ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-jpj5-hg26-6jgc
Cross-site Scripting in Alist
Alist versions 2.0.10 through 2.1.0 were discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. This issue was fixed in version 2.1.1.
{'CVE-2022-26533'}
2022-03-23T15:50:07Z
2022-03-13T00:00:54Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26533', 'https://github.com/Xhofe/alist/issues/645', 'https://github.com/advisories/GHSA-jpj5-hg26-6jgc', 'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'}
null
GHSA
GHSA-jgcr-fg3g-qvw8
Improper permission handling in Apache Solr
When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs.
{'CVE-2021-29262'}
2021-10-07T13:47:34Z
2021-05-10T15:18:17Z
HIGH
7.5
{'CWE-279', 'CWE-522'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29262', 'https://lists.apache.org/thread.html/r7151081abab92a827a607205c4260b0a3d22280b52d15bc909177608@%3Coak-issues.jackrabbit.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210604-0009/', 'https://lists.apache.org/thread.html/rbc680cbfd745f22d182158217428a296e8e398cde16f3f428fe4bddc@%3Coak-issues.jackrabbit.apache.org%3E', 'https://github.com/advisories/GHSA-jgcr-fg3g-qvw8', 'https://lists.apache.org/thread.html/r1e92a2eff6c47a65c4a6e95e809a9707181de76f8062403a0bea1012@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rb6db683903174eaa44ec80cc118a38574319b0d4181f36b61ee6278f@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r8d35eeb9a470d2682b5bcf3be0b8942faa7e28f9ca5861c058d17fff@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/ref84e60192f4bdc3206b247f260513e8d4e71f3e200792f75386d07a@%3Cdev.jackrabbit.apache.org%3E', 'https://issues.apache.org/jira/browse/SOLR-15249', 'https://lists.apache.org/thread.html/r536da4c4e4e406f7843461cc754a3d0a3fe575aa576e2b71a9cd57d0%40%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rd85f87e559ee27e9c69795e3ad93a77621895e0328ea3df41d711d72@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r51b29ff62060b67bc9999ded5e252b36b09311fe5a02d27f6de3e4d3@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r1171f6417eeb6d5e1206d53e2b2ff2d6ee14026f8b595ef7d8a33b79@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r9c4ce6903218c92ef2583070e64af5a69e483821c4b3016dc41e3c6f@%3Coak-issues.jackrabbit.apache.org%3E'}
null
GHSA
GHSA-73q4-j324-2qcc
Incorrect authorization in Drupal core
The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
{'CVE-2022-25270'}
2022-03-01T22:04:21Z
2022-02-18T00:00:36Z
MODERATE
6.5
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25270', 'https://www.drupal.org/sa-core-2022-004', 'https://github.com/advisories/GHSA-73q4-j324-2qcc'}
null
GHSA
GHSA-95cm-88f5-f2c7
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).
{'CVE-2020-10672'}
2021-10-21T21:13:58Z
2020-04-23T16:32:59Z
HIGH
8.8
null
{'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-95cm-88f5-f2c7', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10672', 'https://github.com/FasterXML/jackson-databind/issues/2659'}
null
GHSA
GHSA-gwp7-vqr5-h33h
Open Redirect in autobahn
Autobahn|Python before 20.12.3 allows redirect header injection.
{'CVE-2020-35678'}
2021-04-20T16:13:45Z
2021-04-20T16:13:45Z
MODERATE
6.1
{'CWE-601'}
{'https://autobahn.readthedocs.io/en/latest/changelog.html', 'https://github.com/crossbario/autobahn-python/compare/v20.12.2...v20.12.3', 'https://github.com/crossbario/autobahn-python/pull/1439', 'https://github.com/advisories/GHSA-gwp7-vqr5-h33h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35678', 'https://github.com/crossbario/autobahn-python', 'https://pypi.org/project/autobahn/20.12.3/'}
null
GHSA
GHSA-h362-m8f2-5x7c
Password Hashing: Do not use MD5
### Impact User passwords are stored in the database using the rather outdated and cryptographically insecure MD5 hash algorithm. Furthermore, the hashes are salted using the username instead of a random salt, causing hashes for users with the same username and password to collide which is problematic especially for popular users like the default `admin` user. This essentially means that for an attacker, it might be feasible to reconstruct a user's password given access to these hashes. Note that attackers needing access to the hashes means that they must gain access to the database in which these are stored first to be able to start cracking the passwords. ### Patches The problem is addressed in Opencast 8.1 which now uses the modern and much stronger bcrypt password hashing algorithm for storing passwords. Note, that old hashes remain MD5 until the password is updated. For a list of users whose password hashes are stored using MD5, take a look at the `/user-utils/users/md5.json` REST endpoint. ### Workarounds There is no workaround. ### References - [MD5 (Wikipedia)](https://en.wikipedia.org/wiki/MD5) - [bcrypt (Wikipedia)](https://en.wikipedia.org/wiki/Bcrypt) - [How weak is MD5 as a password hashing function?](https://security.stackexchange.com/q/52461) ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at security@opencast.org
{'CVE-2020-5229'}
2021-01-08T20:31:51Z
2020-01-30T21:21:58Z
LOW
7.7
{'CWE-327'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-h362-m8f2-5x7c', 'https://github.com/advisories/GHSA-h362-m8f2-5x7c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5229', 'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e'}
null
GHSA
GHSA-5jgp-pg4f-q8vj
Malicious Package in node-ftp
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:27:22Z
2020-09-03T19:55:42Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1137', 'https://github.com/advisories/GHSA-5jgp-pg4f-q8vj'}
null
GHSA
GHSA-g9r4-xpmj-mj65
Prototype Pollution in handlebars
Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to prototype pollution. It is possible to add or modify properties to the Object prototype through a malicious template. This may allow attackers to crash the application or execute Arbitrary Code in specific conditions. ## Recommendation Upgrade to version 3.0.8, 4.5.3 or later.
null
2021-10-01T20:08:29Z
2020-09-04T15:06:32Z
HIGH
0
{'CWE-1321'}
{'https://github.com/advisories/GHSA-g9r4-xpmj-mj65', 'https://www.npmjs.com/advisories/1325'}
null
GHSA
GHSA-gjj5-998g-v36v
Improper Access Control in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerability ID: OTF-003 - Vulnerability type: Improper Access Control - Threat level: Moderate ## Description: Anyone with access to the chat environment can write messages disguised as another chat participant. ## Technical description: Prerequisites: - Alice and Bob are legitimate users - A third user has access to the chat environment ![otf-003-a](https://user-images.githubusercontent.com/156128/140665707-1ecc897e-d33b-4f5b-b585-eb4475c1599f.png) This screenshot shows Alice (`glimpse-depress`) and Bob (`blinker-doorpost`) joined a chatroom and are the only participants in the chatroom. Then the non-listed user squad-nursing writes a message in the chatroom without being visible in the list of users. The sending of the message itself is not required but was done here to show the initial access. The non-listed participant now renames himself to Bob and writes another message, seemingly coming from Bob. This can be reproduced by slightly modifying the client-side JavaScript. The `joined` emit needs to be removed from the `socket.on(connect) `event handler. Therefore a client is not listed in the userlist and has no active session. https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/resources/static/js/chat.js#L16-L18 This can be done either via a crafted client or runtime modification of the `chat.js` script in the browser's internal debugger. It is still possible to call the text method and send text to the chat via websocket. https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/web/chat_mode.py#L131-L139 It is also possible to call the `update_username` function and choose an existing username from the chat. https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/web/chat_mode.py#L141-L162 Afterwards the hidden user can send messages that are displayed as coming from the impersonated user. There is no way to distinguish between the fake and original message. ## Impact: An adversary with access to the chat environment can impersonate existing chat participants and write messages but not read the conversation. The similar exploit described in OTF-004 (page 19) has only slightly more requirements but also allows for reading. ## Recommendation: - Implement proper session handling
{'CVE-2022-21692'}
2022-01-21T23:20:21Z
2022-01-21T23:20:21Z
MODERATE
4.3
{'CWE-287'}
{'https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v', 'https://github.com/advisories/GHSA-gjj5-998g-v36v', 'https://github.com/onionshare/onionshare/releases/tag/v2.5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21692'}
null
GHSA
GHSA-6w3v-66mj-2qm6
Moderate severity vulnerability that affects org.apache.qpid:apache-qpid-broker-j
A Denial of Service vulnerability was found in Apache Qpid Broker-J 7.0.0 in functionality for authentication of connections for AMQP protocols 0-8, 0-9, 0-91 and 0-10 when PLAIN or XOAUTH2 SASL mechanism is used. The vulnerability allows unauthenticated attacker to crash the broker instance. AMQP 1.0 and HTTP connections are not affected. An authentication of incoming AMQP connections in Apache Qpid Broker-J is performed by special entities called "Authentication Providers". Each Authentication Provider can support several SASL mechanisms which are offered to the connecting clients as part of SASL negotiation process. The client chooses the most appropriate SASL mechanism for authentication. Authentication Providers of following types supports PLAIN SASL mechanism: Plain, PlainPasswordFile, SimpleLDAP, Base64MD5PasswordFile, MD5, SCRAM-SHA-256, SCRAM-SHA-1. XOAUTH2 SASL mechanism is supported by Authentication Providers of type OAuth2. If an AMQP port is configured with any of these Authentication Providers, the Broker may be vulnerable.
{'CVE-2018-1298'}
2021-09-02T18:30:04Z
2018-10-19T16:41:46Z
MODERATE
5.9
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1298', 'https://github.com/advisories/GHSA-6w3v-66mj-2qm6', 'https://lists.apache.org/thread.html/d9087e9e57c9b6376754e2b4ea8cd5e9ae6449ed17fc384640c9c9e1@%3Cusers.qpid.apache.org%3E'}
null
GHSA
GHSA-9c84-4hx6-xmm4
Integer overflow in TFLite concatentation
### Impact The TFLite implementation of concatenation is [vulnerable to an integer overflow issue](https://github.com/tensorflow/tensorflow/blob/7b7352a724b690b11bfaae2cd54bc3907daf6285/tensorflow/lite/kernels/concatenation.cc#L70-L76): ```cc for (int d = 0; d < t0->dims->size; ++d) { if (d == axis) { sum_axis += t->dims->data[axis]; } else { TF_LITE_ENSURE_EQ(context, t->dims->data[d], t0->dims->data[d]); } } ``` An attacker can craft a model such that the dimensions of one of the concatenation input overflow the values of `int`. TFLite uses `int` to represent tensor dimensions, whereas TF uses `int64`. Hence, valid TF models can trigger an integer overflow when converted to TFLite format. ### Patches We have patched the issue in GitHub commit [4253f96a58486ffe84b61c0415bb234a4632ee73](https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29601'}
2021-05-21T14:28:08Z
2021-05-21T14:28:08Z
MODERATE
6.3
{'CWE-190'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29601', 'https://github.com/advisories/GHSA-9c84-4hx6-xmm4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c84-4hx6-xmm4', 'https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73'}
null
GHSA
GHSA-hpcx-3pw8-g3j2
Free of uninitialized memory in telemetry
An issue was discovered in the telemetry crate through 0.1.2 for Rust. There is a drop of uninitialized memory if a value.clone() call panics within misc::vec_with_size().
{'CVE-2021-29937'}
2021-08-25T20:54:22Z
2021-08-25T20:54:22Z
CRITICAL
9.8
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29937', 'https://github.com/Yoric/telemetry.rs/issues/45', 'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81', 'https://rustsec.org/advisories/RUSTSEC-2021-0046.html', 'https://github.com/advisories/GHSA-hpcx-3pw8-g3j2'}
null
GHSA
GHSA-qx2v-j445-g354
Improper Input Validation in Google TensorFlow
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow before 1.7.1, could result in a crash or read from other parts of process memory.
{'CVE-2018-7577'}
2021-08-03T21:02:28Z
2019-04-30T15:37:34Z
HIGH
8.1
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-7577', 'https://github.com/advisories/GHSA-qx2v-j445-g354', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-005.md'}
null
GHSA
GHSA-37m5-42qp-4qpr
Cross-site scripting in LocalStack
A Cross-site scripting (XSS) vulnerability exists in StackLift LocalStack.
{'CVE-2021-32091'}
2021-06-18T18:38:09Z
2021-06-18T18:38:09Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-37m5-42qp-4qpr', 'https://blog.sonarsource.com/hack-the-stack-with-localstack', 'https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32091'}
null
GHSA
GHSA-f38p-c2gq-4pmr
Regular Expression Denial-of-Service in npm schema-inspector
### Impact _What kind of vulnerability is it? Who is impacted?_ Email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS. The new regex expression is more limited in what it can check, so it is more flexible than the one used before. Therefore, this was a new major version instead of a new patch version to warn people upgrading that they should make sure the email validation still works for their use case. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ If a user chooses to not upgrade, the only known workaround would be to stop using the email validation feature in the library. The user could, for example, accept the email address into their system but save it in a "not yet validated" state in their system until a verification email is sent to it (to determine whether the email is valid and belongs to the form submitter). Note that this is the preferred way of validating email addresses anyways. ### References _Are there any links users can visit to find out more?_ https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f ### For more information If you have any questions or comments about this advisory, you can create an issue in this repository.
{'CVE-2021-21267'}
2022-04-19T19:02:45Z
2021-03-19T20:14:21Z
LOW
0
{'CWE-20', 'CWE-400'}
{'https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f', 'https://github.com/schema-inspector/schema-inspector/releases/tag/2.0.0', 'https://github.com/advisories/GHSA-f38p-c2gq-4pmr', 'https://www.npmjs.com/package/schema-inspector', 'https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21267', 'https://security.netapp.com/advisory/ntap-20210528-0006/'}
null
GHSA
GHSA-8mfc-v7wv-p62g
Path Traversal in Yarn
Arbitrary filesystem write vulnerability in Yarn 1.21.1 and earlier allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package.
{'CVE-2020-8131'}
2022-02-09T22:43:37Z
2022-02-09T22:43:37Z
HIGH
7.5
{'CWE-22'}
{'https://hackerone.com/reports/730239', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8131', 'https://github.com/advisories/GHSA-8mfc-v7wv-p62g', 'https://github.com/yarnpkg/yarn/pull/7831'}
null
GHSA
GHSA-5r5w-h76p-m726
Use of a Broken or Risky Cryptographic Algorithm in Max Mazurov Maddy
A Broken or Risky Cryptographic Algorithm exists in Max Mazurov Maddy before 0.5.2, which is an unnecessary risk that may result in the exposure of sensitive information.
{'CVE-2021-42583'}
2022-01-13T18:32:44Z
2022-01-06T22:20:53Z
HIGH
0
{'CWE-327'}
{'https://github.com/foxcpp/maddy/releases/tag/v0.5.2', 'https://github.com/advisories/GHSA-5r5w-h76p-m726', 'https://github.com/foxcpp/maddy/blob/df40dce1284cd0fd0a9e8e7894029553d653d0a5/internal/auth/shadow/verify.go', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42583'}
null
GHSA
GHSA-53xj-v576-3ch2
OS Command Injection in giting
giting version prior to 0.0.8 allows execution of arbritary commands. The first argument &quot;repo&quot; of function &quot;pull()&quot; is executed by the package without any validation.
{'CVE-2019-10802'}
2021-04-13T15:22:09Z
2021-04-13T15:22:09Z
HIGH
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10802', 'https://snyk.io/vuln/SNYK-JS-GITING-559008', 'https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0', 'https://github.com/advisories/GHSA-53xj-v576-3ch2'}
null
GHSA
GHSA-f34x-8pf6-qc9c
HTTP header injection in Sonatype Nexus Repository
Sonatype Nexus Repository 3.x through 3.33.1-01 is vulnerable to an HTTP header injection. By sending a crafted HTTP request, a remote attacker may disclose sensitive information or request external resources from a vulnerable instance.
{'CVE-2021-40143'}
2021-09-15T18:27:55Z
2021-09-08T17:42:18Z
HIGH
8.2
{'CWE-74'}
{'https://help.sonatype.com/repomanager3/release-notes/2021-release-notes', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40143', 'https://github.com/advisories/GHSA-f34x-8pf6-qc9c', 'https://issues.sonatype.org/secure/ReleaseNote.jspa', 'https://support.sonatype.com/hc/en-us/articles/4405941762579'}
null
GHSA
GHSA-fcf9-3qw3-gxmj
High severity vulnerability that affects cryptography
A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage.
{'CVE-2018-10903'}
2022-03-03T21:54:39Z
2018-07-31T18:28:09Z
HIGH
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-10903', 'https://github.com/advisories/GHSA-fcf9-3qw3-gxmj', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10903', 'https://github.com/pyca/cryptography/pull/4342/commits/688e0f673bfbf43fa898994326c6877f00ab19ef'}
null
GHSA
GHSA-vf5m-q45w-8mh9
Malicious Package in js-qha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:01:14Z
2020-09-03T23:00:25Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-vf5m-q45w-8mh9', 'https://www.npmjs.com/advisories/1282'}
null
GHSA
GHSA-xc6x-cq47-9chw
Vulnerability in Azure Active Directory Authentication Library
An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens, aka 'Azure Active Directory Authentication Library Elevation of Privilege Vulnerability'.
{'CVE-2019-1258'}
2021-08-26T15:33:47Z
2019-08-16T14:03:35Z
HIGH
8.8
null
{'https://github.com/advisories/GHSA-xc6x-cq47-9chw', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1258', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1258'}
null
GHSA
GHSA-mhhc-q96p-mfm9
Infinite loop in TFLite
### Impact The strided slice implementation in TFLite has a logic bug which can allow an attacker to trigger an infinite loop. This arises from newly introduced support for [ellipsis in axis definition](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/strided_slice.cc#L103-L122): ```cc for (int i = 0; i < effective_dims;) { if ((1 << i) & op_context->params->ellipsis_mask) { // ... int ellipsis_end_idx = std::min(i + 1 + num_add_axis + op_context->input_dims - begin_count, effective_dims); // ... for (; i < ellipsis_end_idx; ++i) { // ... } continue; } // ... ++i; } ``` An attacker can craft a model such that `ellipsis_end_idx` is smaller than `i` (e.g., always negative). In this case, the inner loop does not increase `i` and the `continue` statement causes execution to skip over the preincrement at the end of the outer loop. ### Patches We have patched the issue in GitHub commit [dfa22b348b70bb89d6d6ec0ff53973bacb4f4695](https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695). The fix will be included in TensorFlow 2.6.0. This is the only affected version. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37686'}
2021-08-25T14:39:58Z
2021-08-25T14:39:58Z
MODERATE
5.5
{'CWE-835'}
{'https://github.com/tensorflow/tensorflow/releases/tag/v2.6.0', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.4', 'https://github.com/advisories/GHSA-mhhc-q96p-mfm9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37686', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mhhc-q96p-mfm9', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.5.1', 'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.4.3'}
null
GHSA
GHSA-78h7-fgq9-625x
Directory Traversal in quickserver
Affected versions of `quickserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16196'}
2021-01-08T19:16:59Z
2018-07-23T20:40:14Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/quickserver', 'https://github.com/advisories/GHSA-78h7-fgq9-625x', 'https://nodesecurity.io/advisories/433', 'https://www.npmjs.com/advisories/433', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16196'}
null
GHSA
GHSA-g4w7-3qr8-5623
Improper type usage in rusqlite
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via the repr(Rust) type.
{'CVE-2020-35872'}
2021-08-25T20:47:01Z
2021-08-25T20:47:01Z
CRITICAL
9.8
{'CWE-351'}
{'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0', 'https://github.com/advisories/GHSA-g4w7-3qr8-5623', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35872'}
null
GHSA
GHSA-p673-hjf2-pwfr
High severity vulnerability that affects command_wrap
command_wrap.rb in the command_wrap Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL or filename.
{'CVE-2013-1875'}
2021-09-15T21:37:21Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-94'}
{'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'http://seclists.org/fulldisclosure/2013/Mar/175', 'http://packetstormsecurity.com/files/120847/Ruby-Gem-Command-Wrap-Command-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1875', 'https://github.com/advisories/GHSA-p673-hjf2-pwfr', 'http://www.osvdb.org/91450'}
null
GHSA
GHSA-q5hq-fp76-qmrc
Uncontrolled Resource Consumption in Pillow
An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening.
{'CVE-2021-28677'}
2021-09-15T18:31:39Z
2021-06-08T18:49:36Z
HIGH
7.5
{'CWE-400'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://github.com/python-pillow/Pillow/pull/5377', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/advisories/GHSA-q5hq-fp76-qmrc', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28677-fix-eps-dos-on-open', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28677'}
null
GHSA
GHSA-5cqm-crxm-6qpv
Buffer overrun vulnerability in CGI
A security vulnerability that causes buffer overflow when you pass a very large string (> 700 MB) to CGI.escape_html on a platform where long type takes 4 bytes, typically, Windows. Please update the cgi gem to version 0.3.1, 0.2,1, and 0.1,1 or later. You can use gem update cgi to update it. If you are using bundler, please add gem "cgi", ">= 0.3.1" to your Gemfile. Alternatively, please update Ruby to 2.7.5 or 3.0.3. This issue has been introduced since Ruby 2.7, so the cgi version bundled with Ruby 2.6 is not vulnerable.
{'CVE-2021-41816'}
2022-05-02T14:59:16Z
2021-12-14T21:36:20Z
CRITICAL
9.8
{'CWE-190'}
{'https://security-tracker.debian.org/tracker/CVE-2021-41816', 'https://hackerone.com/reports/1328463', 'https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41816', 'https://github.com/advisories/GHSA-5cqm-crxm-6qpv', 'https://security.netapp.com/advisory/ntap-20220303-0006/', 'https://groups.google.com/g/ruby-security-ann/c/4MQ568ZG47c'}
null
GHSA
GHSA-gf93-h79q-6jjv
Incorrect implementation of the Streebog hash functions in streebog
An issue was discovered in the streebog crate before 0.8.0 for Rust. The Streebog hash function can produce the wrong answer.
{'CVE-2019-25006'}
2021-08-25T20:45:41Z
2021-08-25T20:45:41Z
HIGH
7.5
{'CWE-327'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-25006', 'https://github.com/advisories/GHSA-gf93-h79q-6jjv', 'https://github.com/RustCrypto/hashes/pull/91', 'https://rustsec.org/advisories/RUSTSEC-2019-0030.html'}
null
GHSA
GHSA-5m69-3chg-6f8m
Cross Site Scripting (XSS) in Quokka
Cross Site Scripting (XSS) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the 'Username' parameter in the component 'quokka/admin/actions.py'.
{'CVE-2020-18702'}
2021-08-30T16:23:26Z
2021-08-30T16:23:26Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/rochacbruno/quokka/issues/675', 'https://nvd.nist.gov/vuln/detail/CVE-2020-18702', 'https://github.com/advisories/GHSA-5m69-3chg-6f8m'}
null
GHSA
GHSA-cf6r-3wgc-h863
Polymorphic deserialization of malicious object in jackson-databind
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
{'CVE-2019-14892'}
2021-04-27T19:44:30Z
2020-05-15T18:58:58Z
HIGH
7.5
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://github.com/FasterXML/jackson-databind/issues/2462', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14892', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892', 'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b', 'https://security.netapp.com/advisory/ntap-20200904-0005/', 'https://github.com/advisories/GHSA-cf6r-3wgc-h863'}
null
GHSA
GHSA-7h26-63m7-qhf2
HTML comments vulnerability allowing to execute JavaScript code
### Affected packages The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4. ### Impact A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. ### Patches The problem has been recognized and patched. The fix will be available in version 4.17.0. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank William Bowling ([wbowling](https://github.com/wbowling)) for recognizing and reporting this vulnerability.
{'CVE-2021-41165'}
2022-04-22T15:40:19Z
2021-11-17T21:58:25Z
HIGH
8.2
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41165', 'https://github.com/advisories/GHSA-7h26-63m7-qhf2', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417', 'https://www.drupal.org/sa-core-2021-011', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-rmxg-73gg-4p98
Cross-Site Scripting (XSS) in jquery
Affected versions of `jquery` interpret `text/javascript` responses from cross-origin ajax requests, and automatically execute the contents in `jQuery.globalEval`, even when the ajax request doesn't contain the `dataType` option. ## Recommendation Update to version 3.0.0 or later.
{'CVE-2015-9251'}
2021-09-17T18:58:20Z
2018-01-22T13:32:06Z
MODERATE
6.1
{'CWE-79'}
{'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'http://seclists.org/fulldisclosure/2019/May/10', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://www.tenable.com/security/tns-2019-08', 'https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2020:0481', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9251', 'http://www.securityfocus.com/bid/105658', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://snyk.io/vuln/npm:jquery:20150627', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'https://github.com/jquery/jquery/pull/2588', 'https://github.com/advisories/GHSA-rmxg-73gg-4p98', 'https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601', 'https://security.netapp.com/advisory/ntap-20210108-0004/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.npmjs.com/advisories/328', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'https://github.com/jquery/jquery/issues/2432', 'https://seclists.org/bugtraq/2019/May/18', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}
null
GHSA
GHSA-wxhq-pm8v-cw75
Regular Expression Denial of Service in clean-css
Version of `clean-css` prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. ## Recommendation Upgrade to version 4.1.11 or higher.
null
2022-04-19T19:03:26Z
2019-06-05T20:50:16Z
LOW
0
null
{'https://www.npmjs.com/advisories/785', 'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3', 'https://github.com/advisories/GHSA-wxhq-pm8v-cw75'}
null
GHSA
GHSA-5vp3-v4hc-gx76
UUPSUpgradeable vulnerability in @openzeppelin/contracts
### Impact Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon. ### Patches A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds Initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301). ### References [Post-mortem](https://forum.openzeppelin.com/t/uupsupgradeable-vulnerability-post-mortem/15680). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
{'CVE-2021-41264'}
2021-11-16T21:44:48Z
2021-09-15T20:23:17Z
CRITICAL
9.8
{'CWE-665'}
{'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5vp3-v4hc-gx76', 'https://github.com/advisories/GHSA-5vp3-v4hc-gx76', 'https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41264'}
null
GHSA
GHSA-v39h-qm32-8gwq
Improperly Controlled Modification of Dynamically-Determined Object Attributes in express-mock-middleware
express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk.
{'CVE-2020-7616'}
2021-12-09T19:57:29Z
2021-12-09T19:57:29Z
MODERATE
5.3
{'CWE-915'}
{'https://github.com/LingyuCoder/express-mock-middleware/blob/master/lib/index.js#L39', 'https://snyk.io/vuln/SNYK-JS-EXPRESSMOCKMIDDLEWARE-564120', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7616', 'https://github.com/advisories/GHSA-v39h-qm32-8gwq'}
null
GHSA
GHSA-v596-fwhq-8x48
High severity vulnerability that affects org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core
Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.
{'CVE-2018-1199'}
2021-12-03T14:54:43Z
2018-10-17T20:01:54Z
HIGH
0
null
{'https://github.com/advisories/GHSA-v596-fwhq-8x48'}
null
GHSA
GHSA-cf66-xwfp-gvc4
Missing Origin Validation in webpack-dev-server
Versions of `webpack-dev-server` before 3.1.10 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation For `webpack-dev-server` update to version 3.1.11 or later.
{'CVE-2018-14732'}
2022-04-06T20:40:37Z
2019-01-04T17:40:59Z
HIGH
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-14732', 'https://github.com/webpack/webpack-dev-server/issues/1620', 'https://www.npmjs.com/advisories/725', 'https://github.com/webpack/webpack-dev-server/blob/master/CHANGELOG.md#3111-2018-12-21', 'https://github.com/advisories/GHSA-cf66-xwfp-gvc4', 'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10', 'https://github.com/webpack/webpack-dev-server/issues/1445'}
null
GHSA
GHSA-7359-3c6r-hfc2
Improper Certificate Validation in oauth ruby gem
lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
{'CVE-2016-11086'}
2021-10-05T16:25:55Z
2021-04-22T16:22:15Z
HIGH
7.4
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-11086', 'https://github.com/oauth-xx/oauth-ruby/releases/tag/v0.5.5', 'https://github.com/oauth-xx/oauth-ruby/issues/137', 'https://github.com/advisories/GHSA-7359-3c6r-hfc2', 'https://rubygems.org/gems/oauth', 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'}
null
GHSA
GHSA-37hp-765x-j95x
Moderate severity vulnerability that affects django
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
{'CVE-2017-7233'}
2021-08-31T20:50:45Z
2019-01-04T17:50:26Z
MODERATE
6.1
{'CWE-601'}
{'https://access.redhat.com/errata/RHSA-2017:1445', 'https://access.redhat.com/errata/RHSA-2018:2927', 'http://www.securityfocus.com/bid/97406', 'https://access.redhat.com/errata/RHSA-2017:1470', 'https://github.com/advisories/GHSA-37hp-765x-j95x', 'http://www.debian.org/security/2017/dsa-3835', 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/', 'https://access.redhat.com/errata/RHSA-2017:1462', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7233', 'https://access.redhat.com/errata/RHSA-2017:1596', 'http://www.securitytracker.com/id/1038177', 'https://access.redhat.com/errata/RHSA-2017:3093', 'https://access.redhat.com/errata/RHSA-2017:1451'}
null
GHSA
GHSA-mh8g-hprg-8363
Hard-Coded Key Used For Remember-me Token in Opencast
### Impact The security configuration in `etc/security/mh_default_org.xml` enables a remember-me cookie based on a hash created from the [username, password, and an additional system key](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html). Opencast has hard-coded this system key in the large XML file and never mentions to change this, basically ensuring that all systems use the same key: ```xml <sec:remember-me key="opencast" user-service-ref="userDetailsService" /> ``` This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. For example, a remember-me token obtained from develop.opencast.org can be used on stable.opencast.org without actually knowing the log-in credentials. Such an attack will usually not work on different installations – assuming that safe, unique passwords are used – but it is basically guaranteed to work to get access to all machines of one cluster if a token from one machine is compromised. ### Patches This problem is fixed in Opencast 7.6 and Opencast 8.1 ### Workarounds We strongly recommend updating to the patched version. Still, as a workaround for older versions, in `etc/security/mh_default_org.xml`, set a custom key for each server: ```xml <sec:remember-me key="CUSTOM_RANDOM_KEY" user-service-ref="userDetailsService" /> ``` ### References - [Relevant lines in the security configuration](https://github.com/opencast/opencast/blob/161ee619382f144dc35eea211fc6b556025b98e1/etc/security/mh_default_org.xml#L335-L336) - [Spring Security Remember-Me Authentication Documentation](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html#remember-me-hash-token) ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at [security@opencast.org](mailto:security@opencast.org) ### Thanks Thanks to @LukasKalbertodt for reporting the issue.
{'CVE-2020-5222'}
2022-04-19T19:02:24Z
2020-01-30T21:21:44Z
MODERATE
6.8
{'CWE-798'}
{'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6', 'https://github.com/advisories/GHSA-mh8g-hprg-8363', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5222', 'https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363'}
null
GHSA
GHSA-9fgx-q25h-jxrg
DOM XSS in Theme Preview
### Impact An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site. Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.3.2. Immediate action should be taken to secure your site - see patches & workarounds below. ### Patches Fixed in 4.3.3, all 4.x sites should upgrade as soon as possible. As the endpoint is unused, the patch simply removes it. ### Workarounds - Log out of Ghost Admin - Suspend any users who cannot log out - Block access to `/ghost/preview` Example of how to block access in nginx: ``` location ~ /ghost/preview { rewrite ^(\/(.*\/)?ghost\/)(.*)$ $1 redirect; } ``` This redirects the endpoint to `/ghost/`, which mimics the behaviour after the patch is applied.
{'CVE-2021-29484'}
2022-04-19T19:02:55Z
2021-04-29T21:53:18Z
MODERATE
6.8
{'CWE-79'}
{'https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg', 'https://blog.sonarsource.com/ghost-admin-takeover', 'https://github.com/advisories/GHSA-9fgx-q25h-jxrg', 'https://security.netapp.com/advisory/ntap-20210618-0006/', 'https://forum.ghost.org/t/critical-security-update-available-for-ghost-4-x/22290', 'https://www.npmjs.com/package/ghost', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29484'}
null
GHSA
GHSA-4f7p-27jc-3c36
HTTP Request Smuggling in waitress
### Impact When using Waitress behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: - The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits. - Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters ### Patches This has been fixed in Waitress 2.1.1 ### Workarounds When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead. ### References - https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Github issue tracker](https://github.com/Pylons/waitress/issues) (if not security related/sensitive) * Email us at [pylons-project-security@googlegroups.com](mailto:pylons-project-security@googlegroups.com) (If security related or sensitive)
{'CVE-2022-24761'}
2022-03-21T22:15:26Z
2022-03-18T19:00:59Z
HIGH
7.5
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24761', 'https://github.com/Pylons/waitress/releases/tag/v2.1.1', 'https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36', 'https://github.com/advisories/GHSA-4f7p-27jc-3c36', 'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0'}
null
GHSA
GHSA-5qfv-rr79-chx5
Cross-site Scripting in Ignite Realtime Openfire
Ignite Realtime Openfire before 4.4.1 has reflected XSS via an LDAP setup test.
{'CVE-2019-15488'}
2021-08-17T22:12:21Z
2019-08-27T17:37:33Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/igniterealtime/Openfire/compare/cd0a573...5e5d9e5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15488', 'https://github.com/igniterealtime/Openfire/pull/1441', 'https://github.com/advisories/GHSA-5qfv-rr79-chx5'}
null
GHSA
GHSA-qhqf-ghgh-x2m4
High severity vulnerability that affects Microsoft.AspNetCore.Mvc
See https://nvd.nist.gov/vuln/detail/CVE-2017-0249 & https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0249
{'CVE-2017-0249'}
2021-10-08T21:18:13Z
2018-10-16T19:57:38Z
HIGH
7.3
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-0249', 'https://github.com/aspnet/Announcements/issues/239', 'https://github.com/advisories/GHSA-qhqf-ghgh-x2m4', 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7'}
null
GHSA
GHSA-mwcv-m549-5cm8
Hijacked Environment Variables in node-tkinter
The `node-tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16062'}
2021-06-10T22:18:52Z
2018-11-01T14:47:43Z
HIGH
7.5
{'CWE-506'}
{'https://github.com/advisories/GHSA-mwcv-m549-5cm8', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16062', 'https://nodesecurity.io/advisories/501', 'https://www.npmjs.com/advisories/501'}
null
GHSA
GHSA-758c-g2ff-9444
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1140'}
2021-03-29T20:57:49Z
2021-03-29T20:57:49Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1140', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1140', 'https://github.com/advisories/GHSA-758c-g2ff-9444'}
null
GHSA
GHSA-3rh3-wfr4-76mj
Regular expression Denial of Service in multiple packages
### Impact A regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version <= 26.0.0. ### Patches The problem has been recognized and patched. The fix will be available in version 27.0.0. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 5 team would like to thank Yeting Li for recognizing and reporting these vulnerabilities.
{'CVE-2021-21391'}
2021-04-30T17:30:43Z
2021-04-06T17:28:41Z
MODERATE
6.5
{'CWE-400'}
{'https://www.npmjs.com/package/@ckeditor/ckeditor5-widget', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-font', 'https://github.com/advisories/GHSA-3rh3-wfr4-76mj', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-list', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-paste-from-office', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-engine', 'https://github.com/ckeditor/ckeditor5/releases/tag/v27.0.0', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-media-embed', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-image', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21391', 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj'}
null
GHSA
GHSA-hgmg-hhc8-g5wr
Regular expression Denial of Service in Markdown plugin
### Impact A regular expression denial of service (ReDoS) vulnerability has been discovered in the CKEditor 5 Markdown plugin code. The vulnerability allowed to abuse a link recognition regular expression, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 Markdown plugin at version <= 24.0.0. ### Patches The problem has been recognized and patched. The fix will be available in version 25.0.0. ### Workarounds The user can work around the issue by: - Upgrading CKEditor 5 to version 25.0.0. - Disabling the Markdown plugin. ### More information If you have any questions or comments about this advisory: * Email us at [security@cksource.com](mailto:security@cksource.com) ### Acknowledgements The CKEditor 5 team would like to thank Erik Krogh Kristensen from the GitHub team for recognizing this vulnerability and Alvaro Muñoz from GitHub for reporting it.
{'CVE-2021-21254'}
2021-02-02T15:22:38Z
2021-01-29T21:51:22Z
LOW
0
{'CWE-400'}
{'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr', 'https://github.com/advisories/GHSA-hgmg-hhc8-g5wr', 'https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21254', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm'}
null
GHSA
GHSA-7px7-7xjx-hxm8
Moderate severity vulnerability that affects marked
marked version 0.3.6 and earlier is vulnerable to an XSS attack in the data: URI parser.
{'CVE-2017-1000427'}
2021-09-03T21:03:02Z
2018-01-04T21:04:19Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/', 'https://github.com/advisories/GHSA-7px7-7xjx-hxm8', 'https://snyk.io/vuln/npm:marked:20170112', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000427'}
null
GHSA
GHSA-8p36-q63g-68qh
Autobinding vulnerability in MITREid Connect
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
{'CVE-2021-27582'}
2021-05-13T22:31:22Z
2021-05-13T22:31:22Z
CRITICAL
9.1
{'CWE-915'}
{'https://portswigger.net/research/hidden-oauth-attack-vectors', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27582', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c', 'https://github.com/advisories/GHSA-8p36-q63g-68qh', 'http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html'}
null
GHSA
GHSA-x4w5-r546-x9qh
Arbitrary File Read in html-pdf
All versions of `html-pdf` are vulnerable to Arbitrary File Read. The package fails to sanitize the HTML input, allowing attackers to exfiltrate server files by supplying malicious HTML code. XHR requests in the HTML code are executed by the server. Input with an XHR request such as `request.open("GET","file:///etc/passwd")` will result in a PDF document with the contents of `/etc/passwd`. ## Recommendation No fix is currently available. There is a mitigation available in the provided reference.
{'CVE-2019-15138'}
2022-01-04T19:51:52Z
2019-10-11T18:40:38Z
HIGH
7.5
{'CWE-200', 'CWE-668', 'CWE-73', 'CWE-79'}
{'https://github.com/marcbachmann/node-html-pdf/releases/tag/v3.0.1', 'https://github.com/marcbachmann/node-html-pdf/commit/c12d6977778014139183c9f8da7579fd7ac65362', 'https://github.com/marcbachmann/node-html-pdf/issues/530', 'https://security.netapp.com/advisory/ntap-20191017-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15138', 'https://github.com/advisories/GHSA-x4w5-r546-x9qh', 'https://www.npmjs.com/advisories/1095', 'https://github.com/marcbachmann/node-html-pdf/issues/530#issuecomment-535045123'}
null
GHSA
GHSA-872g-2h8h-362q
High severity vulnerability that affects org.eclipse.jetty:jetty-server
The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes.
{'CVE-2016-4800'}
2021-09-03T23:00:05Z
2018-10-19T16:16:16Z
CRITICAL
9.8
{'CWE-284'}
{'https://github.com/advisories/GHSA-872g-2h8h-362q', 'http://www.zerodayinitiative.com/advisories/ZDI-16-362', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20190307-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4800', 'http://www.ocert.org/advisories/ocert-2016-001.html', 'http://www.securityfocus.com/bid/90945', 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00092.html'}
null
GHSA
GHSA-2p5p-m353-833w
Sort order SQL injection in Administrate
In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections. Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication. This is patched in wersion 0.13.0.
{'CVE-2020-5257'}
2022-04-19T19:02:24Z
2020-03-13T21:05:44Z
HIGH
7.7
{'CWE-943'}
{'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5257', 'https://github.com/thoughtbot/administrate/security/advisories/GHSA-2p5p-m353-833w', 'https://github.com/advisories/GHSA-2p5p-m353-833w'}
null
GHSA
GHSA-65xx-c85x-wg76
Command Injection in plotter
All versions of `plotter` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory: ``` var plot = require('plotter').plot; const title = 'Example "\nset title system("touch testing")#'; plot({ data: [ 3, 1, 2, 3, 4 ], filename: 'output.pdf', style: 'linespoints', title: title, logscale: true, xlabel: 'time', ylabel: 'length of string', format: 'pdf' }); ``` ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T20:36:16Z
2020-09-04T17:20:52Z
CRITICAL
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-65xx-c85x-wg76', 'https://www.npmjs.com/advisories/1441'}
null
GHSA
GHSA-5cgx-vhfp-6cf9
Directory traversal in Kubernetes Secrets Store CSI Driver
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that contain other Kubernetes Secrets.
{'CVE-2020-8568'}
2022-04-20T20:56:50Z
2022-02-15T01:57:18Z
MODERATE
6.5
{'CWE-24', 'CWE-20', 'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8568', 'https://github.com/advisories/GHSA-5cgx-vhfp-6cf9', 'https://groups.google.com/g/kubernetes-secrets-store-csi-driver/c/Cb9cvymTzl4', 'https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/378', 'https://github.com/kubernetes-sigs/secrets-store-csi-driver/pull/371'}
null
GHSA
GHSA-9q64-mpxx-87fg
Open Redirect in ecstatic
Versions of `ecstatic` prior to 4.1.2, 3.3.2 or 2.2.2 are vulnerable to Open Redirect. The package fails to validate redirects, allowing attackers to craft requests that result in an `HTTP 301` redirect to any other domains. ## Recommendation If using `ecstatic` 4.x, upgrade to 4.1.2 or later. If using `ecstatic` 3.x, upgrade to 3.3.2 or later. If using `ecstatic` 2.x, upgrade to 2.2.2 or later.
null
2020-12-15T16:51:19Z
2020-04-01T16:35:08Z
HIGH
0
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10775', 'https://github.com/advisories/GHSA-9q64-mpxx-87fg', 'https://www.npmjs.com/advisories/830'}
null
GHSA
GHSA-333x-qr3v-g4xx
Command injection in spritesheet-js
This affects all versions of package spritesheet-js. It depends on a vulnerable package platform-command. The injection point is located in line 32 in lib/generator.js, which is triggered by main entry of the package.
{'CVE-2020-7782'}
2021-07-28T18:55:51Z
2021-04-13T15:30:16Z
CRITICAL
9.8
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7782', 'https://github.com/krzysztof-o/spritesheet.js/blob/master/lib/generator.js#23L32', 'https://github.com/advisories/GHSA-333x-qr3v-g4xx', 'https://www.npmjs.com/package/spritesheet-js', 'https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333'}
null
GHSA
GHSA-f6p5-76fp-m248
URL Rewrite vulnerability in multiple zendframework components
zend-diactoros (and, by extension, Expressive), zend-http (and, by extension, Zend Framework MVC projects), and zend-feed (specifically, its PubSubHubbub sub-component) each contain a potential URL rewrite exploit. In each case, marshaling a request URI includes logic that introspects HTTP request headers that are specific to a given server-side URL rewrite mechanism. When these headers are present on systems not running the specific URL rewriting mechanism, the logic would still trigger, allowing a malicious client or proxy to emulate the headers to request arbitrary content.
null
2022-04-28T21:09:55Z
2022-04-28T21:09:54Z
HIGH
0
null
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-diactoros/ZF2018-01.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-feed/ZF2018-01.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-http/ZF2018-01.yaml', 'https://github.com/advisories/GHSA-f6p5-76fp-m248'}
null
GHSA
GHSA-w64c-pxjj-h866
Moderate severity vulnerability that affects ansible
Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
{'CVE-2015-3908'}
2021-09-21T17:56:58Z
2018-10-10T17:23:51Z
MODERATE
0
{'CWE-345'}
{'https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00051.html', 'https://github.com/advisories/GHSA-w64c-pxjj-h866', 'http://lists.opensuse.org/opensuse-updates/2015-08/msg00029.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3908', 'http://www.openwall.com/lists/oss-security/2015/07/14/4', 'http://www.ansible.com/security'}
null
GHSA
GHSA-8xw8-mmqv-frqq
fake-static allows converting any reference into a `'static` reference
fake-static allows converting a reference with any lifetime into a reference with `'static` lifetime without the `unsafe` keyword. Internally, this crate does not use unsafe code, it instead exploits a soundness bug in rustc
null
2021-08-25T20:55:33Z
2021-08-25T20:55:33Z
HIGH
0
{'CWE-657'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0013', 'https://github.com/advisories/GHSA-8xw8-mmqv-frqq', 'https://github.com/rust-lang/rust/issues/25860'}
null
GHSA
GHSA-r6hh-5g3q-wwgc
Stored Cross-site Scripting in grav
Grav prior to 1.7.31 is vulnerable to stored cross-site scripting.
{'CVE-2022-0970'}
2022-03-28T22:27:37Z
2022-03-16T00:00:45Z
HIGH
7.1
{'CWE-79'}
{'https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec', 'https://github.com/advisories/GHSA-r6hh-5g3q-wwgc', 'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0970'}
null
GHSA
GHSA-vwxj-6m5m-rrvh
The REST Plugin in Apache Struts is using an outdated XStream library
The REST Plugin in Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload.
{'CVE-2017-9793'}
2022-04-26T19:02:11Z
2018-10-16T19:37:22Z
HIGH
7.5
{'CWE-20'}
{'https://security.netapp.com/advisory/ntap-20180629-0001/', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9793', 'http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-429.htm', 'https://struts.apache.org/docs/s2-051.html', 'https://github.com/advisories/GHSA-vwxj-6m5m-rrvh', 'http://www.securitytracker.com/id/1039262', 'http://www.securityfocus.com/bid/100611'}
null
GHSA
GHSA-2f6g-w5gj-c93h
Prototype Pollution in iniparserjs
This affects all versions of package iniparserjs. This vulnerability relates when ini_parser.js is concentrating arrays. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
{'CVE-2021-23328'}
2021-04-13T15:20:09Z
2021-04-13T15:20:09Z
MODERATE
5.6
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23328', 'https://www.npmjs.com/package/iniparserjs', 'https://github.com/advisories/GHSA-2f6g-w5gj-c93h'}
null
GHSA
GHSA-mf7q-gw5f-q8jj
Cross-site Scripting in Apache Zeppelin
Cross Site Scripting vulnerability in markdown interpreter of Apache Zeppelin allows an attacker to inject malicious scripts. This issue affects Apache Zeppelin Apache Zeppelin versions prior to 0.9.0.
{'CVE-2021-27578'}
2021-09-29T17:59:10Z
2021-09-07T22:55:56Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cusers.zeppelin.apache.org%3E', 'https://lists.apache.org/thread.html/r31012f2c8e39a5e12e14c1de030012cb8b51c037d953d73b291b7b50@%3Cusers.zeppelin.apache.org%3E', 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-mf7q-gw5f-q8jj', 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d%40%3Cusers.zeppelin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/09/02/3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27578'}
null
GHSA
GHSA-c2cp-3xj9-97w9
Denial of service in Spring Security OAuth
Spring Security OAuth versions 2.5.x prior to 2.5.2 and older unsupported versions are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session. This vulnerability exposes OAuth 2.0 Client applications only.
{'CVE-2022-22969'}
2022-05-04T03:52:42Z
2022-04-22T00:00:33Z
MODERATE
6.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-c2cp-3xj9-97w9', 'https://tanzu.vmware.com/security/cve-2022-22969', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22969'}
null
GHSA
GHSA-2ghc-6v89-pw9j
Prototype Pollution in body-parser-xml
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3666'}
2021-10-06T22:03:36Z
2021-09-14T20:25:35Z
HIGH
7.6
{'CWE-1321', 'CWE-915'}
{'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml', 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63', 'https://github.com/advisories/GHSA-2ghc-6v89-pw9j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3666'}
null
GHSA
GHSA-crmx-v835-hcp4
Moderate severity vulnerability that affects marked
# Withdrawn This advisory has been withdrawn, per NVD: ["This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue."](https://nvd.nist.gov/vuln/detail/CVE-2017-17461) # Original Description A Regular expression Denial of Service (ReDoS) vulnerability in the file marked.js of the marked npm package (tested on version 0.3.7) allows a remote attacker to overload and crash a server by passing a maliciously crafted string.
{'CVE-2017-17461'}
2021-12-02T22:47:59Z
2018-01-04T21:04:09Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2017-17461', 'https://github.com/advisories/GHSA-crmx-v835-hcp4'}
null
GHSA
GHSA-qg7c-q3vq-rgxr
Leak of information via Store-API aggregations in shopware/platform and shopware/core
### Impact Leak of information via Store-API ### Patches We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021
null
2021-04-13T15:13:26Z
2021-04-13T15:13:26Z
CRITICAL
0
{'CWE-668'}
{'https://github.com/shopware/platform/security/advisories/GHSA-qg7c-q3vq-rgxr', 'https://github.com/advisories/GHSA-qg7c-q3vq-rgxr'}
null
GHSA
GHSA-4rvg-955w-h68q
Path Traversal in angular-http-server
Affected versions of `angular-http-server` are vulnerable to path traversal allowing a remote attacker to read files from the server that uses `angular-http-server`. ## Recommendation Update to version 1.6.0 or later. :exclamation: Note: This was originally thought to be fixed in version 1.4.3, though according to [this issue](https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/issues/117#issuecomment-803872454) the vulnerability was not completely fixed until version 1.6.0.
{'CVE-2018-3713'}
2021-03-23T21:44:03Z
2018-07-26T14:47:40Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/589', 'https://github.com/advisories/GHSA-4rvg-955w-h68q', 'https://hackerone.com/reports/309120', 'https://github.com/simonh1000/angular-http-server/commit/34d4bd0cd0f00c46db30855a8c4aabae27eb0ac8', 'https://github.com/simonh1000/angular-http-server/pull/21', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3713'}
null
GHSA
GHSA-35hc-x2cw-2j4v
Denial of service vulnerability exists when .NET and .NET Core improperly process XML documents
A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents, aka ".NET and .NET Core Denial of Service Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0, Microsoft .NET Framework 4.7.2.
{'CVE-2018-0765'}
2022-04-26T19:04:54Z
2018-10-16T19:54:06Z
HIGH
7.5
{'CWE-611'}
{'http://www.securitytracker.com/id/1040851', 'https://github.com/advisories/GHSA-35hc-x2cw-2j4v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0765', 'http://www.securityfocus.com/bid/104060', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765'}
null
GHSA
GHSA-qfc5-mcwq-26q8
Double Free in psutil
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
{'CVE-2019-18874'}
2021-08-19T22:13:44Z
2020-03-12T17:02:50Z
HIGH
7.5
{'CWE-415'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P7QI7MOTZTFXQYU23CP3RAWXCERMOAS/', 'https://github.com/giampaolo/psutil/pull/1616', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18874', 'https://github.com/advisories/GHSA-qfc5-mcwq-26q8', 'https://usn.ubuntu.com/4204-1/', 'https://lists.debian.org/debian-lts-announce/2019/11/msg00018.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLETTJYZL2SMBUI4Q2NGBMGPDPP54SRG/', 'https://github.com/giampaolo/psutil/blob/master/HISTORY.rst#566', 'https://github.com/giampaolo/psutil/commit/7d512c8e4442a896d56505be3e78f1156f443465'}
null
GHSA
GHSA-gqvf-892r-vjm5
Improper Certificate Validation in Puppet
Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior.
{'CVE-2020-7942'}
2022-01-04T19:45:07Z
2021-04-13T15:42:19Z
MODERATE
6.5
{'CWE-295'}
{'https://github.com/advisories/GHSA-gqvf-892r-vjm5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7942', 'https://puppet.com/security/cve/CVE-2020-7942/'}
null
GHSA
GHSA-g8ww-46x2-2p65
Denial of Service in Action Dispatch
Impact ------ There is a possible Denial of Service vulnerability in Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- The following monkey patch placed in an initializer can be used to work around the issue. ```ruby module Mime class Type MIME_REGEXP = /\A(?:\*\/\*|#{MIME_NAME}\/(?:\*|#{MIME_NAME})(?>\s*#{MIME_PARAMETER}\s*)*)\z/ end end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 6-0-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.0 series * 6-1-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.1 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thanks to Security Curious <security...@pm.me> for reporting this!
{'CVE-2021-22902'}
2021-06-23T18:26:47Z
2021-05-05T19:48:21Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://groups.google.com/g/rubyonrails-security/c/_5ID_ld9u1c', 'https://github.com/rails/rails/releases/tag/v6.0.3.7', 'https://github.com/advisories/GHSA-g8ww-46x2-2p65', 'https://hackerone.com/reports/1138654', 'https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22902'}
null
GHSA
GHSA-28f4-mjfq-qrvf
Malicious Package in buffes-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:26:05Z
2020-09-03T22:18:40Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-28f4-mjfq-qrvf', 'https://www.npmjs.com/advisories/1257'}
null
GHSA
GHSA-926q-wxr6-3crq
Moderate severity vulnerability that affects roundup
Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_handler.py mishandle 404 errors.
{'CVE-2019-10904'}
2021-09-07T20:36:35Z
2019-04-09T19:47:14Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.debian.org/debian-lts-announce/2019/04/msg00009.html', 'http://www.openwall.com/lists/oss-security/2019/04/07/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10904', 'https://github.com/python/bugs.python.org/issues/34', 'https://www.openwall.com/lists/oss-security/2019/04/05/1', 'https://github.com/advisories/GHSA-926q-wxr6-3crq', 'https://bugs.python.org/issue36391'}
null
GHSA
GHSA-fm39-cw8h-3p63
Out-of-bounds Read in OpenCV
An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read in the function cv::predictOrdered<cv::HaarEvaluator> in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
{'CVE-2019-14491'}
2021-10-12T22:07:14Z
2021-10-12T22:07:14Z
HIGH
8.2
{'CWE-125'}
{'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14491', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HPFLN6QAX6SUA4XR4NMKKXX26H3TYCVQ/', 'https://github.com/advisories/GHSA-fm39-cw8h-3p63', 'https://github.com/opencv/opencv/issues/15125', 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}
null
GHSA
GHSA-qgpv-86r3-87fh
Cross-site Scripting in Parsedown
Parsedown version prior to 1.7.0 contains a Cross Site Scripting (XSS) vulnerability in `setMarkupEscaped` for escaping HTML that can result in JavaScript code execution. This attack appears to be exploitable via specially crafted markdown that allows it to side step HTML escaping by breaking AST boundaries. This vulnerability appears to have been fixed in 1.7.0 and later.
{'CVE-2018-1000162'}
2022-03-30T20:45:42Z
2022-03-30T18:26:22Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-qgpv-86r3-87fh', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000162', 'https://github.com/erusev/parsedown/pull/495', 'https://github.com/Roave/SecurityAdvisories/issues/44#issuecomment-368594409'}
null
GHSA
GHSA-6rjc-4pwr-3vp7
Cross-Site Scripting in iobroker.web
Versions of `iobroker.web` prior to 2.4.10 are vulnerable to Cross-Site Scripting. The package fails to escape URL parameters that may be reflected in the server response. This can be used by attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 2.4.10 or later.
{'CVE-2019-10771'}
2021-08-19T15:35:02Z
2019-12-02T18:14:30Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10771', 'https://snyk.io/vuln/SNYK-JS-IOBROKERWEB-534971', 'https://github.com/advisories/GHSA-6rjc-4pwr-3vp7', 'https://www.npmjs.com/advisories/1345'}
null
GHSA
GHSA-hggm-jpg3-v476
RSA decryption vulnerable to Bleichenbacher timing vulnerability
### Impact RSA decryption was vulnerable to Bleichenbacher timing vulnerabilities, which would impact people using RSA decryption in online scenarios. ### Patches This is fixed in cryptography 3.2. https://github.com/pyca/cryptography/commit/58494b41d6ecb0f56b7c5f05d5f5e3ca0320d494 is the resolving commit.
{'CVE-2020-25659'}
2022-04-25T21:36:49Z
2020-10-27T20:33:13Z
MODERATE
5.9
{'CWE-385'}
{'https://pypi.org/project/cryptography/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25659', 'https://github.com/pyca/cryptography/commit/58494b41d6ecb0f56b7c5f05d5f5e3ca0320d494', 'https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b', 'https://github.com/advisories/GHSA-hggm-jpg3-v476', 'https://github.com/pyca/cryptography/security/advisories/GHSA-hggm-jpg3-v476'}
null
GHSA
GHSA-vh7m-p724-62c2
Signature Malleabillity in elliptic
The Elliptic package before version 6.5.3 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
{'CVE-2020-13822'}
2021-09-23T17:39:59Z
2020-07-29T20:40:35Z
HIGH
7.7
{'CWE-190'}
{'https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4', 'https://github.com/advisories/GHSA-vh7m-p724-62c2', 'https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13822', 'https://www.npmjs.com/package/elliptic', 'https://github.com/indutny/elliptic/issues/226'}
null
GHSA
GHSA-m5pf-5894-jmx7
Malicious Package in sailclothjs
Version 1.2.6 of `sailclothjs` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T19:08:00Z
2020-09-03T19:08:00Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/1099', 'https://github.com/advisories/GHSA-m5pf-5894-jmx7'}
null
GHSA
GHSA-hwj3-m3p6-hj38
dom4j allows External Entities by default which might enable XXE attacks
dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.
{'CVE-2020-10683'}
2022-02-08T22:06:13Z
2020-06-05T16:13:36Z
CRITICAL
9.8
{'CWE-611'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-hwj3-m3p6-hj38', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/dom4j/dom4j/commits/version-2.0.3', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://usn.ubuntu.com/4575-1/', 'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/dom4j/dom4j/commit/1707bf3d898a8ada3b213acb0e3b38f16eaae73d', 'https://bugzilla.redhat.com/show_bug.cgi?id=1694235', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10683', 'https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html', 'https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8@%3Cdev.velocity.apache.org%3E', 'https://github.com/dom4j/dom4j/releases/tag/version-2.1.3', 'https://security.netapp.com/advisory/ntap-20200518-0002/', 'https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/dom4j/dom4j/issues/87', 'https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-325j-24f4-qv5x
Regular Expression Denial of Service in ssri
Version of `ssri` prior to 5.2.2 are vulnerable to regular expression denial of service (ReDoS) when using strict mode. ## Recommendation Update to version 5.2.2 or later.
{'CVE-2018-7651'}
2021-08-31T20:21:07Z
2018-03-07T22:22:20Z
MODERATE
5.9
{'CWE-400'}
{'https://github.com/zkat/ssri/issues/10', 'https://github.com/zkat/ssri/commit/d0ebcdc22cb5c8f47f89716d08b3518b2485d65d', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7651', 'https://www.npmjs.com/advisories/565', 'https://github.com/advisories/GHSA-325j-24f4-qv5x', 'https://nodesecurity.io/advisories/565'}
null
GHSA
GHSA-mvrg-5c4w-7qv4
Cross-site Scripting in yii2cmf
yidashi yii2cmf 2.0 has XSS via the /search q parameter.
{'CVE-2018-10704'}
2021-06-22T15:25:22Z
2021-06-22T15:25:22Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/yidashi/yii2cmf', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10704', 'https://github.com/advisories/GHSA-mvrg-5c4w-7qv4', 'http://testh5shanglv.minshengec.com:1024/phpmyadmin/doc/yii2cmf_xss.htm'}
null
GHSA
GHSA-fpqv-x9hm-35j9
Potential XSS vulnerability in Kitodo.Presentation
### Impact Kitodo.Presentation fails to properly encode URL parameters for output in HTML making it vulnerable to Cross Site Scripting (XSS). Only sites using the `ListView`, `Navigation` or `PageView` plugins are affected. It also includes jQuery 3.4.1 which is known to be vulnerable against Cross Site Scripting, although there is currently no known way to exploit this in Kitodo.Presentation. ### Patches An updated version of Kitodo.Presentation is available on [GitHub](https://github.com/kitodo/kitodo-presentation/releases/tag/v3.1.2), [Packagist](https://packagist.org/packages/kitodo/presentation#v3.1.2) and in the [TYPO3 Extension Repository](https://extensions.typo3.org/extension/dlf/). Users are advised to update as soon as possible. The issue was also fixed in release 2.3.1 of the 2.x branch, although it is generally not recommended to run this branch since it depends on an outdated TYPO3 version. ### References TYPO3 Security Advisory [TYPO3-EXT-SA-2020-015](https://typo3.org/security/advisory/typo3-ext-sa-2020-015) jQuery Security Advisory [GHSA-gxr4-xjj5-5px2](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2) Open Bug Bounty Report [OBB-1219978](https://www.openbugbounty.org/reports/1219978/) ### Contact If you have any questions or comments about this advisory: * [Open an issue](https://github.com/kitodo/kitodo-presentation/issues/new/choose) * Email us at [security@kitodo.org](mailto:security@kitodo.org)
{'CVE-2020-16095'}
2022-04-19T19:02:32Z
2020-07-31T17:39:22Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-16095', 'https://typo3.org/help/security-advisories', 'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c', 'https://github.com/advisories/GHSA-fpqv-x9hm-35j9', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-015', 'https://github.com/kitodo/kitodo-presentation/security/advisories/GHSA-fpqv-x9hm-35j9'}
null
GHSA
GHSA-f93j-hmcr-jcwh
Data Injection Vulnerability in moped Rubygem
The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string.
{'CVE-2015-4410'}
2021-09-23T18:56:26Z
2020-08-19T16:45:49Z
HIGH
7.5
{'CWE-20'}
{'http://www.securityfocus.com/bid/75045', 'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24', 'https://www.securityfocus.com/bid/75045', 'https://seclists.org/oss-sec/2015/q2/653', 'http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4410', 'https://rubygems.org/gems/moped/versions', 'https://github.com/advisories/GHSA-f93j-hmcr-jcwh', 'http://www.openwall.com/lists/oss-security/2015/06/06/3', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/moped/CVE-2015-4410.yml', 'https://bugzilla.redhat.com/show_bug.cgi?id=1229757', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html'}
null
GHSA
GHSA-jwf9-w5xm-f437
Heap OOB in TFLite's `Gather*` implementations
### Impact TFLite's [`GatherNd` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather_nd.cc#L124) does not support negative indices but there are no checks for this situation. Hence, an attacker can read arbitrary data from the heap by carefully crafting a model with negative values in `indices`. Similar issue exists in [`Gather` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather.cc). ```python import tensorflow as tf import numpy as np tf.compat.v1.disable_v2_behavior() params = tf.compat.v1.placeholder(name="params", dtype=tf.int64, shape=(1,)) indices = tf.compat.v1.placeholder(name="indices", dtype=tf.int64, shape=()) out = tf.gather(params, indices, name='out') with tf.compat.v1.Session() as sess: converter = tf.compat.v1.lite.TFLiteConverter.from_session(sess, [params, indices], [out]) tflite_model = converter.convert() interpreter = tf.lite.Interpreter(model_content=tflite_model) interpreter.allocate_tensors() input_details = interpreter.get_input_details() output_details = interpreter.get_output_details() params_data = np.reshape(np.array([1], dtype=np.int64), newshape=(1,)) indices_data = np.reshape(np.array(-10, dtype=np.int64), newshape=()) interpreter.set_tensor(input_details[0]['index'], params_data) interpreter.set_tensor(input_details[1]['index'], indices_data) interpreter.invoke() ``` ### Patches We have patched the issue in GitHub commits [bb6a0383ed553c286f87ca88c207f6774d5c4a8f](https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f) and [eb921122119a6b6e470ee98b89e65d721663179d](https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37687'}
2021-08-25T14:40:02Z
2021-08-25T14:40:02Z
MODERATE
5.5
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f', 'https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37687', 'https://github.com/advisories/GHSA-jwf9-w5xm-f437'}
null
GHSA
GHSA-9rpc-5v9q-5r7f
Incomplete validation in `SparseReshape`
### Impact Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure. ```python import tensorflow as tf input_indices = tf.constant(41, shape=[1, 1], dtype=tf.int64) input_shape = tf.zeros([11], dtype=tf.int64) new_shape = tf.zeros([1], dtype=tf.int64) tf.raw_ops.SparseReshape(input_indices=input_indices, input_shape=input_shape, new_shape=new_shape) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/e87b51ce05c3eb172065a6ea5f48415854223285/tensorflow/core/kernels/sparse_reshape_op.cc#L40) has no validation that the input arguments specify a valid sparse tensor. ### Patches We have patched the issue in GitHub commit [1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6](https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are the only affected versions. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29611'}
2021-05-21T14:28:35Z
2021-05-21T14:28:35Z
LOW
3.6
{'CWE-665', 'CWE-20'}
{'https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6', 'https://github.com/advisories/GHSA-9rpc-5v9q-5r7f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9rpc-5v9q-5r7f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29611'}
null
GHSA
GHSA-2x6r-7427-95cm
Deserialization of Untrusted Data in Apache Camel RabbitMQ
Apache Camel RabbitMQ enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0.
{'CVE-2020-11972'}
2021-05-21T19:20:47Z
2021-05-21T19:20:47Z
HIGH
9.8
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.openwall.com/lists/oss-security/2020/05/14/10', 'https://github.com/advisories/GHSA-2x6r-7427-95cm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11972', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://camel.apache.org/security/CVE-2020-11972.html', 'http://www.openwall.com/lists/oss-security/2020/05/14/8'}
null
GHSA
GHSA-f32v-vf79-p29q
Improper authorization in Keycloak
Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform. It was possible to add users to the master realm even though no respective permission was granted.
{'CVE-2022-1466'}
2022-04-28T21:03:14Z
2022-04-27T00:00:19Z
HIGH
0
{'CWE-863'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=2050228', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1466', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-076.txt', 'https://github.com/advisories/GHSA-f32v-vf79-p29q', 'https://www.syss.de/pentest-blog/fehlerhafte-autorisierung-bei-red-hat-single-sign-on-750ga-syss-2021-076'}
null
GHSA
GHSA-pqjj-6f5q-gqph
Denial of Service in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a denial of service (memory consumption) issue, as demonstrated by the 10-opencv-dos-memory-exhaust test case.
{'CVE-2017-12602'}
2021-10-12T22:01:34Z
2021-10-12T22:01:34Z
HIGH
7.5
null
{'https://nvd.nist.gov/vuln/detail/CVE-2017-12602', 'https://github.com/advisories/GHSA-pqjj-6f5q-gqph', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9311', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}
null
GHSA
GHSA-qcxh-w3j9-58qr
Denial of Service in Tomcat
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
{'CVE-2019-0199'}
2021-08-30T14:24:32Z
2020-06-15T18:51:09Z
HIGH
7.5
{'CWE-400'}
{'https://lists.apache.org/thread.html/ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef@%3Cannounce.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50@%3Cdev.tomcat.apache.org%3E', 'https://support.f5.com/csp/article/K17321505', 'https://github.com/advisories/GHSA-qcxh-w3j9-58qr', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0199', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html', 'https://lists.apache.org/thread.html/e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190419-0001/', 'https://lists.apache.org/thread.html/e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995@%3Cannounce.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600@%3Cannounce.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00013.html', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/', 'https://access.redhat.com/errata/RHSA-2019:3931', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://seclists.org/bugtraq/2019/Dec/43', 'http://www.securityfocus.com/bid/107674'}
null
GHSA
GHSA-gwmc-6795-qghj
HashiCorp Nomad Artifact Download Race Condition
HashiCorp Nomad and Nomad Enterprise 0.3.0 through 1.0.17, 1.1.11, and 1.2.5 artifact download functionality has a race condition such that the Nomad client agent could download the wrong artifact into the wrong destination. This issue is fixed in 1.0.18, 1.1.12, and 1.2.6.
{'CVE-2022-24686'}
2022-03-28T15:24:37Z
2022-02-15T00:02:46Z
MODERATE
5.9
{'CWE-362'}
{'https://github.com/advisories/GHSA-gwmc-6795-qghj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24686', 'https://discuss.hashicorp.com/t/hcsec-2022-01-nomad-artifact-download-race-condition/35559', 'https://github.com/hashicorp/nomad/releases/tag/v1.2.6', 'https://github.com/hashicorp/nomad/issues/12036', 'https://discuss.hashicorp.com', 'https://security.netapp.com/advisory/ntap-20220318-0008/'}
null
GHSA
GHSA-7frr-c83r-fm22
Malicious Package in buffez-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:26:37Z
2020-09-03T22:20:49Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-7frr-c83r-fm22', 'https://www.npmjs.com/advisories/1259'}
null
GHSA
GHSA-g8wf-rcg3-qw4q
Directory Traversal in tinyserver2
Affected versions of `tinyserver2` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation Update to v0.6.0 or later.
{'CVE-2017-16085'}
2021-01-08T18:48:29Z
2018-07-24T15:01:34Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tinyserver2', 'https://nodesecurity.io/advisories/371', 'https://www.npmjs.com/advisories/371', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16085', 'https://github.com/advisories/GHSA-g8wf-rcg3-qw4q'}
null
GHSA
GHSA-v659-54cx-g4qr
Prototype Pollution in deep-override
Prototype pollution vulnerability in 'deep-override' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25941'}
2021-05-25T20:44:53Z
2021-05-17T20:57:25Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/ASaiAnudeep/deep-override/commit/2aced17651fb684959a6e04b1465a8329b3d5268', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25941', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25941', 'https://github.com/advisories/GHSA-v659-54cx-g4qr'}
null
GHSA
GHSA-q5mq-6fjg-4mw8
SQL Injection in thinkjs
SQL injection vulnerability in the model.increment and model.decrement function in ThinkJS 3.2.10 allows remote attackers to execute arbitrary SQL commands via the step parameter.
{'CVE-2020-21176'}
2021-11-19T20:42:32Z
2021-11-19T20:42:32Z
HIGH
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-21176', 'https://blog.jiguang.xyz/posts/thinkjs-sql-injection/', 'https://github.com/thinkjs/thinkjs', 'https://github.com/advisories/GHSA-q5mq-6fjg-4mw8'}
null
GHSA
GHSA-9xh4-23q4-v6wr
Heap buffer overflow and undefined behavior in `FusedBatchNorm`
### Impact The implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow: ```python import tensorflow as tf x = tf.zeros([10, 10, 10, 6], dtype=tf.float32) scale = tf.constant([0.0], shape=[1], dtype=tf.float32) offset = tf.constant([0.0], shape=[1], dtype=tf.float32) mean = tf.constant([0.0], shape=[1], dtype=tf.float32) variance = tf.constant([0.0], shape=[1], dtype=tf.float32) epsilon = 0.0 exponential_avg_factor = 0.0 data_format = "NHWC" is_training = False tf.raw_ops.FusedBatchNorm( x=x, scale=scale, offset=offset, mean=mean, variance=variance, epsilon=epsilon, exponential_avg_factor=exponential_avg_factor, data_format=data_format, is_training=is_training) ``` If the tensors are empty, the same implementation can trigger undefined behavior by dereferencing null pointers: ```python import tensorflow as tf import numpy as np x = tf.zeros([10, 10, 10, 1], dtype=tf.float32) scale = tf.constant([], shape=[0], dtype=tf.float32) offset = tf.constant([], shape=[0], dtype=tf.float32) mean = tf.constant([], shape=[0], dtype=tf.float32) variance = tf.constant([], shape=[0], dtype=tf.float32) epsilon = 0.0 exponential_avg_factor = 0.0 data_format = "NHWC" is_training = False tf.raw_ops.FusedBatchNorm( x=x, scale=scale, offset=offset, mean=mean, variance=variance, epsilon=epsilon, exponential_avg_factor=exponential_avg_factor, data_format=data_format, is_training=is_training) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/57d86e0db5d1365f19adcce848dfc1bf89fdd4c7/tensorflow/core/kernels/fused_batch_norm_op.cc) fails to validate that `scale`, `offset`, `mean` and `variance` (the last two only when required) all have the same number of elements as the number of channels of `x`. This results in heap out of bounds reads when the buffers backing these tensors are indexed past their boundary. If the tensors are empty, the validation mentioned in the above paragraph would also trigger and prevent the undefined behavior. ### Patches We have patched the issue in GitHub commit [6972f9dfe325636b3db4e0bc517ee22a159365c0](https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29583'}
2022-04-26T18:09:37Z
2021-05-21T14:26:35Z
LOW
2.5
{'CWE-476', 'CWE-787', 'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29583', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9xh4-23q4-v6wr', 'https://github.com/advisories/GHSA-9xh4-23q4-v6wr'}
null
GHSA
GHSA-v528-7hrm-frqp
Improper Check for Unusual or Exceptional Conditions in json-smart
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
{'CVE-2021-27568'}
2022-04-26T20:59:54Z
2021-06-16T18:03:47Z
CRITICAL
9.1
{'CWE-754'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/netplex/json-smart-v2/issues/60', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/netplex/json-smart-v2/issues/62', 'https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396@%3Ccommits.druid.apache.org%3E', 'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/netplex/json-smart-v1/issues/7', 'https://github.com/advisories/GHSA-v528-7hrm-frqp', 'https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27568', 'https://github.com/netplex/json-smart-v2/pull/72', 'https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E'}
null