://github.com/Styria-Digital/django-rest-framework-jwt/commit/868b5c22ddad59772b447080183e7c7101bb18e0', 'https://github.com/advisories/GHSA-fpjm-rp2g-3r4c', 'https://github.com/jpadilla/django-rest-framework-jwt/issues/484', 'https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10594', 'https://pypi.org/project/drf-jwt/1.15.1/#history'}
| null |
GHSA
|
GHSA-fcrx-8829-jpqx
|
Improper Restriction of XML External Entity Reference in wutka jox
|
An XML External Entity (XXE) vulnerability exists in wutka jox 1.16 in the readObject method in JOXSAXBeanInput.
|
{'CVE-2021-43142'}
|
2022-04-05T21:37:42Z
|
2022-04-01T00:00:45Z
|
MODERATE
| 0
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-fcrx-8829-jpqx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43142', 'https://novysodope.github.io/2021/10/29/64/'}
| null |
GHSA
|
GHSA-ph8p-2g97-9654
|
Downloads Resources over HTTP in jstestdriver
|
Affected versions of `jstestdriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jstestdriver`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2011.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10643'}
|
2021-01-08T18:21:23Z
|
2018-08-15T19:27:25Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/244', 'https://nodesecurity.io/advisories/244', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10643', 'https://github.com/advisories/GHSA-ph8p-2g97-9654'}
| null |
GHSA
|
GHSA-38f9-m297-6q9g
|
DoS via malicious record IDs in WatermelonDB
|
## Impact
Medium severity 5.9 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
A maliciously crafted record ID can exploit a SQL Injection vulnerability in iOS adapter implementation and cause the app to delete all or selected records from the database, generally causing the app to become unusable.
This may happen in apps that don't validate IDs (valid IDs are `/^[a-zA-Z0-9_-.]+$/`) and use Watermelon Sync or low-level `database.adapter.destroyDeletedRecords` method.
The integrity risk is low due to the fact that maliciously deleted records won't synchronize, so logout-login will restore all data, although some local changes may be lost if the malicious deletion causes the sync process to fail to proceed to push stage.
No way to breach confidentiality with this vulnerability is known. Full exploitation of SQL Injection is mitigated, because it's not possible to nest an insert/update query inside a delete query in SQLite, and it's not possible to pass a semicolon-separated second query. There's also no known practicable way to breach confidentiality by selectively deleting records, because those records will not be synchronized.
It's theoretically possible that selective record deletion could cause an app to behave insecurely if lack of a record is used to make security decisions by the app.
## Patches
Patched versions include:
- 0.15.1
- 0.16.2
- 0.16.1-fix
- this is actually the same as 0.16.0, but with the patch applied - as 0.16.1 is causing issues for some users
- `924c7ae2a8d` commit id contains the patch
## Workarounds
1. Ensure that your backend service sanitizes record IDs sent in the `pull sync` endpoint, such that only IDs matching `/^[a-zA-Z0-9_-.]+$/` are returned. This could also be done in JavaScript `pullChanges` function passed to `synchronize()`
2. If you use `destroyDeletedRecords` directly, validate all IDs passed the same way
## For more information
If you have any questions about this advisory, contact @radex.
|
{'CVE-2020-4035'}
|
2021-01-08T20:15:01Z
|
2020-06-03T21:57:53Z
|
MODERATE
| 5.9
|
{'CWE-89'}
|
{'https://github.com/Nozbe/WatermelonDB/security/advisories/GHSA-38f9-m297-6q9g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4035', 'https://github.com/Nozbe/WatermelonDB/commit/924c7ae2a8d7d6459656751e5b9b1bf91a218025', 'https://github.com/advisories/GHSA-38f9-m297-6q9g'}
| null |
GHSA
|
GHSA-cm9w-c4rj-r2cf
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in view_component
|
This is an XSS vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display.
Versions 2.29.1 and 2.49.1 have been released and fully mitigate the vulnerability.
Avoid passing user input to the `translate` function, or sanitize the inputs before passing them.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [github/view_component](http://github.com/github/view_component) project
|
{'CVE-2022-24722'}
|
2022-03-11T20:08:42Z
|
2022-03-02T22:24:05Z
|
HIGH
| 8.1
|
{'CWE-79'}
|
{'https://github.com/github/view_component/security/advisories/GHSA-cm9w-c4rj-r2cf', 'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9', 'https://github.com/github/view_component/releases/tag/v2.49.1', 'https://github.com/advisories/GHSA-cm9w-c4rj-r2cf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24722', 'https://github.com/github/view_component/releases/tag/v2.31.2'}
| null |
GHSA
|
GHSA-v8mp-hhjq-h4cj
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.ofd` file upload.
|
{'CVE-2022-0965'}
|
2022-03-29T21:18:37Z
|
2022-03-16T00:00:46Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8', 'https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347', 'https://github.com/advisories/GHSA-v8mp-hhjq-h4cj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0965'}
| null |
GHSA
|
GHSA-6xhf-x49c-m5m6
|
Github Token Leak in aegir
|
Affected versions of `aegir` bundle and publish the current users github token to npm when `aegir-release` is executed.
## Recommendation
Update to version 12.0.8 or later.
If you used this module to do a release for your project you should invalidate the GitHub tokens that were leaked.
|
{'CVE-2017-16225'}
|
2021-01-08T19:19:20Z
|
2018-07-24T20:04:11Z
|
HIGH
| 0
|
{'CWE-200'}
|
{'https://www.npmjs.com/advisories/546', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16225', 'https://nodesecurity.io/advisories/546', 'https://github.com/advisories/GHSA-6xhf-x49c-m5m6'}
| null |
GHSA
|
GHSA-fvwr-h9xh-m6wc
|
Denial of Service in @commercial/subtext
|
Versions of `@commercial/subtext` prior to 5.1.1 are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service.
## Recommendation
Upgrade to version 5.1.1 or later.
| null |
2020-09-03T20:33:17Z
|
2020-09-03T20:33:17Z
|
HIGH
| 0
| null |
{'https://www.npmjs.com/advisories/1166', 'https://github.com/advisories/GHSA-fvwr-h9xh-m6wc', 'https://github.com/hapijs/subtext/issues/72'}
| null |
GHSA
|
GHSA-gmxv-xf2q-6j8m
|
Cross-Site Scripting in m-server
|
Versions of `m-server` before 1.4.2 are vulnerable to stored cross-site scripting. This vulnerability is exploitable if an attacker is able to control the name of a file that `m-server` is serving.
## Recommendation
Update to version 1.4.2 or later.
|
{'CVE-2018-16484'}
|
2021-01-08T18:46:13Z
|
2019-02-07T18:16:16Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://hackerone.com/reports/319794', 'https://github.com/advisories/GHSA-gmxv-xf2q-6j8m', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/467.json', 'https://www.npmjs.com/advisories/729', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16484'}
| null |
GHSA
|
GHSA-9wv8-jgw4-4g28
|
High severity vulnerability that affects festivaltts4r
|
Withdrawn, accidental duplicate publish.
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) to_speech or (2) to_mp3 method in lib/festivaltts4r/festival4r.rb.
| null |
2021-12-03T13:53:37Z
|
2018-08-15T20:04:13Z
|
HIGH
| 0
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10194', 'https://github.com/advisories/GHSA-9wv8-jgw4-4g28'}
| null |
GHSA
|
GHSA-rmff-f8w9-c9rm
|
Data races in max7301
|
The `ImmediateIO` and `TransactionalIO` types implement `Sync` for all contained
`Expander<EI>` types regardless of if the `Expander` itself is safe to use
across threads.
As the `IO` types allow retrieving the `Expander`, this can lead to non-thread
safe types being sent across threads as part of the `Expander` leading to data
races.
|
{'CVE-2020-36472'}
|
2021-08-25T20:59:22Z
|
2021-08-25T20:59:22Z
|
MODERATE
| 5.9
|
{'CWE-362'}
|
{'https://github.com/advisories/GHSA-rmff-f8w9-c9rm', 'https://github.com/edarc/max7301/issues/1', 'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36472', 'https://rustsec.org/advisories/RUSTSEC-2020-0152.html'}
| null |
GHSA
|
GHSA-r8f7-9pfq-mjmv
|
Improper Certificate Validation in node-sass
|
Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path.
|
{'CVE-2020-24025'}
|
2022-02-10T11:35:22Z
|
2022-02-09T22:22:24Z
|
MODERATE
| 5.3
|
{'CWE-295'}
|
{'https://github.com/sass/node-sass/issues/3067', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025', 'https://github.com/sass/node-sass/pull/567#issuecomment-656609236', 'https://github.com/advisories/GHSA-r8f7-9pfq-mjmv'}
| null |
GHSA
|
GHSA-6f54-3qr9-pjgj
|
Unauthenticated Access Via OAI-PMH
|
### Impact
Media publication via OAI-PMH allows unauthenticated public access to all media and metadata by default. OAI-PMH is part of the default workflow and is activated by default, requiring active user intervention of users to protect media. This leads to users unknowingly handing out public access to events without their knowledge.
### Patches
The problem has been addressed in Opencast 7.6 and 8.1 where the OAI-PMH endpoint is configured to require users with `ROLE_ADMIN` by default. In addition to this, Opencast 9 removes the OAI-PMH publication from the default workflow, making the publication a conscious decision users have to make by updating their workflows.
### Workarounds
In the organization security configuration (`etc/security/mh_default_org.xml`), change the roles required for accessing `/oaipmh` from `ROLE_ANONYMOUS` to `ROLE_ADMIN`.
### References
- [Public access configuration in the organization's security configuration](https://github.com/opencast/opencast/blob/1fb812c7810c78f09f29a7f455ff920417924307/etc/security/mh_default_org.xml#L271-L276)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at security@opencast.org
|
{'CVE-2020-5228'}
|
2021-01-08T20:32:01Z
|
2020-01-30T21:22:06Z
|
HIGH
| 7.6
|
{'CWE-862'}
|
{'https://github.com/opencast/opencast/security/advisories/GHSA-6f54-3qr9-pjgj', 'https://github.com/advisories/GHSA-6f54-3qr9-pjgj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5228', 'https://github.com/opencast/opencast/blob/1fb812c7810c78f09f29a7f455ff920417924307/etc/security/mh_default_org.xml#L271-L276'}
| null |
GHSA
|
GHSA-3627-w2qr-5fxr
|
Downloads Resources over HTTP in fuseki
|
Affected versions of `fuseki` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fuseki`.
## Recommendation
Update to version 1.0.1 or later.
|
{'CVE-2016-10576'}
|
2021-01-08T20:04:29Z
|
2019-02-18T23:52:07Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/278', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10576', 'https://www.npmjs.com/advisories/278', 'https://github.com/advisories/GHSA-3627-w2qr-5fxr'}
| null |
GHSA
|
GHSA-w364-8vfv-gvf5
|
Downloads Resources over HTTP in phantomjs-cheniu
|
Affected versions of `phantomjs-cheniu` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `phantomjs-cheniu`.
## Recommendation
No patch is currently available for this vulnerability.
As this package is just a fork of Medium's [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs) package, the best mitigation is currently to install the `Medium` version of [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs). This can be done via the following command:
```
npm i phantomjs-prebuilt
```
|
{'CVE-2016-10661'}
|
2021-01-08T01:57:04Z
|
2019-02-18T23:44:52Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-w364-8vfv-gvf5', 'https://nodesecurity.io/advisories/262', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10661', 'https://www.npmjs.com/advisories/262'}
| null |
GHSA
|
GHSA-78rc-8c29-p45g
|
High severity vulnerability that affects actionpack
|
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
|
{'CVE-2016-2098'}
|
2021-06-11T14:04:08Z
|
2017-10-24T18:33:35Z
|
HIGH
| 7.3
|
{'CWE-20'}
|
{'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html', 'https://github.com/advisories/GHSA-78rc-8c29-p45g', 'http://www.securitytracker.com/id/1035122', 'http://www.securityfocus.com/bid/83725', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098', 'http://www.debian.org/security/2016/dsa-3509', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html', 'https://www.exploit-db.com/exploits/40086/', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html', 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html'}
| null |
GHSA
|
GHSA-q263-fvxm-m5mw
|
Heap out of bounds access in MakeEdge in TensorFlow
|
### Impact
Under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The [`MakeEdge` function](https://github.com/tensorflow/tensorflow/blob/3616708cb866365301d8e67b43b32b46d94b08a0/tensorflow/core/common_runtime/graph_constructor.cc#L1426-L1438) creates an edge between one output tensor of the `src` node (given by `output_index`) and the input slot of the `dst` node (given by `input_index`). This is only possible if the types of the tensors on both sides coincide, so the function begins by obtaining the corresponding `DataType` values and comparing these for equality:
```cc
DataType src_out = src->output_type(output_index);
DataType dst_in = dst->input_type(input_index);
//...
```
However, there is no check that the indices point to inside of the arrays they index into. Thus, this can result in accessing data out of bounds of the corresponding heap allocated arrays.
In most scenarios, this can manifest as unitialized data access, but if the index points far away from the boundaries of the arrays this can be used to leak addresses from the library.
### Patches
We have patched the issue in GitHub commit [0cc38aaa4064fd9e79101994ce9872c6d91f816b](https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2020-26271'}
|
2021-01-07T22:36:55Z
|
2020-12-10T19:07:34Z
|
LOW
| 4.4
|
{'CWE-908', 'CWE-125'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26271', 'https://github.com/advisories/GHSA-q263-fvxm-m5mw', 'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q263-fvxm-m5mw'}
| null |
GHSA
|
GHSA-23vf-5g53-hm9q
|
Directory Traversal in list-n-stream
|
Affected versions of `list-n-stream` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
Update to version 0.0.11 or later.
|
{'CVE-2017-16084'}
|
2021-01-08T20:10:06Z
|
2018-07-24T14:57:31Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/344', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16084', 'https://github.com/advisories/GHSA-23vf-5g53-hm9q', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/list-n-stream', 'https://nodesecurity.io/advisories/344'}
| null |
GHSA
|
GHSA-jwqm-c9f2-2cq3
|
Cleartext Transmission of Sensitive Information, Inclusion of Functionality from Untrusted Control Sphere , and Download of Code Without Integrity Check in Eclipse hawkBit
|
Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected.
|
{'CVE-2019-10240'}
|
2021-12-03T14:33:15Z
|
2019-04-15T16:19:23Z
|
HIGH
| 8.1
|
{'CWE-319', 'CWE-829', 'CWE-494'}
|
{'https://github.com/advisories/GHSA-jwqm-c9f2-2cq3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10240'}
| null |
GHSA
|
GHSA-xrg3-hmf3-rvgw
|
Path Traversal in rust-embed
|
An issue was discovered in the rust-embed crate before 6.3.0 for Rust. A ../ directory traversal can sometimes occur in debug mode.
|
{'CVE-2021-45712'}
|
2022-01-07T16:10:23Z
|
2022-01-06T22:03:56Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://rustsec.org/advisories/RUSTSEC-2021-0126.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45712', 'https://github.com/pyros2097/rust-embed/issues/159', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rust-embed/RUSTSEC-2021-0126.md', 'https://github.com/advisories/GHSA-xrg3-hmf3-rvgw'}
| null |
GHSA
|
GHSA-4m72-rmm9-2qjr
|
Moderate severity vulnerability that affects feedparser
|
Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via an unexpected URI scheme, as demonstrated by a javascript: URI.
|
{'CVE-2011-1158'}
|
2021-09-01T15:19:31Z
|
2018-07-23T19:51:43Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'http://www.mandriva.com/security/advisories?name=MDVSA-2011:082', 'https://github.com/advisories/GHSA-4m72-rmm9-2qjr', 'https://bugzilla.novell.com/show_bug.cgi?id=680074', 'http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html', 'http://openwall.com/lists/oss-security/2011/03/15/11', 'https://nvd.nist.gov/vuln/detail/CVE-2011-1158', 'http://www.securityfocus.com/bid/46867', 'http://openwall.com/lists/oss-security/2011/03/14/18', 'http://secunia.com/advisories/44074', 'https://bugzilla.redhat.com/show_bug.cgi?id=684877', 'http://secunia.com/advisories/43730', 'https://code.google.com/p/feedparser/issues/detail?id=255', 'http://support.novell.com/security/cve/CVE-2011-1158.html'}
| null |
GHSA
|
GHSA-c332-w4jm-55wv
|
Regular expression Denial of Service (ReDoS) in EmailValidator class in V7 compatibility module in Vaadin 8
|
Unsafe validation RegEx in `EmailValidator` component in `com.vaadin:vaadin-compatibility-server` versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
|
{'CVE-2021-31409'}
|
2022-04-19T19:02:56Z
|
2021-05-04T17:42:02Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-c332-w4jm-55wv', 'https://vaadin.com/security/cve-2021-31409', 'https://github.com/vaadin/framework/pull/12241', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31409', 'https://github.com/vaadin/framework/security/advisories/GHSA-c332-w4jm-55wv', 'https://github.com/vaadin/framework/issues/12240'}
| null |
GHSA
|
GHSA-r9cr-hvjj-496v
|
Path traversal and improper access control allows leaking out-of-bound files from Argo CD repo-server
|
### Impact
All unpatched versions of Argo CD starting with v1.3.0 are vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD's repo-server.
A malicious Argo CD user who has been granted [`get` access for a repository](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#rbac-resources-and-actions) containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server.
The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file.
Sensitive files which could be leaked include files from other Applications' source repositories (potentially decrypted files, if you are using a decryption plugin) or any secrets which have been mounted as files on the repo-server.
### Patches
A patch for this vulnerability has been released in the following Argo CD versions:
* v2.3.0
* v2.2.6
* v2.1.11
The patches do two things:
1) prevent path traversal
2) limit `/api/v1/repositories/{repo_url}/appdetails` access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges _and_ are requesting details for a `repo_url` that has already been used for the given Application
### Workarounds
The only certain way to avoid the vulnerability is to upgrade.
To mitigate the problem, you can
* avoid storing secrets in git
* avoid mounting secrets as files on the repo-server
* avoid decrypting secrets into files on the repo-server
* carefully [limit who has `get` access for repositories](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#rbac-resources-and-actions)
### References
* [Security documentation for the repo-server component](https://argo-cd.readthedocs.io/en/stable/operator-manual/security/#git-helm-repositories)
* [Argo CD RBAC configuration documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#)
### For more information
Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
|
{'CVE-2022-24730'}
|
2022-03-29T21:52:08Z
|
2022-03-24T00:04:03Z
|
HIGH
| 7.7
|
{'CWE-284', 'CWE-22'}
|
{'https://github.com/advisories/GHSA-r9cr-hvjj-496v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24730', 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v'}
| null |
GHSA
|
GHSA-qrrc-ww9x-r43g
|
Improper Input Validation in Docker Engine
|
An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
|
{'CVE-2020-13401'}
|
2022-04-12T22:52:47Z
|
2022-02-15T01:57:18Z
|
HIGH
| 6
|
{'CWE-20'}
|
{'https://security.gentoo.org/glsa/202008-15', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DN4JQAOXBE3XUNK3FD423LHE3K74EMJT/', 'https://github.com/advisories/GHSA-qrrc-ww9x-r43g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13401', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZLKRCOJMOGUIJI2AS27BOZS3RBEF3K/', 'https://www.debian.org/security/2020/dsa-4716', 'http://www.openwall.com/lists/oss-security/2020/06/01/5', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00040.html', 'https://docs.docker.com/engine/release-notes/', 'https://github.com/docker/docker-ce/releases/tag/v19.03.11', 'https://security.netapp.com/advisory/ntap-20200717-0002/'}
| null |
GHSA
|
GHSA-4mpj-488r-vh6m
|
Path traversal in Neo4j Graph Database
|
### Impact
Directory Traversal Vulnerabilities found in several functions of apoc plugins in Neo4j Graph database. The attacker can retrieve and download files from outside the configured directory on the affected server. Under some circumstances, the attacker can also create files.
### Patches
The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability (for Neo4j 4.2, 4.3, and 4.4 bundled with APOC, upgrade to the appropriate patched version):
3.5 - bundle n/a, standalone 3.5.0.17
4.2 - bundle 4.2.13, standalone 4.2.10
4.3 - bundle 4.3.9, standalone 4.3.0.4
4.4 - bundle 4.4.2, standalone 4.4.0.1
### Workarounds
If you cannot upgrade the library, you can control the [allowlist of the functions](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist) that can be used in your system:
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [neo4j-apoc-procedures](https://github.com/neo4j-contrib/neo4j-apoc-procedures)
* Email us at [security@neo4j.com](mailto:security@neo4j.com)
### Credits
We want to publicly recognize the contribution of Nicolai Grødum from the Red Team of PwC Norway for reporting this issue and following the responsible disclosure [policy](https://neo4j.com/trust-center/responsible-disclosure/).
|
{'CVE-2021-42767'}
|
2022-03-18T20:46:47Z
|
2022-02-01T22:01:14Z
|
CRITICAL
| 9.1
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42767', 'https://neo4j.com', 'https://github.com/advisories/GHSA-4mpj-488r-vh6m', 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-4mpj-488r-vh6m'}
| null |
GHSA
|
GHSA-qcgx-crrx-38v5
|
Denial of service in DataCommunicator class in Vaadin 8
|
Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.
|
{'CVE-2021-33609'}
|
2021-10-20T19:22:22Z
|
2021-10-13T18:54:09Z
|
MODERATE
| 4.3
|
{'CWE-400'}
|
{'https://github.com/vaadin/framework/pull/12415', 'https://github.com/vaadin/framework/security/advisories/GHSA-qcgx-crrx-38v5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33609', 'https://vaadin.com/security/cve-2021-33609', 'https://github.com/advisories/GHSA-qcgx-crrx-38v5'}
| null |
GHSA
|
GHSA-33c7-2mpw-hg34
|
Log injection in uvicorn
|
This affects all versions of package uvicorn. The request logger provided by the package is vulnerable to ASNI escape sequence injection. Whenever any HTTP request is received, the default behaviour of uvicorn is to log its details to either the console or a log file. When attackers request crafted URLs with percent-encoded escape sequences, the logging component will log the URL after it's been processed with urllib.parse.unquote, therefore converting any percent-encoded characters into their single-character equivalent, which can have special meaning in terminal emulators. By requesting URLs with crafted paths, attackers can: * Pollute uvicorn's access logs, therefore jeopardising the integrity of such files. * Use ANSI sequence codes to attempt to interact with the terminal emulator that's displaying the logs (either in real time or from a file).
|
{'CVE-2020-7694'}
|
2021-07-29T21:17:18Z
|
2020-07-29T18:07:16Z
|
HIGH
| 7.5
|
{'CWE-94', 'CWE-116'}
|
{'https://github.com/advisories/GHSA-33c7-2mpw-hg34', 'https://github.com/encode/uvicorn', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7694', 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-575560'}
| null |
GHSA
|
GHSA-x4rg-4545-4w7w
|
Improper Input Validation and Excessive Iteration in Go Facebook Thrift
|
Go Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.03.04.00.
|
{'CVE-2019-3564'}
|
2022-04-12T22:50:27Z
|
2022-02-15T01:57:18Z
|
HIGH
| 7.5
|
{'CWE-834', 'CWE-20', 'CWE-755'}
|
{'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-x4rg-4545-4w7w', 'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156', 'https://www.facebook.com/security/advisories/cve-2019-3564', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3564'}
| null |
GHSA
|
GHSA-pc4w-8v5j-29w9
|
Deserialization of Untrusted Data in Neo4j
|
Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
|
{'CVE-2021-34371'}
|
2021-09-01T18:31:29Z
|
2021-09-01T18:31:29Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://github.com/advisories/GHSA-pc4w-8v5j-29w9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34371', 'https://www.exploit-db.com/exploits/50170'}
| null |
GHSA
|
GHSA-pgjj-866w-fc5c
|
Risk of code injection
|
### Impact
Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues
### Patches
Temporarily removed the problematic route and added a `no-new-func` rule to eslint
Self-built users should upgrade to 7f1c430 and later as soon as possible
### Credits
Tencent Woodpecker Security Team
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/DIYgod/RSSHub/issues](https://github.com/DIYgod/RSSHub/issues)
* Email us at [i@diygod.me](mailto:i@diygod.me)
|
{'CVE-2021-21278'}
|
2021-10-12T16:03:43Z
|
2021-10-12T16:03:43Z
|
HIGH
| 8.6
|
{'CWE-74'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21278', 'https://github.com/advisories/GHSA-pgjj-866w-fc5c', 'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d', 'https://www.npmjs.com/package/rsshub', 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-pgjj-866w-fc5c'}
| null |
GHSA
|
GHSA-2xv3-h762-ccxv
|
Out-of-bounds Read in concat-with-sourcemaps
|
Versions of `concat-with-sourcemaps` before 1.0.6 allocates uninitialized Buffers when a number is passed as a separator.
## Recommendation
Update to version 1.0.6 or later.
| null |
2021-09-22T19:49:46Z
|
2019-05-29T19:18:02Z
|
MODERATE
| 0
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-2xv3-h762-ccxv', 'https://github.com/floridoo/concat-with-sourcemaps/blob/v1.0.5/index.js#L18', 'https://www.npmjs.com/advisories/644', 'https://hackerone.com/reports/320166'}
| null |
GHSA
|
GHSA-48mj-p7x2-5jfm
|
Basic auth bypass in esphome
|
### Impact
Anyone with web_server enabled and HTTP basic auth configured on 2021.9.1 or older
`web_server` allows OTA update without checking user defined basic auth username & password
### Patches
Patch released in 2021.9.2
### Workarounds
Disable/remove `web_server`
|
{'CVE-2021-41104'}
|
2022-04-19T19:03:10Z
|
2021-09-29T17:09:14Z
|
HIGH
| 7.5
|
{'CWE-306'}
|
{'https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8a5a14de8d5ca1e', 'https://github.com/esphome/esphome/commit/be965a60eba6bb769e2a5afdbc8eed132f077a59', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41104', 'https://github.com/esphome/esphome/security/advisories/GHSA-48mj-p7x2-5jfm', 'https://github.com/esphome/esphome/releases/tag/2021.9.2', 'https://github.com/advisories/GHSA-48mj-p7x2-5jfm'}
| null |
GHSA
|
GHSA-gjcw-v447-2w7q
|
Forgeable Public/Private Tokens in jws
|
Affected versions of the `jws` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT as a bearer token, the end result is a complete authentication bypass with minimal effort.
## Recommendation
Update to version 3.0.0 or later.
|
{'CVE-2016-1000223'}
|
2021-09-23T21:25:35Z
|
2020-09-01T15:23:18Z
|
HIGH
| 8.7
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000223', 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://snyk.io/vuln/npm:jws:20160726', 'https://github.com/advisories/GHSA-gjcw-v447-2w7q', 'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e', 'https://www.npmjs.com/advisories/88'}
| null |
GHSA
|
GHSA-pv8x-p9hq-j328
|
Arbitrary Code Execution in mathjs
|
math.js before 3.17.0 had an issue where private properties such as a constructor could be replaced by using unicode characters when creating an object.
## Recommendation
Upgrade to version 3.17.0 or later.
|
{'CVE-2017-1001003'}
|
2021-01-08T18:19:21Z
|
2017-12-18T22:27:53Z
|
CRITICAL
| 0
|
{'CWE-88'}
|
{'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761', 'https://github.com/advisories/GHSA-pv8x-p9hq-j328', 'https://www.npmjs.com/advisories/551', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001003'}
| null |
GHSA
|
GHSA-2mxc-m4c3-wqhq
|
Malicious Package in ruffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:18:33Z
|
2020-09-03T22:50:46Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1273', 'https://github.com/advisories/GHSA-2mxc-m4c3-wqhq'}
| null |
GHSA
|
GHSA-j3qq-qvc8-c6g7
|
Malicious Package in foever
|
All versions of `foever` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
| null |
2021-10-01T13:29:50Z
|
2020-09-01T21:15:09Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-j3qq-qvc8-c6g7', 'https://www.npmjs.com/advisories/688'}
| null |
GHSA
|
GHSA-536f-268f-6gxc
|
Malicious Package in buffermxor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:25:47Z
|
2020-09-03T22:17:36Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-536f-268f-6gxc', 'https://www.npmjs.com/advisories/1256'}
| null |
GHSA
|
GHSA-vcfp-ppqw-mf23
|
Downloads Resources over HTTP in fis-sass-all
|
Affected versions of `fis-sass-all` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-sass-all`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10686'}
|
2021-09-16T20:52:57Z
|
2018-08-17T20:20:46Z
|
HIGH
| 0
|
{'CWE-311', 'CWE-269'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10686', 'https://github.com/advisories/GHSA-vcfp-ppqw-mf23', 'https://www.npmjs.com/advisories/287', 'https://nodesecurity.io/advisories/287'}
| null |
GHSA
|
GHSA-qrmm-w75w-3wpx
|
Server side request forgery in SwaggerUI
|
SwaggerUI supports displaying remote OpenAPI definitions through the `?url` parameter. This enables robust demonstration capabilities on sites like `petstore.swagger.io`, `editor.swagger.io`, and similar sites, where users often want to see what their OpenAPI definitions would look like rendered.
However, this functionality may pose a risk for users who host their own SwaggerUI instances. In particular, including remote OpenAPI definitions opens a vector for phishing attacks by abusing the trusted names/domains of self-hosted instances.
An example scenario abusing this functionality could take the following form:
- `https://example.com/api-docs` hosts a version of SwaggerUI with `?url=` query parameter enabled.
- Users will trust the domain `https://example.com` and the contents of the OpenAPI definition.
- A malicious actor may craft a similar OpenAPI definition and service that responds to the defined APIs at `https://evildomain`.
- Users mistakenly click a phishing URL like `https://example.com/api-docs?url=https://evildomain/fakeapi.yaml` and enters sensitive data via the "Try-it-out" feature.
We do want to stress that this attack vector is limited to scenarios that actively trick users into divulging sensitive information. The ease of this is highly contextual and, therefore, the threat model may be different for individual users and organizations. It is *not* possible to perform non-interactive attacks (e.g., cross-site scripting or code injection) through this mechanism.
### Resolution
We've made the decision to [disable query parameters (#4872)](https://github.com/swagger-api/swagger-ui/issues/4872) by default starting with SwaggerUI version `4.1.3`. Please update to this version when it becomes available (**ETA: 2021 December**). Users will still be able to be re-enable the options at their discretion. We'll continue to enable query parameters on the Swagger demo sites.
### Workaround
If you host a version of SwaggerUI and wish to mitigate this issue immediately, you are encouraged to add the following custom plugin code:
```js
SwaggerUI({
// ...other configuration options,
plugins: [function UrlParamDisablePlugin() {
return {
statePlugins: {
spec: {
wrapActions: {
// Remove the ?url parameter from loading an external OpenAPI definition.
updateUrl: (oriAction) => (payload) => {
const url = new URL(window.location.href)
if (url.searchParams.has('url')) {
url.searchParams.delete('url')
window.location.replace(url.toString())
}
return oriAction(payload)
}
}
}
}
}
}],
})
```
### Future UX work
Through the exploration of this issue, it became apparent that users may not be aware to which web server the Try-it-out function will send requests. While this information is currently presented at the top of the page, understanding may improve by displaying it closer to the "Execute" button where requests are actually made. We'll be exploring these UX improvements over the coming months and welcome community input. Please create a Feature Request under the GitHub Issue tab to start a conversation with us and the community.
## Reflected XSS attack
**Warning** in versions <= 3.36.2, it is possible to combine the URL options (as mentioned above) with a vunerability in DOMPurify (https://www.cvedetails.com/cve/CVE-2020-26870/) to create a reflected XSS vector. If your version of Swagger UI is older than or equal to 3.36.2, we suggest you upgrade or implement the workaround as mentioned above.
| null |
2022-04-19T19:03:17Z
|
2021-12-09T19:08:38Z
|
MODERATE
| 0
|
{'CWE-918'}
|
{'https://github.com/advisories/GHSA-qrmm-w75w-3wpx', 'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76', 'https://github.com/swagger-api/swagger-ui/security/advisories/GHSA-qrmm-w75w-3wpx', 'https://github.com/swagger-api/swagger-ui/issues/4872'}
| null |
GHSA
|
GHSA-5gm6-r79q-hfgw
|
Denial of service in direct_mail
|
The direct_mail extension through 5.2.3 for TYPO3 allows Denial of Service via log entries.
|
{'CVE-2020-12697'}
|
2021-05-24T16:58:32Z
|
2021-05-24T16:58:32Z
|
MODERATE
| 5.3
|
{'CWE-770'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-12697', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005', 'https://github.com/advisories/GHSA-5gm6-r79q-hfgw'}
| null |
GHSA
|
GHSA-38cr-2ph5-frr9
|
Apache Struts REST Plugin can potentially allow a DoS attack
|
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.
|
{'CVE-2018-1327'}
|
2022-04-26T18:59:22Z
|
2018-10-16T19:35:26Z
|
HIGH
| 7.5
|
{'CWE-91'}
|
{'https://cwiki.apache.org/confluence/display/WW/S2-056', 'https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3@%3Cissues.struts.apache.org%3E', 'https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db@%3Cissues.struts.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securityfocus.com/bid/103516', 'https://security.netapp.com/advisory/ntap-20180330-0001/', 'https://github.com/advisories/GHSA-38cr-2ph5-frr9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1327', 'http://www.securitytracker.com/id/1040575'}
| null |
GHSA
|
GHSA-35q2-47q7-3pc3
|
Potential exponential regex in monitor mode
|
### Impact
When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service.
### Patches
The problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e) and was released in version `3.1.1`.
### References
#1569 (GHSL-2021-026)
|
{'CVE-2021-29469'}
|
2022-04-19T19:02:53Z
|
2021-04-27T15:56:03Z
|
LOW
| 0
|
{'CWE-400'}
|
{'https://security.netapp.com/advisory/ntap-20210611-0010/', 'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e', 'https://github.com/advisories/GHSA-35q2-47q7-3pc3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29469', 'https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1', 'https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3'}
| null |
GHSA
|
GHSA-85fq-56wq-gmcf
|
Hijacked Environment Variables in mariadb
|
The `mariadb` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16046'}
|
2021-01-08T19:12:06Z
|
2018-07-18T18:28:17Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/495', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16046', 'https://github.com/advisories/GHSA-85fq-56wq-gmcf', 'https://www.npmjs.com/advisories/495'}
| null |
GHSA
|
GHSA-r838-q6jp-58xx
|
Improper Restriction of Excessive Authentication Attempts in py-bcrypt
|
The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.
|
{'CVE-2013-1895'}
|
2021-10-12T16:31:22Z
|
2021-10-12T16:31:22Z
|
HIGH
| 7.5
|
{'CWE-307'}
|
{'http://www.securityfocus.com/bid/58702', 'http://www.openwall.com/lists/oss-security/2013/03/26/2', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83039', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101382.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1895', 'https://github.com/advisories/GHSA-r838-q6jp-58xx', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101387.html'}
| null |
GHSA
|
GHSA-ccrp-c664-8p4j
|
Cross-Site Scripting in markdown-to-jsx
|
Versions of `markdown-to-jsx` prior to 6.11.4 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing `data` or VBScript URIs and a base64-encoded payload.
## Recommendation
Upgrade to version 6.11.4 or later.
| null |
2021-09-29T19:59:57Z
|
2020-09-03T21:17:36Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/probablyup/markdown-to-jsx/pull/307', 'https://github.com/advisories/GHSA-ccrp-c664-8p4j', 'https://www.npmjs.com/advisories/1219'}
| null |
GHSA
|
GHSA-jh82-c5jw-pxpc
|
Denial of Service in Onionshare
|
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/).
- Vulnerability ID: OTF-012
- Vulnerability type: Denial of Service
- Threat level: Moderate
## Description:
The receive mode limits concurrent uploads to 100 per second and blocks other uploads in the same second, which can be triggered by a simple script.
## Technical description:
The following script uses GNU parallel and curl with around 6000 requests in parallel to send 10000 requests. A change in the `ulimit -n` configuration is required for it to work. This is sufficient to block file upload on a (public) receive instance.
```
seq 10000 | parallel --max-args 0 --jobs 6000 "curl -i -s -x socks5h://localhost:9150 -k -X $'POST' -H $'Host: csqrp3qciewvj5axph4o62jnr6aevhmpxfkydmi3256bprhbusr2ltid.onion' -H $'Accept-Encoding: gzip, deflate' -H $'Content-Type: multipart/form-data; boundary=---------------------------19182376703918074873375387042' -H $'Content-Length: 329' -H $'Connection: close' --data-binary $'-----------------------------19182376703918074873375387042\x0d\x0aContent-Disposition: form-data; name=\"file[]\"; filename=\"poc.txt\"\x0d\x0aContent-Type: text/plain\x0d\x0a\x0d\x0aA\x0d\x0a-----------------------------19182376703918074873375387042\x0d\x0aContent-Disposition: form-data; name=\"text\"\x0d\x0a\x0d\x0a\x0d\x0a-----------------------------19182376703918074873375387042--\x0d\x0a' $'http://csqrp3qciewvj5axph4o62jnr6aevhmpxfkydmi3256bprhbusr2ltid.onion/upload-ajax'"
```
Attack duration was around 80 seconds.
Cases where over 99 requests were sent per second:
```
Every 0.1s: ls | grep... onionvm: Tue Oct 5 12:17:00 2021
78
```
Cases where files were successfully written to disk:
```
Every 0.1s: ls | wc -w onionvm: Tue Oct 5 12:17:00 2021
8399
```
This means that during the attack time 1601 requests of 10000 were dropped. We tried to upload multiple files in the web interface during the attack and were not successful.
The failsafe is used to prevent creating more than 100 directories per second:
https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/web/receive_mode.py#L386-L427
The limit of 100 requests/second is significantly lower than the possible network bandwidth and greatly reduces the attack complexity for denial of service. Our test was conducted over the tor network, which showed no limitation for the required bandwidth.
## Impact:
An adversary with access to the receive mode can block file upload for others. There is no way to block this attack in public mode due to the anonymity properties of the tor network.
## Recommendation:
- Remove this limitation, or
- Derive directory name from milliseconds
|
{'CVE-2022-21689'}
|
2022-01-21T23:20:27Z
|
2022-01-21T23:20:27Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc', 'https://github.com/advisories/GHSA-jh82-c5jw-pxpc', 'https://github.com/onionshare/onionshare/releases/tag/v2.5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21689'}
| null |
GHSA
|
GHSA-3pwh-5mmc-mwrx
|
Denial of Service in nes
|
Affected versions of `nes` are vulnerable to denial of service when given an invalid `cookie` header, and websocket authentication is set to `cookie`. Submitting an invalid cookie on the websocket upgrade request will cause the node process to throw and exit.
## Recommendation
Update to version 6.4.1 or later.
|
{'CVE-2017-16025'}
|
2021-01-08T20:00:19Z
|
2018-07-24T20:06:33Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16025', 'https://github.com/advisories/GHSA-3pwh-5mmc-mwrx', 'https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655', 'https://www.npmjs.com/advisories/331', 'https://github.com/hapijs/nes/issues/171', 'https://nodesecurity.io/advisories/331'}
| null |
GHSA
|
GHSA-fxpg-gg9g-76gj
|
Moderate severity vulnerability that affects django
|
Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie.
|
{'CVE-2010-3082'}
|
2021-09-10T20:17:18Z
|
2018-07-23T19:52:42Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-fxpg-gg9g-76gj', 'http://www.djangoproject.com/weblog/2010/sep/08/security-release/', 'https://nvd.nist.gov/vuln/detail/CVE-2010-3082', 'http://www.securityfocus.com/bid/43116', 'http://www.ubuntu.com/usn/USN-1004-1', 'https://bugzilla.redhat.com/show_bug.cgi?id=632239', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/61729', 'http://marc.info/?l=oss-security&m=128403961700444&w=2'}
| null |
GHSA
|
GHSA-w3jx-wv97-67ph
|
Cross-site scripting in Dutchcoders transfer.sh
|
Dutchcoders transfer.sh before 1.2.4 allows XSS via an inline view.
|
{'CVE-2021-33496'}
|
2021-06-29T21:25:27Z
|
2021-06-29T21:25:27Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4', 'https://github.com/advisories/GHSA-w3jx-wv97-67ph', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33496', 'https://vuln.ryotak.me/advisories/43', 'https://github.com/dutchcoders/transfer.sh/pull/373', 'https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4'}
| null |
GHSA
|
GHSA-wpww-4jf4-4hx8
|
Edit feed settings and others, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
|
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS).
Impact: XSS via Arbitrary script execution.
Attack vector is: Administrator must be logged in.
Components are: Edit feed settings, Edit widget area, Sub site new registration, New category registration
Tested baserCMS Version : 4.4.0 (Latest)
Affected baserCMS Version : 4.0.0 ~ 4.4.0
Patches : https://basercms.net/security/20201029
Found by Aquilao Null
|
{'CVE-2020-15273'}
|
2022-04-19T19:02:38Z
|
2020-11-04T21:08:38Z
|
LOW
| 7.3
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15273', 'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1', 'https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8', 'https://packagist.org/packages/baserproject/basercms', 'https://github.com/advisories/GHSA-wpww-4jf4-4hx8'}
| null |
GHSA
|
GHSA-7gm7-8q8v-9gf2
|
Server-Side Request Forgery (SSRF) in Shopware
|
### Impact
The attacker can abuse the Admin SDK functionality on the server to read or update internal resources.
### Patches
We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
{'CVE-2022-24871'}
|
2022-04-22T21:04:08Z
|
2022-04-22T21:04:07Z
|
HIGH
| 7.2
|
{'CWE-918'}
|
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022', 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://github.com/advisories/GHSA-7gm7-8q8v-9gf2', 'https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24871'}
| null |
GHSA
|
GHSA-3p94-vj97-fm4q
|
OS Command Injection in fsa
|
fsa through 0.5.1 is vulnerable to Command Injection. The first argument of 'execGitCommand()', located within 'lib/rep.js#63' can be controlled by users without any sanitization to inject arbitrary commands.
|
{'CVE-2020-7615'}
|
2021-12-09T19:56:44Z
|
2021-12-09T19:56:44Z
|
MODERATE
| 7.8
|
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-3p94-vj97-fm4q', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7615', 'https://github.com/gregof/fsa/blob/master/lib/rep.js#L12', 'https://snyk.io/vuln/SNYK-JS-FSA-564118'}
| null |
GHSA
|
GHSA-rrfp-j2mp-hq9c
|
Segfault in `tf.quantization.quantize_and_dequantize`
|
### Impact
An attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`:
```python
tf.quantization.quantize_and_dequantize(
input=[2.5, 2.5], input_min=[0,0], input_max=[1,1], axis=10)
```
This results in accessing [a dimension outside the rank of the input tensor](https://github.com/tensorflow/tensorflow/blob/0225022b725993bfc19b87a02a2faaad9a53bc17/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L74) in the C++ kernel implementation:
```
const int depth = (axis_ == -1) ? 1 : input.dim_size(axis_);
```
However, [`dim_size` only does a `DCHECK`](https://github.com/tensorflow/tensorflow/blob/0225022b725993bfc19b87a02a2faaad9a53bc17/tensorflow/core/framework/tensor_shape.cc#L292-L307) to validate the argument and then uses it to access the corresponding element of an array:
```
int64 TensorShapeBase<Shape>::dim_size(int d) const {
DCHECK_GE(d, 0);
DCHECK_LT(d, dims());
DoStuffWith(dims_[d]);
}
```
Since in normal builds, `DCHECK`-like macros are no-ops, this results in segfault and access out of bounds of the array.
### Patches
We have patched the issue in eccb7ec454e6617738554a255d77f08e60ee0808 and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported in #42105
|
{'CVE-2020-15265'}
|
2021-08-26T15:20:29Z
|
2020-11-13T17:13:04Z
|
LOW
| 5.9
|
{'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrfp-j2mp-hq9c', 'https://github.com/tensorflow/tensorflow/issues/42105', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15265', 'https://github.com/advisories/GHSA-rrfp-j2mp-hq9c', 'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808'}
| null |
GHSA
|
GHSA-3wcq-x3mq-6r9p
|
Potential memory exposure in dns-packet
|
This affects the package dns-packet before versions 1.3.2 and 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.
|
{'CVE-2021-23386'}
|
2021-05-27T23:00:16Z
|
2021-05-24T19:51:04Z
|
HIGH
| 7.7
|
{'CWE-200', 'CWE-908'}
|
{'https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56', 'https://github.com/mafintosh/dns-packet/commit/0d0d593f8df4e2712c43957a6c62e95047f12b2d', 'https://github.com/advisories/GHSA-3wcq-x3mq-6r9p', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1295719', 'https://hackerone.com/bugs?subject=user&%3Breport_id=968858', 'https://snyk.io/vuln/SNYK-JS-DNSPACKET-1293563', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23386'}
| null |
GHSA
|
GHSA-8xqr-4cpm-wx7g
|
Cross-Site Scripting in react-svg
|
Versions of `react-svg` before 2.2.18 are vulnerable to cross-site scripting (xss). This is due to the fact that scripts found in SVG files are run by default.
## Recommendation
Update to version 2.2.18 or later.
| null |
2021-08-04T20:24:38Z
|
2019-05-31T23:47:27Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://nodesecurity.io/advisories/648', 'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb', 'https://github.com/tanem/react-svg/pull/57', 'https://www.npmjs.com/advisories/648', 'https://github.com/advisories/GHSA-8xqr-4cpm-wx7g'}
| null |
GHSA
|
GHSA-rmm5-g63h-m6g9
|
Moderate severity vulnerability that affects ro.pippo:pippo-core
|
jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE.
|
{'CVE-2018-20059'}
|
2021-09-17T18:57:43Z
|
2018-12-19T19:24:39Z
|
CRITICAL
| 9.8
|
{'CWE-611'}
|
{'https://github.com/pippo-java/pippo/issues/486', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20059', 'https://github.com/advisories/GHSA-rmm5-g63h-m6g9'}
| null |
GHSA
|
GHSA-c545-c4f9-rf6v
|
Heap OOB in TFLite
|
### Impact
TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside of bounds of heap allocated data:
```cc
if (axis < 0) {
axis = input_dims.size + 1 + axis;
}
TF_LITE_ENSURE(context, axis <= input_dims.size);
TfLiteIntArray* output_dims = TfLiteIntArrayCreate(input_dims.size + 1);
for (int i = 0; i < output_dims->size; ++i) {
if (i < axis) {
output_dims->data[i] = input_dims.data[i];
} else if (i == axis) {
output_dims->data[i] = 1;
} else {
output_dims->data[i] = input_dims.data[i - 1];
}
}
```
If `axis` is a large negative value (e.g., `-100000`), then after the first `if` it would still be negative. The check following the `if` statement will pass and the `for` loop would read one element before the start of `input_dims.data` (when `i = 0`).
### Patches
We have patched the issue in GitHub commit [d94ffe08a65400f898241c0374e9edc6fa8ed257](https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security.
|
{'CVE-2021-37685'}
|
2021-08-25T14:40:09Z
|
2021-08-25T14:40:09Z
|
MODERATE
| 5.5
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-c545-c4f9-rf6v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37685', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v', 'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257'}
| null |
GHSA
|
GHSA-6qqf-vvcr-7qrv
|
Cryptographically Weak PRNG in generate-password
|
Affected versions of generate-password generate random values that are biased towards certain characters depending on the chosen character sets. This may result in guessable passwords.
## Recommendation
Update to version 1.4.1 or later.
| null |
2021-08-04T15:27:17Z
|
2019-05-23T09:27:22Z
|
MODERATE
| 0
|
{'CWE-338'}
|
{'https://github.com/advisories/GHSA-6qqf-vvcr-7qrv', 'https://www.npmjs.com/advisories/762', 'https://github.com/brendanashworth/generate-password/pull/26'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.