ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-g5v4-5x39-vwhx
|
Zip slip directory exploit in github.com/deislabs/oras
|
### Impact
The directory support (#55) allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links.
A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`.
Precisely, the following users of the affected versions are impacted
- `oras` CLI users who runs `oras pull`.
- Go programs, which invokes `github.com/deislabs/oras/pkg/content.FileStore`.
### Patches
The problem has been patched by the PR linked with this advisory. Users should upgrade their `oras` CLI and packages to `0.9.0`.
### Workarounds
For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider.
For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider.
### References
- [Zip Slip](https://github.com/snyk/zip-slip-vulnerability)
### For more information
If you have any questions or comments about this advisory:
* Open an issue on the [GitHub repo](https://github.com/deislabs/oras)
* Email the [list of maintainers](https://github.com/deislabs/oras/blob/main/MAINTAINERS)
|
{'CVE-2021-21272'}
|
2022-04-19T19:02:44Z
|
2022-02-15T00:32:04Z
|
HIGH
| 6.5
|
{'CWE-29', 'CWE-22'}
|
{'https://pkg.go.dev/github.com/deislabs/oras/pkg/oras', 'https://github.com/deislabs/oras/releases/tag/v0.9.0', 'https://github.com/advisories/GHSA-g5v4-5x39-vwhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21272', 'https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx', 'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e'}
| null |
GHSA
|
GHSA-7fqj-cg79-f2pv
|
High severity vulnerability that affects thumbshooter
|
lib/thumbshooter.rb in the Thumbshooter 0.1.5 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
|
{'CVE-2013-1898'}
|
2021-09-02T21:17:42Z
|
2017-10-24T18:33:37Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-7fqj-cg79-f2pv', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1898', 'http://vapid.dhs.org/advisories/thumbshooter-ruby-gem-remoteexec.html', 'http://www.openwall.com/lists/oss-security/2013/03/26/13', 'http://www.openwall.com/lists/oss-security/2013/03/26/3', 'http://osvdb.org/91839', 'http://seclists.org/fulldisclosure/2013/Mar/218'}
| null |
GHSA
|
GHSA-rxfq-3vpc-vv72
|
Files or Directories Accessible to External Parties in Adminer
|
Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database.
|
{'CVE-2021-43008'}
|
2022-04-22T20:33:37Z
|
2022-04-06T00:01:33Z
|
HIGH
| 7.5
|
{'CWE-552'}
|
{'https://sansec.io/research/adminer-4.6.2-file-disclosure-vulnerability', 'https://github.com/vrana/adminer/releases/tag/v4.6.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43008', 'https://github.com/advisories/GHSA-rxfq-3vpc-vv72', 'https://www.adminer.org/', 'https://podalirius.net/en/cves/2021-43008/'}
| null |
GHSA
|
GHSA-46c5-pfj8-fv65
|
Improperly checked metadata on tools/armour itemstacks received from the client
|
### Impact
Due to a workaround applied in 1.13, an attacker may send a negative damage/meta value in a tool or armour item's NBT, which `TypeConverter` then blindly uses as if it was valid without being checked.
When this invalid metadata value reaches `Durable->setDamage()`, an exception is thrown because the metadata is not within the expected range for damage values.
This can be reproduced with either a too-large damage value, or a negative one.
### Patches
c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1
### Workarounds
In theory this can be checked by plugins using a custom `TypeConverter`, but this is likely to be very cumbersome.
### For more information
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null |
2022-03-22T18:46:09Z
|
2022-03-18T22:36:03Z
|
HIGH
| 7.5
|
{'CWE-704'}
|
{'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-46c5-pfj8-fv65', 'https://github.com/advisories/GHSA-46c5-pfj8-fv65'}
| null |
GHSA
|
GHSA-p2xq-vcm7-xjj6
|
Low severity vulnerability that affects org.apache.mesos:mesos
|
When parsing a JSON payload with deeply nested JSON structures, the parser in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.1, 1.6.0 to 1.6.1, and 1.7.0 might overflow the stack due to unbounded recursion. A malicious actor can therefore cause a denial of service of Mesos masters rendering the Mesos-controlled cluster inoperable.
|
{'CVE-2018-11793'}
|
2021-09-15T21:18:50Z
|
2019-03-06T17:36:22Z
|
HIGH
| 7.5
|
{'CWE-119'}
|
{'http://www.securityfocus.com/bid/107281', 'https://github.com/advisories/GHSA-p2xq-vcm7-xjj6', 'https://lists.apache.org/thread.html/9be975c53e5ad612c7e0af39f5b88837fbfbc32108e587d3d8499844@%3Cdev.mesos.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11793'}
| null |
GHSA
|
GHSA-8h55-49jm-739x
|
Directory Traversal in easyquick
|
Affected versions of `easyquick` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16109'}
|
2021-01-08T19:09:36Z
|
2018-08-29T23:21:46Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/373', 'https://github.com/advisories/GHSA-8h55-49jm-739x', 'https://nodesecurity.io/advisories/373', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/easyquick', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16109'}
| null |
GHSA
|
GHSA-gpg2-7r7j-4pm9
|
Malicious Package in buffer-xob
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:05:06Z
|
2020-09-03T22:09:56Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-gpg2-7r7j-4pm9', 'https://www.npmjs.com/advisories/1249'}
| null |
GHSA
|
GHSA-f2rp-j8hv-g5gx
|
Cross-site scripting in imgURL
|
imgURL 2.31 allows XSS via an X-Forwarded-For HTTP header.
|
{'CVE-2021-38713'}
|
2021-08-30T16:25:26Z
|
2021-08-30T16:25:26Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/helloxz/imgurl/issues/72', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38713', 'https://github.com/advisories/GHSA-f2rp-j8hv-g5gx'}
| null |
GHSA
|
GHSA-7fcj-pq9j-wh2r
|
Local Privilege Escalation in PyInstaller
|
### Impact
Local Privilege Escalation in all Windows software frozen by PyInstaller in "onefile" mode.
The vulnerability is present only on Windows and in this particular case: If a **software frozen by PyInstaller in "onefile" mode** is launched by a (privileged) user who has **his/her "TempPath" resolving to a world writable directory**. This is the case e.g. if the software is launched as a service or as a scheduled task using a system account (in which case TempPath will default to C:\Windows\Temp).
In order to be exploitable the software has to be (re)started after the attacker has launched the exploit program. So for a service launched at startup, a service restart is needed (e.g. after a crash or an upgrade).
While PyInstaller itself was not vulnerable, all Windows software frozen by PyInstaller in "onefile" mode is vulnerable.
CVSSv3 score 7.0 (High)
CVSSv3 vector CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected
- all Windows software frozen by PyInstaller in "onefile" mode
No affected
- PyInstaller itself (except if frozen by PyInstaller in "onefile" mode on Windows)
- software frozen in "one*dir*" mode
- other platforms (GNU/Linux, OS X, BSD, etc.)
### Patches
The problem is patched in commits 42a67148b3bdf9211fda8499fdc5b63acdd7e6cc (fixed code) and be948cf0954707671aa499da17b10c86b6fa5e5c (recompiled bootloaders). Users should upgrade to PyInstaller version 3.6 and rebuild their software.
### Workarounds
There is no known workaround. Users using PyInstaller to freeze their Windows software using "onefile" mode should upgrade PyInstaller and rebuild their software.
### Credits
This vulnerability was discovered and reported by Farid AYOUJIL (@faridtsl), David HA, Florent LE NIGER and Yann GASCUEL (@lnv42) from Alter Solutions (@AlterSolutions) and fixed in collaboration with
Hartmut Goebel (@htgoebel, maintainer of PyInstaller).
### Funding Development
PyInstaller is in urgent need of funding to make future security fixes happen, see <https://github.com/pyinstaller/pyinstaller/issues/4404> for details.
|
{'CVE-2019-16784'}
|
2022-04-19T19:02:24Z
|
2020-01-16T22:18:27Z
|
HIGH
| 7
|
{'CWE-250'}
|
{'https://github.com/pyinstaller/pyinstaller/commit/be948cf0954707671aa499da17b10c86b6fa5e5c', 'https://github.com/pyinstaller/pyinstaller/commit/42a67148b3bdf9211fda8499fdc5b63acdd7e6cc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16784', 'https://github.com/pyinstaller/pyinstaller/security/advisories/GHSA-7fcj-pq9j-wh2r', 'https://github.com/advisories/GHSA-7fcj-pq9j-wh2r'}
| null |
GHSA
|
GHSA-49r2-73m6-pp8f
|
Directory traversal in development mode handler in Vaadin 14 and 15-17
|
Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.
- https://vaadin.com/security/cve-2020-36321
|
{'CVE-2020-36321'}
|
2021-04-26T20:08:13Z
|
2021-04-19T14:51:58Z
|
MODERATE
| 5.9
|
{'CWE-20', 'CWE-22'}
|
{'https://github.com/vaadin/flow/security/advisories/GHSA-49r2-73m6-pp8f', 'https://github.com/vaadin/flow/pull/9392', 'https://vaadin.com/security/cve-2020-36321', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36321', 'https://github.com/advisories/GHSA-49r2-73m6-pp8f'}
| null |
GHSA
|
GHSA-h3cw-g4mq-c5x2
|
Code Injection in jackson-databind
|
This project contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor. FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).
|
{'CVE-2020-24616'}
|
2022-04-22T18:19:51Z
|
2021-12-09T19:14:51Z
|
HIGH
| 8.1
|
{'CWE-94', 'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24616', 'https://github.com/advisories/GHSA-h3cw-g4mq-c5x2', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2814', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-86qr-9vqc-pgc6
|
Code execution in Spring Integration
|
Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the "deserialization gadgets" exploit when provided data contains malicious code for execution during deserialization. In order to protect against this type of attack, Kryo can be configured to require a set of trusted classes for (de)serialization. Spring Integration should be proactive against blocking unknown "deserialization gadgets" when configuring Kryo in code.
|
{'CVE-2020-5413'}
|
2022-04-25T23:06:11Z
|
2020-08-05T14:53:06Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-86qr-9vqc-pgc6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5413', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://tanzu.vmware.com/security/cve-2020-5413', 'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-hf5h-hh56-3vrg
|
Denial of Service in uws
|
Affected versions of `uws` do not properly handle large websocket messages when `permessage-deflate` is enabled, which may result in a denial of service condition.
If `uws` recieves a 256Mb websocket message when `permessage-deflate` is enabled, the server will compress the message prior to executing the length check, and subsequently extract the message prior to processing. This can result in a situation where an excessively large websocket message passes the length checks, yet still gets cast from a Buffer to a string, which will exceed v8's maximum string size and crash the process.
## Recommendation
Update to version 0.10.9 or later.
Alternatively, disable `permessage-deflate`.
|
{'CVE-2016-10544'}
|
2021-01-08T21:17:01Z
|
2020-09-01T16:02:29Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://nodesecurity.io/advisories/149', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10544', 'https://www.npmjs.com/advisories/149', 'https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9', 'https://github.com/advisories/GHSA-hf5h-hh56-3vrg'}
| null |
GHSA
|
GHSA-r9c2-cr39-c8g6
|
Moderate severity vulnerability that affects rails-html-sanitizer
|
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.
|
{'CVE-2015-7579'}
|
2021-09-17T14:45:38Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/12', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579', 'https://github.com/advisories/GHSA-r9c2-cr39-c8g6', 'https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f', 'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/OU9ugTZcbjc/uksRkSxZEgAJ'}
| null |
GHSA
|
GHSA-fr58-2xhv-qp3w
|
Denial of Service in OpenCV
|
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a denial of service (CPU consumption) issue, as demonstrated by the 11-opencv-dos-cpu-exhaust test case.
|
{'CVE-2017-12600'}
|
2021-10-12T22:01:16Z
|
2021-10-12T22:01:16Z
|
HIGH
| 7.5
| null |
{'https://github.com/opencv/opencv-python/releases/tag/9', 'https://github.com/advisories/GHSA-fr58-2xhv-qp3w', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12600', 'https://github.com/opencv/opencv-python/releases/tag/11', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9311'}
| null |
GHSA
|
GHSA-433w-mm6h-rv9p
|
Auth bypass in SAML provider
|
### Impact
The following vulnerabilities have been disclosed, which impact users leveraging the SAML auth provider:
- [`goxmldsig` - Signature Validation Bypass](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7)
- [`gosaml2` - Authentication Bypass](https://github.com/russellhaering/gosaml2/security/advisories/GHSA-xhqq-x44f-9fgg)
### Patches
[Patch available](https://github.com/netlify/gotrue/pull/274)
Please upgrade to v1.0.0 or commit hash `a2b4dd6bc4ef7562d1df044098b303f564eefa90`
### Workarounds
No known workarounds.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [gotrue](https://github.com/netlify/gotrue/issues)
* Email us at [security@netlify.com](mailto:security@netlify.com)
| null |
2022-04-19T19:02:42Z
|
2021-06-23T17:29:06Z
|
CRITICAL
| 0
| null |
{'https://github.com/netlify/gotrue/security/advisories/GHSA-433w-mm6h-rv9p', 'https://github.com/advisories/GHSA-433w-mm6h-rv9p'}
| null |
GHSA
|
GHSA-p8pq-r894-fm8f
|
XStream is vulnerable to an Arbitrary Code Execution attack
|
### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39146](https://x-stream.github.io/CVE-2021-39146.html).
### Credits
Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-39146'}
|
2022-04-22T15:43:21Z
|
2021-08-25T14:47:57Z
|
HIGH
| 8.5
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-p8pq-r894-fm8f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39146', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://x-stream.github.io/CVE-2021-39146.html', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-2jpm-827p-j44g
|
Stored XSS in TimelineJS3
|
### Impact
TimelineJS renders some user data as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file.
Most TimelineJS users configure their timeline with a Google Sheets document. Those users are exposed to this vulnerability if they grant write access to the document to a malicious inside attacker, if the access of a trusted user is compromised, or if they grant public write access to the document.
Some TimelineJS users configure their timeline with a JSON document. Those users are exposed to this vulnerability if they grant write access to the document to a malicious inside attacker, if the access of a trusted user is compromised, or if write access to the system hosting that document is otherwise compromised.
Although the vulnerability has a [CVSS v3.1 base score of 7.2](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), this vulnerability has a severity of Moderate due to the likeliness of exploitation.
### Patches
Version 3.7.0 of TimelineJS addresses this in two ways.
1. For content which is intended to support limited HTML markup for styling and linking, that content is "sanitized" before being added to the DOM.
1. For content intended for simple text display, all markup is stripped.
Very few users of TimelineJS actually install the TimelineJS code on their server. Most users publish a timeline using a URL hosted on systems we control. The fix for this issue is published to our system such that **those users will automatically begin using the new code**. The only exception would be users who have deliberately edited the embed URL to "pin" their timeline to an earlier version of the code.
Some users of TimelineJS use it as a part of a [wordpress plugin](https://wordpress.org/plugins/knight-lab-timelinejs/). Version 3.7.0.0 of that plugin and newer integrate the updated code. Users are encouraged to update the plugin rather than manually update the embedded version of TimelineJS.
### Workarounds
To exploit this vulnerability, the attacker must have write access to the data source for the Timeline or the server which embeds the timeline.
Thus, the only workaround is appropriate attention to securing write access to the Google Sheet or JSON file which serves as the data source.
### References
For more about the release of TimelineJS which addresses this vulnerability, see the [Knight Lab website](https://knightlab.northwestern.edu/2020/07/09/timelinejs-update/index.html).
A technical write-up of this vulnerability is available [here](https://zanderwork.com/blog/cve-2020-15092/).
### Acknowledgements
This vulnerability was discovered by Zander Work ([@captainGeech42](https://twitter.com/captainGeech42)) of Oregon State University.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub](https://github.com/NUKnightLab/TimelineJS3/issues)
* File a support request in our [helpdesk system](https://knightlab.zendesk.com/hc/en-us/requests/new)
|
{'CVE-2020-15092'}
|
2022-04-19T19:02:29Z
|
2020-07-09T18:28:07Z
|
HIGH
| 7.2
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-2jpm-827p-j44g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15092', 'https://knightlab.northwestern.edu/posts/', 'https://knightlab.northwestern.edu/2020/07/09/timelinejs-update/index.html', 'https://github.com/NUKnightLab/TimelineJS3/security/advisories/GHSA-2jpm-827p-j44g'}
| null |
GHSA
|
GHSA-c9f4-xj24-8jqx
|
Regular Expression Denial of Service in uglify-js
|
Versions of `uglify-js` prior to 2.6.0 are affected by a regular expression denial of service vulnerability when malicious inputs are passed into the `parse()` method.
### Proof of Concept
```
var u = require('uglify-js');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
u.parse("var a = " + genstr(process.argv[2], "1") + ".1ee7;");
```
### Results
```
$ time node test.js 10000
real 0m1.091s
user 0m1.047s
sys 0m0.039s
$ time node test.js 80000
real 0m6.486s
user 0m6.229s
sys 0m0.094s
```
## Recommendation
Update to version 2.6.0 or later.
|
{'CVE-2015-8858'}
|
2021-09-08T21:59:09Z
|
2017-10-24T18:33:36Z
|
HIGH
| 7.5
| null |
{'https://github.com/advisories/GHSA-c9f4-xj24-8jqx', 'https://www.npmjs.com/advisories/48', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8858', 'https://nodesecurity.io/advisories/48', 'http://www.securityfocus.com/bid/96409', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
GHSA
|
GHSA-mmhj-4w6j-76h7
|
Misuse of `Reference` and other transferable APIs may lead to access to nodejs isolate
|
Versions of `isolated-vm` before v4.0.0, and especially before v3.0.0, have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate.
`Reference` objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a `Reference` instance to an attacker they would be able to use it to acquire a `Reference` to the nodejs context's `Function` object.
Similar application-specific attacks could be possible by modifying the local prototype of other API objects.
Access to `NativeModule` objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API this would allow for arbitrary code execution.
To address these issues the following changes were made in v4.0.0:
- Documentation was updated with more explicit guidelines on building secure applications.
- `Reference` instances will no longer follow prototype chains by default, nor will they invoke accessors or proxies.
- All `isolated-vm` API prototypes are now immutable.
- `NativeModule` constructor may only be invoked from a nodejs isolate.
|
{'CVE-2021-21413'}
|
2022-04-19T19:02:46Z
|
2021-04-06T17:22:55Z
|
HIGH
| 8
|
{'CWE-913'}
|
{'https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15', 'https://github.com/laverdet/isolated-vm/security/advisories/GHSA-mmhj-4w6j-76h7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21413', 'https://github.com/laverdet/isolated-vm/blob/main/CHANGELOG.md#v400', 'https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704', 'https://github.com/advisories/GHSA-mmhj-4w6j-76h7'}
| null |
GHSA
|
GHSA-vhxc-8jjq-859j
|
Moderate severity vulnerability that affects org.apache.ranger:ranger
|
In Apache Ranger before 0.6.2, users with "keyadmin" role should not be allowed to change password for users with "admin" role.
|
{'CVE-2016-6815'}
|
2021-09-20T22:05:45Z
|
2018-10-17T17:21:44Z
|
MODERATE
| 6.5
| null |
{'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://github.com/advisories/GHSA-vhxc-8jjq-859j', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6815', 'http://www.securityfocus.com/bid/94221'}
| null |
GHSA
|
GHSA-3p32-j457-pg5x
|
Query Binding Exploitation
|
### Description
Laravel versions <6.20.12, <7.30.3 & <8.22.1 contain a query binding exploitation.
If a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results.
This vulnerability was discovered by Tim Groenevelt (tim.g@foodbyus.com).
### References
- https://github.com/laravel/framework/pull/35865
|
{'CVE-2021-21263'}
|
2021-03-29T17:41:17Z
|
2021-01-19T19:36:51Z
|
HIGH
| 7.2
|
{'CWE-74'}
|
{'https://github.com/laravel/framework/security/advisories/GHSA-3p32-j457-pg5x', 'https://blog.laravel.com/security-laravel-62011-7302-8221-released', 'https://github.com/laravel/framework/pull/35865', 'https://packagist.org/packages/illuminate/database', 'https://github.com/advisories/GHSA-3p32-j457-pg5x', 'https://packagist.org/packages/laravel/framework', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21263'}
| null |
GHSA
|
GHSA-2hfj-cxw7-g45p
|
Unsafe inline XSS in pasting DOM element into chat
|
### Impact
Inline scripts are executed when Javascript is parsed via a paste action.
1. Open https://watch.owncast.online/
2. Copy and then paste `<img src=null onerror=alert('hello')>` into the
chat field.
3. An alert should pop up.
### Patches
```
⋮ 13 │ // Content security policy
⋮ 14 │ csp := []string{
⋮ 15 │ "script-src 'self' 'sha256-2HPCfJIJHnY0NrRDPTOdC7AOSJIcQyNxzUuut3TsYRY='",
⋮ 16 │ "worker-src 'self' blob:", // No single quotes around blob:
⋮ 17 │ }
```
Will be patched in 0.0.9 by blocking `unsafe-inline` Content Security Policy and specifying the `script-src`. The `worker-src` is required to be set to `blob` for the video player.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [owncast/owncast](https://github.com/owncast/owncast/issues)
* Email us at [gabek@real-ity.com](mailto:gabek@real-ity.com)
|
{'CVE-2021-39183'}
|
2022-04-19T19:03:06Z
|
2021-12-14T21:48:16Z
|
HIGH
| 8.2
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39183', 'https://github.com/owncast/owncast/security/advisories/GHSA-2hfj-cxw7-g45p', 'https://github.com/advisories/GHSA-2hfj-cxw7-g45p'}
| null |
GHSA
|
GHSA-p92x-r36w-9395
|
Type confusion in mpath
|
This affects the package mpath before 0.8.4. A type confusion vulnerability can lead to a bypass of CVE-2018-16490. In particular, the condition ignoreProperties.indexOf(parts[i]) !== -1 returns -1 if parts[i] is ['__proto__']. This is because the method that has been called if the input is an array is Array.prototype.indexOf() and not String.prototype.indexOf(). They behave differently depending on the type of the input.
|
{'CVE-2021-23438'}
|
2021-09-13T20:27:08Z
|
2021-09-02T22:02:25Z
|
CRITICAL
| 5.6
|
{'CWE-843'}
|
{'https://github.com/advisories/GHSA-p92x-r36w-9395', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579548', 'https://snyk.io/vuln/SNYK-JS-MPATH-1577289', 'https://github.com/aheckmann/mpath/commit/89402d2880d4ea3518480a8c9847c541f2d824fc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23438'}
| null |
GHSA
|
GHSA-gqfv-g9f6-3v3m
|
Directory Traversal in serveryaozeyan
|
Affected versions of `serveryaozeyan` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16096'}
|
2021-01-14T15:54:43Z
|
2020-09-01T16:50:23Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/355', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryaozeyan', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16096', 'https://github.com/advisories/GHSA-gqfv-g9f6-3v3m', 'https://www.npmjs.com/advisories/355'}
| null |
GHSA
|
GHSA-q863-cchm-c6c6
|
SQL Injection in Fork CMS
|
Fork CMS contains a SQL injection vulnerability in versions prior to version 5.11.1. When deleting submissions which belong to a formular (made with module `FormBuilder`), the parameter `id[]` is vulnerable to SQL injection.
|
{'CVE-2022-0153'}
|
2022-03-30T20:34:44Z
|
2022-03-25T00:00:33Z
|
HIGH
| 7.5
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0153', 'https://github.com/advisories/GHSA-q863-cchm-c6c6', 'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608', 'https://huntr.dev/bounties/841503dd-311c-470a-a8ec-d4579b3274eb'}
| null |
GHSA
|
GHSA-xrr6-6ww3-f3qm
|
Sandbox Breakout / Arbitrary Code Execution in value-censorship
|
All versions of `value-censorship` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to validate async function constructors allowing attackers to execute arbitrary code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-09-02T21:25:58Z
|
2020-09-02T21:25:58Z
|
MODERATE
| 0
| null |
{'https://www.npmjs.com/advisories/888', 'https://github.com/advisories/GHSA-xrr6-6ww3-f3qm'}
| null |
GHSA
|
GHSA-7q44-gfvq-6g93
|
SQL Injection in Subrion CMS
|
SQL Injection vulnerability in Subrion CMS v4.2.1 in the search page if a website uses a PDO connection.
|
{'CVE-2020-18155'}
|
2021-09-08T17:27:45Z
|
2021-09-08T17:27:45Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://github.com/intelliants/subrion/issues/817', 'https://nvd.nist.gov/vuln/detail/CVE-2020-18155', 'https://github.com/advisories/GHSA-7q44-gfvq-6g93'}
| null |
GHSA
|
GHSA-c6h4-gc3f-hgjq
|
Prototype Pollution in js-data
|
All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655).
|
{'CVE-2021-23574'}
|
2022-01-13T18:28:52Z
|
2022-01-06T21:58:56Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/js-data/js-data/blob/master/dist/js-data.js%23L472', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2320790', 'https://github.com/js-data/js-data/issues/576', 'https://github.com/advisories/GHSA-c6h4-gc3f-hgjq', 'https://snyk.io/vuln/SNYK-JS-JSDATA-1584361', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2320791', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23574', 'https://github.com/js-data/js-data/issues/577'}
| null |
GHSA
|
GHSA-jg4m-q6w8-vrjp
|
High severity vulnerability that affects rgpg
|
The self.run_gpg function in lib/rgpg/gpg_helper.rb in the rgpg gem before 0.2.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
|
{'CVE-2013-4203'}
|
2021-09-14T19:42:52Z
|
2017-10-24T18:33:37Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-jg4m-q6w8-vrjp', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4203', 'http://www.openwall.com/lists/oss-security/2013/08/03/2', 'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505'}
| null |
GHSA
|
GHSA-2wj9-434x-9hvp
|
Insecure Deserialization in Backend User Settings in TYPO3 CMS
|
It has been discovered that backend user settings (in $BE_USER->uc) are vulnerable to insecure deserialization. In combination with vulnerabilities of 3rd party components this can lead to remote code execution. A valid backend user account is needed to exploit this vulnerability.
Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described.
### References
* https://typo3.org/security/advisory/typo3-core-sa-2020-005
|
{'CVE-2020-11067'}
|
2022-04-19T19:02:26Z
|
2020-05-13T23:29:04Z
|
HIGH
| 8.8
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11067', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2wj9-434x-9hvp', 'https://github.com/advisories/GHSA-2wj9-434x-9hvp'}
| null |
GHSA
|
GHSA-f64g-whxf-w8f2
|
Malicious Package in buffar-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:57:00Z
|
2020-09-03T21:44:06Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-f64g-whxf-w8f2', 'https://www.npmjs.com/advisories/1236'}
| null |
GHSA
|
GHSA-qpgw-2c72-4c89
|
Mautic users able to download any files from server using filemanager
|
### Impact
Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to.
### Patches
Update to 2.12.0 or later.
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2017-1000490'}
|
2022-04-19T19:02:45Z
|
2021-01-19T20:50:38Z
|
HIGH
| 6.5
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000490', 'https://github.com/advisories/GHSA-qpgw-2c72-4c89', 'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241', 'https://github.com/mautic/mautic/security/advisories/GHSA-qpgw-2c72-4c89', 'https://github.com/mautic/mautic/releases/tag/2.12.0'}
| null |
GHSA
|
GHSA-c2v2-7rcg-2ch7
|
Regular Expression Denial of Service in ansi2html
|
The `ansi2html` package is affected by a regular expression denial of service vulnerability when certain types of user input is passed in.
## Proof of concept
```
var ansi2html = require('ansi2html')
var start = process.hrtime();
ansi2html("[1111111111111111111111;0000000000000000000000");
console.log(process.hrtime(start));
start = process.hrtime();
ansi2html("[1111111111111111111111;00000000000000000000000");
console.log(process.hrtime(start));
start = process.hrtime();
ansi2html("[1111111111111111111111;000000000000000000000000");
console.log(process.hrtime(start));
start = process.hrtime();
ansi2html("[1111111111111111111111;0000000000000000000000000000");
console.log(process.hrtime(start));
```
Results of the above
```
00:29:53-adam_baldwin~/tmp$ node test
[ 0, 119615367 ]
[ 0, 149934565 ]
[ 0, 233325677 ]
[ 3, 46582479 ]
```
## Recommendation
At the time of this writing, February 2018, all versions of `ansi2html` remain vulnerable, and the package has not been updated for 4 years.
In order to use this package safely, it is necessary to avoid passing user input to the package, or to limit the size of the input string to a size with a parse time you find acceptable. Unfortunately, the match time grows at quite a small character count, so it is unlikely for it to both allow strings of a useful size while protecting against the denial of service attack.
In the case that user input of significant length must be parsed by ansi2html, the best mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.][available on npm](https://www.npmjs.com/search?q=ansi+html)
|
{'CVE-2015-9239'}
|
2021-01-14T15:58:09Z
|
2020-09-01T15:17:48Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/51', 'https://github.com/advisories/GHSA-c2v2-7rcg-2ch7', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9239', 'https://nodesecurity.io/advisories/51'}
| null |
GHSA
|
GHSA-r43h-gmrm-h5c9
|
Access of Uninitialized Pointer in linked-hash-map
|
An issue was discovered in the linked-hash-map crate before 0.5.3 for Rust. It creates an uninitialized NonNull pointer, which violates a non-null constraint.
|
{'CVE-2020-25573'}
|
2021-08-25T20:45:09Z
|
2021-08-25T20:45:09Z
|
CRITICAL
| 9.8
|
{'CWE-824'}
|
{'https://github.com/advisories/GHSA-r43h-gmrm-h5c9', 'https://github.com/contain-rs/linked-hash-map/pull/100', 'https://rustsec.org/advisories/RUSTSEC-2020-0026.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25573'}
| null |
GHSA
|
GHSA-8v3j-jfg3-v3fv
|
Prototype Pollution in Sails.js
|
Sails.js <= 1.5.2 is vulnerable to Prototype Pollution via controller/load-action-modules.js, function loadActionModules(). A [patch](https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358) is available in the `master` branch of Sails.js's GItHub repository.
|
{'CVE-2021-44908'}
|
2022-03-29T21:42:44Z
|
2022-03-18T00:01:11Z
|
MODERATE
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/balderdashy/sails/issues/7209', 'https://github.com/balderdashy/sails/blob/master/lib/app/private/controller/load-action-modules.js#L32', 'https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44908', 'https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/sailsJS%20PoC.zip', 'https://github.com/advisories/GHSA-8v3j-jfg3-v3fv'}
| null |
GHSA
|
GHSA-px8v-hxxx-2rgh
|
Potential Code Injection in Sprout Forms
|
### Impact
A potential Server-Side Template Injection vulnerability exists in Sprout Forms which could lead to the execution of Twig code.
### Patches
The problem is fixed in`barrelstrength/sprout-forms:v3.9.0` which upgrades to `barrelstrength/sprout-base-email:v1.2.7`
### Workarounds
Users unable to upgrade should update any Notification Emails to use the "Basic Notification (Sprout Email)" template and avoid using the "Basic Notification (Sprout Forms)" template or any custom templates that display Form Fields.
### References
- See the release notes in the [CHANGELOG](https://github.com/barrelstrength/craft-sprout-forms/blob/v3/CHANGELOG.md#390---2020-04-09-critical)
- Credits to Paweł Hałdrzyński, Daniel Kalinowski from [ISEC.PL](https://isec.pl/) for discovery and responsible disclosure
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Sprout Forms repo](https://github.com/barrelstrength/craft-sprout-forms/issues)
* Email us at [sprout@barrelstrengthdesign.com](mailto:sprout@barrelstrengthdesign.com)
|
{'CVE-2020-11056'}
|
2022-04-19T19:02:25Z
|
2020-05-08T21:00:02Z
|
CRITICAL
| 7.4
|
{'CWE-94', 'CWE-74'}
|
{'https://github.com/barrelstrength/craft-sprout-forms/security/advisories/GHSA-px8v-hxxx-2rgh', 'https://github.com/advisories/GHSA-px8v-hxxx-2rgh', 'https://github.com/barrelstrength/craft-sprout-forms/blob/v3/CHANGELOG.md#390---2020-04-09-critical', 'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11056'}
| null |
GHSA
|
GHSA-65xw-pcqw-hjrh
|
Cross site scripting in apache airflow
|
It was discovered that the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. This issue affects Apache Airflow versions 2.2.3 and below.
|
{'CVE-2021-45229'}
|
2022-03-07T13:36:32Z
|
2022-02-26T00:00:45Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread/phx76cgtmhwwdy780rvwhobx8qoy4bnk', 'https://github.com/advisories/GHSA-65xw-pcqw-hjrh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45229'}
| null |
GHSA
|
GHSA-pgv6-jrvv-75jp
|
Moderate severity vulnerability that affects send
|
Withdrawn, accidental duplicate publish.
visionmedia send before 0.8.4 for Node.js uses a partial comparison for verifying whether a directory is within the document root, which allows remote attackers to access restricted directories, as demonstrated using "public-restricted" under a "public" directory.
| null |
2021-12-03T14:26:10Z
|
2018-10-09T00:34:30Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-pgv6-jrvv-75jp', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6394'}
| null |
GHSA
|
GHSA-g6ww-2x43-h963
|
Cross-site scripting in Apache JSPWiki
|
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
|
{'CVE-2019-10090'}
|
2021-08-17T22:33:54Z
|
2019-10-11T18:41:44Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-g6ww-2x43-h963', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10090', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10090'}
| null |
GHSA
|
GHSA-mgpf-hhgf-cxg4
|
In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin.
|
In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
|
{'CVE-2021-45457'}
|
2022-01-14T19:39:39Z
|
2022-01-08T00:43:16Z
|
MODERATE
| 0
|
{'CWE-522'}
|
{'https://github.com/apache/kylin/pull/1782', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45457', 'https://github.com/advisories/GHSA-mgpf-hhgf-cxg4', 'http://www.openwall.com/lists/oss-security/2022/01/06/2', 'https://github.com/apache/kylin/pull/1781', 'https://lists.apache.org/thread/rzv4mq58okwj1n88lry82ol2wwm57q1m'}
| null |
GHSA
|
GHSA-c9j3-wqph-5xx9
|
Command Injection in egg-scripts
|
Versions of `egg-scripts` before 2.8.1 are vulnerable to command injection. This is only exploitable if a malicious argument is provided on the command line.
Example:
`eggctl start --daemon --stderr='/tmp/eggctl_stderr.log; touch /tmp/malicious'`
## Recommendation
Update to version 2.8.1 or later.
|
{'CVE-2018-3786'}
|
2021-01-08T18:59:52Z
|
2018-09-17T20:43:34Z
|
LOW
| 0
|
{'CWE-77'}
|
{'https://github.com/eggjs/egg-scripts/pull/26', 'https://github.com/advisories/GHSA-c9j3-wqph-5xx9', 'https://github.com/eggjs/egg-scripts/blob/2.8.1/History.md', 'https://hackerone.com/reports/388936', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3786', 'https://www.npmjs.com/advisories/694'}
| null |
GHSA
|
GHSA-mw6v-crh8-8533
|
Integer Overflow or Wraparound in Google TensorFlow
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The type of exploitation is context-dependent.
|
{'CVE-2018-7575'}
|
2022-03-23T22:28:48Z
|
2019-04-30T15:36:41Z
|
CRITICAL
| 9.8
|
{'CWE-190'}
|
{'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-004.md', 'https://github.com/advisories/GHSA-mw6v-crh8-8533', 'https://github.com/tensorflow/tensorflow/commit/d107fee1e4a9a4462f01564798d345802acc2aef', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7575'}
| null |
GHSA
|
GHSA-g4gq-j4p2-j8fr
|
Remote Code Execution via Script (Python) objects under Python 3
|
### Impact
Background: The optional add-on package `Products.PythonScripts` adds `Script (Python)` to the list of content items a user can add to the Zope object database. Inside these scripts users can write Python code that is executed when rendered through the web. The code environment in these script objects is limited, it relies on the `RestrictedPython` package to provide a "safe" subset of Python instructions as well as the `AccessControl` package that defines security policies for execution in the context of a Zope application.
Recently the `AccessControl` package was updated to fix a remote code execution security issue. A link to the security advisory is provided in the References section below. The bug tightens the `AccessControl` security policies for Zope by blocking access to unsafe classes inside the Python `string` module.
You are only affected if the following are true:
- You use Python 3 for your Zope deployment (Zope 4 on Python 2 is not affected)
- You run Zope 4 below version 4.6.3 or Zope 5 below version 5.3
- You have installed the optional `Products.PythonScripts` add-on package
By default, you need to have the admin-level Zope "Manager" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk.
### Patches
The problem has been fixed in `AccessControl` versions 4.3 and 5.2. Zope releases 4.6.3 and 5.3 now require these new `AccessControl` releases.
### Workarounds
A site administrator can restrict adding/editing Script (Python) objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.
### References
* [AccessControl security advisory GHSA-qcx9-j53g-ccgf](https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Zope issue tracker](https://github.com/zopefoundation/Zope/issues)
* Email us at [security@plone.org](mailto:security@plone.org)
|
{'CVE-2021-32811'}
|
2021-08-30T23:21:30Z
|
2021-08-05T17:00:37Z
|
HIGH
| 7.5
|
{'CWE-915'}
|
{'https://github.com/advisories/GHSA-g4gq-j4p2-j8fr', 'https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf', 'https://github.com/zopefoundation/Zope/commit/f72a18dda8e9bf2aedb46168761668464a4be988', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-g4gq-j4p2-j8fr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32811'}
| null |
GHSA
|
GHSA-9gp4-qrff-c648
|
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
|
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.
|
{'CVE-2016-1000345'}
|
2021-09-07T21:35:31Z
|
2018-10-18T18:04:13Z
|
MODERATE
| 5.9
| null |
{'https://usn.ubuntu.com/3727-1/', 'https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098', 'https://github.com/advisories/GHSA-9gp4-qrff-c648', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000345', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927'}
| null |
GHSA
|
GHSA-94jq-q5v2-76wj
|
Improper certificate management in AWS IoT Device SDK v2
|
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on Windows. This issue has been addressed in aws-c-io submodule versions 0.9.13 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.3.3 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.5.18 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Microsoft Windows.
|
{'CVE-2021-40828'}
|
2021-12-03T15:21:37Z
|
2021-11-24T21:02:24Z
|
MODERATE
| 6.3
|
{'CWE-295'}
|
{'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/advisories/GHSA-94jq-q5v2-76wj', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40828', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/awslabs/aws-c-io/'}
| null |
GHSA
|
GHSA-grh6-q6m2-rh72
|
Origin Validation Error
|
Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman versions from 1.8.0 to 3.0.0.
|
{'CVE-2021-20199'}
|
2021-05-18T21:07:49Z
|
2021-05-18T21:07:49Z
|
MODERATE
| 5.9
|
{'CWE-200', 'CWE-346'}
|
{'https://github.com/containers/podman/pull/9052', 'https://github.com/advisories/GHSA-grh6-q6m2-rh72', 'https://github.com/containers/podman/issues/5138', 'https://github.com/containers/podman/releases/tag/v3.0.0-rc3', 'https://github.com/rootless-containers/rootlesskit/pull/206', 'https://github.com/containers/podman/pull/9225', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20199', 'https://bugzilla.redhat.com/show_bug.cgi?id=1919050'}
| null |
GHSA
|
GHSA-7p99-3798-f85c
|
URL Redirection to Untrusted Site ('Open Redirect') in express-openid-connect
|
### Impact
Users of the `requiresAuth` middleware, either directly or through the default `authRequired` option, are vulnerable to an Open Redirect when the middleware is applied to a catch all route.
If all routes under `example.com` are protected with the `requiresAuth` middleware, a visit to `http://example.com//google.com` will be redirected to `google.com` after login because the original url reported by the Express framework is not properly sanitised.
### Am I affected?
You are affected by this vulnerability if you are using the `requiresAuth` middleware on a catch all route or the default `authRequired` option and `express-openid-connect` version `<=2.7.1`.
### How to fix that?
Upgrade to version `>=2.7.2`
### Will this update impact my users?
The fix provided in the patch will not affect your users.
|
{'CVE-2022-24794'}
|
2022-04-09T15:03:35Z
|
2022-03-31T22:44:47Z
|
HIGH
| 7.5
|
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24794', 'https://github.com/auth0/express-openid-connect/commit/0947b92164a2c5f661ebcc183d37e7f21de719ad', 'https://github.com/advisories/GHSA-7p99-3798-f85c', 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7p99-3798-f85c'}
| null |
GHSA
|
GHSA-x9gm-qxhh-rf75
|
Malicious Package in cordova-plugin-china-picker
|
Version 1.0.910 of `cordova-plugin-china-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.910 of this module is found installed you will want to replace it with a version before or after 1.0.910. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T17:04:32Z
|
2020-09-01T19:51:28Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-x9gm-qxhh-rf75', 'https://snyk.io/vuln/SNYK-JS-CORDOVAPLUGINCHINAPICKER-451001', 'https://www.npmjs.com/advisories/622'}
| null |
GHSA
|
GHSA-r3vr-prwv-86g9
|
High severity vulnerability that affects python-gnupg
|
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
|
{'CVE-2014-1927'}
|
2021-09-17T14:15:09Z
|
2018-11-06T23:14:39Z
|
HIGH
| 0
|
{'CWE-20'}
|
{'http://seclists.org/oss-sec/2014/q1/245', 'https://code.google.com/p/python-gnupg/', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1927', 'https://github.com/advisories/GHSA-r3vr-prwv-86g9', 'http://seclists.org/oss-sec/2014/q1/294', 'http://secunia.com/advisories/56616', 'http://www.debian.org/security/2014/dsa-2946', 'http://secunia.com/advisories/59031', 'https://code.google.com/p/python-gnupg/issues/detail?id=98'}
| null |
GHSA
|
GHSA-j8c8-67vp-6mx7
|
Arbitrary memory read in `ImmutableConst`
|
### Impact
The `ImmutableConst` operation in TensorFlow can be tricked into reading arbitrary memory contents:
```python
import tensorflow as tf
with open('/tmp/test','wb') as f:
f.write(b'\xe2'*128)
data = tf.raw_ops.ImmutableConst(dtype=tf.string,shape=3,memory_region_name='/tmp/test')
print(data)
```
This is because the `tstring` TensorFlow string class has a special case for memory mapped strings but the operation itself does not offer any support for this datatype.
### Patches
We have patched the issue in GitHub commit [3712a2d3455e6ccb924daa5724a3652a86f6b585](https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585) and GitHub commit [1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b](https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-41227'}
|
2021-11-10T18:34:49Z
|
2021-11-10T18:34:49Z
|
MODERATE
| 6.6
|
{'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41227', 'https://github.com/advisories/GHSA-j8c8-67vp-6mx7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8c8-67vp-6mx7', 'https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b'}
| null |
GHSA
|
GHSA-h7mq-27r7-w972
|
Cross-site Scripting in GilaCMS
|
A cross-site scripting (XSS) vulnerability in /admin/content/post of GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Tags field.
|
{'CVE-2020-20696'}
|
2021-10-04T13:56:48Z
|
2021-09-30T17:13:02Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-h7mq-27r7-w972', 'https://github.com/GilaCMS/gila/issues/53', 'https://nvd.nist.gov/vuln/detail/CVE-2020-20696'}
| null |
GHSA
|
GHSA-cmch-296j-wfvw
|
Arbitrary File Write in iobroker.js-controller
|
Versions of `iobroker.controller` prior to 2.0.25 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended `/adapter/<adapter-name>` folder, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the attack but the package has authentication disabled by default.
## Recommendation
Upgrade to version 2.0.25 or later.
|
{'CVE-2019-10767'}
|
2021-08-19T15:11:16Z
|
2019-12-02T18:06:14Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda', 'https://www.npmjs.com/advisories/1419', 'https://github.com/advisories/GHSA-cmch-296j-wfvw', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10767', 'https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881'}
| null |
GHSA
|
GHSA-cw98-cx2m-9qqg
|
Denial of Service in ckb
|
An issue was discovered in the ckb crate before 0.40.0 for Rust. Attackers can cause a denial of service (Nervos CKB blockchain node crash) via a dead call that is used as a DepGroup.
|
{'CVE-2021-45700'}
|
2022-01-07T17:53:20Z
|
2022-01-06T22:10:08Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-cw98-cx2m-9qqg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45700', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ckb/RUSTSEC-2021-0109.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0109.html'}
| null |
GHSA
|
GHSA-x6gq-467r-hwcc
|
Malicious Package in soket.js
|
All versions of `soket.js` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
| null |
2021-10-01T13:29:36Z
|
2020-09-01T21:14:05Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-x6gq-467r-hwcc', 'https://www.npmjs.com/advisories/687'}
| null |
GHSA
|
GHSA-v4rr-65x6-g69f
|
XXE vulnerability in Jenkins Flaky Test Handler Plugin
|
Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
|
{'CVE-2022-28140'}
|
2022-05-03T20:56:23Z
|
2022-03-30T00:00:25Z
|
HIGH
| 8.1
|
{'CWE-611'}
|
{'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28140', 'https://github.com/advisories/GHSA-v4rr-65x6-g69f', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1896'}
| null |
GHSA
|
GHSA-6gmv-pjp9-p8w8
|
Out of bounds read in Tensorflow
|
### Impact
The [implementation of shape inference for `ReverseSequence`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671) does not fully validate the value of `batch_dim` and can result in a heap OOB read:
```python
import tensorflow as tf
@tf.function
def test():
y = tf.raw_ops.ReverseSequence(
input = ['aaa','bbb'],
seq_lengths = [1,1,1],
seq_dim = -10,
batch_dim = -10 )
return y
test()
```
There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check for negative values:
```cc
const int32_t input_rank = c->Rank(input);
if (batch_dim >= input_rank) {
return errors::InvalidArgument(
"batch_dim must be < input rank: ", batch_dim, " vs. ", input_rank);
}
// ...
DimensionHandle batch_dim_dim = c->Dim(input, batch_dim);
```
Negative dimensions are allowed in some cases to mimic Python's negative indexing (i.e., indexing from the end of the array), however if the value is too negative then [the implementation of `Dim`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.h#L415-L428) would access elements before the start of an array:
```cc
DimensionHandle Dim(ShapeHandle s, int64_t idx) {
if (!s.Handle() || s->rank_ == kUnknownRank) {
return UnknownDim();
}
return DimKnownRank(s, idx);
}
·
static DimensionHandle DimKnownRank(ShapeHandle s, int64_t idx) {
CHECK_NE(s->rank_, kUnknownRank);
if (idx < 0) {
return s->dims_[s->dims_.size() + idx];
}
return s->dims_[idx];
}
```
### Patches
We have patched the issue in GitHub commit [37c01fb5e25c3d80213060460196406c43d31995](https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
|
{'CVE-2022-21728'}
|
2022-02-10T00:17:52Z
|
2022-02-09T18:29:24Z
|
HIGH
| 8.1
|
{'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.h#L415-L428', 'https://github.com/advisories/GHSA-6gmv-pjp9-p8w8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21728', 'https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gmv-pjp9-p8w8', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671'}
| null |
GHSA
|
GHSA-j878-43hm-8gr5
|
Unrestricted Upload of File with Dangerous Type in Microweber
|
In Microweber prior to 1.2.12, a malicious actor may abuse the Backup/Restore feature to achieve Remote Code Execution.
|
{'CVE-2022-0921'}
|
2022-03-23T15:35:21Z
|
2022-03-12T00:00:30Z
|
MODERATE
| 6.7
|
{'CWE-434'}
|
{'https://github.com/advisories/GHSA-j878-43hm-8gr5', 'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318', 'https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0921'}
| null |
GHSA
|
GHSA-p6mr-pxg4-68hx
|
Symlink Arbitrary File Overwrite in bower
|
Versions of `bower` prior to 1.8.8 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `bower` does not verify that extracted symbolic links do not resolve to targets outside of the extraction root directory.
## Recommendation
Update to version 1.8.8 or later
|
{'CVE-2019-5484'}
|
2021-01-08T20:41:10Z
|
2019-09-17T23:21:34Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/bower/bower/commit/45c6bfa86f6e57731b153baca9e0b41a1cc699e3', 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5484', 'https://github.com/advisories/GHSA-p6mr-pxg4-68hx', 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E', 'https://hackerone.com/reports/473811', 'https://www.npmjs.com/advisories/776', 'https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/487.json'}
| null |
GHSA
|
GHSA-37jj-wp7g-7wj4
|
Read of uninitialized memory in cdr
|
An issue was discovered in Deserializer::read_vec in the cdr crate before 0.2.4 for Rust. A user-provided Read implementation can gain access to the old contents of newly allocated heap memory, violating soundness.
|
{'CVE-2021-26305'}
|
2021-08-25T20:53:12Z
|
2021-08-25T20:53:12Z
|
CRITICAL
| 9.8
|
{'CWE-908'}
|
{'https://github.com/advisories/GHSA-37jj-wp7g-7wj4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26305', 'https://github.com/hrektts/cdr-rs/issues/10', 'https://rustsec.org/advisories/RUSTSEC-2021-0012.html'}
| null |
GHSA
|
GHSA-58qp-5328-v7mh
|
Improper Input Validation and Loop with Unreachable Exit Condition ('Infinite Loop') in cumulative-distribution-function
|
### Impact
* Apps using this library on improper data may crash or go into an infinite-loop
* In the case of a nodejs server-app using this library to act on invalid non-numeric data, the nodejs server may crash. This may affect other users of this server and/or require the server to be rebooted for proper operation.
* In the case of a browser app using this library to act on invalid non-numeric data, that browser may crash or lock up.
A flaw enabling an infinite-loop was discovered in the code for evaluating the cumulative-distribution-function
of input data. Although the documentation explains that numeric data is required, some users may confuse an array
of strings like ["1","2","3","4","5"] for numeric data [1,2,3,4,5] when it is in fact string data. An infinite loop is possible when the
cumulative-distribution-function is evaluated for a given point when the input data is string data rather than type `number`.
This vulnerability enables an infinite-cpu-loop denial-of-service-attack on any app using npm:cumulative-distribution-function v1.0.3 or earlier if the attacker can supply malformed data to the library. The vulnerability could also manifest if a data source to
be analyzed changes data type from Arrays of number (proper) to Arrays of string (invalid, but undetected by earlier version of the library).
### Patches
Users should upgrade to at least v2.0.0, or the latest version.
Tests for several types of invalid data have been created, and version 2.0.0 has been tested to reject this invalid data by
throwing a `TypeError()` instead of processing it. Developers using this library may wish to adjust their app's code slightly to better tolerate or handle this TypeError. Apps performing proper numeric data validation before sending data to this library should be mostly unaffected by this patch.
### Workarounds
The vulnerability can be mitigated in older versions by ensuring that only finite numeric data of type `Array[number]` or `number` is passed to `cumulative-distribution-function` and its `f(x)` function, respectively.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the Github repository at https://github.com/DrPaulBrewer/cumulative-distribution-function
|
{'CVE-2021-29486'}
|
2022-04-19T19:02:55Z
|
2021-05-04T17:43:36Z
|
HIGH
| 7.5
|
{'CWE-835', 'CWE-20'}
|
{'https://github.com/DrPaulBrewer/cumulative-distribution-function/pull/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29486', 'https://github.com/advisories/GHSA-58qp-5328-v7mh', 'https://github.com/DrPaulBrewer/cumulative-distribution-function/issues/7', 'https://www.npmjs.com/package/cumulative-distribution-function', 'https://github.com/DrPaulBrewer/cumulative-distribution-function/security/advisories/GHSA-58qp-5328-v7mh'}
| null |
GHSA
|
GHSA-qhm8-m2c4-9mw7
|
Downloads Resources over HTTP in qbs
|
Affected versions of `qbs` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `qbs`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10656'}
|
2021-01-08T01:58:37Z
|
2019-02-18T23:45:11Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-qhm8-m2c4-9mw7', 'https://nodesecurity.io/advisories/266', 'https://www.npmjs.com/advisories/266', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10656'}
| null |
GHSA
|
GHSA-4mqv-gcr3-pff9
|
"Cross-site scripting in phpoffice/phpspreadsheet"
|
"This affects the package phpoffice/phpspreadsheet. The library is vulnerable to XSS when creating an html output from an excel file by adding a comment on any cell. The root cause of this issue is within the HTML writer where user comments are concatenated as part of link and this is returned as HTML."
|
{'CVE-2020-7776'}
|
2021-05-06T18:53:37Z
|
2021-05-06T18:53:37Z
|
MODERATE
| 6.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-4mqv-gcr3-pff9', 'https://github.com/PHPOffice/PhpSpreadsheet/blob/master/src/PhpSpreadsheet/Writer/Html.php%23L1792', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7776', 'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845', 'https://snyk.io/vuln/SNYK-PHP-PHPOFFICEPHPSPREADSHEET-1048856'}
| null |
GHSA
|
GHSA-h4rc-386g-6m85
|
jackson-databind mishandles the interaction between serialization gadgets and typing
|
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).
|
{'CVE-2020-11620'}
|
2021-08-23T15:31:59Z
|
2020-04-23T20:19:02Z
|
HIGH
| 8.1
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2682', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://security.netapp.com/advisory/ntap-20200511-0004/', 'https://github.com/advisories/GHSA-h4rc-386g-6m85', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11620'}
| null |
GHSA
|
GHSA-cgqv-x5cx-xvqh
|
Arbitrary Code Injection in pouchdb
|
Affected versions of `pouchdb` do not properly sandbox the code execution engine which executes the map/reduce functions for temporary views and design documents. Under certain circumstances, an attacker could uses this to run arbitrary code on the server.
## Recommendation
Update to version 6.0.5 or later.
|
{'CVE-2016-10546'}
|
2021-01-08T18:58:20Z
|
2018-07-26T16:22:08Z
|
CRITICAL
| 0
|
{'CWE-94'}
|
{'https://nodesecurity.io/advisories/143', 'https://www.npmjs.com/advisories/143', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10546', 'https://github.com/advisories/GHSA-cgqv-x5cx-xvqh'}
| null |
GHSA
|
GHSA-7fvx-3jfc-2cpc
|
Heap OOB in `ResourceScatterUpdate`
|
### Impact
An attacker can trigger a read from outside of bounds of heap allocated data by sending invalid arguments to `tf.raw_ops.ResourceScatterUpdate`:
```python
import tensorflow as tf
v = tf.Variable([b'vvv'])
tf.raw_ops.ResourceScatterUpdate(
resource=v.handle,
indices=[0],
updates=['1', '2', '3', '4', '5'])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L919-L923) has an incomplete validation of the relationship between the shapes of `indices` and `updates`: instead of checking that the shape of `indices` is a prefix of the shape of `updates` (so that broadcasting can happen), code only checks that the number of elements in these two tensors are in a divisibility relationship.
### Patches
We have patched the issue in GitHub commit [01cff3f986259d661103412a20745928c727326f](https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37655'}
|
2021-08-25T14:42:58Z
|
2021-08-25T14:42:58Z
|
HIGH
| 7.3
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-7fvx-3jfc-2cpc', 'https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37655', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7fvx-3jfc-2cpc'}
| null |
GHSA
|
GHSA-8j9v-h2vp-2hhv
|
XSS in HtmlSanitizer
|
### Impact
If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag.
### Patches
The problem has been fixed in version 5.0.372.
### Workarounds
Remove the `<style>` tag from the set of allowed tags.
### For more information
If you have any questions or comments about this advisory open an issue in https://github.com/mganss/HtmlSanitizer
### Credits
This issue was discovered by Michal Bentkowski of Securitum.
|
{'CVE-2020-26293'}
|
2021-01-08T18:14:26Z
|
2021-01-04T18:22:11Z
|
LOW
| 6.1
|
{'CWE-74', 'CWE-79'}
|
{'https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv', 'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8', 'https://www.nuget.org/packages/HtmlSanitizer/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26293', 'https://github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372', 'https://github.com/advisories/GHSA-8j9v-h2vp-2hhv'}
| null |
GHSA
|
GHSA-jjvm-3mfq-7gc7
|
Cross-site Scripting in microweber
|
microweber version 1.2.10 and prior is vulnerable to cross-site scripting.
|
{'CVE-2022-0506'}
|
2022-02-15T00:17:21Z
|
2022-02-09T00:00:31Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0506', 'https://huntr.dev/bounties/0a5ec24c-343e-4cc4-b27b-2beb19a1c35f', 'https://github.com/advisories/GHSA-jjvm-3mfq-7gc7'}
| null |
GHSA
|
GHSA-xp7p-3gx7-j6wx
|
calibre-web is vulnerable to Business Logic Errors
|
calibre-web is vulnerable to Business Logic Errors
|
{'CVE-2021-4171'}
|
2022-03-21T19:12:08Z
|
2022-01-21T23:44:15Z
|
CRITICAL
| 9.8
| null |
{'https://github.com/janeczku/calibre-web/commit/3e0d8763c377d2146462811e3e4ccf13f0d312ce', 'https://github.com/advisories/GHSA-xp7p-3gx7-j6wx', 'https://huntr.dev/bounties/1117f439-133c-4563-afb2-6cd80607bd5c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4171'}
| null |
GHSA
|
GHSA-ff6r-5jwm-8292
|
Regular Expression Denial of Service in no-case
|
Affected versions of `no-case` are vulnerable to a regular expression denial of service when parsing untrusted user input.
## Recommendation
Update to version 2.3.2 or later.
|
{'CVE-2017-16099'}
|
2021-01-08T18:53:14Z
|
2018-07-24T19:51:16Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://nodesecurity.io/advisories/529', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16099', 'https://github.com/advisories/GHSA-ff6r-5jwm-8292', 'https://www.npmjs.com/advisories/529', 'https://github.com/blakeembrey/no-case/issues/17'}
| null |
GHSA
|
GHSA-grv5-w5vr-8h98
|
Path Traversal in droppy
|
This affects all versions of package droppy. It is possible to traverse directories to fetch configuration files from a droopy server.
|
{'CVE-2020-7757'}
|
2021-05-10T18:47:29Z
|
2021-05-10T18:47:29Z
|
MODERATE
| 6.5
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7757', 'https://github.com/silverwind/droppy/blob/master/server/server.js%23L845', 'https://snyk.io/vuln/SNYK-JS-DROPPY-1023656', 'https://github.com/advisories/GHSA-grv5-w5vr-8h98'}
| null |
GHSA
|
GHSA-83mx-573x-5rw9
|
Null pointer deference in openssl-src
|
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
|
{'CVE-2021-3449'}
|
2022-04-25T20:27:40Z
|
2021-08-25T20:54:02Z
|
MODERATE
| 5.9
|
{'CWE-476'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/advisories/GHSA-83mx-573x-5rw9', 'https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf', 'http://www.openwall.com/lists/oss-security/2021/03/28/4', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.tenable.com/security/tns-2021-05', 'https://security.netapp.com/advisory/ntap-20210326-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3449', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.openwall.com/lists/oss-security/2021/03/27/2', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013', 'https://www.openssl.org/news/secadv/20210325.txt', 'https://security.gentoo.org/glsa/202103-03', 'https://www.tenable.com/security/tns-2021-06', 'https://security.netapp.com/advisory/ntap-20210513-0002/', 'https://www.tenable.com/security/tns-2021-10', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/', 'https://rustsec.org/advisories/RUSTSEC-2021-0055', 'http://www.openwall.com/lists/oss-security/2021/03/27/1', 'https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10356', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd', 'https://www.debian.org/security/2021/dsa-4875', 'https://www.tenable.com/security/tns-2021-09', 'http://www.openwall.com/lists/oss-security/2021/03/28/3', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-qx3w-4864-94ch
|
Cleartext storage of session identifier
|
### Problem
User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system.
### Solution
Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported this issue and to TYPO3 core & security team members Benni Mack & Oliver Hader who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-006](https://typo3.org/security/advisory/typo3-core-sa-2021-006)
|
{'CVE-2021-21339'}
|
2022-04-19T19:02:50Z
|
2021-03-23T01:53:42Z
|
MODERATE
| 5.9
|
{'CWE-312'}
|
{'https://typo3.org/security/advisory/typo3-core-sa-2021-006', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21339', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-qx3w-4864-94ch', 'https://github.com/advisories/GHSA-qx3w-4864-94ch', 'https://packagist.org/packages/typo3/cms-core'}
| null |
GHSA
|
GHSA-4r4m-hjwj-43p8
|
Insecure Defaults Allow MITM Over TLS in engine.io-client
|
Affected versions of `engine.io-client` do not verify certificates by default, and as such may be vulnerable to Man-in-the-Middle attacks.
The vulnerability is related to the way that node.js handles the `rejectUnauthorized` setting. If the value is something that evaluates to false, such as undefined or null, certificate verification will be disabled.
## Recommendation
Update to version 1.6.9 or later.
If you are unable to upgrade, ensure all calls to socket.io to have a `rejectedUnauthorized: true` flag.
|
{'CVE-2016-10536'}
|
2021-01-08T19:53:57Z
|
2019-02-18T23:39:50Z
|
MODERATE
| 0
|
{'CWE-300'}
|
{'https://github.com/advisories/GHSA-4r4m-hjwj-43p8', 'https://www.cigital.com/blog/node-js-socket-io/', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10536', 'https://github.com/socketio/engine.io-client/commit/2c55b278a491bf45313ecc0825cf800e2f7ff5c1', 'https://www.npmjs.com/advisories/99', 'https://nodesecurity.io/advisories/99'}
| null |
GHSA
|
GHSA-836c-xg97-8p4h
|
Server-Side Request Forgery in libtaxii
|
"TAXII libtaxii through 1.1.117, as used in EclecticIQ OpenTAXII through 0.2.0 and other products, allows SSRF via an initial http:// substring to the parse method, even when the no_network setting is used for the XML parser. NOTE: the vendor points out that the parse method "wraps the lxml library" and that this may be an issue to "raise ... to the lxml group.""
|
{'CVE-2020-27197'}
|
2022-03-22T18:45:56Z
|
2021-04-30T17:34:48Z
|
CRITICAL
| 9.8
|
{'CWE-918'}
|
{'http://packetstormsecurity.com/files/159662/Libtaxii-1.1.117-OpenTaxi-0.2.0-Server-Side-Request-Forgery.html', 'https://github.com/eclecticiq/OpenTAXII/issues/176', 'https://github.com/advisories/GHSA-836c-xg97-8p4h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27197', 'https://github.com/TAXIIProject/libtaxii/pull/247', 'https://github.com/TAXIIProject/libtaxii/issues/246'}
| null |
GHSA
|
GHSA-7jvx-f994-rfw2
|
materialize-css vulnerable to cross-site Scripting (XSS) due to improper escape of user input
|
All versions of package materialize-css are vulnerable to Cross-site Scripting (XSS) due to improper escape of user input (such as <not-a-tag />) that is being parsed as HTML/JavaScript, and inserted into the Document Object Model (DOM). This vulnerability can be exploited when the user-input is provided to the autocomplete component.
|
{'CVE-2022-25349'}
|
2022-05-03T21:09:13Z
|
2022-05-03T00:00:45Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/Dogfalo/materialize/blob/v1-dev/js/autocomplete.js%23L285%20', 'https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25349', 'https://github.com/advisories/GHSA-7jvx-f994-rfw2'}
| null |
GHSA
|
GHSA-64xx-cq4q-mf44
|
XStream is vulnerable to an Arbitrary Code Execution attack
|
### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39139](https://x-stream.github.io/CVE-2021-39139.html).
### Credits
Lai Han of nsfocus security team found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-39139'}
|
2022-04-22T15:44:09Z
|
2021-08-25T14:48:47Z
|
HIGH
| 8.5
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/advisories/GHSA-64xx-cq4q-mf44', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://x-stream.github.io/CVE-2021-39139.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39139', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-hp5r-mhgp-56c9
|
Cross-site Scriptin in JSPWiki
|
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable.
|
{'CVE-2019-10078'}
|
2021-08-04T20:00:09Z
|
2019-06-06T15:29:29Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-hp5r-mhgp-56c9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10078', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10078'}
| null |
GHSA
|
GHSA-84q7-p226-4x5w
|
Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server
|
In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
|
{'CVE-2017-7656'}
|
2021-07-22T22:29:12Z
|
2018-10-19T16:16:27Z
|
HIGH
| 7.5
|
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-7656', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.debian.org/security/2018/dsa-4278', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'http://www.securitytracker.com/id/1041194', 'https://github.com/advisories/GHSA-84q7-p226-4x5w', 'https://lists.apache.org/thread.html/rbf4565a0b63f9c8b07fab29352a97bbffe76ecafed8b8555c15b83c6@%3Cissues.maven.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535667', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
| null |
GHSA
|
GHSA-vpwq-6cp4-ffqc
|
Stored Cross-site Scripting in ShowDoc
|
ShowDoc prior to version 2.10.4 is vulnerable to stored cross-site scripting viva `axd` and `cshtml` file upload.
|
{'CVE-2022-0945'}
|
2022-03-29T21:28:25Z
|
2022-03-16T00:00:49Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0945', 'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891', 'https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e', 'https://github.com/advisories/GHSA-vpwq-6cp4-ffqc'}
| null |
GHSA
|
GHSA-w3v3-cxq5-9vr4
|
Incorrect Default Permissions and Improper Access Control in snipe-it
|
snipe-it is vulnerable to Improper Access Control/Incorrect Default Permissions.
|
{'CVE-2022-0179'}
|
2022-01-21T23:58:07Z
|
2022-01-21T23:58:07Z
|
MODERATE
| 6.3
|
{'CWE-284', 'CWE-276'}
|
{'https://github.com/snipe/snipe-it/pull/10498', 'https://github.com/advisories/GHSA-w3v3-cxq5-9vr4', 'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e', 'https://huntr.dev/bounties/efdf2ead-f9d1-4767-9f02-d11f762d15e7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0179'}
| null |
GHSA
|
GHSA-hmv2-79q8-fv6g
|
Uncontrolled Resource Consumption in urllib3
|
The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) because of an inefficient algorithm. The percent_encodings array contains all matches of percent encodings. It is not deduplicated. For a URL of length N, the size of percent_encodings may be up to O(N). The next step (normalize existing percent-encoded bytes) also takes up to O(N) for each step, so the total time is O(N^2). If percent_encodings were deduplicated, the time to compute _encode_invalid_chars would be O(kN), where k is at most 484 ((10+6*2)^2).
|
{'CVE-2020-7212'}
|
2021-04-30T17:31:43Z
|
2021-04-30T17:31:43Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://pypi.org/project/urllib3/1.25.8/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7212', 'https://github.com/advisories/GHSA-hmv2-79q8-fv6g', 'https://github.com/urllib3/urllib3/blob/master/CHANGES.rst', 'https://github.com/urllib3/urllib3/commit/a74c9cfbaed9f811e7563cfc3dce894928e0221a'}
| null |
GHSA
|
GHSA-9vh5-r4qw-v3vv
|
Improper Resource Shutdown or Release in HashiCorp Vault
|
HashiCorp Vault Enterprise 0.11.0 through 1.3.1 fails, in certain circumstances, to revoke dynamic secrets for a mount in a deleted namespace. Fixed in 1.3.2.
|
{'CVE-2020-7220'}
|
2021-07-28T17:57:46Z
|
2021-07-28T17:57:46Z
|
HIGH
| 7.5
|
{'CWE-404'}
|
{'https://www.hashicorp.com/blog/category/vault/', 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#132-january-22nd-2020', 'https://github.com/advisories/GHSA-9vh5-r4qw-v3vv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7220'}
| null |
GHSA
|
GHSA-852q-xxj4-x2rx
|
SQL Injection in SimpleSAMLphp
|
The proxystatistics module before 3.1.0 for SimpleSAMLphp allows SQL Injection in lib/Auth/Process/DatabaseCommand.php.
|
{'CVE-2019-15537'}
|
2021-08-17T22:41:38Z
|
2019-11-08T20:05:45Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15537', 'https://github.com/CESNET/proxystatistics-simplesamlphp-module/pull/18', 'https://github.com/advisories/GHSA-852q-xxj4-x2rx', 'https://github.com/CESNET/proxystatistics-simplesamlphp-module/releases/tag/v3.1.0'}
| null |
GHSA
|
GHSA-gg9m-x3cg-69vh
|
Access key stored in plain text by Jenkins Metrics Plugin
|
Jenkins Metrics Plugin 4.0.2.8 and earlier stores an access key unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
|
{'CVE-2022-20621'}
|
2022-05-04T21:00:00Z
|
2022-01-13T00:00:57Z
|
MODERATE
| 0
|
{'CWE-522'}
|
{'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1624', 'https://github.com/advisories/GHSA-gg9m-x3cg-69vh', 'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20621'}
| null |
GHSA
|
GHSA-7vx9-xjhr-rw6h
|
Cross-site Scripting in Eclipse Jetty
|
In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.
|
{'CVE-2019-10241'}
|
2022-04-25T23:33:58Z
|
2019-04-23T16:06:02Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/d7c4a664a34853f57c2163ab562f39802df5cf809523ea40c97289c1@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/bcfb37bfba7b3d7e9c7808b5e5a38a98d6bb714d52cf5162bdd48e32@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/8bff534863c7aaf09bb17c3d0532777258dd3a5c7ddda34198cc2742@%3Cdev.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-7vx9-xjhr-rw6h', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546121', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/464892b514c029dfc0c8656a93e1c0de983c473df70fdadbd224e09f@%3Cjira.kafka.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://security.netapp.com/advisory/ntap-20190509-0003/', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10241', 'https://lists.apache.org/thread.html/01e004c3f7c7365863a27e7038b7f32dae56ccf3a496b277c9b7f7b6@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
| null |
GHSA
|
GHSA-fg47-3c2x-m2wr
|
TimelockController vulnerability in OpenZeppelin Contracts
|
### Impact
A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to "open" allow anyone to use the executor role, thus leaving the timelock at risk of being taken over by an attacker.
### Patches
A fix is included in the following releases of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`:
- 4.3.1
- 3.4.2
- 3.4.2-solc-0.7
Deployed instances of `TimelockController` should be replaced with a fixed version by migrating all assets, ownership, and roles.
### Workarounds
Revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.
### References
[Post-mortem](https://forum.openzeppelin.com/t/timelockcontroller-vulnerability-postmortem/14958).
### Credits
The issue was identified by an anonymous white hat hacker through [Immunefi](https://immunefi.com/).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
|
{'CVE-2021-39167'}
|
2021-09-13T20:30:11Z
|
2021-08-30T16:12:38Z
|
CRITICAL
| 10
|
{'CWE-269'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39167', 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-fg47-3c2x-m2wr', 'https://github.com/advisories/GHSA-fg47-3c2x-m2wr'}
| null |
GHSA
|
GHSA-73rf-6mrf-759q
|
Moderate severity vulnerability that affects devise
|
Devise ruby gem before 4.6.0 when the `lockable` module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to `increment_failed_attempts` within the `Devise::Models::Lockable` class not being concurrency safe.
|
{'CVE-2019-5421'}
|
2021-01-08T19:18:06Z
|
2019-03-19T18:03:25Z
|
MODERATE
| 0
|
{'CWE-367'}
|
{'https://github.com/plataformatec/devise/pull/4996', 'https://github.com/plataformatec/devise/issues/4981', 'https://github.com/advisories/GHSA-73rf-6mrf-759q', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5421'}
| null |
GHSA
|
GHSA-jf85-cpcp-j695
|
Prototype Pollution in lodash
|
Versions of `lodash` before 4.17.12 are vulnerable to Prototype Pollution. The function `defaultsDeep` allows a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.17.12 or later.
|
{'CVE-2019-10744'}
|
2021-08-17T17:55:47Z
|
2019-07-10T19:45:23Z
|
CRITICAL
| 9.1
|
{'CWE-20'}
|
{'https://github.com/lodash/lodash/pull/4336', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-jf85-cpcp-j695', 'https://access.redhat.com/errata/RHSA-2019:3024', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS', 'https://www.npmjs.com/advisories/1065', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10744', 'https://snyk.io/vuln/SNYK-JS-LODASH-450202', 'https://security.netapp.com/advisory/ntap-20191004-0005/'}
| null |
GHSA
|
GHSA-gg6x-xx78-448c
|
Reflected XSS when importing CSV in OctoberCMS
|
### Impact
A user with the ability to use the import functionality of the `ImportExportController` behavior could be socially engineered by an attacker to upload a maliciously crafted CSV file which could result in a reflected XSS attack on the user in question
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c to your installation manually if unable to upgrade to Build 466.
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1100" alt="Screen Shot 2020-03-31 at 2 01 52 PM" src="https://user-images.githubusercontent.com/7253840/78070158-8f7ef580-7358-11ea-950c-226533f6a0a3.png">
|
{'CVE-2020-5298'}
|
2022-04-19T19:02:26Z
|
2020-06-03T21:58:32Z
|
MODERATE
| 4
|
{'CWE-87'}
|
{'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://github.com/advisories/GHSA-gg6x-xx78-448c', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/octobercms/october/security/advisories/GHSA-gg6x-xx78-448c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5298', 'https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c'}
| null |
GHSA
|
GHSA-8gv3-57p6-g35r
|
Heap buffer overflow in `RaggedTensorToTensor`
|
### Impact
An attacker can cause a heap buffer overflow in `tf.raw_ops.RaggedTensorToTensor`:
```python
import tensorflow as tf
shape = tf.constant([10, 10], shape=[2], dtype=tf.int64)
values = tf.constant(0, shape=[1], dtype=tf.int64)
default_value = tf.constant(0, dtype=tf.int64)
l = [849, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
row = tf.constant(l, shape=[5, 43], dtype=tf.int64)
rows = [row]
types = ['ROW_SPLITS']
tf.raw_ops.RaggedTensorToTensor(
shape=shape, values=values, default_value=default_value,
row_partition_tensors=rows, row_partition_types=types)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) uses the same index to access two arrays in parallel:
```cc
for (INDEX_TYPE i = 0; i < row_split_size - 1; ++i) {
INDEX_TYPE row_length = row_split(i + 1) - row_split(i);
INDEX_TYPE real_length = std::min(output_size, row_length);
INDEX_TYPE parent_output_index_current = parent_output_index[i];
...
}
```
Since the user controls the shape of the input arguments, an attacker could trigger a heap OOB access when `parent_output_index` is shorter than `row_split`.
### Patches
We have patched the issue in GitHub commit [a84358aa12f0b1518e606095ab9cfddbf597c121](https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29560'}
|
2022-04-26T18:10:15Z
|
2021-05-21T14:24:57Z
|
LOW
| 2.5
|
{'CWE-787', 'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29560', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8gv3-57p6-g35r', 'https://github.com/advisories/GHSA-8gv3-57p6-g35r'}
| null |
GHSA
|
GHSA-j2x6-9323-fp7h
|
Integer bounds error in Vyper
|
### Impact
in the following code, the return of `<iface>.returns_int128()` is not validated to fall within the bounds of `int128`. as of v0.3.0, `<iface>.returns_int128()` is validated in simple expressions, but not complex expressions.
```vyper
interface iface:
def returns_int128() -> int128: view
def returns_Bytes33() -> Bytes[33]: view
x: iface
@external
def call_out():
x: int128 = self.x.returns_int128() # affected, <0.3.0
y: uint256 = convert(self.x.returns_int128(), uint256) # affected, <0.3.2
z: Bytes[33] = concat(self.x.returns_Bytes33(), b"") # affected >= 0.3.0, <0.3.2
```
### Patches
0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b)
### Workarounds
Break up operations involving external calls into multiple statements. For instance, instead of the example above, use
```
x: int128 = self.x.returns_int128()
y: uint256 = convert(x, uint256)
```
|
{'CVE-2022-24845'}
|
2022-04-22T20:24:15Z
|
2022-04-22T20:24:13Z
|
HIGH
| 8.8
|
{'CWE-190'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24845', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-j2x6-9323-fp7h', 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b', 'https://github.com/advisories/GHSA-j2x6-9323-fp7h'}
| null |
GHSA
|
GHSA-6gvc-4jvj-pwq4
|
Use after free in libpulse-binding
|
An issue was discovered in the libpulse-binding crate before 2.5.0 for Rust. proplist::Iterator can cause a use-after-free.
|
{'CVE-2018-25001'}
|
2021-09-27T15:46:50Z
|
2021-08-30T16:22:34Z
|
MODERATE
| 6.5
|
{'CWE-416'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-25001', 'https://github.com/advisories/GHSA-6gvc-4jvj-pwq4', 'https://rustsec.org/advisories/RUSTSEC-2018-0020.html'}
| null |
GHSA
|
GHSA-f2c9-5jqw-3xh3
|
Cross-Site Scripting in Qiita::Markdown
|
Increments Qiita::Markdown before 0.33.0 allows XSS in transformers.
|
{'CVE-2021-28796'}
|
2021-08-02T17:23:39Z
|
2021-08-02T17:23:39Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28796', 'https://vuln.ryotak.me/advisories/15', 'https://github.com/advisories/GHSA-f2c9-5jqw-3xh3', 'https://github.com/increments/qiita-markdown/compare/v0.32.0...v0.33.0'}
| null |
GHSA
|
GHSA-q5pq-pgrv-fh89
|
Critical severity vulnerability that affects dns-sync
|
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.
|
{'CVE-2014-9682'}
|
2021-09-16T19:33:41Z
|
2017-10-24T18:33:36Z
|
CRITICAL
| 0
|
{'CWE-77'}
|
{'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d', 'https://github.com/skoranga/node-dns-sync/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9682', 'https://github.com/advisories/GHSA-q5pq-pgrv-fh89', 'http://www.openwall.com/lists/oss-security/2014/11/11/6'}
| null |
GHSA
|
GHSA-v4cp-h94r-m7xf
|
Use after free passing `externref`s to Wasm in Wasmtime
|
### Impact
There was a use-after-free bug when passing `externref`s from the host to guest Wasm content.
To trigger the bug, you have to explicitly pass multiple `externref`s from the host to a Wasm instance at the same time, either by
* passing multiple `externref`s as arguments from host code to a Wasm function,
* or returning multiple `externref`s to Wasm from a multi-value return function defined in the host.
If you do not have host code that matches one of these shapes, then you are not impacted.
If Wasmtime's [`VMExternRefActivationsTable`](https://github.com/bytecodealliance/wasmtime/blob/37c094faf53f1b356aab3c79d451395e4f7edb34/crates/runtime/src/externref.rs#L493) became filled to capacity after passing the first `externref` in, then passing in the second `externref` could trigger a garbage collection. However the first `externref` is not rooted until we pass control to Wasm, and therefore could be reclaimed by the collector if nothing else was holding a reference to it or otherwise keeping it alive. Then, when control was passed to Wasm after the garbage collection, Wasm could use the first `externref`, which at this point has already been freed.
We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare.
### Patches
The bug has been fixed, and users should upgrade to Wasmtime 0.30.0.
Additionally, we have updated [our primary `externref` fuzz target](https://github.com/bytecodealliance/wasmtime/blob/37c094faf53f1b356aab3c79d451395e4f7edb34/fuzz/fuzz_targets/table_ops.rs) such that it better exercises these code paths and we can have greater confidence in their correctness going forward.
### Workarounds
If you cannot upgrade Wasmtime yet, you can avoid the bug by disabling reference types support in Wasmtime by passing `false` to [`wasmtime::Config::wasm_reference_types`](https://docs.rs/wasmtime/0.29.0/wasmtime/struct.Config.html#method.wasm_reference_types).
### References
* [The reference types Wasm proposal, which introduces `externref`](https://github.com/WebAssembly/reference-types/)
### For more information
If you have any questions or comments about this advisory:
* Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)
* Open an issue in [the `bytecodealliance/wasmtime` repository](https://github.com/bytecodealliance/wasmtime/)
|
{'CVE-2021-39216'}
|
2022-04-19T19:03:08Z
|
2021-09-20T19:54:05Z
|
MODERATE
| 6.3
|
{'CWE-416'}
|
{'https://github.com/advisories/GHSA-v4cp-h94r-m7xf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39216', 'https://github.com/bytecodealliance/wasmtime/commit/101998733b74624cbd348a2366d05760b40181f3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/', 'https://crates.io/crates/wasmtime', 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-v4cp-h94r-m7xf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/'}
| null |
GHSA
|
GHSA-c3g4-w6cv-6v7h
|
Non-empty default inheritable capabilities for linux container in Buildah
|
A bug was found in Buildah where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).
This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.
|
{'CVE-2022-27651'}
|
2022-04-19T18:02:47Z
|
2022-04-01T13:56:42Z
|
MODERATE
| 6.8
|
{'CWE-276'}
|
{'https://github.com/containers/buildah/commit/90b3254c7404039c1c786999ac189654228f6e0e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27651', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VWH6X6HOFPO6HTESF42HIJZEPXSWVIO/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NETC7I6RTMMBRJJQVJOJUPDK4W4PQSJ/', 'https://github.com/advisories/GHSA-c3g4-w6cv-6v7h', 'https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b', 'https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h', 'https://github.com/containers/buildah/pull/3855', 'https://bugzilla.redhat.com/show_bug.cgi?id=2066840'}
| null |
GHSA
|
GHSA-chxf-fjcf-7fwp
|
Possible filesystem space exhaustion by local users
|
`fscrypt` through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to `fscrypt` v0.3.3 or above and adjusting the permissions on existing `fscrypt` metadata directories where applicable.
For more details, see [CVE-2022-25326](https://www.cve.org/CVERecord?id=CVE-2022-25326) and https://github.com/google/fscrypt#setting-up-fscrypt-on-a-filesystem.
| null |
2022-04-19T19:03:25Z
|
2022-03-01T21:04:07Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-chxf-fjcf-7fwp', 'https://github.com/google/fscrypt/security/advisories/GHSA-chxf-fjcf-7fwp'}
| null |
GHSA
|
GHSA-7g47-xxff-9p85
|
Remote unauthenticated attackers able to upload files in Onionshare
|
OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.
|
{'CVE-2021-41868'}
|
2021-11-19T20:39:44Z
|
2021-11-19T20:39:44Z
|
CRITICAL
| 9.8
| null |
{'https://github.com/advisories/GHSA-7g47-xxff-9p85', 'https://www.ihteam.net/advisory/onionshare/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41868', 'https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4'}
| null |
GHSA
|
GHSA-hj2j-77xm-mc5v
|
High severity vulnerability that affects Jinja2
|
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
|
{'CVE-2016-10745'}
|
2021-09-14T17:21:43Z
|
2019-04-10T14:30:13Z
|
HIGH
| 8.6
|
{'CWE-134'}
|
{'https://access.redhat.com/errata/RHSA-2019:4062', 'https://access.redhat.com/errata/RHSA-2019:1237', 'https://github.com/advisories/GHSA-hj2j-77xm-mc5v', 'https://github.com/pallets/jinja/commit/9b53045c34e61013dc8f09b7e52a555fa16bed16', 'https://usn.ubuntu.com/4011-2/', 'https://access.redhat.com/errata/RHSA-2019:1260', 'https://access.redhat.com/errata/RHSA-2019:1022', 'https://palletsprojects.com/blog/jinja-281-released/', 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10745', 'https://access.redhat.com/errata/RHSA-2019:3964', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html', 'https://usn.ubuntu.com/4011-1/'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.