ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-jpj5-hg26-6jgc
|
Cross-site Scripting in Alist
|
Alist versions 2.0.10 through 2.1.0 were discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. This issue was fixed in version 2.1.1.
|
{'CVE-2022-26533'}
|
2022-03-23T15:50:07Z
|
2022-03-13T00:00:54Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26533', 'https://github.com/Xhofe/alist/issues/645', 'https://github.com/advisories/GHSA-jpj5-hg26-6jgc', 'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'}
| null |
GHSA
|
GHSA-jgcr-fg3g-qvw8
|
Improper permission handling in Apache Solr
|
When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs.
|
{'CVE-2021-29262'}
|
2021-10-07T13:47:34Z
|
2021-05-10T15:18:17Z
|
HIGH
| 7.5
|
{'CWE-279', 'CWE-522'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29262', 'https://lists.apache.org/thread.html/r7151081abab92a827a607205c4260b0a3d22280b52d15bc909177608@%3Coak-issues.jackrabbit.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210604-0009/', 'https://lists.apache.org/thread.html/rbc680cbfd745f22d182158217428a296e8e398cde16f3f428fe4bddc@%3Coak-issues.jackrabbit.apache.org%3E', 'https://github.com/advisories/GHSA-jgcr-fg3g-qvw8', 'https://lists.apache.org/thread.html/r1e92a2eff6c47a65c4a6e95e809a9707181de76f8062403a0bea1012@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rb6db683903174eaa44ec80cc118a38574319b0d4181f36b61ee6278f@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r8d35eeb9a470d2682b5bcf3be0b8942faa7e28f9ca5861c058d17fff@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/ref84e60192f4bdc3206b247f260513e8d4e71f3e200792f75386d07a@%3Cdev.jackrabbit.apache.org%3E', 'https://issues.apache.org/jira/browse/SOLR-15249', 'https://lists.apache.org/thread.html/r536da4c4e4e406f7843461cc754a3d0a3fe575aa576e2b71a9cd57d0%40%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rd85f87e559ee27e9c69795e3ad93a77621895e0328ea3df41d711d72@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r51b29ff62060b67bc9999ded5e252b36b09311fe5a02d27f6de3e4d3@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r1171f6417eeb6d5e1206d53e2b2ff2d6ee14026f8b595ef7d8a33b79@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r9c4ce6903218c92ef2583070e64af5a69e483821c4b3016dc41e3c6f@%3Coak-issues.jackrabbit.apache.org%3E'}
| null |
GHSA
|
GHSA-73q4-j324-2qcc
|
Incorrect authorization in Drupal core
|
The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
|
{'CVE-2022-25270'}
|
2022-03-01T22:04:21Z
|
2022-02-18T00:00:36Z
|
MODERATE
| 6.5
|
{'CWE-863'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25270', 'https://www.drupal.org/sa-core-2022-004', 'https://github.com/advisories/GHSA-73q4-j324-2qcc'}
| null |
GHSA
|
GHSA-95cm-88f5-f2c7
|
jackson-databind mishandles the interaction between serialization gadgets and typing
|
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).
|
{'CVE-2020-10672'}
|
2021-10-21T21:13:58Z
|
2020-04-23T16:32:59Z
|
HIGH
| 8.8
| null |
{'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-95cm-88f5-f2c7', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10672', 'https://github.com/FasterXML/jackson-databind/issues/2659'}
| null |
GHSA
|
GHSA-gwp7-vqr5-h33h
|
Open Redirect in autobahn
|
Autobahn|Python before 20.12.3 allows redirect header injection.
|
{'CVE-2020-35678'}
|
2021-04-20T16:13:45Z
|
2021-04-20T16:13:45Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://autobahn.readthedocs.io/en/latest/changelog.html', 'https://github.com/crossbario/autobahn-python/compare/v20.12.2...v20.12.3', 'https://github.com/crossbario/autobahn-python/pull/1439', 'https://github.com/advisories/GHSA-gwp7-vqr5-h33h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35678', 'https://github.com/crossbario/autobahn-python', 'https://pypi.org/project/autobahn/20.12.3/'}
| null |
GHSA
|
GHSA-h362-m8f2-5x7c
|
Password Hashing: Do not use MD5
|
### Impact
User passwords are stored in the database using the rather outdated and cryptographically insecure MD5 hash algorithm. Furthermore, the hashes are salted using the username instead of a random salt, causing hashes for users with the same username and password to collide which is problematic especially for popular users like the default `admin` user.
This essentially means that for an attacker, it might be feasible to reconstruct a user's password given access to these hashes.
Note that attackers needing access to the hashes means that they must gain access to the database in which these are stored first to be able to start cracking the passwords.
### Patches
The problem is addressed in Opencast 8.1 which now uses the modern and much stronger bcrypt password hashing algorithm for storing passwords. Note, that old hashes remain MD5 until the password is updated.
For a list of users whose password hashes are stored using MD5, take a look at the `/user-utils/users/md5.json` REST endpoint.
### Workarounds
There is no workaround.
### References
- [MD5 (Wikipedia)](https://en.wikipedia.org/wiki/MD5)
- [bcrypt (Wikipedia)](https://en.wikipedia.org/wiki/Bcrypt)
- [How weak is MD5 as a password hashing function?](https://security.stackexchange.com/q/52461)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at security@opencast.org
|
{'CVE-2020-5229'}
|
2021-01-08T20:31:51Z
|
2020-01-30T21:21:58Z
|
LOW
| 7.7
|
{'CWE-327'}
|
{'https://github.com/opencast/opencast/security/advisories/GHSA-h362-m8f2-5x7c', 'https://github.com/advisories/GHSA-h362-m8f2-5x7c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5229', 'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e'}
| null |
GHSA
|
GHSA-5jgp-pg4f-q8vj
|
Malicious Package in node-ftp
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:27:22Z
|
2020-09-03T19:55:42Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1137', 'https://github.com/advisories/GHSA-5jgp-pg4f-q8vj'}
| null |
GHSA
|
GHSA-g9r4-xpmj-mj65
|
Prototype Pollution in handlebars
|
Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to prototype pollution. It is possible to add or modify properties to the Object prototype through a malicious template. This may allow attackers to crash the application or execute Arbitrary Code in specific conditions.
## Recommendation
Upgrade to version 3.0.8, 4.5.3 or later.
| null |
2021-10-01T20:08:29Z
|
2020-09-04T15:06:32Z
|
HIGH
| 0
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-g9r4-xpmj-mj65', 'https://www.npmjs.com/advisories/1325'}
| null |
GHSA
|
GHSA-gjj5-998g-v36v
|
Improper Access Control in Onionshare
|
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerability ID: OTF-003
- Vulnerability type: Improper Access Control
- Threat level: Moderate
## Description:
Anyone with access to the chat environment can write messages disguised as another chat participant.
## Technical description:
Prerequisites:
- Alice and Bob are legitimate users
- A third user has access to the chat environment

This screenshot shows Alice (`glimpse-depress`) and Bob (`blinker-doorpost`) joined a chatroom and are the only participants in the chatroom. Then the non-listed user squad-nursing writes a message in the chatroom without being visible in the list of users. The sending of the message itself is not required but was done here to show the initial access. The non-listed participant now renames himself to Bob and writes another message, seemingly coming from Bob.
This can be reproduced by slightly modifying the client-side JavaScript. The `joined` emit needs to be removed from the `socket.on(connect) `event handler. Therefore a client is not listed in the userlist and has no active session.
https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/resources/static/js/chat.js#L16-L18
This can be done either via a crafted client or runtime modification of the `chat.js` script in the browser's internal debugger.
It is still possible to call the text method and send text to the chat via websocket.
https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/web/chat_mode.py#L131-L139
It is also possible to call the `update_username` function and choose an existing username from the chat.
https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/web/chat_mode.py#L141-L162
Afterwards the hidden user can send messages that are displayed as coming from the impersonated user. There is no way to distinguish between the fake and original message.
## Impact:
An adversary with access to the chat environment can impersonate existing chat participants and write messages but not read the conversation. The similar exploit described in OTF-004 (page 19) has only slightly more requirements but also allows for reading.
## Recommendation:
- Implement proper session handling
|
{'CVE-2022-21692'}
|
2022-01-21T23:20:21Z
|
2022-01-21T23:20:21Z
|
MODERATE
| 4.3
|
{'CWE-287'}
|
{'https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v', 'https://github.com/advisories/GHSA-gjj5-998g-v36v', 'https://github.com/onionshare/onionshare/releases/tag/v2.5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21692'}
| null |
GHSA
|
GHSA-6w3v-66mj-2qm6
|
Moderate severity vulnerability that affects org.apache.qpid:apache-qpid-broker-j
|
A Denial of Service vulnerability was found in Apache Qpid Broker-J 7.0.0 in functionality for authentication of connections for AMQP protocols 0-8, 0-9, 0-91 and 0-10 when PLAIN or XOAUTH2 SASL mechanism is used. The vulnerability allows unauthenticated attacker to crash the broker instance. AMQP 1.0 and HTTP connections are not affected. An authentication of incoming AMQP connections in Apache Qpid Broker-J is performed by special entities called "Authentication Providers". Each Authentication Provider can support several SASL mechanisms which are offered to the connecting clients as part of SASL negotiation process. The client chooses the most appropriate SASL mechanism for authentication. Authentication Providers of following types supports PLAIN SASL mechanism: Plain, PlainPasswordFile, SimpleLDAP, Base64MD5PasswordFile, MD5, SCRAM-SHA-256, SCRAM-SHA-1. XOAUTH2 SASL mechanism is supported by Authentication Providers of type OAuth2. If an AMQP port is configured with any of these Authentication Providers, the Broker may be vulnerable.
|
{'CVE-2018-1298'}
|
2021-09-02T18:30:04Z
|
2018-10-19T16:41:46Z
|
MODERATE
| 5.9
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1298', 'https://github.com/advisories/GHSA-6w3v-66mj-2qm6', 'https://lists.apache.org/thread.html/d9087e9e57c9b6376754e2b4ea8cd5e9ae6449ed17fc384640c9c9e1@%3Cusers.qpid.apache.org%3E'}
| null |
GHSA
|
GHSA-9c84-4hx6-xmm4
|
Integer overflow in TFLite concatentation
|
### Impact
The TFLite implementation of concatenation is [vulnerable to an integer overflow issue](https://github.com/tensorflow/tensorflow/blob/7b7352a724b690b11bfaae2cd54bc3907daf6285/tensorflow/lite/kernels/concatenation.cc#L70-L76):
```cc
for (int d = 0; d < t0->dims->size; ++d) {
if (d == axis) {
sum_axis += t->dims->data[axis];
} else {
TF_LITE_ENSURE_EQ(context, t->dims->data[d], t0->dims->data[d]);
}
}
```
An attacker can craft a model such that the dimensions of one of the concatenation input overflow the values of `int`. TFLite uses `int` to represent tensor dimensions, whereas TF uses `int64`. Hence, valid TF models can trigger an integer overflow when converted to TFLite format.
### Patches
We have patched the issue in GitHub commit [4253f96a58486ffe84b61c0415bb234a4632ee73](https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29601'}
|
2021-05-21T14:28:08Z
|
2021-05-21T14:28:08Z
|
MODERATE
| 6.3
|
{'CWE-190'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29601', 'https://github.com/advisories/GHSA-9c84-4hx6-xmm4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c84-4hx6-xmm4', 'https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73'}
| null |
GHSA
|
GHSA-hpcx-3pw8-g3j2
|
Free of uninitialized memory in telemetry
|
An issue was discovered in the telemetry crate through 0.1.2 for Rust. There is a drop of uninitialized memory if a value.clone() call panics within misc::vec_with_size().
|
{'CVE-2021-29937'}
|
2021-08-25T20:54:22Z
|
2021-08-25T20:54:22Z
|
CRITICAL
| 9.8
|
{'CWE-908'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29937', 'https://github.com/Yoric/telemetry.rs/issues/45', 'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81', 'https://rustsec.org/advisories/RUSTSEC-2021-0046.html', 'https://github.com/advisories/GHSA-hpcx-3pw8-g3j2'}
| null |
GHSA
|
GHSA-qx2v-j445-g354
|
Improper Input Validation in Google TensorFlow
|
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow before 1.7.1, could result in a crash or read from other parts of process memory.
|
{'CVE-2018-7577'}
|
2021-08-03T21:02:28Z
|
2019-04-30T15:37:34Z
|
HIGH
| 8.1
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-7577', 'https://github.com/advisories/GHSA-qx2v-j445-g354', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-005.md'}
| null |
GHSA
|
GHSA-37m5-42qp-4qpr
|
Cross-site scripting in LocalStack
|
A Cross-site scripting (XSS) vulnerability exists in StackLift LocalStack.
|
{'CVE-2021-32091'}
|
2021-06-18T18:38:09Z
|
2021-06-18T18:38:09Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-37m5-42qp-4qpr', 'https://blog.sonarsource.com/hack-the-stack-with-localstack', 'https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32091'}
| null |
GHSA
|
GHSA-f38p-c2gq-4pmr
|
Regular Expression Denial-of-Service in npm schema-inspector
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
Email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS. The new regex expression is more limited in what it can check, so it is more flexible than the one used before. Therefore, this was a new major version instead of a new patch version to warn people upgrading that they should make sure the email validation still works for their use case.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
If a user chooses to not upgrade, the only known workaround would be to stop using the email validation feature in the library. The user could, for example, accept the email address into their system but save it in a "not yet validated" state in their system until a verification email is sent to it (to determine whether the email is valid and belongs to the form submitter). Note that this is the preferred way of validating email addresses anyways.
### References
_Are there any links users can visit to find out more?_
https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f
### For more information
If you have any questions or comments about this advisory, you can create an issue in this repository.
|
{'CVE-2021-21267'}
|
2022-04-19T19:02:45Z
|
2021-03-19T20:14:21Z
|
LOW
| 0
|
{'CWE-20', 'CWE-400'}
|
{'https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f', 'https://github.com/schema-inspector/schema-inspector/releases/tag/2.0.0', 'https://github.com/advisories/GHSA-f38p-c2gq-4pmr', 'https://www.npmjs.com/package/schema-inspector', 'https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21267', 'https://security.netapp.com/advisory/ntap-20210528-0006/'}
| null |
GHSA
|
GHSA-8mfc-v7wv-p62g
|
Path Traversal in Yarn
|
Arbitrary filesystem write vulnerability in Yarn 1.21.1 and earlier allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package.
|
{'CVE-2020-8131'}
|
2022-02-09T22:43:37Z
|
2022-02-09T22:43:37Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://hackerone.com/reports/730239', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8131', 'https://github.com/advisories/GHSA-8mfc-v7wv-p62g', 'https://github.com/yarnpkg/yarn/pull/7831'}
| null |
GHSA
|
GHSA-5r5w-h76p-m726
|
Use of a Broken or Risky Cryptographic Algorithm in Max Mazurov Maddy
|
A Broken or Risky Cryptographic Algorithm exists in Max Mazurov Maddy before 0.5.2, which is an unnecessary risk that may result in the exposure of sensitive information.
|
{'CVE-2021-42583'}
|
2022-01-13T18:32:44Z
|
2022-01-06T22:20:53Z
|
HIGH
| 0
|
{'CWE-327'}
|
{'https://github.com/foxcpp/maddy/releases/tag/v0.5.2', 'https://github.com/advisories/GHSA-5r5w-h76p-m726', 'https://github.com/foxcpp/maddy/blob/df40dce1284cd0fd0a9e8e7894029553d653d0a5/internal/auth/shadow/verify.go', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42583'}
| null |
GHSA
|
GHSA-53xj-v576-3ch2
|
OS Command Injection in giting
|
giting version prior to 0.0.8 allows execution of arbritary commands. The first argument "repo" of function "pull()" is executed by the package without any validation.
|
{'CVE-2019-10802'}
|
2021-04-13T15:22:09Z
|
2021-04-13T15:22:09Z
|
HIGH
| 9.8
|
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10802', 'https://snyk.io/vuln/SNYK-JS-GITING-559008', 'https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0', 'https://github.com/advisories/GHSA-53xj-v576-3ch2'}
| null |
GHSA
|
GHSA-f34x-8pf6-qc9c
|
HTTP header injection in Sonatype Nexus Repository
|
Sonatype Nexus Repository 3.x through 3.33.1-01 is vulnerable to an HTTP header injection. By sending a crafted HTTP request, a remote attacker may disclose sensitive information or request external resources from a vulnerable instance.
|
{'CVE-2021-40143'}
|
2021-09-15T18:27:55Z
|
2021-09-08T17:42:18Z
|
HIGH
| 8.2
|
{'CWE-74'}
|
{'https://help.sonatype.com/repomanager3/release-notes/2021-release-notes', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40143', 'https://github.com/advisories/GHSA-f34x-8pf6-qc9c', 'https://issues.sonatype.org/secure/ReleaseNote.jspa', 'https://support.sonatype.com/hc/en-us/articles/4405941762579'}
| null |
GHSA
|
GHSA-fcf9-3qw3-gxmj
|
High severity vulnerability that affects cryptography
|
A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage.
|
{'CVE-2018-10903'}
|
2022-03-03T21:54:39Z
|
2018-07-31T18:28:09Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-10903', 'https://github.com/advisories/GHSA-fcf9-3qw3-gxmj', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10903', 'https://github.com/pyca/cryptography/pull/4342/commits/688e0f673bfbf43fa898994326c6877f00ab19ef'}
| null |
GHSA
|
GHSA-vf5m-q45w-8mh9
|
Malicious Package in js-qha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:01:14Z
|
2020-09-03T23:00:25Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-vf5m-q45w-8mh9', 'https://www.npmjs.com/advisories/1282'}
| null |
GHSA
|
GHSA-xc6x-cq47-9chw
|
Vulnerability in Azure Active Directory Authentication Library
|
An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens, aka 'Azure Active Directory Authentication Library Elevation of Privilege Vulnerability'.
|
{'CVE-2019-1258'}
|
2021-08-26T15:33:47Z
|
2019-08-16T14:03:35Z
|
HIGH
| 8.8
| null |
{'https://github.com/advisories/GHSA-xc6x-cq47-9chw', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1258', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1258'}
| null |
GHSA
|
GHSA-mhhc-q96p-mfm9
|
Infinite loop in TFLite
|
### Impact
The strided slice implementation in TFLite has a logic bug which can allow an attacker to trigger an infinite loop. This arises from newly introduced support for [ellipsis in axis definition](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/strided_slice.cc#L103-L122):
```cc
for (int i = 0; i < effective_dims;) {
if ((1 << i) & op_context->params->ellipsis_mask) {
// ...
int ellipsis_end_idx =
std::min(i + 1 + num_add_axis + op_context->input_dims - begin_count,
effective_dims);
// ...
for (; i < ellipsis_end_idx; ++i) {
// ...
}
continue;
}
// ...
++i;
}
```
An attacker can craft a model such that `ellipsis_end_idx` is smaller than `i` (e.g., always negative). In this case, the inner loop does not increase `i` and the `continue` statement causes execution to skip over the preincrement at the end of the outer loop.
### Patches
We have patched the issue in GitHub commit [dfa22b348b70bb89d6d6ec0ff53973bacb4f4695](https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695).
The fix will be included in TensorFlow 2.6.0. This is the only affected version.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37686'}
|
2021-08-25T14:39:58Z
|
2021-08-25T14:39:58Z
|
MODERATE
| 5.5
|
{'CWE-835'}
|
{'https://github.com/tensorflow/tensorflow/releases/tag/v2.6.0', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.4', 'https://github.com/advisories/GHSA-mhhc-q96p-mfm9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37686', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mhhc-q96p-mfm9', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.5.1', 'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.4.3'}
| null |
GHSA
|
GHSA-78h7-fgq9-625x
|
Directory Traversal in quickserver
|
Affected versions of `quickserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16196'}
|
2021-01-08T19:16:59Z
|
2018-07-23T20:40:14Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/quickserver', 'https://github.com/advisories/GHSA-78h7-fgq9-625x', 'https://nodesecurity.io/advisories/433', 'https://www.npmjs.com/advisories/433', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16196'}
| null |
GHSA
|
GHSA-g4w7-3qr8-5623
|
Improper type usage in rusqlite
|
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via the repr(Rust) type.
|
{'CVE-2020-35872'}
|
2021-08-25T20:47:01Z
|
2021-08-25T20:47:01Z
|
CRITICAL
| 9.8
|
{'CWE-351'}
|
{'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0', 'https://github.com/advisories/GHSA-g4w7-3qr8-5623', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35872'}
| null |
GHSA
|
GHSA-p673-hjf2-pwfr
|
High severity vulnerability that affects command_wrap
|
command_wrap.rb in the command_wrap Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL or filename.
|
{'CVE-2013-1875'}
|
2021-09-15T21:37:21Z
|
2017-10-24T18:33:37Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'http://seclists.org/fulldisclosure/2013/Mar/175', 'http://packetstormsecurity.com/files/120847/Ruby-Gem-Command-Wrap-Command-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1875', 'https://github.com/advisories/GHSA-p673-hjf2-pwfr', 'http://www.osvdb.org/91450'}
| null |
GHSA
|
GHSA-q5hq-fp76-qmrc
|
Uncontrolled Resource Consumption in Pillow
|
An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening.
|
{'CVE-2021-28677'}
|
2021-09-15T18:31:39Z
|
2021-06-08T18:49:36Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://github.com/python-pillow/Pillow/pull/5377', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/advisories/GHSA-q5hq-fp76-qmrc', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28677-fix-eps-dos-on-open', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28677'}
| null |
GHSA
|
GHSA-5cqm-crxm-6qpv
|
Buffer overrun vulnerability in CGI
|
A security vulnerability that causes buffer overflow when you pass a very large string (> 700 MB) to CGI.escape_html on a platform where long type takes 4 bytes, typically, Windows. Please update the cgi gem to version 0.3.1, 0.2,1, and 0.1,1 or later. You can use gem update cgi to update it. If you are using bundler, please add gem "cgi", ">= 0.3.1" to your Gemfile. Alternatively, please update Ruby to 2.7.5 or 3.0.3. This issue has been introduced since Ruby 2.7, so the cgi version bundled with Ruby 2.6 is not vulnerable.
|
{'CVE-2021-41816'}
|
2022-05-02T14:59:16Z
|
2021-12-14T21:36:20Z
|
CRITICAL
| 9.8
|
{'CWE-190'}
|
{'https://security-tracker.debian.org/tracker/CVE-2021-41816', 'https://hackerone.com/reports/1328463', 'https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41816', 'https://github.com/advisories/GHSA-5cqm-crxm-6qpv', 'https://security.netapp.com/advisory/ntap-20220303-0006/', 'https://groups.google.com/g/ruby-security-ann/c/4MQ568ZG47c'}
| null |
GHSA
|
GHSA-gf93-h79q-6jjv
|
Incorrect implementation of the Streebog hash functions in streebog
|
An issue was discovered in the streebog crate before 0.8.0 for Rust. The Streebog hash function can produce the wrong answer.
|
{'CVE-2019-25006'}
|
2021-08-25T20:45:41Z
|
2021-08-25T20:45:41Z
|
HIGH
| 7.5
|
{'CWE-327'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-25006', 'https://github.com/advisories/GHSA-gf93-h79q-6jjv', 'https://github.com/RustCrypto/hashes/pull/91', 'https://rustsec.org/advisories/RUSTSEC-2019-0030.html'}
| null |
GHSA
|
GHSA-5m69-3chg-6f8m
|
Cross Site Scripting (XSS) in Quokka
|
Cross Site Scripting (XSS) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the 'Username' parameter in the component 'quokka/admin/actions.py'.
|
{'CVE-2020-18702'}
|
2021-08-30T16:23:26Z
|
2021-08-30T16:23:26Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/rochacbruno/quokka/issues/675', 'https://nvd.nist.gov/vuln/detail/CVE-2020-18702', 'https://github.com/advisories/GHSA-5m69-3chg-6f8m'}
| null |
GHSA
|
GHSA-cf6r-3wgc-h863
|
Polymorphic deserialization of malicious object in jackson-databind
|
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
|
{'CVE-2019-14892'}
|
2021-04-27T19:44:30Z
|
2020-05-15T18:58:58Z
|
HIGH
| 7.5
|
{'CWE-502'}
|
{'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://github.com/FasterXML/jackson-databind/issues/2462', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14892', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892', 'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b', 'https://security.netapp.com/advisory/ntap-20200904-0005/', 'https://github.com/advisories/GHSA-cf6r-3wgc-h863'}
| null |
GHSA
|
GHSA-7h26-63m7-qhf2
|
HTML comments vulnerability allowing to execute JavaScript code
|
### Affected packages
The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4.
### Impact
A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.17.0.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank William Bowling ([wbowling](https://github.com/wbowling)) for recognizing and reporting this vulnerability.
|
{'CVE-2021-41165'}
|
2022-04-22T15:40:19Z
|
2021-11-17T21:58:25Z
|
HIGH
| 8.2
|
{'CWE-79'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41165', 'https://github.com/advisories/GHSA-7h26-63m7-qhf2', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417', 'https://www.drupal.org/sa-core-2021-011', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-rmxg-73gg-4p98
|
Cross-Site Scripting (XSS) in jquery
|
Affected versions of `jquery` interpret `text/javascript` responses from cross-origin ajax requests, and automatically execute the contents in `jQuery.globalEval`, even when the ajax request doesn't contain the `dataType` option.
## Recommendation
Update to version 3.0.0 or later.
|
{'CVE-2015-9251'}
|
2021-09-17T18:58:20Z
|
2018-01-22T13:32:06Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'http://seclists.org/fulldisclosure/2019/May/10', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://www.tenable.com/security/tns-2019-08', 'https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2020:0481', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9251', 'http://www.securityfocus.com/bid/105658', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://snyk.io/vuln/npm:jquery:20150627', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'https://github.com/jquery/jquery/pull/2588', 'https://github.com/advisories/GHSA-rmxg-73gg-4p98', 'https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601', 'https://security.netapp.com/advisory/ntap-20210108-0004/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.npmjs.com/advisories/328', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'https://github.com/jquery/jquery/issues/2432', 'https://seclists.org/bugtraq/2019/May/18', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}
| null |
GHSA
|
GHSA-wxhq-pm8v-cw75
|
Regular Expression Denial of Service in clean-css
|
Version of `clean-css` prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
## Recommendation
Upgrade to version 4.1.11 or higher.
| null |
2022-04-19T19:03:26Z
|
2019-06-05T20:50:16Z
|
LOW
| 0
| null |
{'https://www.npmjs.com/advisories/785', 'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3', 'https://github.com/advisories/GHSA-wxhq-pm8v-cw75'}
| null |
GHSA
|
GHSA-5vp3-v4hc-gx76
|
UUPSUpgradeable vulnerability in @openzeppelin/contracts
|
### Impact
Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon.
### Patches
A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
### Workarounds
Initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301).
### References
[Post-mortem](https://forum.openzeppelin.com/t/uupsupgradeable-vulnerability-post-mortem/15680).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
|
{'CVE-2021-41264'}
|
2021-11-16T21:44:48Z
|
2021-09-15T20:23:17Z
|
CRITICAL
| 9.8
|
{'CWE-665'}
|
{'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5vp3-v4hc-gx76', 'https://github.com/advisories/GHSA-5vp3-v4hc-gx76', 'https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41264'}
| null |
GHSA
|
GHSA-v39h-qm32-8gwq
|
Improperly Controlled Modification of Dynamically-Determined Object Attributes in express-mock-middleware
|
express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk.
|
{'CVE-2020-7616'}
|
2021-12-09T19:57:29Z
|
2021-12-09T19:57:29Z
|
MODERATE
| 5.3
|
{'CWE-915'}
|
{'https://github.com/LingyuCoder/express-mock-middleware/blob/master/lib/index.js#L39', 'https://snyk.io/vuln/SNYK-JS-EXPRESSMOCKMIDDLEWARE-564120', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7616', 'https://github.com/advisories/GHSA-v39h-qm32-8gwq'}
| null |
GHSA
|
GHSA-v596-fwhq-8x48
|
High severity vulnerability that affects org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core
|
Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.
|
{'CVE-2018-1199'}
|
2021-12-03T14:54:43Z
|
2018-10-17T20:01:54Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-v596-fwhq-8x48'}
| null |
GHSA
|
GHSA-cf66-xwfp-gvc4
|
Missing Origin Validation in webpack-dev-server
|
Versions of `webpack-dev-server` before 3.1.10 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation
For `webpack-dev-server` update to version 3.1.11 or later.
|
{'CVE-2018-14732'}
|
2022-04-06T20:40:37Z
|
2019-01-04T17:40:59Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-14732', 'https://github.com/webpack/webpack-dev-server/issues/1620', 'https://www.npmjs.com/advisories/725', 'https://github.com/webpack/webpack-dev-server/blob/master/CHANGELOG.md#3111-2018-12-21', 'https://github.com/advisories/GHSA-cf66-xwfp-gvc4', 'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10', 'https://github.com/webpack/webpack-dev-server/issues/1445'}
| null |
GHSA
|
GHSA-7359-3c6r-hfc2
|
Improper Certificate Validation in oauth ruby gem
|
lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
|
{'CVE-2016-11086'}
|
2021-10-05T16:25:55Z
|
2021-04-22T16:22:15Z
|
HIGH
| 7.4
|
{'CWE-295'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-11086', 'https://github.com/oauth-xx/oauth-ruby/releases/tag/v0.5.5', 'https://github.com/oauth-xx/oauth-ruby/issues/137', 'https://github.com/advisories/GHSA-7359-3c6r-hfc2', 'https://rubygems.org/gems/oauth', 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'}
| null |
GHSA
|
GHSA-37hp-765x-j95x
|
Moderate severity vulnerability that affects django
|
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
|
{'CVE-2017-7233'}
|
2021-08-31T20:50:45Z
|
2019-01-04T17:50:26Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://access.redhat.com/errata/RHSA-2017:1445', 'https://access.redhat.com/errata/RHSA-2018:2927', 'http://www.securityfocus.com/bid/97406', 'https://access.redhat.com/errata/RHSA-2017:1470', 'https://github.com/advisories/GHSA-37hp-765x-j95x', 'http://www.debian.org/security/2017/dsa-3835', 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/', 'https://access.redhat.com/errata/RHSA-2017:1462', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7233', 'https://access.redhat.com/errata/RHSA-2017:1596', 'http://www.securitytracker.com/id/1038177', 'https://access.redhat.com/errata/RHSA-2017:3093', 'https://access.redhat.com/errata/RHSA-2017:1451'}
| null |
GHSA
|
GHSA-mh8g-hprg-8363
|
Hard-Coded Key Used For Remember-me Token in Opencast
|
### Impact
The security configuration in `etc/security/mh_default_org.xml` enables a remember-me cookie based on a hash created from the [username, password, and an additional system key](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html). Opencast has hard-coded this system key in the large XML file and never mentions to change this, basically ensuring that all systems use the same key:
```xml
<sec:remember-me key="opencast" user-service-ref="userDetailsService" />
```
This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. For example, a remember-me token obtained from develop.opencast.org can be used on stable.opencast.org without actually knowing the log-in credentials.
Such an attack will usually not work on different installations – assuming that safe, unique passwords are used – but it is basically guaranteed to work to get access to all machines of one cluster if a token from one machine is compromised.
### Patches
This problem is fixed in Opencast 7.6 and Opencast 8.1
### Workarounds
We strongly recommend updating to the patched version. Still, as a workaround for older versions, in `etc/security/mh_default_org.xml`, set a custom key for each server:
```xml
<sec:remember-me key="CUSTOM_RANDOM_KEY" user-service-ref="userDetailsService" />
```
### References
- [Relevant lines in the security configuration](https://github.com/opencast/opencast/blob/161ee619382f144dc35eea211fc6b556025b98e1/etc/security/mh_default_org.xml#L335-L336)
- [Spring Security Remember-Me Authentication Documentation](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html#remember-me-hash-token)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at [security@opencast.org](mailto:security@opencast.org)
### Thanks
Thanks to @LukasKalbertodt for reporting the issue.
|
{'CVE-2020-5222'}
|
2022-04-19T19:02:24Z
|
2020-01-30T21:21:44Z
|
MODERATE
| 6.8
|
{'CWE-798'}
|
{'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6', 'https://github.com/advisories/GHSA-mh8g-hprg-8363', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5222', 'https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363'}
| null |
GHSA
|
GHSA-9fgx-q25h-jxrg
|
DOM XSS in Theme Preview
|
### Impact
An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site.
Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added.
Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.3.2. Immediate action should be taken to secure your site - see patches & workarounds below.
### Patches
Fixed in 4.3.3, all 4.x sites should upgrade as soon as possible.
As the endpoint is unused, the patch simply removes it.
### Workarounds
- Log out of Ghost Admin
- Suspend any users who cannot log out
- Block access to `/ghost/preview`
Example of how to block access in nginx:
```
location ~ /ghost/preview {
rewrite ^(\/(.*\/)?ghost\/)(.*)$ $1 redirect;
}
```
This redirects the endpoint to `/ghost/`, which mimics the behaviour after the patch is applied.
|
{'CVE-2021-29484'}
|
2022-04-19T19:02:55Z
|
2021-04-29T21:53:18Z
|
MODERATE
| 6.8
|
{'CWE-79'}
|
{'https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg', 'https://blog.sonarsource.com/ghost-admin-takeover', 'https://github.com/advisories/GHSA-9fgx-q25h-jxrg', 'https://security.netapp.com/advisory/ntap-20210618-0006/', 'https://forum.ghost.org/t/critical-security-update-available-for-ghost-4-x/22290', 'https://www.npmjs.com/package/ghost', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29484'}
| null |
GHSA
|
GHSA-4f7p-27jc-3c36
|
HTTP Request Smuggling in waitress
|
### Impact
When using Waitress behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends.
This would allow requests to be smuggled via the front-end proxy to waitress and later behavior.
There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory:
- The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits.
- Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters
### Patches
This has been fixed in Waitress 2.1.1
### Workarounds
When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead.
### References
- https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Github issue tracker](https://github.com/Pylons/waitress/issues) (if not security related/sensitive)
* Email us at [pylons-project-security@googlegroups.com](mailto:pylons-project-security@googlegroups.com) (If security related or sensitive)
|
{'CVE-2022-24761'}
|
2022-03-21T22:15:26Z
|
2022-03-18T19:00:59Z
|
HIGH
| 7.5
|
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24761', 'https://github.com/Pylons/waitress/releases/tag/v2.1.1', 'https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36', 'https://github.com/advisories/GHSA-4f7p-27jc-3c36', 'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0'}
| null |
GHSA
|
GHSA-5qfv-rr79-chx5
|
Cross-site Scripting in Ignite Realtime Openfire
|
Ignite Realtime Openfire before 4.4.1 has reflected XSS via an LDAP setup test.
|
{'CVE-2019-15488'}
|
2021-08-17T22:12:21Z
|
2019-08-27T17:37:33Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/igniterealtime/Openfire/compare/cd0a573...5e5d9e5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15488', 'https://github.com/igniterealtime/Openfire/pull/1441', 'https://github.com/advisories/GHSA-5qfv-rr79-chx5'}
| null |
GHSA
|
GHSA-qhqf-ghgh-x2m4
|
High severity vulnerability that affects Microsoft.AspNetCore.Mvc
|
See https://nvd.nist.gov/vuln/detail/CVE-2017-0249 & https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0249
|
{'CVE-2017-0249'}
|
2021-10-08T21:18:13Z
|
2018-10-16T19:57:38Z
|
HIGH
| 7.3
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-0249', 'https://github.com/aspnet/Announcements/issues/239', 'https://github.com/advisories/GHSA-qhqf-ghgh-x2m4', 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7'}
| null |
GHSA
|
GHSA-mwcv-m549-5cm8
|
Hijacked Environment Variables in node-tkinter
|
The `node-tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16062'}
|
2021-06-10T22:18:52Z
|
2018-11-01T14:47:43Z
|
HIGH
| 7.5
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-mwcv-m549-5cm8', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16062', 'https://nodesecurity.io/advisories/501', 'https://www.npmjs.com/advisories/501'}
| null |
GHSA
|
GHSA-758c-g2ff-9444
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
|
{'CVE-2019-1140'}
|
2021-03-29T20:57:49Z
|
2021-03-29T20:57:49Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1140', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1140', 'https://github.com/advisories/GHSA-758c-g2ff-9444'}
| null |
GHSA
|
GHSA-3rh3-wfr4-76mj
|
Regular expression Denial of Service in multiple packages
|
### Impact
A regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version <= 26.0.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 27.0.0.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 5 team would like to thank Yeting Li for recognizing and reporting these vulnerabilities.
|
{'CVE-2021-21391'}
|
2021-04-30T17:30:43Z
|
2021-04-06T17:28:41Z
|
MODERATE
| 6.5
|
{'CWE-400'}
|
{'https://www.npmjs.com/package/@ckeditor/ckeditor5-widget', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-font', 'https://github.com/advisories/GHSA-3rh3-wfr4-76mj', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-list', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-paste-from-office', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-engine', 'https://github.com/ckeditor/ckeditor5/releases/tag/v27.0.0', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-media-embed', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-image', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21391', 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj'}
| null |
GHSA
|
GHSA-hgmg-hhc8-g5wr
|
Regular expression Denial of Service in Markdown plugin
|
### Impact
A regular expression denial of service (ReDoS) vulnerability has been discovered in the CKEditor 5 Markdown plugin code. The vulnerability allowed to abuse a link recognition regular expression, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 Markdown plugin at version <= 24.0.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 25.0.0.
### Workarounds
The user can work around the issue by:
- Upgrading CKEditor 5 to version 25.0.0.
- Disabling the Markdown plugin.
### More information
If you have any questions or comments about this advisory:
* Email us at [security@cksource.com](mailto:security@cksource.com)
### Acknowledgements
The CKEditor 5 team would like to thank Erik Krogh Kristensen from the GitHub team for recognizing this vulnerability and
Alvaro Muñoz from GitHub for reporting it.
|
{'CVE-2021-21254'}
|
2021-02-02T15:22:38Z
|
2021-01-29T21:51:22Z
|
LOW
| 0
|
{'CWE-400'}
|
{'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr', 'https://github.com/advisories/GHSA-hgmg-hhc8-g5wr', 'https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21254', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm'}
| null |
GHSA
|
GHSA-7px7-7xjx-hxm8
|
Moderate severity vulnerability that affects marked
|
marked version 0.3.6 and earlier is vulnerable to an XSS attack in the data: URI parser.
|
{'CVE-2017-1000427'}
|
2021-09-03T21:03:02Z
|
2018-01-04T21:04:19Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/', 'https://github.com/advisories/GHSA-7px7-7xjx-hxm8', 'https://snyk.io/vuln/npm:marked:20170112', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000427'}
| null |
GHSA
|
GHSA-8p36-q63g-68qh
|
Autobinding vulnerability in MITREid Connect
|
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
|
{'CVE-2021-27582'}
|
2021-05-13T22:31:22Z
|
2021-05-13T22:31:22Z
|
CRITICAL
| 9.1
|
{'CWE-915'}
|
{'https://portswigger.net/research/hidden-oauth-attack-vectors', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27582', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c', 'https://github.com/advisories/GHSA-8p36-q63g-68qh', 'http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html'}
| null |
GHSA
|
GHSA-x4w5-r546-x9qh
|
Arbitrary File Read in html-pdf
|
All versions of `html-pdf` are vulnerable to Arbitrary File Read. The package fails to sanitize the HTML input, allowing attackers to exfiltrate server files by supplying malicious HTML code. XHR requests in the HTML code are executed by the server. Input with an XHR request such as `request.open("GET","file:///etc/passwd")` will result in a PDF document with the contents of `/etc/passwd`.
## Recommendation
No fix is currently available. There is a mitigation available in the provided reference.
|
{'CVE-2019-15138'}
|
2022-01-04T19:51:52Z
|
2019-10-11T18:40:38Z
|
HIGH
| 7.5
|
{'CWE-200', 'CWE-668', 'CWE-73', 'CWE-79'}
|
{'https://github.com/marcbachmann/node-html-pdf/releases/tag/v3.0.1', 'https://github.com/marcbachmann/node-html-pdf/commit/c12d6977778014139183c9f8da7579fd7ac65362', 'https://github.com/marcbachmann/node-html-pdf/issues/530', 'https://security.netapp.com/advisory/ntap-20191017-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15138', 'https://github.com/advisories/GHSA-x4w5-r546-x9qh', 'https://www.npmjs.com/advisories/1095', 'https://github.com/marcbachmann/node-html-pdf/issues/530#issuecomment-535045123'}
| null |
GHSA
|
GHSA-872g-2h8h-362q
|
High severity vulnerability that affects org.eclipse.jetty:jetty-server
|
The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes.
|
{'CVE-2016-4800'}
|
2021-09-03T23:00:05Z
|
2018-10-19T16:16:16Z
|
CRITICAL
| 9.8
|
{'CWE-284'}
|
{'https://github.com/advisories/GHSA-872g-2h8h-362q', 'http://www.zerodayinitiative.com/advisories/ZDI-16-362', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20190307-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4800', 'http://www.ocert.org/advisories/ocert-2016-001.html', 'http://www.securityfocus.com/bid/90945', 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00092.html'}
| null |
GHSA
|
GHSA-2p5p-m353-833w
|
Sort order SQL injection in Administrate
|
In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard,
the direction parameter was not validated before being interpolated into the SQL query.
This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections.
Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication.
This is patched in wersion 0.13.0.
|
{'CVE-2020-5257'}
|
2022-04-19T19:02:24Z
|
2020-03-13T21:05:44Z
|
HIGH
| 7.7
|
{'CWE-943'}
|
{'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5257', 'https://github.com/thoughtbot/administrate/security/advisories/GHSA-2p5p-m353-833w', 'https://github.com/advisories/GHSA-2p5p-m353-833w'}
| null |
GHSA
|
GHSA-65xx-c85x-wg76
|
Command Injection in plotter
|
All versions of `plotter` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory:
```
var plot = require('plotter').plot;
const title = 'Example "\nset title system("touch testing")#';
plot({
data: [ 3, 1, 2, 3, 4 ],
filename: 'output.pdf',
style: 'linespoints',
title: title,
logscale: true,
xlabel: 'time',
ylabel: 'length of string',
format: 'pdf'
});
```
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-04T20:36:16Z
|
2020-09-04T17:20:52Z
|
CRITICAL
| 0
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-65xx-c85x-wg76', 'https://www.npmjs.com/advisories/1441'}
| null |
GHSA
|
GHSA-5cgx-vhfp-6cf9
|
Directory traversal in Kubernetes Secrets Store CSI Driver
|
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that contain other Kubernetes Secrets.
|
{'CVE-2020-8568'}
|
2022-04-20T20:56:50Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 6.5
|
{'CWE-24', 'CWE-20', 'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8568', 'https://github.com/advisories/GHSA-5cgx-vhfp-6cf9', 'https://groups.google.com/g/kubernetes-secrets-store-csi-driver/c/Cb9cvymTzl4', 'https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/378', 'https://github.com/kubernetes-sigs/secrets-store-csi-driver/pull/371'}
| null |
GHSA
|
GHSA-9q64-mpxx-87fg
|
Open Redirect in ecstatic
|
Versions of `ecstatic` prior to 4.1.2, 3.3.2 or 2.2.2 are vulnerable to Open Redirect. The package fails to validate redirects, allowing attackers to craft requests that result in an `HTTP 301` redirect to any other domains.
## Recommendation
If using `ecstatic` 4.x, upgrade to 4.1.2 or later.
If using `ecstatic` 3.x, upgrade to 3.3.2 or later.
If using `ecstatic` 2.x, upgrade to 2.2.2 or later.
| null |
2020-12-15T16:51:19Z
|
2020-04-01T16:35:08Z
|
HIGH
| 0
|
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10775', 'https://github.com/advisories/GHSA-9q64-mpxx-87fg', 'https://www.npmjs.com/advisories/830'}
| null |
GHSA
|
GHSA-333x-qr3v-g4xx
|
Command injection in spritesheet-js
|
This affects all versions of package spritesheet-js. It depends on a vulnerable package platform-command. The injection point is located in line 32 in lib/generator.js, which is triggered by main entry of the package.
|
{'CVE-2020-7782'}
|
2021-07-28T18:55:51Z
|
2021-04-13T15:30:16Z
|
CRITICAL
| 9.8
|
{'CWE-74'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7782', 'https://github.com/krzysztof-o/spritesheet.js/blob/master/lib/generator.js#23L32', 'https://github.com/advisories/GHSA-333x-qr3v-g4xx', 'https://www.npmjs.com/package/spritesheet-js', 'https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333'}
| null |
GHSA
|
GHSA-f6p5-76fp-m248
|
URL Rewrite vulnerability in multiple zendframework components
|
zend-diactoros (and, by extension, Expressive), zend-http (and, by extension, Zend Framework MVC projects), and zend-feed (specifically, its PubSubHubbub sub-component) each contain a potential URL rewrite exploit. In each case, marshaling a request URI includes logic that introspects HTTP request headers that are specific to a given server-side URL rewrite mechanism.
When these headers are present on systems not running the specific URL rewriting mechanism, the logic would still trigger, allowing a malicious client or proxy to emulate the headers to request arbitrary content.
| null |
2022-04-28T21:09:55Z
|
2022-04-28T21:09:54Z
|
HIGH
| 0
| null |
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-diactoros/ZF2018-01.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-feed/ZF2018-01.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-http/ZF2018-01.yaml', 'https://github.com/advisories/GHSA-f6p5-76fp-m248'}
| null |
GHSA
|
GHSA-w64c-pxjj-h866
|
Moderate severity vulnerability that affects ansible
|
Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
{'CVE-2015-3908'}
|
2021-09-21T17:56:58Z
|
2018-10-10T17:23:51Z
|
MODERATE
| 0
|
{'CWE-345'}
|
{'https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00051.html', 'https://github.com/advisories/GHSA-w64c-pxjj-h866', 'http://lists.opensuse.org/opensuse-updates/2015-08/msg00029.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3908', 'http://www.openwall.com/lists/oss-security/2015/07/14/4', 'http://www.ansible.com/security'}
| null |
GHSA
|
GHSA-8xw8-mmqv-frqq
|
fake-static allows converting any reference into a `'static` reference
|
fake-static allows converting a reference with any lifetime into
a reference with `'static` lifetime without the `unsafe` keyword.
Internally, this crate does not use unsafe code, it instead
exploits a soundness bug in rustc
| null |
2021-08-25T20:55:33Z
|
2021-08-25T20:55:33Z
|
HIGH
| 0
|
{'CWE-657'}
|
{'https://rustsec.org/advisories/RUSTSEC-2020-0013', 'https://github.com/advisories/GHSA-8xw8-mmqv-frqq', 'https://github.com/rust-lang/rust/issues/25860'}
| null |
GHSA
|
GHSA-r6hh-5g3q-wwgc
|
Stored Cross-site Scripting in grav
|
Grav prior to 1.7.31 is vulnerable to stored cross-site scripting.
|
{'CVE-2022-0970'}
|
2022-03-28T22:27:37Z
|
2022-03-16T00:00:45Z
|
HIGH
| 7.1
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec', 'https://github.com/advisories/GHSA-r6hh-5g3q-wwgc', 'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0970'}
| null |
GHSA
|
GHSA-vwxj-6m5m-rrvh
|
The REST Plugin in Apache Struts is using an outdated XStream library
|
The REST Plugin in Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload.
|
{'CVE-2017-9793'}
|
2022-04-26T19:02:11Z
|
2018-10-16T19:37:22Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://security.netapp.com/advisory/ntap-20180629-0001/', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9793', 'http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-429.htm', 'https://struts.apache.org/docs/s2-051.html', 'https://github.com/advisories/GHSA-vwxj-6m5m-rrvh', 'http://www.securitytracker.com/id/1039262', 'http://www.securityfocus.com/bid/100611'}
| null |
GHSA
|
GHSA-2f6g-w5gj-c93h
|
Prototype Pollution in iniparserjs
|
This affects all versions of package iniparserjs. This vulnerability relates when ini_parser.js is concentrating arrays. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
|
{'CVE-2021-23328'}
|
2021-04-13T15:20:09Z
|
2021-04-13T15:20:09Z
|
MODERATE
| 5.6
|
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23328', 'https://www.npmjs.com/package/iniparserjs', 'https://github.com/advisories/GHSA-2f6g-w5gj-c93h'}
| null |
GHSA
|
GHSA-mf7q-gw5f-q8jj
|
Cross-site Scripting in Apache Zeppelin
|
Cross Site Scripting vulnerability in markdown interpreter of Apache Zeppelin allows an attacker to inject malicious scripts. This issue affects Apache Zeppelin Apache Zeppelin versions prior to 0.9.0.
|
{'CVE-2021-27578'}
|
2021-09-29T17:59:10Z
|
2021-09-07T22:55:56Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cusers.zeppelin.apache.org%3E', 'https://lists.apache.org/thread.html/r31012f2c8e39a5e12e14c1de030012cb8b51c037d953d73b291b7b50@%3Cusers.zeppelin.apache.org%3E', 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-mf7q-gw5f-q8jj', 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d%40%3Cusers.zeppelin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/09/02/3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27578'}
| null |
GHSA
|
GHSA-c2cp-3xj9-97w9
|
Denial of service in Spring Security OAuth
|
Spring Security OAuth versions 2.5.x prior to 2.5.2 and older unsupported versions are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session. This vulnerability exposes OAuth 2.0 Client applications only.
|
{'CVE-2022-22969'}
|
2022-05-04T03:52:42Z
|
2022-04-22T00:00:33Z
|
MODERATE
| 6.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-c2cp-3xj9-97w9', 'https://tanzu.vmware.com/security/cve-2022-22969', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22969'}
| null |
GHSA
|
GHSA-2ghc-6v89-pw9j
|
Prototype Pollution in body-parser-xml
|
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
|
{'CVE-2021-3666'}
|
2021-10-06T22:03:36Z
|
2021-09-14T20:25:35Z
|
HIGH
| 7.6
|
{'CWE-1321', 'CWE-915'}
|
{'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml', 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63', 'https://github.com/advisories/GHSA-2ghc-6v89-pw9j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3666'}
| null |
GHSA
|
GHSA-crmx-v835-hcp4
|
Moderate severity vulnerability that affects marked
|
# Withdrawn
This advisory has been withdrawn, per NVD: ["This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue."](https://nvd.nist.gov/vuln/detail/CVE-2017-17461)
# Original Description
A Regular expression Denial of Service (ReDoS) vulnerability in the file marked.js of the marked npm package (tested on version 0.3.7) allows a remote attacker to overload and crash a server by passing a maliciously crafted string.
|
{'CVE-2017-17461'}
|
2021-12-02T22:47:59Z
|
2018-01-04T21:04:09Z
|
MODERATE
| 0
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2017-17461', 'https://github.com/advisories/GHSA-crmx-v835-hcp4'}
| null |
GHSA
|
GHSA-qg7c-q3vq-rgxr
|
Leak of information via Store-API aggregations in shopware/platform and shopware/core
|
### Impact
Leak of information via Store-API
### Patches
We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021
| null |
2021-04-13T15:13:26Z
|
2021-04-13T15:13:26Z
|
CRITICAL
| 0
|
{'CWE-668'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-qg7c-q3vq-rgxr', 'https://github.com/advisories/GHSA-qg7c-q3vq-rgxr'}
| null |
GHSA
|
GHSA-4rvg-955w-h68q
|
Path Traversal in angular-http-server
|
Affected versions of `angular-http-server` are vulnerable to path traversal allowing a remote attacker to read files from the server that uses `angular-http-server`.
## Recommendation
Update to version 1.6.0 or later.
:exclamation: Note: This was originally thought to be fixed in version 1.4.3, though according to [this issue](https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/issues/117#issuecomment-803872454) the vulnerability was not completely fixed until version 1.6.0.
|
{'CVE-2018-3713'}
|
2021-03-23T21:44:03Z
|
2018-07-26T14:47:40Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/589', 'https://github.com/advisories/GHSA-4rvg-955w-h68q', 'https://hackerone.com/reports/309120', 'https://github.com/simonh1000/angular-http-server/commit/34d4bd0cd0f00c46db30855a8c4aabae27eb0ac8', 'https://github.com/simonh1000/angular-http-server/pull/21', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3713'}
| null |
GHSA
|
GHSA-35hc-x2cw-2j4v
|
Denial of service vulnerability exists when .NET and .NET Core improperly process XML documents
|
A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents, aka ".NET and .NET Core Denial of Service Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0, Microsoft .NET Framework 4.7.2.
|
{'CVE-2018-0765'}
|
2022-04-26T19:04:54Z
|
2018-10-16T19:54:06Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'http://www.securitytracker.com/id/1040851', 'https://github.com/advisories/GHSA-35hc-x2cw-2j4v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0765', 'http://www.securityfocus.com/bid/104060', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765'}
| null |
GHSA
|
GHSA-qfc5-mcwq-26q8
|
Double Free in psutil
|
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
|
{'CVE-2019-18874'}
|
2021-08-19T22:13:44Z
|
2020-03-12T17:02:50Z
|
HIGH
| 7.5
|
{'CWE-415'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P7QI7MOTZTFXQYU23CP3RAWXCERMOAS/', 'https://github.com/giampaolo/psutil/pull/1616', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18874', 'https://github.com/advisories/GHSA-qfc5-mcwq-26q8', 'https://usn.ubuntu.com/4204-1/', 'https://lists.debian.org/debian-lts-announce/2019/11/msg00018.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLETTJYZL2SMBUI4Q2NGBMGPDPP54SRG/', 'https://github.com/giampaolo/psutil/blob/master/HISTORY.rst#566', 'https://github.com/giampaolo/psutil/commit/7d512c8e4442a896d56505be3e78f1156f443465'}
| null |
GHSA
|
GHSA-gqvf-892r-vjm5
|
Improper Certificate Validation in Puppet
|
Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior.
|
{'CVE-2020-7942'}
|
2022-01-04T19:45:07Z
|
2021-04-13T15:42:19Z
|
MODERATE
| 6.5
|
{'CWE-295'}
|
{'https://github.com/advisories/GHSA-gqvf-892r-vjm5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7942', 'https://puppet.com/security/cve/CVE-2020-7942/'}
| null |
GHSA
|
GHSA-g8ww-46x2-2p65
|
Denial of Service in Action Dispatch
|
Impact
------
There is a possible Denial of Service vulnerability in Action Dispatch.
Carefully crafted Accept headers can cause the mime type parser in Action
Dispatch to do catastrophic backtracking in the regular expression engine.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
The following monkey patch placed in an initializer can be used to work around
the issue.
```ruby
module Mime
class Type
MIME_REGEXP = /\A(?:\*\/\*|#{MIME_NAME}\/(?:\*|#{MIME_NAME})(?>\s*#{MIME_PARAMETER}\s*)*)\z/
end
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 6-0-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.0 series
* 6-1-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at
present. Users of earlier unsupported releases are advised to upgrade as soon
as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases.
Credits
-------
Thanks to Security Curious <security...@pm.me> for reporting this!
|
{'CVE-2021-22902'}
|
2021-06-23T18:26:47Z
|
2021-05-05T19:48:21Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://groups.google.com/g/rubyonrails-security/c/_5ID_ld9u1c', 'https://github.com/rails/rails/releases/tag/v6.0.3.7', 'https://github.com/advisories/GHSA-g8ww-46x2-2p65', 'https://hackerone.com/reports/1138654', 'https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22902'}
| null |
GHSA
|
GHSA-28f4-mjfq-qrvf
|
Malicious Package in buffes-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:26:05Z
|
2020-09-03T22:18:40Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-28f4-mjfq-qrvf', 'https://www.npmjs.com/advisories/1257'}
| null |
GHSA
|
GHSA-926q-wxr6-3crq
|
Moderate severity vulnerability that affects roundup
|
Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_handler.py mishandle 404 errors.
|
{'CVE-2019-10904'}
|
2021-09-07T20:36:35Z
|
2019-04-09T19:47:14Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.debian.org/debian-lts-announce/2019/04/msg00009.html', 'http://www.openwall.com/lists/oss-security/2019/04/07/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10904', 'https://github.com/python/bugs.python.org/issues/34', 'https://www.openwall.com/lists/oss-security/2019/04/05/1', 'https://github.com/advisories/GHSA-926q-wxr6-3crq', 'https://bugs.python.org/issue36391'}
| null |
GHSA
|
GHSA-fm39-cw8h-3p63
|
Out-of-bounds Read in OpenCV
|
An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read in the function cv::predictOrdered<cv::HaarEvaluator> in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
|
{'CVE-2019-14491'}
|
2021-10-12T22:07:14Z
|
2021-10-12T22:07:14Z
|
HIGH
| 8.2
|
{'CWE-125'}
|
{'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14491', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HPFLN6QAX6SUA4XR4NMKKXX26H3TYCVQ/', 'https://github.com/advisories/GHSA-fm39-cw8h-3p63', 'https://github.com/opencv/opencv/issues/15125', 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}
| null |
GHSA
|
GHSA-qgpv-86r3-87fh
|
Cross-site Scripting in Parsedown
|
Parsedown version prior to 1.7.0 contains a Cross Site Scripting (XSS) vulnerability in `setMarkupEscaped` for escaping HTML that can result in JavaScript code execution. This attack appears to be exploitable via specially crafted markdown that allows it to side step HTML escaping by breaking AST boundaries. This vulnerability appears to have been fixed in 1.7.0 and later.
|
{'CVE-2018-1000162'}
|
2022-03-30T20:45:42Z
|
2022-03-30T18:26:22Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-qgpv-86r3-87fh', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000162', 'https://github.com/erusev/parsedown/pull/495', 'https://github.com/Roave/SecurityAdvisories/issues/44#issuecomment-368594409'}
| null |
GHSA
|
GHSA-6rjc-4pwr-3vp7
|
Cross-Site Scripting in iobroker.web
|
Versions of `iobroker.web` prior to 2.4.10 are vulnerable to Cross-Site Scripting. The package fails to escape URL parameters that may be reflected in the server response. This can be used by attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 2.4.10 or later.
|
{'CVE-2019-10771'}
|
2021-08-19T15:35:02Z
|
2019-12-02T18:14:30Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10771', 'https://snyk.io/vuln/SNYK-JS-IOBROKERWEB-534971', 'https://github.com/advisories/GHSA-6rjc-4pwr-3vp7', 'https://www.npmjs.com/advisories/1345'}
| null |
GHSA
|
GHSA-hggm-jpg3-v476
|
RSA decryption vulnerable to Bleichenbacher timing vulnerability
|
### Impact
RSA decryption was vulnerable to Bleichenbacher timing vulnerabilities, which would impact people using RSA decryption in online scenarios.
### Patches
This is fixed in cryptography 3.2. https://github.com/pyca/cryptography/commit/58494b41d6ecb0f56b7c5f05d5f5e3ca0320d494 is the resolving commit.
|
{'CVE-2020-25659'}
|
2022-04-25T21:36:49Z
|
2020-10-27T20:33:13Z
|
MODERATE
| 5.9
|
{'CWE-385'}
|
{'https://pypi.org/project/cryptography/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25659', 'https://github.com/pyca/cryptography/commit/58494b41d6ecb0f56b7c5f05d5f5e3ca0320d494', 'https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b', 'https://github.com/advisories/GHSA-hggm-jpg3-v476', 'https://github.com/pyca/cryptography/security/advisories/GHSA-hggm-jpg3-v476'}
| null |
GHSA
|
GHSA-vh7m-p724-62c2
|
Signature Malleabillity in elliptic
|
The Elliptic package before version 6.5.3 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
|
{'CVE-2020-13822'}
|
2021-09-23T17:39:59Z
|
2020-07-29T20:40:35Z
|
HIGH
| 7.7
|
{'CWE-190'}
|
{'https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4', 'https://github.com/advisories/GHSA-vh7m-p724-62c2', 'https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13822', 'https://www.npmjs.com/package/elliptic', 'https://github.com/indutny/elliptic/issues/226'}
| null |
GHSA
|
GHSA-m5pf-5894-jmx7
|
Malicious Package in sailclothjs
|
Version 1.2.6 of `sailclothjs` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-03T19:08:00Z
|
2020-09-03T19:08:00Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/1099', 'https://github.com/advisories/GHSA-m5pf-5894-jmx7'}
| null |
GHSA
|
GHSA-hwj3-m3p6-hj38
|
dom4j allows External Entities by default which might enable XXE attacks
|
dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.
|
{'CVE-2020-10683'}
|
2022-02-08T22:06:13Z
|
2020-06-05T16:13:36Z
|
CRITICAL
| 9.8
|
{'CWE-611'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-hwj3-m3p6-hj38', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/dom4j/dom4j/commits/version-2.0.3', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://usn.ubuntu.com/4575-1/', 'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/dom4j/dom4j/commit/1707bf3d898a8ada3b213acb0e3b38f16eaae73d', 'https://bugzilla.redhat.com/show_bug.cgi?id=1694235', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10683', 'https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html', 'https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8@%3Cdev.velocity.apache.org%3E', 'https://github.com/dom4j/dom4j/releases/tag/version-2.1.3', 'https://security.netapp.com/advisory/ntap-20200518-0002/', 'https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/dom4j/dom4j/issues/87', 'https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-325j-24f4-qv5x
|
Regular Expression Denial of Service in ssri
|
Version of `ssri` prior to 5.2.2 are vulnerable to regular expression denial of service (ReDoS) when using strict mode.
## Recommendation
Update to version 5.2.2 or later.
|
{'CVE-2018-7651'}
|
2021-08-31T20:21:07Z
|
2018-03-07T22:22:20Z
|
MODERATE
| 5.9
|
{'CWE-400'}
|
{'https://github.com/zkat/ssri/issues/10', 'https://github.com/zkat/ssri/commit/d0ebcdc22cb5c8f47f89716d08b3518b2485d65d', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7651', 'https://www.npmjs.com/advisories/565', 'https://github.com/advisories/GHSA-325j-24f4-qv5x', 'https://nodesecurity.io/advisories/565'}
| null |
GHSA
|
GHSA-mvrg-5c4w-7qv4
|
Cross-site Scripting in yii2cmf
|
yidashi yii2cmf 2.0 has XSS via the /search q parameter.
|
{'CVE-2018-10704'}
|
2021-06-22T15:25:22Z
|
2021-06-22T15:25:22Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/yidashi/yii2cmf', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10704', 'https://github.com/advisories/GHSA-mvrg-5c4w-7qv4', 'http://testh5shanglv.minshengec.com:1024/phpmyadmin/doc/yii2cmf_xss.htm'}
| null |
GHSA
|
GHSA-fpqv-x9hm-35j9
|
Potential XSS vulnerability in Kitodo.Presentation
|
### Impact
Kitodo.Presentation fails to properly encode URL parameters for output in HTML making it vulnerable to Cross Site Scripting (XSS). Only sites using the `ListView`, `Navigation` or `PageView` plugins are affected.
It also includes jQuery 3.4.1 which is known to be vulnerable against Cross Site Scripting, although there is currently no known way to exploit this in Kitodo.Presentation.
### Patches
An updated version of Kitodo.Presentation is available on [GitHub](https://github.com/kitodo/kitodo-presentation/releases/tag/v3.1.2), [Packagist](https://packagist.org/packages/kitodo/presentation#v3.1.2) and in the [TYPO3 Extension Repository](https://extensions.typo3.org/extension/dlf/). Users are advised to update as soon as possible.
The issue was also fixed in release 2.3.1 of the 2.x branch, although it is generally not recommended to run this branch since it depends on an outdated TYPO3 version.
### References
TYPO3 Security Advisory [TYPO3-EXT-SA-2020-015](https://typo3.org/security/advisory/typo3-ext-sa-2020-015)
jQuery Security Advisory [GHSA-gxr4-xjj5-5px2](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2)
Open Bug Bounty Report [OBB-1219978](https://www.openbugbounty.org/reports/1219978/)
### Contact
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/kitodo/kitodo-presentation/issues/new/choose)
* Email us at [security@kitodo.org](mailto:security@kitodo.org)
|
{'CVE-2020-16095'}
|
2022-04-19T19:02:32Z
|
2020-07-31T17:39:22Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-16095', 'https://typo3.org/help/security-advisories', 'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c', 'https://github.com/advisories/GHSA-fpqv-x9hm-35j9', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-015', 'https://github.com/kitodo/kitodo-presentation/security/advisories/GHSA-fpqv-x9hm-35j9'}
| null |
GHSA
|
GHSA-f93j-hmcr-jcwh
|
Data Injection Vulnerability in moped Rubygem
|
The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string.
|
{'CVE-2015-4410'}
|
2021-09-23T18:56:26Z
|
2020-08-19T16:45:49Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'http://www.securityfocus.com/bid/75045', 'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24', 'https://www.securityfocus.com/bid/75045', 'https://seclists.org/oss-sec/2015/q2/653', 'http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4410', 'https://rubygems.org/gems/moped/versions', 'https://github.com/advisories/GHSA-f93j-hmcr-jcwh', 'http://www.openwall.com/lists/oss-security/2015/06/06/3', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/moped/CVE-2015-4410.yml', 'https://bugzilla.redhat.com/show_bug.cgi?id=1229757', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html'}
| null |
GHSA
|
GHSA-jwf9-w5xm-f437
|
Heap OOB in TFLite's `Gather*` implementations
|
### Impact
TFLite's [`GatherNd` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather_nd.cc#L124) does not support negative indices but there are no checks for this situation.
Hence, an attacker can read arbitrary data from the heap by carefully crafting a model with negative values in `indices`.
Similar issue exists in [`Gather` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather.cc).
```python
import tensorflow as tf
import numpy as np
tf.compat.v1.disable_v2_behavior()
params = tf.compat.v1.placeholder(name="params", dtype=tf.int64, shape=(1,))
indices = tf.compat.v1.placeholder(name="indices", dtype=tf.int64, shape=())
out = tf.gather(params, indices, name='out')
with tf.compat.v1.Session() as sess:
converter = tf.compat.v1.lite.TFLiteConverter.from_session(sess, [params, indices], [out])
tflite_model = converter.convert()
interpreter = tf.lite.Interpreter(model_content=tflite_model)
interpreter.allocate_tensors()
input_details = interpreter.get_input_details()
output_details = interpreter.get_output_details()
params_data = np.reshape(np.array([1], dtype=np.int64), newshape=(1,))
indices_data = np.reshape(np.array(-10, dtype=np.int64), newshape=())
interpreter.set_tensor(input_details[0]['index'], params_data)
interpreter.set_tensor(input_details[1]['index'], indices_data)
interpreter.invoke()
```
### Patches
We have patched the issue in GitHub commits [bb6a0383ed553c286f87ca88c207f6774d5c4a8f](https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f) and [eb921122119a6b6e470ee98b89e65d721663179d](https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security.
|
{'CVE-2021-37687'}
|
2021-08-25T14:40:02Z
|
2021-08-25T14:40:02Z
|
MODERATE
| 5.5
|
{'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f', 'https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37687', 'https://github.com/advisories/GHSA-jwf9-w5xm-f437'}
| null |
GHSA
|
GHSA-9rpc-5v9q-5r7f
|
Incomplete validation in `SparseReshape`
|
### Impact
Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure.
```python
import tensorflow as tf
input_indices = tf.constant(41, shape=[1, 1], dtype=tf.int64)
input_shape = tf.zeros([11], dtype=tf.int64)
new_shape = tf.zeros([1], dtype=tf.int64)
tf.raw_ops.SparseReshape(input_indices=input_indices,
input_shape=input_shape,
new_shape=new_shape)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/e87b51ce05c3eb172065a6ea5f48415854223285/tensorflow/core/kernels/sparse_reshape_op.cc#L40) has no validation that the input arguments specify a valid sparse tensor.
### Patches
We have patched the issue in GitHub commit [1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6](https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are the only affected versions.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29611'}
|
2021-05-21T14:28:35Z
|
2021-05-21T14:28:35Z
|
LOW
| 3.6
|
{'CWE-665', 'CWE-20'}
|
{'https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6', 'https://github.com/advisories/GHSA-9rpc-5v9q-5r7f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9rpc-5v9q-5r7f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29611'}
| null |
GHSA
|
GHSA-2x6r-7427-95cm
|
Deserialization of Untrusted Data in Apache Camel RabbitMQ
|
Apache Camel RabbitMQ enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0.
|
{'CVE-2020-11972'}
|
2021-05-21T19:20:47Z
|
2021-05-21T19:20:47Z
|
HIGH
| 9.8
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.openwall.com/lists/oss-security/2020/05/14/10', 'https://github.com/advisories/GHSA-2x6r-7427-95cm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11972', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://camel.apache.org/security/CVE-2020-11972.html', 'http://www.openwall.com/lists/oss-security/2020/05/14/8'}
| null |
GHSA
|
GHSA-f32v-vf79-p29q
|
Improper authorization in Keycloak
|
Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform. It was possible to add users to the master realm even though no respective permission was granted.
|
{'CVE-2022-1466'}
|
2022-04-28T21:03:14Z
|
2022-04-27T00:00:19Z
|
HIGH
| 0
|
{'CWE-863'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=2050228', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1466', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-076.txt', 'https://github.com/advisories/GHSA-f32v-vf79-p29q', 'https://www.syss.de/pentest-blog/fehlerhafte-autorisierung-bei-red-hat-single-sign-on-750ga-syss-2021-076'}
| null |
GHSA
|
GHSA-pqjj-6f5q-gqph
|
Denial of Service in OpenCV
|
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a denial of service (memory consumption) issue, as demonstrated by the 10-opencv-dos-memory-exhaust test case.
|
{'CVE-2017-12602'}
|
2021-10-12T22:01:34Z
|
2021-10-12T22:01:34Z
|
HIGH
| 7.5
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2017-12602', 'https://github.com/advisories/GHSA-pqjj-6f5q-gqph', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9311', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}
| null |
GHSA
|
GHSA-qcxh-w3j9-58qr
|
Denial of Service in Tomcat
|
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
|
{'CVE-2019-0199'}
|
2021-08-30T14:24:32Z
|
2020-06-15T18:51:09Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://lists.apache.org/thread.html/ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef@%3Cannounce.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50@%3Cdev.tomcat.apache.org%3E', 'https://support.f5.com/csp/article/K17321505', 'https://github.com/advisories/GHSA-qcxh-w3j9-58qr', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0199', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html', 'https://lists.apache.org/thread.html/e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190419-0001/', 'https://lists.apache.org/thread.html/e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995@%3Cannounce.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600@%3Cannounce.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00013.html', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/', 'https://access.redhat.com/errata/RHSA-2019:3931', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://seclists.org/bugtraq/2019/Dec/43', 'http://www.securityfocus.com/bid/107674'}
| null |
GHSA
|
GHSA-gwmc-6795-qghj
|
HashiCorp Nomad Artifact Download Race Condition
|
HashiCorp Nomad and Nomad Enterprise 0.3.0 through 1.0.17, 1.1.11, and 1.2.5 artifact download functionality has a race condition such that the Nomad client agent could download the wrong artifact into the wrong destination. This issue is fixed in 1.0.18, 1.1.12, and 1.2.6.
|
{'CVE-2022-24686'}
|
2022-03-28T15:24:37Z
|
2022-02-15T00:02:46Z
|
MODERATE
| 5.9
|
{'CWE-362'}
|
{'https://github.com/advisories/GHSA-gwmc-6795-qghj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24686', 'https://discuss.hashicorp.com/t/hcsec-2022-01-nomad-artifact-download-race-condition/35559', 'https://github.com/hashicorp/nomad/releases/tag/v1.2.6', 'https://github.com/hashicorp/nomad/issues/12036', 'https://discuss.hashicorp.com', 'https://security.netapp.com/advisory/ntap-20220318-0008/'}
| null |
GHSA
|
GHSA-7frr-c83r-fm22
|
Malicious Package in buffez-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:26:37Z
|
2020-09-03T22:20:49Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-7frr-c83r-fm22', 'https://www.npmjs.com/advisories/1259'}
| null |
GHSA
|
GHSA-g8wf-rcg3-qw4q
|
Directory Traversal in tinyserver2
|
Affected versions of `tinyserver2` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
Update to v0.6.0 or later.
|
{'CVE-2017-16085'}
|
2021-01-08T18:48:29Z
|
2018-07-24T15:01:34Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tinyserver2', 'https://nodesecurity.io/advisories/371', 'https://www.npmjs.com/advisories/371', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16085', 'https://github.com/advisories/GHSA-g8wf-rcg3-qw4q'}
| null |
GHSA
|
GHSA-v659-54cx-g4qr
|
Prototype Pollution in deep-override
|
Prototype pollution vulnerability in 'deep-override' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25941'}
|
2021-05-25T20:44:53Z
|
2021-05-17T20:57:25Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/ASaiAnudeep/deep-override/commit/2aced17651fb684959a6e04b1465a8329b3d5268', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25941', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25941', 'https://github.com/advisories/GHSA-v659-54cx-g4qr'}
| null |
GHSA
|
GHSA-q5mq-6fjg-4mw8
|
SQL Injection in thinkjs
|
SQL injection vulnerability in the model.increment and model.decrement function in ThinkJS 3.2.10 allows remote attackers to execute arbitrary SQL commands via the step parameter.
|
{'CVE-2020-21176'}
|
2021-11-19T20:42:32Z
|
2021-11-19T20:42:32Z
|
HIGH
| 9.8
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-21176', 'https://blog.jiguang.xyz/posts/thinkjs-sql-injection/', 'https://github.com/thinkjs/thinkjs', 'https://github.com/advisories/GHSA-q5mq-6fjg-4mw8'}
| null |
GHSA
|
GHSA-9xh4-23q4-v6wr
|
Heap buffer overflow and undefined behavior in `FusedBatchNorm`
|
### Impact
The implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow:
```python
import tensorflow as tf
x = tf.zeros([10, 10, 10, 6], dtype=tf.float32)
scale = tf.constant([0.0], shape=[1], dtype=tf.float32)
offset = tf.constant([0.0], shape=[1], dtype=tf.float32)
mean = tf.constant([0.0], shape=[1], dtype=tf.float32)
variance = tf.constant([0.0], shape=[1], dtype=tf.float32)
epsilon = 0.0
exponential_avg_factor = 0.0
data_format = "NHWC"
is_training = False
tf.raw_ops.FusedBatchNorm(
x=x, scale=scale, offset=offset, mean=mean, variance=variance,
epsilon=epsilon, exponential_avg_factor=exponential_avg_factor,
data_format=data_format, is_training=is_training)
```
If the tensors are empty, the same implementation can trigger undefined behavior by dereferencing null pointers:
```python
import tensorflow as tf
import numpy as np
x = tf.zeros([10, 10, 10, 1], dtype=tf.float32)
scale = tf.constant([], shape=[0], dtype=tf.float32)
offset = tf.constant([], shape=[0], dtype=tf.float32)
mean = tf.constant([], shape=[0], dtype=tf.float32)
variance = tf.constant([], shape=[0], dtype=tf.float32)
epsilon = 0.0
exponential_avg_factor = 0.0
data_format = "NHWC"
is_training = False
tf.raw_ops.FusedBatchNorm(
x=x, scale=scale, offset=offset, mean=mean, variance=variance,
epsilon=epsilon, exponential_avg_factor=exponential_avg_factor,
data_format=data_format, is_training=is_training)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/57d86e0db5d1365f19adcce848dfc1bf89fdd4c7/tensorflow/core/kernels/fused_batch_norm_op.cc) fails to validate that `scale`, `offset`, `mean` and `variance` (the last two only when required) all have the same number of elements as the number of channels of `x`. This results in heap out of bounds reads when the buffers backing these tensors are indexed past their boundary.
If the tensors are empty, the validation mentioned in the above paragraph would also trigger and prevent the undefined behavior.
### Patches
We have patched the issue in GitHub commit [6972f9dfe325636b3db4e0bc517ee22a159365c0](https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29583'}
|
2022-04-26T18:09:37Z
|
2021-05-21T14:26:35Z
|
LOW
| 2.5
|
{'CWE-476', 'CWE-787', 'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29583', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9xh4-23q4-v6wr', 'https://github.com/advisories/GHSA-9xh4-23q4-v6wr'}
| null |
GHSA
|
GHSA-v528-7hrm-frqp
|
Improper Check for Unusual or Exceptional Conditions in json-smart
|
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
|
{'CVE-2021-27568'}
|
2022-04-26T20:59:54Z
|
2021-06-16T18:03:47Z
|
CRITICAL
| 9.1
|
{'CWE-754'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/netplex/json-smart-v2/issues/60', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/netplex/json-smart-v2/issues/62', 'https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396@%3Ccommits.druid.apache.org%3E', 'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/netplex/json-smart-v1/issues/7', 'https://github.com/advisories/GHSA-v528-7hrm-frqp', 'https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27568', 'https://github.com/netplex/json-smart-v2/pull/72', 'https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.