ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-3gm7-v7vw-866c
XML External Entity (XXE) Injection in Apache Solr
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
{'CVE-2019-0193'}
2021-08-31T21:17:20Z
2019-08-01T19:17:35Z
HIGH
7.2
{'CWE-94'}
{'https://lists.apache.org/thread.html/9b0e7a7e3e18d0724f511403b364fc082ff56e3134d84cfece1c82fc@%3Cissues.lucene.apache.org%3E', 'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7', 'https://lists.apache.org/thread.html/rb34d820c21f1708c351f9035d6bc7daf80bfb6ef99b34f7af1d2f699@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/e85f735fad06a0fb46e74b7e6e9ce7ded20b59637cd9f993310f814d@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://github.com/advisories/GHSA-3gm7-v7vw-866c', 'https://issues.apache.org/jira/browse/SOLR-13669', 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00013.html', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00025.html', 'https://lists.apache.org/thread.html/55880d48e38ba9e8c41a3b9e41051dbfdef63b86b0cfeb32967edf03@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/7143983363f0ba463475be4a8b775077070a08dbf075449b7beb51ee@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0193', 'https://lists.apache.org/thread.html/6f2d61bd8732224c5fd3bdd84798f8e01e4542d3ee2f527a52a81b83@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/42cc4d334ba33905b872a0aa00d6a481391951c8b1450f01b077ce74@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/a6e3c09dba52b86d3a1273f82425973e1b0623c415d0e4f121d89eab@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r33aed7ad4ee9833c4190a44e2b106efd2deb19504b85e012175540f6@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/1addbb49a1fc0947fb32ca663d76d93cfaade35a4848a76d4b4ded9c@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESOLR-536063'}
null
GHSA
GHSA-9w8f-7wgr-2h7g
kimai2 is vulnerable to Improper Access Control
kimai2 is vulnerable to Improper Access Control
{'CVE-2021-3992'}
2021-12-03T20:42:59Z
2021-12-03T20:42:59Z
MODERATE
6.5
{'CWE-863', 'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3992', 'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5', 'https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93', 'https://github.com/advisories/GHSA-9w8f-7wgr-2h7g'}
null
GHSA
GHSA-484q-784p-8m5h
Cross-site Scripting in keycloak
A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack.
{'CVE-2020-10776'}
2022-02-09T00:58:15Z
2022-02-09T00:58:15Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-484q-784p-8m5h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10776', 'https://bugzilla.redhat.com/show_bug.cgi?id=1847428'}
null
GHSA
GHSA-vfxj-qg93-7wwc
Sessions could be hijacked due to tracking contacts by an auto-incremented ID in Mautic
### Impact An issue was discovered in Mautic 1.x and 2.x before 2.13.0. It is possible to systematically emulate tracking cookies per contact due to tracking the contact by their auto-incremented ID. Thus, a third party can manipulate the cookie value with +1 to systematically assume being tracked as each contact in Mautic. It is then possible to retrieve information about the contact through forms that have progressive profiling enabled. ### Patches Update to 2.13.0 or later ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2018-10189'}
2022-04-19T19:02:45Z
2021-01-19T21:16:21Z
MODERATE
7.5
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-10189', 'https://github.com/mautic/mautic/releases/tag/2.13.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-vfxj-qg93-7wwc', 'https://github.com/advisories/GHSA-vfxj-qg93-7wwc'}
null
GHSA
GHSA-9ccv-p7fg-m73x
XML Injection in python-libnmap
python-libnmap is affected by: XML Injection. The impact is: Denial of service (DoS) by consuming resources. The component is: XML Parsing. The attack vector is: Specially crafted XML payload.
{'CVE-2019-1010017'}
2021-08-17T18:24:43Z
2019-07-18T15:38:41Z
HIGH
7.5
{'CWE-91'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1010017', 'https://github.com/savon-noir/python-libnmap/issues/87', 'https://github.com/advisories/GHSA-9ccv-p7fg-m73x'}
null
GHSA
GHSA-g95f-p29q-9xw4
Regular Expression Denial of Service in braces
Versions of `braces` prior to 2.3.1 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. ## Recommendation Upgrade to version 2.3.1 or higher.
null
2021-08-04T21:35:07Z
2019-06-06T15:30:30Z
LOW
3.7
{'CWE-400', 'CWE-185'}
{'https://snyk.io/vuln/npm:braces:20180219', 'https://www.npmjs.com/advisories/786', 'https://github.com/advisories/GHSA-g95f-p29q-9xw4', 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'}
null
GHSA
GHSA-59hh-656j-3p7v
DoS via maliciously crafted p2p message
### Impact A vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer, via the `snap/1` protocol. The crash can be triggered by sending a malicious `snap/1` `GetTrieNodes` package. ### Details On September 21, 2021, geth-team member Gary Rong (@rjl493456442) found a way to crash the snap request handler . By using this vulnerability, a peer connected on the `snap/1` protocol could cause a vulnerable node to crash with a `panic`. In the `trie.TryGetNode` implementation, if the requested path is reached, the associated node will be returned. However the nilness is not checked there. ```golang func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) { // If we reached the requested path, return the current node if pos >= len(path) { // Although we most probably have the original node expanded, encoding // that into consensus form can be nasty (needs to cascade down) and // time consuming. Instead, just pull the hash up from disk directly. var hash hashNode if node, ok := origNode.(hashNode); ok { hash = node } else { hash, _ = origNode.cache() } ``` More specifically the `origNode` can be nil(e.g. the child of fullnode) and system can panic at line `hash, _ = origNode.cache()`. When investigating this, @holiman tried to find it via fuzzing, which uncovered a second crasher, also related to the snap `GetTrieNodes` package. If the caller requests a storage trie: ```golang // Storage slots requested, open the storage trie and retrieve from there account, err := snap.Account(common.BytesToHash(pathset[0])) loads++ // always account database reads, even for failures if account == nil { break } stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb) ``` The code assumes that `snap.Account` returns _either_ a non-nil response unless `error` is also provided. This is however not the case, since `snap.Account` can return `nil, nil`. ### Patches ```diff --- a/eth/protocols/snap/handler.go +++ b/eth/protocols/snap/handler.go @@ -469,7 +469,7 @@ func handleMessage(backend Backend, peer *Peer) error { // Storage slots requested, open the storage trie and retrieve from there account, err := snap.Account(common.BytesToHash(pathset[0])) loads++ // always account database reads, even for failures - if err != nil { + if err != nil || account == nil { break } stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb) diff --git a/trie/trie.go b/trie/trie.go index 7ea7efa835..d0f0d4e2bc 100644 --- a/trie/trie.go +++ b/trie/trie.go @@ -174,6 +174,10 @@ func (t *Trie) TryGetNode(path []byte) ([]byte, int, error) { } func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) { + // If non-existent path requested, abort + if origNode == nil { + return nil, nil, 0, nil + } // If we reached the requested path, return the current node if pos >= len(path) { // Although we most probably have the original node expanded, encoding @@ -193,10 +197,6 @@ func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, new } // Path still needs to be traversed, descend into children switch n := (origNode).(type) { - case nil: - // Non-existent path requested, abort - return nil, nil, 0, nil - case valueNode: // Path prematurely ended, abort return nil, nil, 0, nil ``` The fixes were merged into [#23657](https://github.com/ethereum/go-ethereum/pull/23657), with commit [f1fd963](https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8), and released as part of Geth [v1.10.9](https://github.com/ethereum/go-ethereum/tree/v1.10.9) on Sept 29, 2021. ### Workarounds Apply the patch above or upgrade to a version which is not vulnerable. ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum/) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
{'CVE-2021-41173'}
2022-04-19T19:03:12Z
2021-10-25T19:42:57Z
MODERATE
5.7
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41173', 'https://github.com/ethereum/go-ethereum/pull/23801', 'https://github.com/advisories/GHSA-59hh-656j-3p7v', 'https://github.com/ethereum/go-ethereum/releases/tag/v1.10.9', 'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v'}
null
GHSA
GHSA-4fqg-89cc-5pv5
Malicious Package in sj-labc
All versions of `sj-labc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T17:21:39Z
2020-09-04T14:58:44Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1315', 'https://github.com/advisories/GHSA-4fqg-89cc-5pv5'}
null
GHSA
GHSA-pfwg-rxf4-97c3
Open Redirect in Apache Superset
Apache Superset up to and including 1.0.1 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link.
{'CVE-2021-28125'}
2021-10-06T17:47:53Z
2021-10-06T17:47:53Z
MODERATE
6.1
{'CWE-601'}
{'http://www.openwall.com/lists/oss-security/2021/04/27/2', 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434@%3Cdev.superset.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28125', 'https://github.com/advisories/GHSA-pfwg-rxf4-97c3', 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434%40%3Cdev.superset.apache.org%3E'}
null
GHSA
GHSA-vqcq-mrmw-mcmg
Rubyzip gem contains a Directory Traversal vulnerability in zip file component
rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem.. This is similar to CVE-2017-5946 which was patched in 1.2.1 but the fix in that case was incomplete.
{'CVE-2018-1000544'}
2022-04-26T18:30:20Z
2018-09-06T03:27:18Z
CRITICAL
9.8
{'CWE-59', 'CWE-434'}
{'https://github.com/rubyzip/rubyzip/issues/369', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000544', 'https://github.com/advisories/GHSA-vqcq-mrmw-mcmg', 'https://lists.debian.org/debian-lts-announce/2018/08/msg00013.html', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00002.html', 'https://access.redhat.com/errata/RHSA-2018:3466'}
null
GHSA
GHSA-jqmc-79gx-7g8p
Incorrect Permission Assignment for Critical Resource in CRI-O
An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.
{'CVE-2022-0532'}
2022-02-23T22:00:52Z
2022-02-11T00:00:54Z
MODERATE
4.2
{'CWE-732'}
{'https://github.com/cri-o/cri-o/pull/5610', 'https://github.com/advisories/GHSA-jqmc-79gx-7g8p', 'https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#enabling-unsafe-sysctls', 'https://github.com/cri-o/cri-o/releases/tag/v1.23.1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0532', 'https://bugzilla.redhat.com/show_bug.cgi?id=2051730'}
null
GHSA
GHSA-rcwj-2hj2-vmjj
Insufficient Session Expiration in Apache NiFi Registry
If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi Registry.
{'CVE-2020-9482'}
2022-02-09T00:23:21Z
2022-02-09T00:23:06Z
MODERATE
6.5
{'CWE-613'}
{'https://github.com/advisories/GHSA-rcwj-2hj2-vmjj', 'https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9482', 'https://nifi.apache.org/registry-security.html#CVE-2020-9482', 'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'}
null
GHSA
GHSA-4xfp-4pfp-89wg
Reference binding to nullptr in `RaggedTensorToSparse`
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToSparse`: ```python import tensorflow as tf tf.raw_ops.RaggedTensorToSparse( rt_nested_splits=[[0, 38, 0]], rt_dense_values=[]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/ragged_tensor_to_sparse_kernel.cc#L30) has an incomplete validation of the splits values: it does not check that they are in increasing order. ### Patches We have patched the issue in GitHub commit [1071f554dbd09f7e101324d366eec5f4fe5a3ece](https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37656'}
2021-08-25T14:42:55Z
2021-08-25T14:42:55Z
HIGH
7.1
{'CWE-824'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37656', 'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece', 'https://github.com/advisories/GHSA-4xfp-4pfp-89wg', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg'}
null
GHSA
GHSA-w9q5-mvc6-5cw3
Malicious Package in bufder-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:56:44Z
2020-09-03T21:45:13Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1235', 'https://github.com/advisories/GHSA-w9q5-mvc6-5cw3'}
null
GHSA
GHSA-mm4f-47ch-f7hx
Arbitrary code execution in kill-by-port
This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23363'}
2021-04-13T15:32:43Z
2021-04-13T15:32:43Z
MODERATE
6.3
{'CWE-77'}
{'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23363', 'https://github.com/advisories/GHSA-mm4f-47ch-f7hx', 'https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531', 'https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8'}
null
GHSA
GHSA-j9m2-6hq2-4r3c
Cross-site Scripting in invenio-previewer
## Cross-Site Scripting (XSS) vulnerability in JSON, Markdown and iPython Notebook previewers ### Impact Several Cross-Site Scripting (XSS) vulnerabilities have been found in the JSON, Markdown and iPython Notebook previewers. The vulnerabilities would allow a malicous user to upload a JSON, Markdown or Notebook file with embedded scripts that would be executed by a victims browser. ### Patches Invenio-Previewer v1.0.0a12 fixes the issue. ### Workarounds You can remediate the vulnerability without upgrading by disabling the affected previewers. You do this by adding the following to your configuration: ```python PREVIEWER_PREFERENCE = [ 'csv_dthreejs', 'simple_image', # 'json_prismjs', 'xml_prismjs', # 'mistune', 'pdfjs', # 'ipynb', 'zip', ] ``` Afterwards, you should not be able to preview JSON, Markdown or iPython Notebook files. ### For more information If you have any questions or comments about this advisory: * Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org)
{'CVE-2019-1020019'}
2021-04-12T21:57:29Z
2019-07-16T00:52:22Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-j9m2-6hq2-4r3c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020019', 'https://github.com/inveniosoftware/invenio-previewer/security/advisories/GHSA-j9m2-6hq2-4r3c'}
null
GHSA
GHSA-4p7j-5ppx-rfhm
Downloads Resources over HTTP in apk-parser3
Affected versions of `apk-parser3` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser3`. ## Recommendation Update to version 0.1.3 or greater.
{'CVE-2016-10574'}
2021-01-07T23:32:43Z
2020-09-01T16:06:49Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/245', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10574', 'https://github.com/advisories/GHSA-4p7j-5ppx-rfhm', 'https://www.npmjs.com/advisories/245'}
null
GHSA
GHSA-6h7f-qwqm-35pp
Arbitrary File Read in phantom-html-to-pdf
This affects the package phantom-html-to-pdf before 0.6.1.
{'CVE-2020-7763'}
2021-07-29T20:38:33Z
2020-11-06T18:06:16Z
HIGH
7.5
{'CWE-200', 'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7763', 'https://www.npmjs.com/package/phantom-html-to-pdf', 'https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598', 'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259', 'https://github.com/advisories/GHSA-6h7f-qwqm-35pp'}
null
GHSA
GHSA-25v4-mcx4-hh35
Cross-Site Scripting in atlasboard-atlassian-package
All versions of `atlasboard-atlassian-package` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize user input that is rendered as HTML, which may allow attackers to execute arbitrary JavaScript in a victim's browser. This requires attackers being able to change issue summaries in Jira tickets. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T20:45:45Z
2020-09-04T17:28:28Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1449', 'https://hackerone.com/reports/456702', 'https://github.com/advisories/GHSA-25v4-mcx4-hh35'}
null
GHSA
GHSA-x6mj-w4jf-jmgw
Server Side Request Forgery (SSRF) in Kubernetes
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services).
{'CVE-2020-8555'}
2022-04-12T22:54:16Z
2022-02-15T01:57:18Z
LOW
6.3
{'CWE-918'}
{'https://github.com/kubernetes/kubernetes/pull/89794', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/', 'https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion', 'https://github.com/advisories/GHSA-x6mj-w4jf-jmgw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8555', 'https://security.netapp.com/advisory/ntap-20200724-0005/', 'http://www.openwall.com/lists/oss-security/2020/06/01/4', 'https://github.com/kubernetes/kubernetes/issues/91542', 'http://www.openwall.com/lists/oss-security/2021/05/04/8'}
null
GHSA
GHSA-qrx8-8545-4wg2
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39148](https://x-stream.github.io/CVE-2021-39148.html). ### Credits wh1t3p1g from TSRC (Tencent Security Response Center) found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39148'}
2022-04-22T15:42:09Z
2021-08-25T14:47:38Z
HIGH
8.5
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://x-stream.github.io/CVE-2021-39148.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39148', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/advisories/GHSA-qrx8-8545-4wg2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-m9hp-7r99-94h5
Critical security issues in XML encoding in github.com/dexidp/dex
### Impact The following vulnerabilities have been disclosed, which impact users leveraging the SAML connector: Signature Validation Bypass (CVE-2020-15216): https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7 `encoding/xml` instabilities: - [Element namespace prefix instability (CVE-2020-29511)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md) - [Attribute namespace prefix instability (CVE-2020-29509)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md) - [Directive comment instability (CVE-2020-29510)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md) ### Patches Immediately update to [Dex v2.27.0](https://github.com/dexidp/dex/releases/tag/v2.27.0). ### Workarounds There are no known workarounds.
{'CVE-2020-26290'}
2022-04-19T19:02:43Z
2021-12-20T17:53:53Z
CRITICAL
9.3
{'CWE-347'}
{'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md', 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md', 'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8', 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/', 'https://github.com/dexidp/dex/releases/tag/v2.27.0', 'https://github.com/advisories/GHSA-m9hp-7r99-94h5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26290', 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5', 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md'}
null
GHSA
GHSA-p5wr-vp8g-q5p4
Moderate severity vulnerability that affects Plone
Plone 4.x through 4.3.11 and 5.x through 5.0.6 allow remote attackers to bypass a sandbox protection mechanism and obtain sensitive information by leveraging the Python string format method.
{'CVE-2017-5524'}
2021-06-10T22:12:49Z
2018-07-12T14:45:15Z
MODERATE
4.3
{'CWE-134'}
{'https://github.com/advisories/GHSA-p5wr-vp8g-q5p4', 'http://www.openwall.com/lists/oss-security/2017/01/18/6', 'https://plone.org/security/hotfix/20170117/sandbox-escape', 'http://www.securityfocus.com/bid/95679', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5524'}
null
GHSA
GHSA-6qgx-f452-7699
Malicious Package in superhappyfuntime
All versions of `superhappyfuntime` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T17:08:43Z
2020-09-03T23:28:39Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-6qgx-f452-7699', 'https://www.npmjs.com/advisories/1314'}
null
GHSA
GHSA-rvjg-gxwx-j5gf
OIDC Logout redirect in keycloak
A flaw was found in keycloak. The OIDC logout endpoint does not have CSRF protection. The highest threat from this vulnerability is to system availability.
{'CVE-2020-10734'}
2022-04-28T17:13:59Z
2022-04-28T17:13:58Z
LOW
3.3
{'CWE-601'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1831662', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-rvjg-gxwx-j5gf', 'https://issues.redhat.com/browse/KEYCLOAK-13653', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10734', 'https://github.com/advisories/GHSA-rvjg-gxwx-j5gf'}
null
GHSA
GHSA-wqg7-vrj7-v82h
High severity vulnerability that affects mosca
This vulnerability allows remote attackers to deny service on vulnerable installations of npm mosca 2.8.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of topics. A crafted regular expression can cause the broker to crash. An attacker can leverage this vulnerability to deny access to the target system.
{'CVE-2018-11615'}
2021-01-08T01:48:06Z
2018-08-31T06:22:50Z
HIGH
0
{'CWE-20'}
{'https://zerodayinitiative.com/advisories/ZDI-18-583', 'https://github.com/advisories/GHSA-wqg7-vrj7-v82h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11615'}
null
GHSA
GHSA-4xc7-x2jr-cr74
Improper Authorization in dolibarr/dolibarr
Dolibarr allows improper access control issues in the userphoto modulepart. The impact could lead to data exposure as the attached files and documents may contain sensitive information of relevant parties such as contacts, suppliers, invoices, orders, stocks, agenda, accounting and more.
{'CVE-2022-0731'}
2022-03-04T14:46:06Z
2022-02-24T00:00:52Z
MODERATE
6.5
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0731', 'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a', 'https://github.com/advisories/GHSA-4xc7-x2jr-cr74', 'https://huntr.dev/bounties/e242ab4e-fc70-4b2c-a42d-5b3ee4895de8'}
null
GHSA
GHSA-hrgx-7j6v-xj82
Reflected cross-site scripting (XSS) vulnerability
This security advisory relates to a capability for an attacker to exploit a reflected cross-site scripting vulnerability when using the `@keystone-6/auth` package. #### Impact The vulnerability can impact users of the administration user interface when following an untrusted link to the `signin` or `init` page. This is a targeted attack and may present itself in the form of phishing and or chained in conjunction with some other vulnerability. ## Vulnerability mitigation Please upgrade to `@keystone-6/auth >= 1.0.2`, where this vulnerability has been closed. If you are using `@keystone-next/auth`, we **strongly** recommend you upgrade to `@keystone-6`. ### Workarounds If for some reason you cannot upgrade the dependencies in software, you could alternatively - disable the administration user interface, or - if using a reverse-proxy, strip query parameters when accessing the administration interface ### References https://owasp.org/www-community/attacks/xss/ Thanks to Shivansh Khari (@Shivansh-Khari) for discovering and reporting this vulnerability
{'CVE-2022-0087'}
2022-04-19T19:03:19Z
2022-01-12T21:55:40Z
HIGH
7.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-hrgx-7j6v-xj82', 'https://huntr.dev/bounties/c9d7374f-2cb9-4bac-9c90-a965942f413e', 'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365cf394467a943cc481b38', 'https://github.com/keystonejs/keystone/security/advisories/GHSA-hrgx-7j6v-xj82', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0087'}
null
GHSA
GHSA-6675-wwqr-jhmf
Cross-site Scripting in GilaCMS
A stored cross-site scripting (XSS) vulnerability in GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.
{'CVE-2020-20695'}
2021-10-04T13:52:09Z
2021-09-30T17:12:56Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-20695', 'https://github.com/advisories/GHSA-6675-wwqr-jhmf', 'https://github.com/GilaCMS/gila/issues/52'}
null
GHSA
GHSA-qcx9-j53g-ccgf
Remote Code Execution via unsafe classes in otherwise permitted modules
### Impact The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects. The policies defined in `AccessControl` severely restrict access to Python modules and only exempt a few that are deemed safe, such as Python's `string` module. However, full access to the `string` module also allows access to the class `Formatter`, which can be overridden and extended within `Script (Python)` in a way that provides access to other unsafe Python libraries. Those unsafe Python libraries can be used for remote code execution. By default, you need to have the admin-level Zope "Manager" role to add or edit `Script (Python)` objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk. ### Patches The problem has been fixed in AccessControl 4.3 and 5.2. Only AccessControl versions 4 and 5 are vulnerable, and only on Python 3, not Python 2.7. ### Workarounds A site administrator can restrict adding/editing `Script (Python)` objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [AccessControl issue tracker](https://github.com/zopefoundation/AccessControl/issues) * Email us at [security@plone.org](mailto:security@plone.org)
{'CVE-2021-32807'}
2021-08-30T23:27:56Z
2021-08-05T17:01:30Z
MODERATE
4.4
{'CWE-915'}
{'https://github.com/zopefoundation/AccessControl/blob/master/CHANGES.rst#51-2021-07-30', 'https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf', 'https://github.com/advisories/GHSA-qcx9-j53g-ccgf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32807', 'https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c'}
null
GHSA
GHSA-25pc-85qf-6j69
Deserialization of Untrusted Data in Apache Storm
In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class.
{'CVE-2018-11779'}
2021-08-17T20:24:23Z
2019-08-01T19:17:53Z
CRITICAL
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/3e4f704c4bd9296405a07a0290b8cbb6cbf5046e277efe6d93280a98@%3Cuser.storm.apache.org%3E', 'https://github.com/advisories/GHSA-25pc-85qf-6j69', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11779'}
null
GHSA
GHSA-mm57-9j6q-rxm2
High severity vulnerability that affects com.typesafe.akka:akka-actor_2.11 and com.typesafe.akka:akka-actor_2.12
Akka versions <=2.4.16 and 2.5-M1 are vulnerable to a java deserialization attack in its Remoting component resulting in remote code execution in the context of the ActorSystem.
{'CVE-2017-1000034'}
2021-09-15T20:23:29Z
2018-10-22T20:52:38Z
HIGH
8.1
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000034', 'https://github.com/advisories/GHSA-mm57-9j6q-rxm2', 'http://doc.akka.io/docs/akka/2.4/security/2017-02-10-java-serialization.html'}
null
GHSA
GHSA-q759-hwvc-m3jg
Moderate severity vulnerability that affects actionpack
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
{'CVE-2013-1855'}
2021-09-16T19:36:22Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-79'}
{'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1855', 'https://github.com/advisories/GHSA-q759-hwvc-m3jg', 'http://rhn.redhat.com/errata/RHSA-2013-0698.html', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'http://support.apple.com/kb/HT5784', 'https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}
null
GHSA
GHSA-mj9r-wwm8-7q52
Open Redirect in github.com/AndrewBurian/powermux
### Impact Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. ### Patches The issue is resolved in v1.1.1 ### Workarounds There are no existing workarounds. You may detect attempts to craft urls that exploit this feature by looking for request paths containing pairs of forward slashes in sequence combined with a trailing slash e.g. `https://example.com//foo/`
{'CVE-2021-32721'}
2021-07-01T17:00:32Z
2021-07-01T17:00:32Z
MODERATE
4.7
{'CWE-601'}
{'https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52', 'https://github.com/advisories/GHSA-mj9r-wwm8-7q52', 'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32721'}
null
GHSA
GHSA-w5hr-jm4j-9jvq
Sandbox escape through template_object in smarty
Sandbox protection could be bypassed through access to an internal Smarty object that should have been blocked. Sites that rely on [Smarty Security features](https://www.smarty.net/docs/en/advanced.features.tpl) should upgrade as soon as possible. Please upgrade to 3.1.39 or higher.
{'CVE-2021-26119'}
2022-05-03T03:42:06Z
2021-03-02T02:57:23Z
HIGH
7.5
null
{'https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html', 'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26119', 'https://github.com/smarty-php/smarty/security/advisories/GHSA-w5hr-jm4j-9jvq', 'https://srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-escape-vulnerabilities.html', 'https://github.com/advisories/GHSA-w5hr-jm4j-9jvq', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html', 'https://security.gentoo.org/glsa/202105-06'}
null
GHSA
GHSA-g87r-23vw-7f87
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. update_hook has a use-after-free.
{'CVE-2021-45719'}
2022-01-06T22:00:21Z
2022-01-06T22:00:21Z
HIGH
7.5
{'CWE-416'}
{'https://github.com/advisories/GHSA-g87r-23vw-7f87', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45719', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
null
GHSA
GHSA-ghgj-3xqr-6jfm
Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
{'CVE-2015-2080'}
2021-06-10T23:37:12Z
2018-11-09T17:50:00Z
HIGH
7.5
{'CWE-200'}
{'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2080', 'https://github.com/advisories/GHSA-ghgj-3xqr-6jfm', 'http://www.securityfocus.com/archive/1/534755/100/1600/threaded', 'https://security.netapp.com/advisory/ntap-20190307-0005/', 'http://seclists.org/fulldisclosure/2015/Mar/12', 'https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md', 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00075.html', 'http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html', 'http://www.securityfocus.com/bid/72768', 'https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151804.html', 'http://www.securitytracker.com/id/1031800'}
null
GHSA
GHSA-f3pg-qwvg-p99c
Lenient Parsing of Content-Length Header When Prefixed with Plus Sign
### Summary hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn't parse such `Content-Length` headers, but forwards them, can result in "request smuggling" or "desync attacks". ### Vulnerability The flaw exists in all prior versions of hyper, if built with [`rustc` v1.5.0 or newer](https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739). Example: ``` GET / HTTP/1.1 Host: example.com Content-Length: +3 abc ``` This request gets accepted and hyper reads the body as abc. The request _should_ be rejected, according to RFC 7230, since the ABNF for `Content-Length` only allows for `DIGIT`s. This is due to using the `FromStr` implementation for `u64` in the standard library. By differing from the spec, it is possible to send requests like these to endpoints that have different HTTP implementations, with different interpretations of the payload semantics, and cause "desync attacks". In this particular case, an upstream proxy would need to error when parsing the `Content-Length`, but _not_ reject the request (swallowing its own error), and forwarding the request as-is with the `Content-Length` still included. _Then_ the upstream proxy and hyper would disagree on the length of the request body. The combination of these factors would be extremely rare. Read more about desync attacks: https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn ### Impact To determine if vulnerable, all these things must be true: - **Using hyper as an HTTP server**. While the lenient decoder also exists in the client, a vulnerability does not exist around _responses_. - **Using HTTP/1**. The HTTP/2 code uses a stricter parser. - **Using a vulnerable HTTP proxy upstream to hyper**. If an upstream proxy correctly rejects the illegal `Content-Length` header, *OR* can parse the length with the plus sign, the desync attack cannot succeed. ### Patches We have released the following patch versions: - v0.14.10 (to be released when this advisor is published) ### Workarounds Besides upgrading hyper, you can take the following options: - Reject requests manually that contain a plus sign prefix in the `Content-Length` header. - Ensure any upstream proxy handles `Content-Length` headers with a plus sign prefix. ### Credits This issue was initially reported by [Mattias Grenfeldt](https://grenfeldt.dev/) and Asta Olofsson.
{'CVE-2021-32715'}
2022-04-19T19:03:01Z
2021-07-12T16:54:20Z
LOW
3.1
{'CWE-444'}
{'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739', 'https://github.com/hyperium/hyper/security/advisories/GHSA-f3pg-qwvg-p99c', 'https://rustsec.org/advisories/RUSTSEC-2021-0078.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32715', 'https://github.com/advisories/GHSA-f3pg-qwvg-p99c'}
null
GHSA
GHSA-35c4-f3rq-f9g3
Moderate severity vulnerability that affects activesupport
Withdrawn, accidental duplicate publish. The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
null
2021-12-03T14:23:39Z
2018-09-17T21:57:23Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-35c4-f3rq-f9g3', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3227'}
null
GHSA
GHSA-gmv4-r438-p67f
Leading white space bypasses protocol validation
### Impact Whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly and protocol validation mechanisms may fail. ### Patches Patched in 1.19.9 ### Workarounds Remove leading whitespace from values before passing them to URI.parse (e.g. via `.href(value)` or `new URI(value)`), e.g. by using ```js function remove_whitespace(url){ const whitespace = /^[\x00-\x20\u00a0\u1680\u2000-\u200a\u2028\u2029\u202f\u205f\u3000\ufeff]+/; url = url.replace(whitespace, '') return url } ``` ### References * https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [medialize/URI.js](https://github.com/medialize/URI.js/)
{'CVE-2022-24723'}
2022-04-19T19:03:25Z
2022-03-03T19:23:36Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/medialize/URI.js/releases/tag/v1.19.9', 'https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24723', 'https://github.com/advisories/GHSA-gmv4-r438-p67f', 'https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/', 'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316'}
null
GHSA
GHSA-m833-jv95-mfjh
Memory safety violation in crayon
An issue was discovered in the crayon crate through 2020-08-31 for Rust. A TOCTOU issue has a resultant memory safety violation via HandleLike.
{'CVE-2020-35889'}
2021-08-25T20:48:50Z
2021-08-25T20:48:50Z
HIGH
8.1
{'CWE-367'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35889', 'https://github.com/shawnscode/crayon/issues/87', 'https://github.com/advisories/GHSA-m833-jv95-mfjh', 'https://rustsec.org/advisories/RUSTSEC-2020-0037.html'}
null
GHSA
GHSA-f263-c949-w85g
Improper Authorization in Google OAuth Client
PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.
{'CVE-2020-7692'}
2022-05-04T02:18:41Z
2021-09-28T16:16:52Z
HIGH
7.4
{'CWE-862', 'CWE-863'}
{'https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E', 'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824', 'https://tools.ietf.org/html/rfc7636%23section-1', 'https://github.com/googleapis/google-oauth-java-client/issues/469', 'https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276', 'https://tools.ietf.org/html/rfc8252%23section-8.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7692', 'https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-f263-c949-w85g'}
null
GHSA
GHSA-fpjm-rp2g-3r4c
Django Rest Framework jwt allows obtaining new token from notionally invalidated token
An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained.
{'CVE-2020-10594'}
2022-03-21T22:21:38Z
2020-06-05T16:09:34Z
CRITICAL
9.1
{'CWE-287'}
{'https://github.com/Styria-Digital/django-rest-framework-jwt/commit/868b5c22ddad59772b447080183e7c7101bb18e0', 'https://github.com/advisories/GHSA-fpjm-rp2g-3r4c', 'https://github.com/jpadilla/django-rest-framework-jwt/issues/484', 'https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10594', 'https://pypi.org/project/drf-jwt/1.15.1/#history'}
null
GHSA
GHSA-fcrx-8829-jpqx
Improper Restriction of XML External Entity Reference in wutka jox
An XML External Entity (XXE) vulnerability exists in wutka jox 1.16 in the readObject method in JOXSAXBeanInput.
{'CVE-2021-43142'}
2022-04-05T21:37:42Z
2022-04-01T00:00:45Z
MODERATE
0
{'CWE-611'}
{'https://github.com/advisories/GHSA-fcrx-8829-jpqx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43142', 'https://novysodope.github.io/2021/10/29/64/'}
null
GHSA
GHSA-ph8p-2g97-9654
Downloads Resources over HTTP in jstestdriver
Affected versions of `jstestdriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jstestdriver`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2011. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10643'}
2021-01-08T18:21:23Z
2018-08-15T19:27:25Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/244', 'https://nodesecurity.io/advisories/244', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10643', 'https://github.com/advisories/GHSA-ph8p-2g97-9654'}
null
GHSA
GHSA-38f9-m297-6q9g
DoS via malicious record IDs in WatermelonDB
## Impact Medium severity 5.9 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H A maliciously crafted record ID can exploit a SQL Injection vulnerability in iOS adapter implementation and cause the app to delete all or selected records from the database, generally causing the app to become unusable. This may happen in apps that don't validate IDs (valid IDs are `/^[a-zA-Z0-9_-.]+$/`) and use Watermelon Sync or low-level `database.adapter.destroyDeletedRecords` method. The integrity risk is low due to the fact that maliciously deleted records won't synchronize, so logout-login will restore all data, although some local changes may be lost if the malicious deletion causes the sync process to fail to proceed to push stage. No way to breach confidentiality with this vulnerability is known. Full exploitation of SQL Injection is mitigated, because it's not possible to nest an insert/update query inside a delete query in SQLite, and it's not possible to pass a semicolon-separated second query. There's also no known practicable way to breach confidentiality by selectively deleting records, because those records will not be synchronized. It's theoretically possible that selective record deletion could cause an app to behave insecurely if lack of a record is used to make security decisions by the app. ## Patches Patched versions include: - 0.15.1 - 0.16.2 - 0.16.1-fix - this is actually the same as 0.16.0, but with the patch applied - as 0.16.1 is causing issues for some users - `924c7ae2a8d` commit id contains the patch ## Workarounds 1. Ensure that your backend service sanitizes record IDs sent in the `pull sync` endpoint, such that only IDs matching `/^[a-zA-Z0-9_-.]+$/` are returned. This could also be done in JavaScript `pullChanges` function passed to `synchronize()` 2. If you use `destroyDeletedRecords` directly, validate all IDs passed the same way ## For more information If you have any questions about this advisory, contact @radex.
{'CVE-2020-4035'}
2021-01-08T20:15:01Z
2020-06-03T21:57:53Z
MODERATE
5.9
{'CWE-89'}
{'https://github.com/Nozbe/WatermelonDB/security/advisories/GHSA-38f9-m297-6q9g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4035', 'https://github.com/Nozbe/WatermelonDB/commit/924c7ae2a8d7d6459656751e5b9b1bf91a218025', 'https://github.com/advisories/GHSA-38f9-m297-6q9g'}
null
GHSA
GHSA-cm9w-c4rj-r2cf
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in view_component
This is an XSS vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display. Versions 2.29.1 and 2.49.1 have been released and fully mitigate the vulnerability. Avoid passing user input to the `translate` function, or sanitize the inputs before passing them. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [github/view_component](http://github.com/github/view_component) project
{'CVE-2022-24722'}
2022-03-11T20:08:42Z
2022-03-02T22:24:05Z
HIGH
8.1
{'CWE-79'}
{'https://github.com/github/view_component/security/advisories/GHSA-cm9w-c4rj-r2cf', 'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9', 'https://github.com/github/view_component/releases/tag/v2.49.1', 'https://github.com/advisories/GHSA-cm9w-c4rj-r2cf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24722', 'https://github.com/github/view_component/releases/tag/v2.31.2'}
null
GHSA
GHSA-v8mp-hhjq-h4cj
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.ofd` file upload.
{'CVE-2022-0965'}
2022-03-29T21:18:37Z
2022-03-16T00:00:46Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8', 'https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347', 'https://github.com/advisories/GHSA-v8mp-hhjq-h4cj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0965'}
null
GHSA
GHSA-6xhf-x49c-m5m6
Github Token Leak in aegir
Affected versions of `aegir` bundle and publish the current users github token to npm when `aegir-release` is executed. ## Recommendation Update to version 12.0.8 or later. If you used this module to do a release for your project you should invalidate the GitHub tokens that were leaked.
{'CVE-2017-16225'}
2021-01-08T19:19:20Z
2018-07-24T20:04:11Z
HIGH
0
{'CWE-200'}
{'https://www.npmjs.com/advisories/546', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16225', 'https://nodesecurity.io/advisories/546', 'https://github.com/advisories/GHSA-6xhf-x49c-m5m6'}
null
GHSA
GHSA-fvwr-h9xh-m6wc
Denial of Service in @commercial/subtext
Versions of `@commercial/subtext` prior to 5.1.1 are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service. ## Recommendation Upgrade to version 5.1.1 or later.
null
2020-09-03T20:33:17Z
2020-09-03T20:33:17Z
HIGH
0
null
{'https://www.npmjs.com/advisories/1166', 'https://github.com/advisories/GHSA-fvwr-h9xh-m6wc', 'https://github.com/hapijs/subtext/issues/72'}
null
GHSA
GHSA-gmxv-xf2q-6j8m
Cross-Site Scripting in m-server
Versions of `m-server` before 1.4.2 are vulnerable to stored cross-site scripting. This vulnerability is exploitable if an attacker is able to control the name of a file that `m-server` is serving. ## Recommendation Update to version 1.4.2 or later.
{'CVE-2018-16484'}
2021-01-08T18:46:13Z
2019-02-07T18:16:16Z
MODERATE
0
{'CWE-79'}
{'https://hackerone.com/reports/319794', 'https://github.com/advisories/GHSA-gmxv-xf2q-6j8m', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/467.json', 'https://www.npmjs.com/advisories/729', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16484'}
null
GHSA
GHSA-9wv8-jgw4-4g28
High severity vulnerability that affects festivaltts4r
Withdrawn, accidental duplicate publish. The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) to_speech or (2) to_mp3 method in lib/festivaltts4r/festival4r.rb.
null
2021-12-03T13:53:37Z
2018-08-15T20:04:13Z
HIGH
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10194', 'https://github.com/advisories/GHSA-9wv8-jgw4-4g28'}
null
GHSA
GHSA-rmff-f8w9-c9rm
Data races in max7301
The `ImmediateIO` and `TransactionalIO` types implement `Sync` for all contained `Expander<EI>` types regardless of if the `Expander` itself is safe to use across threads. As the `IO` types allow retrieving the `Expander`, this can lead to non-thread safe types being sent across threads as part of the `Expander` leading to data races.
{'CVE-2020-36472'}
2021-08-25T20:59:22Z
2021-08-25T20:59:22Z
MODERATE
5.9
{'CWE-362'}
{'https://github.com/advisories/GHSA-rmff-f8w9-c9rm', 'https://github.com/edarc/max7301/issues/1', 'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36472', 'https://rustsec.org/advisories/RUSTSEC-2020-0152.html'}
null
GHSA
GHSA-r8f7-9pfq-mjmv
Improper Certificate Validation in node-sass
Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path.
{'CVE-2020-24025'}
2022-02-10T11:35:22Z
2022-02-09T22:22:24Z
MODERATE
5.3
{'CWE-295'}
{'https://github.com/sass/node-sass/issues/3067', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025', 'https://github.com/sass/node-sass/pull/567#issuecomment-656609236', 'https://github.com/advisories/GHSA-r8f7-9pfq-mjmv'}
null
GHSA
GHSA-6f54-3qr9-pjgj
Unauthenticated Access Via OAI-PMH
### Impact Media publication via OAI-PMH allows unauthenticated public access to all media and metadata by default. OAI-PMH is part of the default workflow and is activated by default, requiring active user intervention of users to protect media. This leads to users unknowingly handing out public access to events without their knowledge. ### Patches The problem has been addressed in Opencast 7.6 and 8.1 where the OAI-PMH endpoint is configured to require users with `ROLE_ADMIN` by default. In addition to this, Opencast 9 removes the OAI-PMH publication from the default workflow, making the publication a conscious decision users have to make by updating their workflows. ### Workarounds In the organization security configuration (`etc/security/mh_default_org.xml`), change the roles required for accessing `/oaipmh` from `ROLE_ANONYMOUS` to `ROLE_ADMIN`. ### References - [Public access configuration in the organization's security configuration](https://github.com/opencast/opencast/blob/1fb812c7810c78f09f29a7f455ff920417924307/etc/security/mh_default_org.xml#L271-L276) ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at security@opencast.org
{'CVE-2020-5228'}
2021-01-08T20:32:01Z
2020-01-30T21:22:06Z
HIGH
7.6
{'CWE-862'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-6f54-3qr9-pjgj', 'https://github.com/advisories/GHSA-6f54-3qr9-pjgj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5228', 'https://github.com/opencast/opencast/blob/1fb812c7810c78f09f29a7f455ff920417924307/etc/security/mh_default_org.xml#L271-L276'}
null
GHSA
GHSA-3627-w2qr-5fxr
Downloads Resources over HTTP in fuseki
Affected versions of `fuseki` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fuseki`. ## Recommendation Update to version 1.0.1 or later.
{'CVE-2016-10576'}
2021-01-08T20:04:29Z
2019-02-18T23:52:07Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/278', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10576', 'https://www.npmjs.com/advisories/278', 'https://github.com/advisories/GHSA-3627-w2qr-5fxr'}
null
GHSA
GHSA-w364-8vfv-gvf5
Downloads Resources over HTTP in phantomjs-cheniu
Affected versions of `phantomjs-cheniu` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `phantomjs-cheniu`. ## Recommendation No patch is currently available for this vulnerability. As this package is just a fork of Medium's [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs) package, the best mitigation is currently to install the `Medium` version of [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs). This can be done via the following command: ``` npm i phantomjs-prebuilt ```
{'CVE-2016-10661'}
2021-01-08T01:57:04Z
2019-02-18T23:44:52Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-w364-8vfv-gvf5', 'https://nodesecurity.io/advisories/262', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10661', 'https://www.npmjs.com/advisories/262'}
null
GHSA
GHSA-78rc-8c29-p45g
High severity vulnerability that affects actionpack
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
{'CVE-2016-2098'}
2021-06-11T14:04:08Z
2017-10-24T18:33:35Z
HIGH
7.3
{'CWE-20'}
{'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html', 'https://github.com/advisories/GHSA-78rc-8c29-p45g', 'http://www.securitytracker.com/id/1035122', 'http://www.securityfocus.com/bid/83725', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098', 'http://www.debian.org/security/2016/dsa-3509', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html', 'https://www.exploit-db.com/exploits/40086/', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html', 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html'}
null
GHSA
GHSA-q263-fvxm-m5mw
Heap out of bounds access in MakeEdge in TensorFlow
### Impact Under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The [`MakeEdge` function](https://github.com/tensorflow/tensorflow/blob/3616708cb866365301d8e67b43b32b46d94b08a0/tensorflow/core/common_runtime/graph_constructor.cc#L1426-L1438) creates an edge between one output tensor of the `src` node (given by `output_index`) and the input slot of the `dst` node (given by `input_index`). This is only possible if the types of the tensors on both sides coincide, so the function begins by obtaining the corresponding `DataType` values and comparing these for equality: ```cc DataType src_out = src->output_type(output_index); DataType dst_in = dst->input_type(input_index); //... ``` However, there is no check that the indices point to inside of the arrays they index into. Thus, this can result in accessing data out of bounds of the corresponding heap allocated arrays. In most scenarios, this can manifest as unitialized data access, but if the index points far away from the boundaries of the arrays this can be used to leak addresses from the library. ### Patches We have patched the issue in GitHub commit [0cc38aaa4064fd9e79101994ce9872c6d91f816b](https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2020-26271'}
2021-01-07T22:36:55Z
2020-12-10T19:07:34Z
LOW
4.4
{'CWE-908', 'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26271', 'https://github.com/advisories/GHSA-q263-fvxm-m5mw', 'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q263-fvxm-m5mw'}
null
GHSA
GHSA-23vf-5g53-hm9q
Directory Traversal in list-n-stream
Affected versions of `list-n-stream` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation Update to version 0.0.11 or later.
{'CVE-2017-16084'}
2021-01-08T20:10:06Z
2018-07-24T14:57:31Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/344', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16084', 'https://github.com/advisories/GHSA-23vf-5g53-hm9q', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/list-n-stream', 'https://nodesecurity.io/advisories/344'}
null
GHSA
GHSA-jwqm-c9f2-2cq3
Cleartext Transmission of Sensitive Information, Inclusion of Functionality from Untrusted Control Sphere , and Download of Code Without Integrity Check in Eclipse hawkBit
Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected.
{'CVE-2019-10240'}
2021-12-03T14:33:15Z
2019-04-15T16:19:23Z
HIGH
8.1
{'CWE-319', 'CWE-829', 'CWE-494'}
{'https://github.com/advisories/GHSA-jwqm-c9f2-2cq3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10240'}
null
GHSA
GHSA-xrg3-hmf3-rvgw
Path Traversal in rust-embed
An issue was discovered in the rust-embed crate before 6.3.0 for Rust. A ../ directory traversal can sometimes occur in debug mode.
{'CVE-2021-45712'}
2022-01-07T16:10:23Z
2022-01-06T22:03:56Z
HIGH
7.5
{'CWE-22'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0126.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45712', 'https://github.com/pyros2097/rust-embed/issues/159', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rust-embed/RUSTSEC-2021-0126.md', 'https://github.com/advisories/GHSA-xrg3-hmf3-rvgw'}
null
GHSA
GHSA-4m72-rmm9-2qjr
Moderate severity vulnerability that affects feedparser
Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via an unexpected URI scheme, as demonstrated by a javascript: URI.
{'CVE-2011-1158'}
2021-09-01T15:19:31Z
2018-07-23T19:51:43Z
MODERATE
0
{'CWE-79'}
{'http://www.mandriva.com/security/advisories?name=MDVSA-2011:082', 'https://github.com/advisories/GHSA-4m72-rmm9-2qjr', 'https://bugzilla.novell.com/show_bug.cgi?id=680074', 'http://lists.opensuse.org/opensuse-updates/2011-04/msg00026.html', 'http://openwall.com/lists/oss-security/2011/03/15/11', 'https://nvd.nist.gov/vuln/detail/CVE-2011-1158', 'http://www.securityfocus.com/bid/46867', 'http://openwall.com/lists/oss-security/2011/03/14/18', 'http://secunia.com/advisories/44074', 'https://bugzilla.redhat.com/show_bug.cgi?id=684877', 'http://secunia.com/advisories/43730', 'https://code.google.com/p/feedparser/issues/detail?id=255', 'http://support.novell.com/security/cve/CVE-2011-1158.html'}
null
GHSA
GHSA-c332-w4jm-55wv
Regular expression Denial of Service (ReDoS) in EmailValidator class in V7 compatibility module in Vaadin 8
Unsafe validation RegEx in `EmailValidator` component in `com.vaadin:vaadin-compatibility-server` versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
{'CVE-2021-31409'}
2022-04-19T19:02:56Z
2021-05-04T17:42:02Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-c332-w4jm-55wv', 'https://vaadin.com/security/cve-2021-31409', 'https://github.com/vaadin/framework/pull/12241', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31409', 'https://github.com/vaadin/framework/security/advisories/GHSA-c332-w4jm-55wv', 'https://github.com/vaadin/framework/issues/12240'}
null
GHSA
GHSA-r9cr-hvjj-496v
Path traversal and improper access control allows leaking out-of-bound files from Argo CD repo-server
### Impact All unpatched versions of Argo CD starting with v1.3.0 are vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD's repo-server. A malicious Argo CD user who has been granted [`get` access for a repository](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#rbac-resources-and-actions) containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications' source repositories (potentially decrypted files, if you are using a decryption plugin) or any secrets which have been mounted as files on the repo-server. ### Patches A patch for this vulnerability has been released in the following Argo CD versions: * v2.3.0 * v2.2.6 * v2.1.11 The patches do two things: 1) prevent path traversal 2) limit `/api/v1/repositories/{repo_url}/appdetails` access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges _and_ are requesting details for a `repo_url` that has already been used for the given Application ### Workarounds The only certain way to avoid the vulnerability is to upgrade. To mitigate the problem, you can * avoid storing secrets in git * avoid mounting secrets as files on the repo-server * avoid decrypting secrets into files on the repo-server * carefully [limit who has `get` access for repositories](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#rbac-resources-and-actions) ### References * [Security documentation for the repo-server component](https://argo-cd.readthedocs.io/en/stable/operator-manual/security/#git-helm-repositories) * [Argo CD RBAC configuration documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#) ### For more information Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
{'CVE-2022-24730'}
2022-03-29T21:52:08Z
2022-03-24T00:04:03Z
HIGH
7.7
{'CWE-284', 'CWE-22'}
{'https://github.com/advisories/GHSA-r9cr-hvjj-496v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24730', 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v'}
null
GHSA
GHSA-qrrc-ww9x-r43g
Improper Input Validation in Docker Engine
An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
{'CVE-2020-13401'}
2022-04-12T22:52:47Z
2022-02-15T01:57:18Z
HIGH
6
{'CWE-20'}
{'https://security.gentoo.org/glsa/202008-15', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DN4JQAOXBE3XUNK3FD423LHE3K74EMJT/', 'https://github.com/advisories/GHSA-qrrc-ww9x-r43g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13401', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZLKRCOJMOGUIJI2AS27BOZS3RBEF3K/', 'https://www.debian.org/security/2020/dsa-4716', 'http://www.openwall.com/lists/oss-security/2020/06/01/5', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00040.html', 'https://docs.docker.com/engine/release-notes/', 'https://github.com/docker/docker-ce/releases/tag/v19.03.11', 'https://security.netapp.com/advisory/ntap-20200717-0002/'}
null
GHSA
GHSA-4mpj-488r-vh6m
Path traversal in Neo4j Graph Database
### Impact Directory Traversal Vulnerabilities found in several functions of apoc plugins in Neo4j Graph database. The attacker can retrieve and download files from outside the configured directory on the affected server. Under some circumstances, the attacker can also create files. ### Patches The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability (for Neo4j 4.2, 4.3, and 4.4 bundled with APOC, upgrade to the appropriate patched version): 3.5 - bundle n/a, standalone 3.5.0.17 4.2 - bundle 4.2.13, standalone 4.2.10 4.3 - bundle 4.3.9, standalone 4.3.0.4 4.4 - bundle 4.4.2, standalone 4.4.0.1 ### Workarounds If you cannot upgrade the library, you can control the [allowlist of the functions](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist) that can be used in your system: ### For more information If you have any questions or comments about this advisory: * Open an issue in [neo4j-apoc-procedures](https://github.com/neo4j-contrib/neo4j-apoc-procedures) * Email us at [security@neo4j.com](mailto:security@neo4j.com) ### Credits We want to publicly recognize the contribution of Nicolai Grødum from the Red Team of PwC Norway for reporting this issue and following the responsible disclosure [policy](https://neo4j.com/trust-center/responsible-disclosure/).
{'CVE-2021-42767'}
2022-03-18T20:46:47Z
2022-02-01T22:01:14Z
CRITICAL
9.1
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42767', 'https://neo4j.com', 'https://github.com/advisories/GHSA-4mpj-488r-vh6m', 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-4mpj-488r-vh6m'}
null
GHSA
GHSA-qcgx-crrx-38v5
Denial of service in DataCommunicator class in Vaadin 8
Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.
{'CVE-2021-33609'}
2021-10-20T19:22:22Z
2021-10-13T18:54:09Z
MODERATE
4.3
{'CWE-400'}
{'https://github.com/vaadin/framework/pull/12415', 'https://github.com/vaadin/framework/security/advisories/GHSA-qcgx-crrx-38v5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33609', 'https://vaadin.com/security/cve-2021-33609', 'https://github.com/advisories/GHSA-qcgx-crrx-38v5'}
null
GHSA
GHSA-33c7-2mpw-hg34
Log injection in uvicorn
This affects all versions of package uvicorn. The request logger provided by the package is vulnerable to ASNI escape sequence injection. Whenever any HTTP request is received, the default behaviour of uvicorn is to log its details to either the console or a log file. When attackers request crafted URLs with percent-encoded escape sequences, the logging component will log the URL after it's been processed with urllib.parse.unquote, therefore converting any percent-encoded characters into their single-character equivalent, which can have special meaning in terminal emulators. By requesting URLs with crafted paths, attackers can: * Pollute uvicorn's access logs, therefore jeopardising the integrity of such files. * Use ANSI sequence codes to attempt to interact with the terminal emulator that's displaying the logs (either in real time or from a file).
{'CVE-2020-7694'}
2021-07-29T21:17:18Z
2020-07-29T18:07:16Z
HIGH
7.5
{'CWE-94', 'CWE-116'}
{'https://github.com/advisories/GHSA-33c7-2mpw-hg34', 'https://github.com/encode/uvicorn', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7694', 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-575560'}
null
GHSA
GHSA-x4rg-4545-4w7w
Improper Input Validation and Excessive Iteration in Go Facebook Thrift
Go Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.03.04.00.
{'CVE-2019-3564'}
2022-04-12T22:50:27Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-834', 'CWE-20', 'CWE-755'}
{'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-x4rg-4545-4w7w', 'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156', 'https://www.facebook.com/security/advisories/cve-2019-3564', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3564'}
null
GHSA
GHSA-pc4w-8v5j-29w9
Deserialization of Untrusted Data in Neo4j
Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
{'CVE-2021-34371'}
2021-09-01T18:31:29Z
2021-09-01T18:31:29Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/advisories/GHSA-pc4w-8v5j-29w9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34371', 'https://www.exploit-db.com/exploits/50170'}
null
GHSA
GHSA-pgjj-866w-fc5c
Risk of code injection
### Impact Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues ### Patches Temporarily removed the problematic route and added a `no-new-func` rule to eslint Self-built users should upgrade to 7f1c430 and later as soon as possible ### Credits Tencent Woodpecker Security Team ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/DIYgod/RSSHub/issues](https://github.com/DIYgod/RSSHub/issues) * Email us at [i@diygod.me](mailto:i@diygod.me)
{'CVE-2021-21278'}
2021-10-12T16:03:43Z
2021-10-12T16:03:43Z
HIGH
8.6
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21278', 'https://github.com/advisories/GHSA-pgjj-866w-fc5c', 'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d', 'https://www.npmjs.com/package/rsshub', 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-pgjj-866w-fc5c'}
null
GHSA
GHSA-2xv3-h762-ccxv
Out-of-bounds Read in concat-with-sourcemaps
Versions of `concat-with-sourcemaps` before 1.0.6 allocates uninitialized Buffers when a number is passed as a separator. ## Recommendation Update to version 1.0.6 or later.
null
2021-09-22T19:49:46Z
2019-05-29T19:18:02Z
MODERATE
0
{'CWE-125'}
{'https://github.com/advisories/GHSA-2xv3-h762-ccxv', 'https://github.com/floridoo/concat-with-sourcemaps/blob/v1.0.5/index.js#L18', 'https://www.npmjs.com/advisories/644', 'https://hackerone.com/reports/320166'}
null
GHSA
GHSA-48mj-p7x2-5jfm
Basic auth bypass in esphome
### Impact Anyone with web_server enabled and HTTP basic auth configured on 2021.9.1 or older `web_server` allows OTA update without checking user defined basic auth username & password ### Patches Patch released in 2021.9.2 ### Workarounds Disable/remove `web_server`
{'CVE-2021-41104'}
2022-04-19T19:03:10Z
2021-09-29T17:09:14Z
HIGH
7.5
{'CWE-306'}
{'https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8a5a14de8d5ca1e', 'https://github.com/esphome/esphome/commit/be965a60eba6bb769e2a5afdbc8eed132f077a59', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41104', 'https://github.com/esphome/esphome/security/advisories/GHSA-48mj-p7x2-5jfm', 'https://github.com/esphome/esphome/releases/tag/2021.9.2', 'https://github.com/advisories/GHSA-48mj-p7x2-5jfm'}
null
GHSA
GHSA-gjcw-v447-2w7q
Forgeable Public/Private Tokens in jws
Affected versions of the `jws` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT as a bearer token, the end result is a complete authentication bypass with minimal effort. ## Recommendation Update to version 3.0.0 or later.
{'CVE-2016-1000223'}
2021-09-23T21:25:35Z
2020-09-01T15:23:18Z
HIGH
8.7
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000223', 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://snyk.io/vuln/npm:jws:20160726', 'https://github.com/advisories/GHSA-gjcw-v447-2w7q', 'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e', 'https://www.npmjs.com/advisories/88'}
null
GHSA
GHSA-pv8x-p9hq-j328
Arbitrary Code Execution in mathjs
math.js before 3.17.0 had an issue where private properties such as a constructor could be replaced by using unicode characters when creating an object. ## Recommendation Upgrade to version 3.17.0 or later.
{'CVE-2017-1001003'}
2021-01-08T18:19:21Z
2017-12-18T22:27:53Z
CRITICAL
0
{'CWE-88'}
{'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761', 'https://github.com/advisories/GHSA-pv8x-p9hq-j328', 'https://www.npmjs.com/advisories/551', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001003'}
null
GHSA
GHSA-2mxc-m4c3-wqhq
Malicious Package in ruffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:18:33Z
2020-09-03T22:50:46Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1273', 'https://github.com/advisories/GHSA-2mxc-m4c3-wqhq'}
null
GHSA
GHSA-j3qq-qvc8-c6g7
Malicious Package in foever
All versions of `foever` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
null
2021-10-01T13:29:50Z
2020-09-01T21:15:09Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-j3qq-qvc8-c6g7', 'https://www.npmjs.com/advisories/688'}
null
GHSA
GHSA-536f-268f-6gxc
Malicious Package in buffermxor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:25:47Z
2020-09-03T22:17:36Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-536f-268f-6gxc', 'https://www.npmjs.com/advisories/1256'}
null
GHSA
GHSA-vcfp-ppqw-mf23
Downloads Resources over HTTP in fis-sass-all
Affected versions of `fis-sass-all` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-sass-all`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10686'}
2021-09-16T20:52:57Z
2018-08-17T20:20:46Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10686', 'https://github.com/advisories/GHSA-vcfp-ppqw-mf23', 'https://www.npmjs.com/advisories/287', 'https://nodesecurity.io/advisories/287'}
null
GHSA
GHSA-qrmm-w75w-3wpx
Server side request forgery in SwaggerUI
SwaggerUI supports displaying remote OpenAPI definitions through the `?url` parameter. This enables robust demonstration capabilities on sites like `petstore.swagger.io`, `editor.swagger.io`, and similar sites, where users often want to see what their OpenAPI definitions would look like rendered. However, this functionality may pose a risk for users who host their own SwaggerUI instances. In particular, including remote OpenAPI definitions opens a vector for phishing attacks by abusing the trusted names/domains of self-hosted instances. An example scenario abusing this functionality could take the following form: - `https://example.com/api-docs` hosts a version of SwaggerUI with `?url=` query parameter enabled. - Users will trust the domain `https://example.com` and the contents of the OpenAPI definition. - A malicious actor may craft a similar OpenAPI definition and service that responds to the defined APIs at `https://evildomain`. - Users mistakenly click a phishing URL like `https://example.com/api-docs?url=https://evildomain/fakeapi.yaml` and enters sensitive data via the "Try-it-out" feature. We do want to stress that this attack vector is limited to scenarios that actively trick users into divulging sensitive information. The ease of this is highly contextual and, therefore, the threat model may be different for individual users and organizations. It is *not* possible to perform non-interactive attacks (e.g., cross-site scripting or code injection) through this mechanism. ### Resolution We've made the decision to [disable query parameters (#4872)](https://github.com/swagger-api/swagger-ui/issues/4872) by default starting with SwaggerUI version `4.1.3`. Please update to this version when it becomes available (**ETA: 2021 December**). Users will still be able to be re-enable the options at their discretion. We'll continue to enable query parameters on the Swagger demo sites. ### Workaround If you host a version of SwaggerUI and wish to mitigate this issue immediately, you are encouraged to add the following custom plugin code: ```js SwaggerUI({ // ...other configuration options, plugins: [function UrlParamDisablePlugin() { return { statePlugins: { spec: { wrapActions: { // Remove the ?url parameter from loading an external OpenAPI definition. updateUrl: (oriAction) => (payload) => { const url = new URL(window.location.href) if (url.searchParams.has('url')) { url.searchParams.delete('url') window.location.replace(url.toString()) } return oriAction(payload) } } } } } }], }) ``` ### Future UX work Through the exploration of this issue, it became apparent that users may not be aware to which web server the Try-it-out function will send requests. While this information is currently presented at the top of the page, understanding may improve by displaying it closer to the "Execute" button where requests are actually made. We'll be exploring these UX improvements over the coming months and welcome community input. Please create a Feature Request under the GitHub Issue tab to start a conversation with us and the community. ## Reflected XSS attack **Warning** in versions <= 3.36.2, it is possible to combine the URL options (as mentioned above) with a vunerability in DOMPurify (https://www.cvedetails.com/cve/CVE-2020-26870/) to create a reflected XSS vector. If your version of Swagger UI is older than or equal to 3.36.2, we suggest you upgrade or implement the workaround as mentioned above.
null
2022-04-19T19:03:17Z
2021-12-09T19:08:38Z
MODERATE
0
{'CWE-918'}
{'https://github.com/advisories/GHSA-qrmm-w75w-3wpx', 'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76', 'https://github.com/swagger-api/swagger-ui/security/advisories/GHSA-qrmm-w75w-3wpx', 'https://github.com/swagger-api/swagger-ui/issues/4872'}
null
GHSA
GHSA-5gm6-r79q-hfgw
Denial of service in direct_mail
The direct_mail extension through 5.2.3 for TYPO3 allows Denial of Service via log entries.
{'CVE-2020-12697'}
2021-05-24T16:58:32Z
2021-05-24T16:58:32Z
MODERATE
5.3
{'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-12697', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005', 'https://github.com/advisories/GHSA-5gm6-r79q-hfgw'}
null
GHSA
GHSA-38cr-2ph5-frr9
Apache Struts REST Plugin can potentially allow a DoS attack
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.
{'CVE-2018-1327'}
2022-04-26T18:59:22Z
2018-10-16T19:35:26Z
HIGH
7.5
{'CWE-91'}
{'https://cwiki.apache.org/confluence/display/WW/S2-056', 'https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3@%3Cissues.struts.apache.org%3E', 'https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db@%3Cissues.struts.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securityfocus.com/bid/103516', 'https://security.netapp.com/advisory/ntap-20180330-0001/', 'https://github.com/advisories/GHSA-38cr-2ph5-frr9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1327', 'http://www.securitytracker.com/id/1040575'}
null
GHSA
GHSA-35q2-47q7-3pc3
Potential exponential regex in monitor mode
### Impact When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. ### Patches The problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e) and was released in version `3.1.1`. ### References #1569 (GHSL-2021-026)
{'CVE-2021-29469'}
2022-04-19T19:02:53Z
2021-04-27T15:56:03Z
LOW
0
{'CWE-400'}
{'https://security.netapp.com/advisory/ntap-20210611-0010/', 'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e', 'https://github.com/advisories/GHSA-35q2-47q7-3pc3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29469', 'https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1', 'https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3'}
null
GHSA
GHSA-85fq-56wq-gmcf
Hijacked Environment Variables in mariadb
The `mariadb` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16046'}
2021-01-08T19:12:06Z
2018-07-18T18:28:17Z
MODERATE
0
{'CWE-506'}
{'https://nodesecurity.io/advisories/495', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16046', 'https://github.com/advisories/GHSA-85fq-56wq-gmcf', 'https://www.npmjs.com/advisories/495'}
null
GHSA
GHSA-r838-q6jp-58xx
Improper Restriction of Excessive Authentication Attempts in py-bcrypt
The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.
{'CVE-2013-1895'}
2021-10-12T16:31:22Z
2021-10-12T16:31:22Z
HIGH
7.5
{'CWE-307'}
{'http://www.securityfocus.com/bid/58702', 'http://www.openwall.com/lists/oss-security/2013/03/26/2', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83039', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101382.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1895', 'https://github.com/advisories/GHSA-r838-q6jp-58xx', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101387.html'}
null
GHSA
GHSA-ccrp-c664-8p4j
Cross-Site Scripting in markdown-to-jsx
Versions of `markdown-to-jsx` prior to 6.11.4 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing `data` or VBScript URIs and a base64-encoded payload. ## Recommendation Upgrade to version 6.11.4 or later.
null
2021-09-29T19:59:57Z
2020-09-03T21:17:36Z
HIGH
0
{'CWE-79'}
{'https://github.com/probablyup/markdown-to-jsx/pull/307', 'https://github.com/advisories/GHSA-ccrp-c664-8p4j', 'https://www.npmjs.com/advisories/1219'}
null
GHSA
GHSA-jh82-c5jw-pxpc
Denial of Service in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). - Vulnerability ID: OTF-012 - Vulnerability type: Denial of Service - Threat level: Moderate ## Description: The receive mode limits concurrent uploads to 100 per second and blocks other uploads in the same second, which can be triggered by a simple script. ## Technical description: The following script uses GNU parallel and curl with around 6000 requests in parallel to send 10000 requests. A change in the `ulimit -n` configuration is required for it to work. This is sufficient to block file upload on a (public) receive instance. ``` seq 10000 | parallel --max-args 0 --jobs 6000 "curl -i -s -x socks5h://localhost:9150 -k -X $'POST' -H $'Host: csqrp3qciewvj5axph4o62jnr6aevhmpxfkydmi3256bprhbusr2ltid.onion' -H $'Accept-Encoding: gzip, deflate' -H $'Content-Type: multipart/form-data; boundary=---------------------------19182376703918074873375387042' -H $'Content-Length: 329' -H $'Connection: close' --data-binary $'-----------------------------19182376703918074873375387042\x0d\x0aContent-Disposition: form-data; name=\"file[]\"; filename=\"poc.txt\"\x0d\x0aContent-Type: text/plain\x0d\x0a\x0d\x0aA\x0d\x0a-----------------------------19182376703918074873375387042\x0d\x0aContent-Disposition: form-data; name=\"text\"\x0d\x0a\x0d\x0a\x0d\x0a-----------------------------19182376703918074873375387042--\x0d\x0a' $'http://csqrp3qciewvj5axph4o62jnr6aevhmpxfkydmi3256bprhbusr2ltid.onion/upload-ajax'" ``` Attack duration was around 80 seconds. Cases where over 99 requests were sent per second: ``` Every 0.1s: ls | grep... onionvm: Tue Oct 5 12:17:00 2021 78 ``` Cases where files were successfully written to disk: ``` Every 0.1s: ls | wc -w onionvm: Tue Oct 5 12:17:00 2021 8399 ``` This means that during the attack time 1601 requests of 10000 were dropped. We tried to upload multiple files in the web interface during the attack and were not successful. The failsafe is used to prevent creating more than 100 directories per second: https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/web/receive_mode.py#L386-L427 The limit of 100 requests/second is significantly lower than the possible network bandwidth and greatly reduces the attack complexity for denial of service. Our test was conducted over the tor network, which showed no limitation for the required bandwidth. ## Impact: An adversary with access to the receive mode can block file upload for others. There is no way to block this attack in public mode due to the anonymity properties of the tor network. ## Recommendation: - Remove this limitation, or - Derive directory name from milliseconds
{'CVE-2022-21689'}
2022-01-21T23:20:27Z
2022-01-21T23:20:27Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc', 'https://github.com/advisories/GHSA-jh82-c5jw-pxpc', 'https://github.com/onionshare/onionshare/releases/tag/v2.5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21689'}
null
GHSA
GHSA-3pwh-5mmc-mwrx
Denial of Service in nes
Affected versions of `nes` are vulnerable to denial of service when given an invalid `cookie` header, and websocket authentication is set to `cookie`. Submitting an invalid cookie on the websocket upgrade request will cause the node process to throw and exit. ## Recommendation Update to version 6.4.1 or later.
{'CVE-2017-16025'}
2021-01-08T20:00:19Z
2018-07-24T20:06:33Z
HIGH
0
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16025', 'https://github.com/advisories/GHSA-3pwh-5mmc-mwrx', 'https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655', 'https://www.npmjs.com/advisories/331', 'https://github.com/hapijs/nes/issues/171', 'https://nodesecurity.io/advisories/331'}
null
GHSA
GHSA-fxpg-gg9g-76gj
Moderate severity vulnerability that affects django
Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie.
{'CVE-2010-3082'}
2021-09-10T20:17:18Z
2018-07-23T19:52:42Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-fxpg-gg9g-76gj', 'http://www.djangoproject.com/weblog/2010/sep/08/security-release/', 'https://nvd.nist.gov/vuln/detail/CVE-2010-3082', 'http://www.securityfocus.com/bid/43116', 'http://www.ubuntu.com/usn/USN-1004-1', 'https://bugzilla.redhat.com/show_bug.cgi?id=632239', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/61729', 'http://marc.info/?l=oss-security&m=128403961700444&w=2'}
null
GHSA
GHSA-w3jx-wv97-67ph
Cross-site scripting in Dutchcoders transfer.sh
Dutchcoders transfer.sh before 1.2.4 allows XSS via an inline view.
{'CVE-2021-33496'}
2021-06-29T21:25:27Z
2021-06-29T21:25:27Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4', 'https://github.com/advisories/GHSA-w3jx-wv97-67ph', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33496', 'https://vuln.ryotak.me/advisories/43', 'https://github.com/dutchcoders/transfer.sh/pull/373', 'https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4'}
null
GHSA
GHSA-wpww-4jf4-4hx8
Edit feed settings and others, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS). Impact: XSS via Arbitrary script execution. Attack vector is: Administrator must be logged in. Components are: Edit feed settings, Edit widget area, Sub site new registration, New category registration Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by Aquilao Null
{'CVE-2020-15273'}
2022-04-19T19:02:38Z
2020-11-04T21:08:38Z
LOW
7.3
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15273', 'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1', 'https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8', 'https://packagist.org/packages/baserproject/basercms', 'https://github.com/advisories/GHSA-wpww-4jf4-4hx8'}
null
GHSA
GHSA-7gm7-8q8v-9gf2
Server-Side Request Forgery (SSRF) in Shopware
### Impact The attacker can abuse the Admin SDK functionality on the server to read or update internal resources. ### Patches We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
{'CVE-2022-24871'}
2022-04-22T21:04:08Z
2022-04-22T21:04:07Z
HIGH
7.2
{'CWE-918'}
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022', 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://github.com/advisories/GHSA-7gm7-8q8v-9gf2', 'https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24871'}
null
GHSA
GHSA-3p94-vj97-fm4q
OS Command Injection in fsa
fsa through 0.5.1 is vulnerable to Command Injection. The first argument of 'execGitCommand()', located within 'lib/rep.js#63' can be controlled by users without any sanitization to inject arbitrary commands.
{'CVE-2020-7615'}
2021-12-09T19:56:44Z
2021-12-09T19:56:44Z
MODERATE
7.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-3p94-vj97-fm4q', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7615', 'https://github.com/gregof/fsa/blob/master/lib/rep.js#L12', 'https://snyk.io/vuln/SNYK-JS-FSA-564118'}
null
GHSA
GHSA-rrfp-j2mp-hq9c
Segfault in `tf.quantization.quantize_and_dequantize`
### Impact An attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`: ```python tf.quantization.quantize_and_dequantize( input=[2.5, 2.5], input_min=[0,0], input_max=[1,1], axis=10) ``` This results in accessing [a dimension outside the rank of the input tensor](https://github.com/tensorflow/tensorflow/blob/0225022b725993bfc19b87a02a2faaad9a53bc17/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L74) in the C++ kernel implementation: ``` const int depth = (axis_ == -1) ? 1 : input.dim_size(axis_); ``` However, [`dim_size` only does a `DCHECK`](https://github.com/tensorflow/tensorflow/blob/0225022b725993bfc19b87a02a2faaad9a53bc17/tensorflow/core/framework/tensor_shape.cc#L292-L307) to validate the argument and then uses it to access the corresponding element of an array: ``` int64 TensorShapeBase<Shape>::dim_size(int d) const { DCHECK_GE(d, 0); DCHECK_LT(d, dims()); DoStuffWith(dims_[d]); } ``` Since in normal builds, `DCHECK`-like macros are no-ops, this results in segfault and access out of bounds of the array. ### Patches We have patched the issue in eccb7ec454e6617738554a255d77f08e60ee0808 and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported in #42105
{'CVE-2020-15265'}
2021-08-26T15:20:29Z
2020-11-13T17:13:04Z
LOW
5.9
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrfp-j2mp-hq9c', 'https://github.com/tensorflow/tensorflow/issues/42105', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15265', 'https://github.com/advisories/GHSA-rrfp-j2mp-hq9c', 'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808'}
null
GHSA
GHSA-3wcq-x3mq-6r9p
Potential memory exposure in dns-packet
This affects the package dns-packet before versions 1.3.2 and 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.
{'CVE-2021-23386'}
2021-05-27T23:00:16Z
2021-05-24T19:51:04Z
HIGH
7.7
{'CWE-200', 'CWE-908'}
{'https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56', 'https://github.com/mafintosh/dns-packet/commit/0d0d593f8df4e2712c43957a6c62e95047f12b2d', 'https://github.com/advisories/GHSA-3wcq-x3mq-6r9p', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1295719', 'https://hackerone.com/bugs?subject=user&amp%3Breport_id=968858', 'https://snyk.io/vuln/SNYK-JS-DNSPACKET-1293563', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23386'}
null
GHSA
GHSA-8xqr-4cpm-wx7g
Cross-Site Scripting in react-svg
Versions of `react-svg` before 2.2.18 are vulnerable to cross-site scripting (xss). This is due to the fact that scripts found in SVG files are run by default. ## Recommendation Update to version 2.2.18 or later.
null
2021-08-04T20:24:38Z
2019-05-31T23:47:27Z
HIGH
0
{'CWE-79'}
{'https://nodesecurity.io/advisories/648', 'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb', 'https://github.com/tanem/react-svg/pull/57', 'https://www.npmjs.com/advisories/648', 'https://github.com/advisories/GHSA-8xqr-4cpm-wx7g'}
null
GHSA
GHSA-rmm5-g63h-m6g9
Moderate severity vulnerability that affects ro.pippo:pippo-core
jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE.
{'CVE-2018-20059'}
2021-09-17T18:57:43Z
2018-12-19T19:24:39Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/pippo-java/pippo/issues/486', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20059', 'https://github.com/advisories/GHSA-rmm5-g63h-m6g9'}
null
GHSA
GHSA-c545-c4f9-rf6v
Heap OOB in TFLite
### Impact TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside of bounds of heap allocated data: ```cc if (axis < 0) { axis = input_dims.size + 1 + axis; } TF_LITE_ENSURE(context, axis <= input_dims.size); TfLiteIntArray* output_dims = TfLiteIntArrayCreate(input_dims.size + 1); for (int i = 0; i < output_dims->size; ++i) { if (i < axis) { output_dims->data[i] = input_dims.data[i]; } else if (i == axis) { output_dims->data[i] = 1; } else { output_dims->data[i] = input_dims.data[i - 1]; } } ``` If `axis` is a large negative value (e.g., `-100000`), then after the first `if` it would still be negative. The check following the `if` statement will pass and the `for` loop would read one element before the start of `input_dims.data` (when `i = 0`). ### Patches We have patched the issue in GitHub commit [d94ffe08a65400f898241c0374e9edc6fa8ed257](https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37685'}
2021-08-25T14:40:09Z
2021-08-25T14:40:09Z
MODERATE
5.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-c545-c4f9-rf6v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37685', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v', 'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257'}
null
GHSA
GHSA-6qqf-vvcr-7qrv
Cryptographically Weak PRNG in generate-password
Affected versions of generate-password generate random values that are biased towards certain characters depending on the chosen character sets. This may result in guessable passwords. ## Recommendation Update to version 1.4.1 or later.
null
2021-08-04T15:27:17Z
2019-05-23T09:27:22Z
MODERATE
0
{'CWE-338'}
{'https://github.com/advisories/GHSA-6qqf-vvcr-7qrv', 'https://www.npmjs.com/advisories/762', 'https://github.com/brendanashworth/generate-password/pull/26'}
null