ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-5fm9-jmv7-fcx5
Malicious Package in asynnc
All versions of `asynnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:47:06Z
2020-09-02T18:35:26Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-5fm9-jmv7-fcx5', 'https://www.npmjs.com/advisories/842'}
null
GHSA
GHSA-hf6p-4rv2-9qrp
Path Traversal in bikshed
This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing include, include-code or include-raw block is processed. The contents of arbitrary files could be disclosed in the HTML output.
{'CVE-2021-23423'}
2021-08-30T16:25:42Z
2021-08-30T16:25:42Z
MODERATE
5.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-hf6p-4rv2-9qrp', 'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23423', 'https://snyk.io/vuln/SNYK-PYTHON-BIKESHED-1537647'}
null
GHSA
GHSA-87qw-7v97-w34r
Malicious Package in asinc
All versions of `asinc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:46:37Z
2020-09-02T18:33:18Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-87qw-7v97-w34r', 'https://www.npmjs.com/advisories/840'}
null
GHSA
GHSA-5whq-j5qg-wjvp
Stored Cross-Site Scripting vulnerability in admin component of DotNetNuke
Cross-site scripting (XSS) is possible in DNN (formerly DotNetNuke) before 9.4.0 by remote authenticated users via the Display Name field in the admin notification function.
{'CVE-2019-12562'}
2021-08-18T22:33:30Z
2019-11-18T17:16:06Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12562', 'http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html', 'https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/', 'https://github.com/advisories/GHSA-5whq-j5qg-wjvp'}
null
GHSA
GHSA-h6hq-c896-w882
Low severity vulnerability that affects Plone
Cross-site scripting (XSS) vulnerability in the safe_html filter in Products.PortalTransforms in Plone 2.1 through 4.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2010-2422.
{'CVE-2011-1949'}
2021-09-14T15:28:53Z
2018-07-23T21:01:10Z
LOW
0
{'CWE-79'}
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/67694', 'http://osvdb.org/72728', 'http://plone.org/products/plone/security/advisories/CVE-2011-1949', 'http://secunia.com/advisories/44775', 'http://secunia.com/advisories/44776', 'https://github.com/advisories/GHSA-h6hq-c896-w882', 'http://securityreason.com/securityalert/8269', 'http://www.securityfocus.com/bid/48005', 'http://www.securityfocus.com/archive/1/518155/100/0/threaded', 'https://nvd.nist.gov/vuln/detail/CVE-2011-1949'}
null
GHSA
GHSA-878x-85hc-gc4g
SQL Injection in LibreNMS
An issue was discovered in LibreNMS 1.50.1. A SQL injection flaw was identified in the ajax_rulesuggest.php file where the term parameter is used insecurely in a database query for showing columns of a table, as demonstrated by an ajax_rulesuggest.php?debug=1&term= request.
{'CVE-2019-12465'}
2021-08-18T18:58:36Z
2019-10-11T18:43:29Z
HIGH
8.1
{'CWE-89'}
{'https://github.com/advisories/GHSA-878x-85hc-gc4g', 'https://www.darkmatter.ae/xen1thlabs/librenms-sql-injection-vulnerability-xl-19-024/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12465'}
null
GHSA
GHSA-q897-9jxf-jg9r
Security check skip in Apache Dubbo
The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.
{'CVE-2021-37579'}
2021-09-20T20:18:29Z
2021-09-10T17:56:23Z
CRITICAL
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/r898afa109cdbb4b79724308648ff0718152ebe1d3d6dfc7202d958bc%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37579', 'https://github.com/advisories/GHSA-q897-9jxf-jg9r'}
null
GHSA
GHSA-f7wm-x4gw-6m23
Insert tag injection in forms
### Impact It is possible to inject insert tags in front end forms which will be replaced when the page is rendered. ### Patches Update to Contao 4.4.52, 4.9.6 or 4.10.1. ### Workarounds Disable the front end login form and do not use form fields with array keys such as `fieldname[]`. ### References https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
{'CVE-2020-25768'}
2021-08-02T15:23:31Z
2020-09-24T16:23:54Z
MODERATE
5.3
{'CWE-74', 'CWE-20'}
{'https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html', 'https://github.com/advisories/GHSA-f7wm-x4gw-6m23', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25768', 'https://community.contao.org/en/forumdisplay.php?4-Announcements', 'https://github.com/contao/contao/security/advisories/GHSA-f7wm-x4gw-6m23'}
null
GHSA
GHSA-cxw4-9qv9-vx5h
High severity vulnerability that affects PeterO.Cbor
### Impact The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as `EncodeToBytes`, `ToString`, or `ToJSONString`, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved. The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication. ### Patches This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library. ### Workarounds Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution. In version 3.6, if the method used `CBORObject.Read()` or `CBORObject.DecodeFromBytes()` to decode a serialized CBOR object, call the overload that takes `CBOREncodeOptions` as follows: CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions("resolvereferences=false")); In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows: if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) { cbor.EncodeToBytes(); } Alternatively, for such versions, the application can use `WriteTo` to decode the CBOR object to a so-called "limited memory stream", that is, a `Stream` that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory. using(var stream = new LimitedMemoryStream(100000)) { // Limit to 100000 bytes cbor.WriteTo(stream); return stream.ToBytes(); } To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings). ### References See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253). ### For more information If you have any questions or comments about this advisory: * Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
null
2022-01-18T23:06:10Z
2019-09-30T19:42:28Z
HIGH
0
null
{'https://github.com/advisories/GHSA-cxw4-9qv9-vx5h', 'https://github.com/peteroupc/CBOR/security/advisories/GHSA-cxw4-9qv9-vx5h'}
null
GHSA
GHSA-7cqg-8449-rmfv
Observable Discrepancy in libsecp256k1-rs
A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
{'CVE-2019-20399'}
2021-08-25T21:01:27Z
2021-08-25T21:01:27Z
MODERATE
5.9
{'CWE-362', 'CWE-203'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-20399', 'https://github.com/paritytech/libsecp256k1/commit/11ba23a9766a5079918cd9f515bc100bc8164b50', 'https://github.com/advisories/GHSA-7cqg-8449-rmfv'}
null
GHSA
GHSA-ffjp-66mx-3qpj
Privilege escalation in beego
An issue was discovered in file profile.go. The MemProf and GetCPUProfile functions do not correctly check whether the created file exists. As a result attackers can launch attacks symlink attacks locally. Attackers can use this vulnerability to escalate privileges.
{'CVE-2021-27116'}
2022-04-19T14:07:24Z
2022-04-06T00:01:30Z
HIGH
7.8
{'CWE-59'}
{'https://github.com/beego/beego/issues/4484', 'https://github.com/advisories/GHSA-ffjp-66mx-3qpj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27116'}
null
GHSA
GHSA-923p-fr2c-g5m2
Exposure of Sensitive Information to an Unauthorized Actor in Ansible
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
{'CVE-2020-1739'}
2022-04-04T21:22:08Z
2021-04-07T20:30:44Z
LOW
3.9
{'CWE-200'}
{'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html', 'https://www.debian.org/security/2021/dsa-4950', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/', 'https://github.com/ansible/ansible/issues/67797', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1739', 'https://github.com/advisories/GHSA-923p-fr2c-g5m2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739'}
null
GHSA
GHSA-rxmr-c9jm-7mm8
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false.
{'CVE-2018-1284'}
2021-09-20T14:46:09Z
2018-11-21T22:24:22Z
LOW
3.7
{'CWE-200'}
{'https://lists.apache.org/thread.html/29184dbce4a37be2af36e539ecb479b1d27868f73ccfdff46c7174b4@%3Cdev.hive.apache.org%3E', 'http://www.securityfocus.com/bid/103750', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1284', 'https://github.com/advisories/GHSA-rxmr-c9jm-7mm8'}
null
GHSA
GHSA-46m8-42hm-wvvw
Cross-Site Scripting in emojione
Affected versions of `emojione` are vulnerable to cross-site scripting when user input is passed into the `toShort()`, `shortnameToImage()`, `unicodeToImage()`, and `toImage()` functions. ## Recommendation Update to version 1.3.1 or later.
{'CVE-2016-1000231'}
2021-09-23T21:33:01Z
2020-09-01T15:34:16Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-46m8-42hm-wvvw', 'https://github.com/Ranks/emojione/issues/61', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000231', 'https://www.npmjs.com/advisories/129'}
null
GHSA
GHSA-cvgx-3v3q-m36c
Heap OOB in shape inference for `QuantizeV2`
### Impact The [shape inference code for `QuantizeV2`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/framework/common_shape_fns.cc#L2509-L2530) can trigger a read outside of bounds of heap allocated array: ```python import tensorflow as tf @tf.function def test(): data=tf.raw_ops.QuantizeV2( input=[1.0,1.0], min_range=[1.0,10.0], max_range=[1.0,10.0], T=tf.qint32, mode='MIN_COMBINED', round_mode='HALF_TO_EVEN', narrow_range=False, axis=-100, ensure_minimum_range=10) return data test() ``` This occurs whenever `axis` is a negative value less than `-1`. In this case, we are accessing data before the start of a heap buffer: ```cc int axis = -1; Status s = c->GetAttr("axis", &axis); if (!s.ok() && s.code() != error::NOT_FOUND) { return s; } ... if (axis != -1) { ... TF_RETURN_IF_ERROR( c->Merge(c->Dim(minmax, 0), c->Dim(input, axis), &depth)); } ``` The code allows `axis` to be an optional argument (`s` would contain an `error::NOT_FOUND` error code). Otherwise, it assumes that `axis` is a valid index into the dimensions of the `input` tensor. If `axis` is less than `-1` then this results in a heap OOB read. ### Patches We have patched the issue in GitHub commit [a0d64445116c43cf46a5666bd4eee28e7a82f244](https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41211'}
2021-11-10T19:01:03Z
2021-11-10T19:01:03Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvgx-3v3q-m36c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41211', 'https://github.com/advisories/GHSA-cvgx-3v3q-m36c', 'https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244'}
null
GHSA
GHSA-9689-rx4v-cqgc
Open Redirect
Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse.
{'CVE-2018-15798'}
2022-04-12T22:10:05Z
2022-02-15T01:57:18Z
MODERATE
5.4
{'CWE-601'}
{'https://github.com/concourse/concourse/blob/release/5.2.x/release-notes/v5.2.8.md', 'https://pivotal.io/security/cve-2018-15798', 'https://github.com/advisories/GHSA-9689-rx4v-cqgc', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15798', 'https://github.com/concourse/concourse/pull/5350/commits/38cb4cc025e5ed28764b4adc363a0bbf41f3c7cb'}
null
GHSA
GHSA-hc33-32vw-rpp9
Remote Code Execution Vulnerability in Session Storage
### Impact A malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store. If your application does not use Ratpack's session mechanism, it is not vulnerable. ### Details Attackers with the ability to write to session data, can potentially craft payloads that deserialize unsafe objects, leading to the ability to remotely execute arbitrary code. This is known as an “[insecure deserialization](https://portswigger.net/web-security/deserialization)” vulnerability, or “gadget vulnerability”. Ratpack allows session data to be stored server side in an external system such as a relational database, or client side via user cookies. When using server side storage, the attacker would need to obtain the ability to write to the session data store. When using client side storage, the attacker would need to obtain the secrets used to encrypt and/or sign the session data stored in user cookies. Ratpack's session mechanism allows storing serialized objects, of arbitrary types. The type must be specified when writing the data and when reading, with data only deserialized when there is an exact type match. However, in the process of deserializing an object of a known/trusted/deserialization-safe type, it may attempt to deserialize unsafe types. By default Ratpack uses Java's built-in serialization mechanism, though other serialization providers can be used. The exact types of payloads required to enable an exploit depend on the exact serialization mechanism used. To mitigate this vulnerability, Ratpack now employs a “strict allow-list” when deserializing (and serializing) objects to session data. All concrete types of objects serialized must be explicitly declared as safe. Some standard well known JDK types are registered by default. Serialization is provided by implementations of [`SessionSerializer`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html). Its existing methods have been deprecated, and replaced with a [new methods](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html#deserialize(java.lang.Class,java.io.InputStream,ratpack.session.SessionTypeFilter)) that accept a [`SessionTypeFilter`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionTypeFilter.html) that can be used to assert whether a type is allowed when serializing and deserializing. The default serializer implementation has been updated to use this mechanism. Any proprietary implementations should also be updated to consult the type filter _before_ serializing or deserializing data. Warnings will be logged any time an implementation that does not implement the new methods is used. Upon upgrading to Ratpack 1.9, users of the built-in serialization mechanism will need to change their application to declare all types currently being serialized as being safe. This can be done using the new [`SessionModule.allowTypes()`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionModule.html#allowTypes(com.google.inject.Binder,java.lang.Class...)) method. Please see its documentation for details...)) ### Patches Ratpack 1.9.0 introduces a strict allow-list mechanism that mitigates this vulnerability when used. ### Workarounds The simplest mitigation for users of earlier versions is to reduce the likelihood of attackers being able to write to the session data store. Alternatively or additionally, the allow-list mechanism could be manually back ported by providing an alternative implementation of `SessionSerializer` that uses an allow-list. ### References - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ - https://owasp.org/www-community/vulnerabilities/Deserialization_of_untrusted_data
{'CVE-2021-29485'}
2022-04-19T19:02:29Z
2021-07-01T17:01:16Z
CRITICAL
9.9
{'CWE-502'}
{'https://github.com/ratpack/ratpack/security/advisories/GHSA-hc33-32vw-rpp9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29485', 'https://mvnrepository.com/artifact/io.ratpack/ratpack-core', 'https://github.com/advisories/GHSA-hc33-32vw-rpp9'}
null
GHSA
GHSA-m852-866j-69j8
Malicious Package in eslint-config-airbnb-standard
Version 2.0.0 of `eslint-config-airbnb-standard` was published with a bundled version of `eslint-scope` that was found to contain malicious code. This code would read the users `.npmrc` file and send it's contents to a remote server. ## Recommendation The best course of action if you found this package installed in your environment is to revoke all your npm tokens and use a different version of the module. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
null
2021-10-01T13:27:58Z
2020-09-01T20:47:01Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/675', 'https://github.com/advisories/GHSA-m852-866j-69j8'}
null
GHSA
GHSA-wh87-3959-vfrq
Malicious Package in buffer-hor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:58:38Z
2020-09-03T21:51:58Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-wh87-3959-vfrq', 'https://www.npmjs.com/advisories/1242'}
null
GHSA
GHSA-62g9-6hw5-rwfp
Path Traversal in resolve-path
Versions of `resolve-path` before 1.4.0 are vulnerable to path traversal. `resolve-path` relative path resolving suffers from a lack of file path sanitization for windows based paths. ## Recommendation Update to version 1.4.0 or later.
{'CVE-2018-3732'}
2021-01-08T21:07:10Z
2018-07-18T21:20:25Z
HIGH
0
{'CWE-22'}
{'https://hackerone.com/reports/315760', 'https://www.npmjs.com/advisories/573', 'https://github.com/advisories/GHSA-62g9-6hw5-rwfp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3732', 'https://github.com/pillarjs/resolve-path/commit/fe5b8052cafd35fcdafe9210e100e9050b37d2a0'}
null
GHSA
GHSA-cq27-v7xp-c356
Moderate severity vulnerability that affects pycrypto
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
{'CVE-2013-7459'}
2021-09-09T20:09:53Z
2018-12-14T18:51:38Z
CRITICAL
9.8
{'CWE-119'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJ37R2YLX56YZABFNAOWV4VTHTGYREAE/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7459', 'https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4', 'http://www.openwall.com/lists/oss-security/2016/12/27/8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C6BWNADPLKDBBQBUT3P75W7HAJCE7M3B/', 'https://github.com/advisories/GHSA-cq27-v7xp-c356', 'http://www.securityfocus.com/bid/95122', 'https://bugzilla.redhat.com/show_bug.cgi?id=1409754', 'https://github.com/dlitz/pycrypto/issues/176', 'https://security.gentoo.org/glsa/201702-14', 'https://pony7.fr/ctf:public:32c3:cryptmsg'}
null
GHSA
GHSA-82mf-mmh7-hxp5
Directory traversal in development mode handler in Vaadin 14 and 15-17
Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder. - https://vaadin.com/security/cve-2020-36321
null
2021-10-08T21:24:02Z
2021-04-19T14:48:15Z
MODERATE
5.9
{'CWE-20'}
{'https://vaadin.com/security/cve-2020-36321', 'https://github.com/vaadin/platform/security/advisories/GHSA-82mf-mmh7-hxp5', 'https://github.com/advisories/GHSA-82mf-mmh7-hxp5'}
null
GHSA
GHSA-wmjf-jpjj-9f3j
Low severity vulnerability that affects rubocop
RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local users to exploit this to tamper with cache files belonging to other users.
{'CVE-2017-8418'}
2021-09-21T21:13:14Z
2017-11-15T20:39:47Z
LOW
3.3
{'CWE-668'}
{'http://www.openwall.com/lists/oss-security/2017/05/01/14', 'https://nvd.nist.gov/vuln/detail/CVE-2017-8418', 'https://github.com/bbatsov/rubocop/issues/4336', 'https://github.com/advisories/GHSA-wmjf-jpjj-9f3j'}
null
GHSA
GHSA-wvhm-4hhf-97x9
Cross-Site Scripting in Prism
### Impact The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer. This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 to v1.9.0). ### Patches This problem is patched in v1.21.0. ### Workarounds To workaround the issue without upgrading, [disable the easing preview](https://prismjs.com/plugins/previewers/#disabling-a-previewer) on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround. ### References The vulnerability was introduced by this [commit](https://github.com/PrismJS/prism/commit/4303c940d3d3a20e8ce7635bf23331c75060f5c5) on Sep 29, 2015 and fixed by [Masato Kinugawa](https://twitter.com/kinugawamasato) (#2506). ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/PrismJS/prism/issues).
{'CVE-2020-15138'}
2022-04-19T19:02:32Z
2020-08-07T22:28:30Z
HIGH
7.1
{'CWE-79'}
{'https://github.com/PrismJS/prism/security/advisories/GHSA-wvhm-4hhf-97x9', 'https://prismjs.com/plugins/previewers/#disabling-a-previewer', 'https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c', 'https://github.com/advisories/GHSA-wvhm-4hhf-97x9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15138'}
null
GHSA
GHSA-pr34-8jfr-xhv8
Downloads Resources over HTTP in selenium-wrapper
Affected versions of `selenium-wrapper` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-wrapper`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10628'}
2021-01-08T18:20:01Z
2019-02-18T23:47:21Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/224', 'https://www.npmjs.com/advisories/224', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10628', 'https://github.com/advisories/GHSA-pr34-8jfr-xhv8'}
null
GHSA
GHSA-3cv4-xxv7-934q
Improper Verification of Cryptographic Signature in Apache Pulsar
If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins).
{'CVE-2021-22160'}
2021-06-07T20:49:23Z
2021-06-01T21:53:49Z
CRITICAL
9.8
{'CWE-347'}
{'https://lists.apache.org/thread.html/r9a12b4da2f26ce9b8f7e7117a879efaa973dab7e54717bbc7923fab1%40%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8e545559781231a83bf0644548c660255859e52feb86bbfcd42590da@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rca54f4b26ba5e6f2e39732b47ec51640e89f57e3b6a38ac3bab314df@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r347650d15a3e9c5f58b83e918b6ad6dedc2a63d3eb63da8e6a7be87e%40%3Cusers.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-3cv4-xxv7-934q', 'https://lists.apache.org/thread.html/rf54fefc25c49d4715d484133d438f13bf2e515a5fed5d3a745d4f6e7@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/re2ae364e0c02093dc721699698c6f23cfbba0220c78b5e28cafeae81@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rbe845aa1573a61769b9c5916c62971f4b10de87c2ea5f38a97f0cf84@%3Cdev.pulsar.apache.org%3E', 'https://github.com/apache/pulsar/releases/tag/v2.7.2', 'https://lists.apache.org/thread.html/rf2e90942996dceebac8296abf39257cfeb5ae918f82f7af3d37a48c5@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cusers.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22160', 'https://lists.apache.org/thread.html/r08c7df60cae031361df7fbac39d08b6d5b5079e74db5195d409db9a2@%3Cdev.pulsar.apache.org%3E'}
null
GHSA
GHSA-wp34-mqw5-jj85
Use after free in nano_arena
An issue was discovered in the nano_arena crate before 0.5.2 for Rust. There is an aliasing violation in split_at because two mutable references can exist for the same element, if Borrow<Idx> behaves in certain ways. This can have a resultant out-of-bounds write or use-after-free.
{'CVE-2021-28032'}
2021-08-25T20:52:00Z
2021-08-25T20:52:00Z
CRITICAL
9.8
{'CWE-416'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0031.html', 'https://github.com/advisories/GHSA-wp34-mqw5-jj85', 'https://github.com/bennetthardwick/nano-arena/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28032'}
null
GHSA
GHSA-88cw-3m6x-49f7
Out-of-bounds Write in ChakraCore
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.
{'CVE-2020-17054'}
2021-08-02T17:25:58Z
2021-08-02T17:25:58Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/pull/6528', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17054', 'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1', 'https://github.com/advisories/GHSA-88cw-3m6x-49f7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17054'}
null
GHSA
GHSA-57f3-gghm-9mhc
Regular Expression Denial of Service (ReDoS)
This affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function.
{'CVE-2021-23353'}
2021-03-25T00:18:31Z
2021-03-12T21:28:46Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23353', 'https://snyk.io/vuln/SNYK-JS-JSPDF-1073626', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288', 'https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286', 'https://github.com/advisories/GHSA-57f3-gghm-9mhc', 'https://github.com/MrRio/jsPDF/pull/3091'}
null
GHSA
GHSA-hg78-c92r-hvwr
Denial of Service in mqtt
Affected versions of `mqtt` will cause the node process to crash when receiving specially crafted MQTT packets, making the application vulnerable to a denial of service condition. ## Recommendation Update to v1.0.0 or later
{'CVE-2016-1000242'}
2021-09-23T21:37:39Z
2020-09-01T16:01:24Z
HIGH
7.5
{'CWE-248'}
{'https://snyk.io/vuln/npm:mqtt:20160817', 'https://github.com/advisories/GHSA-hg78-c92r-hvwr', 'https://github.com/mqttjs/MQTT.js/blob/388a084d7803934b18b43c1146c817deaa1396b1/lib/parse.js#L230', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000242', 'https://www.npmjs.com/advisories/140'}
null
GHSA
GHSA-c78w-2gw7-gjv3
XSS in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in: the core parser and `media` plugin. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.9 or lower and TinyMCE 5.2.1 or lower. ### Patches This vulnerability has been patched in TinyMCE 4.9.10 and 5.2.2 by improved HTML parsing and sanitization logic. ### Workarounds The workarounds available are: - disable the media plugin and manually sanitize CDATA content (see below) or - upgrade to either TinyMCE 4.9.10 or TinyMCE 5.2.2 #### Example: Manually strip CDATA elements ```js setup: function(editor) { editor.on('PreInit', function() { editor.parser.addNodeFilter('#cdata', function(nodes) { for (var i = 0; i < nodes.length; i++) { nodes[i].remove(); } }); }); } ``` ### Acknowledgements Tiny Technologies would like to thank Michał Bentkowski and [intivesec](https://github.com/intivesec) for discovering these vulnerabilities. ### References https://www.tiny.cloud/docs/release-notes/release-notes522/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
{'CVE-2019-1010091'}
2021-01-14T17:50:10Z
2020-05-11T20:00:15Z
MODERATE
0
{'CWE-79'}
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-c78w-2gw7-gjv3', 'https://github.com/tinymce/tinymce/issues/4394', 'https://github.com/advisories/GHSA-c78w-2gw7-gjv3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010091'}
null
GHSA
GHSA-5fxf-x22x-5q38
Cross-site Scripting in microweber
XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0929'}
2022-03-22T20:02:31Z
2022-03-13T00:00:54Z
MODERATE
6.8
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0929', 'https://huntr.dev/bounties/66abf7ec-2dd7-4cb7-87f5-e91375883f03', 'https://github.com/advisories/GHSA-5fxf-x22x-5q38'}
null
GHSA
GHSA-c6jq-h4jp-72pr
NULL Pointer Dereference in aubio
aubio v0.4.0 to v0.4.8 has a new_aubio_onset NULL pointer dereference.
{'CVE-2018-19802'}
2021-08-17T19:08:16Z
2019-07-26T16:10:25Z
HIGH
7.5
{'CWE-476'}
{'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog', 'https://github.com/advisories/GHSA-c6jq-h4jp-72pr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19802'}
null
GHSA
GHSA-8wr4-2wm6-w3pr
B2 Command Line Tool TOCTOU application key disclosure
### Impact Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/account_info`, `~/.b2_account_info` or a user-defined path) when `b2 authorize-account` is first run. This happens regardless of whether a valid key is provided or not. When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory is readable by a local attacker and the user did not yet run `b2 authorize-account` then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. ### Remediation Users that have not yet run `b2 authorize-account` should upgrade to B2 Command-Line Tool v3.2.1 before running it. Users that have run `b2 authorize-account` are safe if at the time of the file creation no other local users had read access to the local configuration file. Users that have run `b2 authorize-account` where the designated path could be opened by another local user should upgrade to B2 Command-Line Tool v3.2.1 and remove the database and regenerate all application keys. Note that `b2 clear-account` does not remove the database file and it should not be used to ensure that all open handles to the file are invalidated. ### Workarounds If B2 Command-Line Tool cannot be upgraded to v3.2.1 due to a dependency conflict, a binary release can be used instead. Alternatively a new version could be installed within a virtualenv, or the permissions can be changed to prevent local users from opening the database file. ### For more information If you have any questions or comments about this advisory: * Open an issue in [B2 Command-Line Tool](https://github.com/Backblaze/B2_Command_Line_Tool) mentioning the CVE id in the issue title * Email us at [security@backblaze.com](mailto:security@backblaze.com)
{'CVE-2022-23653'}
2022-04-19T19:03:23Z
2022-02-24T13:11:51Z
MODERATE
4.7
{'CWE-367'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23653', 'https://github.com/advisories/GHSA-8wr4-2wm6-w3pr', 'https://github.com/Backblaze/B2_Command_Line_Tool/commit/c74029f9f75065e8f7e3c3ec8e0a23fb8204feeb', 'https://github.com/Backblaze/B2_Command_Line_Tool/security/advisories/GHSA-8wr4-2wm6-w3pr'}
null
GHSA
GHSA-m3rf-7m4w-r66q
Improper Authentication in Flask-AppBuilder
### Impact Improper authentication on the REST API. Allows for a malicious actor with a carefully crafted request to successfully authenticate and gain access to existing protected REST API endpoints. Only affects non database authentication types, and new REST API endpoints. ### Patches Upgrade to Flask-AppBuilder 3.3.4 ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/dpgaspar/Flask-AppBuilder
{'CVE-2021-41265'}
2021-12-10T18:29:56Z
2021-12-09T19:09:07Z
HIGH
8.1
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41265', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-m3rf-7m4w-r66q', 'https://github.com/dpgaspar/Flask-AppBuilder/commit/eba517aab121afa3f3f2edb011ec6bc4efd61fbc', 'https://github.com/advisories/GHSA-m3rf-7m4w-r66q', 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.3.4'}
null
GHSA
GHSA-5946-mpw5-pqxx
Incorrect Default Permissions in Cobbler
An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.
{'CVE-2021-45083'}
2022-03-29T22:17:11Z
2022-02-21T00:00:20Z
HIGH
7.1
{'CWE-276'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/', 'https://github.com/advisories/GHSA-5946-mpw5-pqxx', 'https://github.com/cobbler/cobbler/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45083', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/', 'https://github.com/cobbler/cobbler/pull/2945', 'https://www.openwall.com/lists/oss-security/2022/02/18/3', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.1', 'https://bugzilla.suse.com/show_bug.cgi?id=1193671'}
null
GHSA
GHSA-mj6m-246h-9w56
Improper regex in htaccess file
### Impact the default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application. This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path. ### Patches Please upgrade to 3.3.5 or 4.2.0 ### Workarounds No ### References - Release post: https://www.mautic.org/blog/community/mautic-4-2-one-small-step-mautic - Internally tracked under MST-32 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2022-25769'}
2022-04-19T19:03:25Z
2022-03-01T22:05:34Z
MODERATE
0
null
{'https://github.com/mautic/mautic/security/advisories/GHSA-mj6m-246h-9w56', 'https://github.com/advisories/GHSA-mj6m-246h-9w56'}
null
GHSA
GHSA-jqpv-jm4m-86j9
Use After Free in libpulse-binding
An issue was discovered in the libpulse-binding crate before 1.2.1 for Rust. get_context can cause a use-after-free.
{'CVE-2018-25028'}
2022-01-06T22:17:50Z
2022-01-06T22:17:50Z
HIGH
7.5
{'CWE-416'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/libpulse-binding/RUSTSEC-2018-0021.md', 'https://github.com/advisories/GHSA-jqpv-jm4m-86j9', 'https://rustsec.org/advisories/RUSTSEC-2018-0021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25028'}
null
GHSA
GHSA-m8pw-hgvj-cwcm
Directory Traversal in sgqserve
Affected versions of `sgqserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16215'}
2021-01-14T15:45:34Z
2020-09-01T18:08:55Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sgqserve', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16215', 'https://nodesecurity.io/advisories/419', 'https://github.com/advisories/GHSA-m8pw-hgvj-cwcm', 'https://www.npmjs.com/advisories/419'}
null
GHSA
GHSA-69p6-wvmq-27gg
Command injection in ruby-git
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
{'CVE-2022-25648'}
2022-04-28T21:13:23Z
2022-04-20T00:00:33Z
CRITICAL
9.8
{'CWE-88'}
{'https://github.com/ruby-git/ruby-git/releases/tag/v1.11.0', 'https://github.com/advisories/GHSA-69p6-wvmq-27gg', 'https://github.com/ruby-git/ruby-git/pull/569', 'https://snyk.io/vuln/SNYK-RUBY-GIT-2421270', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25648'}
null
GHSA
GHSA-2c25-xfpq-8w9r
Cross-site scripting in jfinal
An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.
{'CVE-2021-33348'}
2021-08-13T15:22:14Z
2021-08-13T15:22:14Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/jfinal/jfinal/issues/188', 'https://github.com/advisories/GHSA-2c25-xfpq-8w9r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33348'}
null
GHSA
GHSA-8fx9-5hx8-crhm
Apache Struts 2.0.1 uses an unintentional expression in a Freemarker tag instead of string literal
In Apache Struts 2.0.1 through 2.3.33 and 2.5 through 2.5.10, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
{'CVE-2017-12611'}
2022-04-26T18:59:37Z
2018-10-16T19:35:40Z
CRITICAL
9.8
{'CWE-20'}
{'https://struts.apache.org/docs/s2-053.html', 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12611', 'https://github.com/advisories/GHSA-8fx9-5hx8-crhm', 'http://www.securityfocus.com/bid/100829', 'https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001'}
null
GHSA
GHSA-c738-77x8-wmq5
Uncontrolled Resource Consumption in XNIO
A vulnerability was discovered in XNIO where file descriptor leak caused by growing amounts of NIO Selector file handles between garbage collection cycles. It may allow the attacker to cause a denial of service. It affects XNIO versions 3.6.0.Beta1 through 3.8.1.Final.
{'CVE-2020-14340'}
2022-04-22T15:48:33Z
2021-06-08T22:29:29Z
MODERATE
5.9
{'CWE-400'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1860218', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14340', 'https://github.com/advisories/GHSA-c738-77x8-wmq5', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-gjph-xf5q-6mfq
Denial of Service in @hapi/ammo
Versions of `@hapi/ammo` prior to 3.1.2 or 5.0.1 are vulnerable to Denial of Service. The Range HTTP header parser has a vulnerability which will cause the function to throw a system error if the header is set to an invalid value. Because hapi is not expecting the function to ever throw, the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to version 3.1.2 or 5.0.1.
null
2020-09-03T15:46:02Z
2020-09-03T15:46:02Z
HIGH
0
null
{'https://github.com/advisories/GHSA-gjph-xf5q-6mfq', 'https://www.npmjs.com/advisories/1474'}
null
GHSA
GHSA-v7m9-9497-p9gr
Possible pod name collisions in jupyterhub-kubespawner
### Impact _What kind of vulnerability is it? Who is impacted?_ JupyterHub deployments using: - KubeSpawner <= 0.11.1 (e.g. zero-to-jupyterhub 0.9.0) and - enabled named_servers (not default), and - an Authenticator that allows: - usernames with hyphens or other characters that require escape (e.g. `user-hyphen` or `user@email`), and - usernames which may match other usernames up to but not including the escaped character (e.g. `user` in the above cases) In this circumstance, certain usernames will be able to craft particular server names which will grant them access to the default server of other users who have matching usernames. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Patch will be released in kubespawner 0.12 and zero-to-jupyterhub 0.9.1 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ #### KubeSpawner Specify configuration: for KubeSpawner ```python from traitlets import default from kubespawner import KubeSpawner class PatchedKubeSpawner(KubeSpawner): @default("pod_name_template") def _default_pod_name_template(self): if self.name: return "jupyter-{username}-{servername}" else: return "jupyter-{username}" @default("pvc_name_template") def _default_pvc_name_template(self): if self.name: return "claim-{username}-{servername}" else: return "claim-{username}" c.JupyterHub.spawner_class = PatchedKubeSpawner ``` **Note for KubeSpawner:** this configuration will behave differently before and after the upgrade, so will need to be removed when upgrading. Only apply this configuration while still using KubeSpawner ≤ 0.11.1 and remove it after upgrade to ensure consistent pod and pvc naming. Changing the name template means pvcs for named servers will have different names. This will result in orphaned PVCs for named servers across Hub upgrade! This may appear as data loss for users, depending on configuration, but the orphaned PVCs will still be around and data can be migrated manually (or new PVCs created manually to reference existing PVs) before deleting the old PVCs and/or PVs. ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [kubespawner](https://github.com/jupyterhub/kubespawner) * Email us at [security@ipython.org](mailto:security@ipython.org) Credit: Jining Huang
{'CVE-2020-15110'}
2021-11-19T15:44:02Z
2020-07-22T23:07:16Z
MODERATE
6.8
{'CWE-863'}
{'https://github.com/jupyterhub/kubespawner/commit/3dfe870a7f5e98e2e398b01996ca6b8eff4bb1d0', 'https://github.com/jupyterhub/kubespawner/security/advisories/GHSA-v7m9-9497-p9gr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15110', 'https://github.com/advisories/GHSA-v7m9-9497-p9gr'}
null
GHSA
GHSA-vxrc-68xx-x48g
Sandbox Information Disclosure
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.
{'CVE-2019-9942'}
2022-04-06T20:28:17Z
2022-03-26T00:25:25Z
LOW
3.7
null
{'https://seclists.org/bugtraq/2019/Mar/60', 'https://symfony.com/blog/twig-sandbox-information-disclosure', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9942', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2019-9942.yaml', 'https://www.debian.org/security/2019/dsa-4419', 'https://github.com/advisories/GHSA-vxrc-68xx-x48g', 'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'}
null
GHSA
GHSA-v73w-r9xg-7cr9
Use of insecure jQuery version in OctoberCMS
### Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. ### Patches Issue has been patched in Build 466 (v1.0.466) by applying the recommended patch from @jquery. ### Workarounds Apply https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892 to your installation manually if unable to upgrade to Build 466. ### References - https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022 - https://jquery.com/upgrade-guide/3.5/ ### For more information If you have any questions or comments about this advisory: * Email us at [octobercms@luketowers.ca](mailto:octobercms@luketowers.ca) & [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat Assessment Assessed as Moderate by the @jquery team. ### Acknowledgements Thanks to @mrgswift for reporting the issue to the October CMS team.
null
2022-04-19T19:02:27Z
2020-06-05T19:37:49Z
MODERATE
0
null
{'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892', 'https://github.com/advisories/GHSA-v73w-r9xg-7cr9', 'https://github.com/octobercms/october/security/advisories/GHSA-v73w-r9xg-7cr9', 'https://github.com/octobercms/october/issues/5097'}
null
GHSA
GHSA-vjqw-r3ww-wj2w
Expression Language Injection in Apache Syncope
A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.
{'CVE-2020-1959'}
2021-07-29T16:57:06Z
2021-06-16T17:18:58Z
CRITICAL
9.8
{'CWE-917'}
{'http://syncope.apache.org/security', 'https://github.com/advisories/GHSA-vjqw-r3ww-wj2w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1959'}
null
GHSA
GHSA-8843-m7mw-mxqm
Buffer overflow in Pillow
In Pillow before 6.2.3 and 7.x before 7.0.1, there are two Buffer Overflows in libImaging/TiffDecode.c.
{'CVE-2020-10379'}
2021-09-22T21:45:09Z
2020-07-27T21:52:41Z
HIGH
7.8
{'CWE-120'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/', 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging', 'https://github.com/python-pillow/Pillow/pull/4538', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10379', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html', 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574577', 'https://usn.ubuntu.com/4430-2/', 'https://github.com/advisories/GHSA-8843-m7mw-mxqm', 'https://github.com/python-pillow/Pillow/commit/46f4a349b88915787fea3fb91348bb1665831bbb#diff-9478f2787e3ae9668a15123b165c23ac', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/', 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}
null
GHSA
GHSA-m2wv-m5pf-284r
Cross-site Scripting in teampass
Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO. Someone must open a link for the Teampass Password Manager index page containing malicious payload.
{'CVE-2022-26980'}
2022-04-05T21:07:47Z
2022-03-29T00:01:09Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2', 'https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26980', 'https://github.com/advisories/GHSA-m2wv-m5pf-284r'}
null
GHSA
GHSA-694m-jhr9-pf77
High severity vulnerability that affects doorkeeper
Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.
{'CVE-2018-1000211'}
2021-09-02T15:43:13Z
2018-08-13T20:46:41Z
HIGH
7.5
{'CWE-732'}
{'https://github.com/advisories/GHSA-694m-jhr9-pf77', 'https://github.com/doorkeeper-gem/doorkeeper/pull/1119', 'https://github.com/doorkeeper-gem/doorkeeper/issues/891', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000211'}
null
GHSA
GHSA-5mxh-2qfv-4g7j
NUL character in ROA causes OctoRPKI to crash
OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded `NUL` (`\0`) character). ## Patches ## For more information If you have any questions or comments about this advisory email us at security@cloudflare.com
{'CVE-2021-3910'}
2022-04-05T19:29:26Z
2021-11-10T20:15:06Z
HIGH
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3910', 'https://www.debian.org/security/2022/dsa-5041', 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-5mxh-2qfv-4g7j', 'https://github.com/advisories/GHSA-5mxh-2qfv-4g7j', 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'}
null
GHSA
GHSA-wp7m-mrvf-599c
Command Injection in node-df
All versions of `node-df` are vulnerable to Command Injection. The package fails to sanitize filenames passed to the `file` option. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-15597'}
2021-11-01T14:12:07Z
2020-02-14T23:09:10Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15597', 'https://www.npmjs.com/advisories/1431', 'https://hackerone.com/reports/703412', 'https://github.com/advisories/GHSA-wp7m-mrvf-599c'}
null
GHSA
GHSA-gx7g-wjxg-jwwj
Cross-Site Request Forgery in YOURLS
YOURLS versions 1.8.2 and prior are vulnerable to Cross-Site Request Forgery.
{'CVE-2022-0088'}
2022-04-18T22:17:43Z
2022-04-04T00:00:55Z
LOW
3.5
{'CWE-352'}
{'https://github.com/YOURLS/YOURLS/pull/3264', 'https://github.com/advisories/GHSA-gx7g-wjxg-jwwj', 'https://github.com/YOURLS/YOURLS/issues/3170', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0088', 'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59', 'https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29'}
null
GHSA
GHSA-9hgc-wpc5-v8p9
An attacker can execute malicious javascript in Live Helper Chat
Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious javascript on application.
{'CVE-2022-1530'}
2022-05-03T20:49:16Z
2022-04-30T00:00:37Z
LOW
0
{'CWE-79'}
{'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1530', 'https://github.com/advisories/GHSA-9hgc-wpc5-v8p9', 'https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6'}
null
GHSA
GHSA-rpvr-mw7r-25xx
Path traversal in MCMS
MCMS v5.2.5 was discovered to contain an arbitrary file deletion vulnerability via the component oldFileName.
{'CVE-2021-46062'}
2022-03-01T21:24:01Z
2022-02-19T00:01:24Z
HIGH
7.1
{'CWE-22'}
{'https://github.com/advisories/GHSA-rpvr-mw7r-25xx', 'https://github.com/ming-soft/MCMS/issues/59', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46062'}
null
GHSA
GHSA-h5g2-38x9-4gv3
High severity vulnerability that affects archive-tar-minitar and minitar
Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry.
{'CVE-2016-10173'}
2021-09-13T16:33:15Z
2017-10-24T18:33:35Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10173', 'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4', 'http://www.openwall.com/lists/oss-security/2017/01/29/1', 'http://www.securityfocus.com/bid/95874', 'https://security.gentoo.org/glsa/201702-32', 'http://www.openwall.com/lists/oss-security/2017/01/24/7', 'https://github.com/halostatue/minitar/issues/16', 'https://puppet.com/security/cve/cve-2016-10173', 'https://github.com/advisories/GHSA-h5g2-38x9-4gv3', 'http://www.debian.org/security/2017/dsa-3778'}
null
GHSA
GHSA-x7m2-6g99-84w5
Arbitrary File Read in Snyk Broker
All versions of snyk-broker before 4.80.0 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users with access to Snyk's internal network via directory traversal.
{'CVE-2020-7652'}
2021-08-25T21:46:47Z
2020-06-03T22:02:24Z
MODERATE
6.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-x7m2-6g99-84w5', 'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570611', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7652'}
null
GHSA
GHSA-m98g-63qj-fp8j
Reflected XSS on clients-registrations endpoint
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak. When a malicious request is sent to the client registration endpoint, the error message is not properly escaped, allowing an attacker to execute malicious scripts into the user's browser. ### Acknowledgement Keycloak would like to thank Quentin TEXIER (Pentester at Opencyber) for reporting this issue.
null
2022-04-28T21:01:29Z
2022-04-28T21:01:28Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-m98g-63qj-fp8j', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-m98g-63qj-fp8j'}
null
GHSA
GHSA-v222-6mr4-qj29
Command Injection vulnerability in asciidoctor-include-ext
### Impact Applications using [Asciidoctor (Ruby)](https://github.com/asciidoctor/asciidoctor) with [asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext) (prior to version 0.4.0), which render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. ~~This attack is possible even when `allow-uri-read` is disabled!~~ (EDIT: it’s not) ### Patches The vulnerability has been fixed in commit c7ea001 (and further improved in cbaccf3), which is included in version [0.4.0](https://rubygems.org/gems/asciidoctor-include-ext/versions/0.4.0). ### Workarounds ```rb require 'asciidoctor/include_ext' class Asciidoctor::IncludeExt::IncludeProcessor # Overrides superclass private method to mitigate Command Injection # vulnerability in asciidoctor-include-ext <0.4.0. def target_uri?(target) target.downcase.start_with?('http://', 'https://') \ && URI.parse(target).is_a?(URI::HTTP) rescue URI::InvalidURIError false end end ``` ### References * https://sakurity.com/blog/2015/02/28/openuri.html ### Credits This vulnerability was discovered by Joern Schneeweisz from the GitLab Security Research Team. ### For more information See commit message c7ea001. If you have any questions or comments about this advisory open an issue in [jirutka/asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext/issues/).
{'CVE-2022-24803'}
2022-04-06T21:24:00Z
2022-03-31T23:27:15Z
CRITICAL
10
{'CWE-78'}
{'https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae155', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24803', 'https://github.com/advisories/GHSA-v222-6mr4-qj29', 'https://github.com/jirutka/asciidoctor-include-ext/security/advisories/GHSA-v222-6mr4-qj29', 'https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee'}
null
GHSA
GHSA-w8hg-mxvh-9h57
Malicious Package in angular-bmap
Version 0.0.9 of `angular-bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.0.9 of this module is found installed you will want to replace it with a version before or after 0.0.9. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T14:49:20Z
2020-09-01T19:42:49Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/shenfw1987/angular-bmap', 'https://github.com/advisories/GHSA-w8hg-mxvh-9h57', 'https://snyk.io/vuln/SNYK-JS-ANGULARBMAP-451017', 'https://www.npmjs.com/advisories/614'}
null
GHSA
GHSA-5gjh-5j4f-cpwv
Unrestricted Upload of File with Dangerous Type in Gogs
### Impact The malicious user is able to upload a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected. ### Patches Repository file uploads are prohibited to its `.git` directory. Users should upgrade to 0.12.6 or the latest 0.13.0+dev. ### Workarounds [Disable repository files upload](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L128-L129). ### References https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902/ ### For more information If you have any questions or comments about this advisory, please post on #6833.
{'CVE-2022-0415'}
2022-03-29T22:02:35Z
2022-03-28T16:46:41Z
HIGH
8.8
{'CWE-434', 'CWE-20'}
{'https://github.com/gogs/gogs/pull/6838', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0415', 'https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902', 'https://github.com/gogs/gogs/commit/0fef3c9082269e9a4e817274942a5d7c50617284', 'https://github.com/gogs/gogs/issues/6833', 'https://github.com/advisories/GHSA-5gjh-5j4f-cpwv', 'https://github.com/gogs/gogs/security/advisories/GHSA-5gjh-5j4f-cpwv'}
null
GHSA
GHSA-6898-wx94-8jq8
Potential Command Injection in libnotify
Versions 1.0.3 and earlier of libnotify are affected by a shell command injection vulnerability. This may result in execution of arbitrary shell commands, if user input is passed into libnotify.notify. Untrusted input passed in the call to libnotify.notify could result in execution of shell commands. Callers may be unaware of this. ### Example ``` var libnotify = require('libnotify') libnotify.notify('UNTRUSTED INPUT', { title: \"\" }, function () { console.log(arguments); }) ``` Special thanks to Neal Poole for submitting the pull request to fix this issue. ## Recommendation Update to version 1.0.4 or greater
{'CVE-2013-7381'}
2021-09-23T20:55:30Z
2020-08-31T22:50:48Z
CRITICAL
9.8
{'CWE-74'}
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://github.com/mytrile/node-libnotify/commit/dfe7801d73a0dda10663a0ff3d0ec8b4d5f0d448', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7381', 'https://nodesecurity.io/advisories/libnotify_potential_command_injection_in_libnotify.notify', 'https://www.npmjs.com/advisories/20', 'https://github.com/advisories/GHSA-6898-wx94-8jq8', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
null
GHSA
GHSA-qpgv-g792-wh6x
Uncontrolled Resource Consumption in parse_duration
An issue was discovered in the parse_duration crate through 2021-03-18 for Rust. It allows attackers to cause a denial of service (CPU and memory consumption) via a duration string with a large exponent.
{'CVE-2021-29932'}
2021-08-25T20:54:04Z
2021-08-25T20:54:04Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-qpgv-g792-wh6x', 'https://rustsec.org/advisories/RUSTSEC-2021-0041.html', 'https://github.com/zeta12ti/parse_duration/issues/21', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29932'}
null
GHSA
GHSA-fjqm-246c-mwqg
In Bouncy Castle JCE Provider the other party DH public key is not fully validated
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.
{'CVE-2016-1000346'}
2022-04-27T13:35:25Z
2018-10-17T16:27:28Z
LOW
3.7
null
{'https://usn.ubuntu.com/3727-1/', 'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000346', 'https://github.com/advisories/GHSA-fjqm-246c-mwqg', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927'}
null
GHSA
GHSA-62mh-w5cv-p88c
Import token permissions checking not enforced
(This advisory is canonically <https://advisories.nats.io/CVE/CVE-2021-3127.txt>) ## Problem Description The NATS server provides for Subjects which are namespaced by Account; all Subjects are supposed to be private to an account, with an Export/Import system used to grant cross-account access to some Subjects. Some Exports are public, such that anyone can import the relevant subjects, and some Exports are private, such that the Import requires a token JWT to prove permission. The JWT library's validation of the bindings in the Import Token incorrectly warned on mismatches, instead of outright rejecting the token. As a result, any account can take an Import token used by any other account and re-use it for themselves because the binding to the importing account is not rejected, and use it to import *any* Subject from the Exporting account, not just the Subject referenced in the Import Token. The NATS account-server system treats account JWTs as semi-public information, such that an attacker can easily enumerate all account JWTs and retrieve all Import Tokens from those account JWTs. The CVE identifier should cover the JWT library repair and the nats-server containing the fixed JWT library, and any other application depending upon the fixed JWT library. ## Affected versions #### JWT library * all versions prior to 2.0.1 * fixed after nats-io/jwt#149 landed (2021-03-14) #### NATS Server * Version 2 prior to 2.2.0 + 2.0.0 through and including 2.1.9 are vulnerable * fixed with nats-io/nats-server@423b79440c (2021-03-14) ## Impact In deployments with untrusted accounts able to update the Account Server with imports, a malicious account can access any Subject from an account which provides Exported Subjects. Abuse of this facility requires the malicious actor to upload their tampered Account JWT to the Account Server, providing the service operator with a data-store which can be scanned for signs of abuse. ## Workaround Deny access to clients to update their account JWT in the account server. ## Solution Upgrade the JWT dependency in any application using it. Upgrade the NATS server if using NATS Accounts (with private Exports; Account owners can create those at any time though). Audit all accounts JWTs to scan for exploit attempts; a Python script to audit the accounts can be found at <https://gist.github.com/philpennock/09d49524ad98043ff11d8a40c2bb0d5a>.
null
2022-02-15T00:42:57Z
2022-02-15T00:42:28Z
CRITICAL
0
{'CWE-863'}
{'https://github.com/advisories/GHSA-62mh-w5cv-p88c', 'https://github.com/nats-io/jwt/security/advisories/GHSA-62mh-w5cv-p88c'}
null
GHSA
GHSA-h6xq-3h62-99qx
Cross-site scripting in Apache Atlas
Apache Atlas before 2.1.0 contain a XSS vulnerability. While saving search or rendering elements values are not sanitized correctly and because of that it triggers the XSS vulnerability.
{'CVE-2020-13928'}
2022-02-10T20:51:46Z
2022-02-10T20:51:46Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/ra468036f913be41b0c8fea74f91d53e273b0bfa838a4b140a5dcd463%40%3Cuser.atlas.apache.org%3E', 'https://github.com/advisories/GHSA-h6xq-3h62-99qx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13928', 'https://mvnrepository.com/artifact/org.apache.atlas/apache-atlas'}
null
GHSA
GHSA-66p5-j55p-32r9
smallvec creates uninitialized value of any type
Affected versions of this crate called `mem::uninitialized()` to create values of a user-supplied type `T`. This is unsound e.g. if `T` is a reference type (which must be non-null and thus may not remain uninitialized). The flaw was corrected by avoiding the use of `mem::uninitialized()`, using `MaybeUninit` instead.
null
2021-08-25T21:00:25Z
2021-08-25T21:00:25Z
MODERATE
0
{'CWE-457'}
{'https://rustsec.org/advisories/RUSTSEC-2018-0018.html', 'https://github.com/advisories/GHSA-66p5-j55p-32r9', 'https://github.com/servo/rust-smallvec/pull/162', 'https://github.com/servo/rust-smallvec/issues/126'}
null
GHSA
GHSA-2p89-5f22-8qvf
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021
{'CVE-2021-32711'}
2021-09-08T18:00:32Z
2021-09-08T18:00:32Z
CRITICAL
9.1
{'CWE-200'}
{'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32711', 'https://github.com/advisories/GHSA-2p89-5f22-8qvf', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021', 'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'}
null
GHSA
GHSA-ph98-v78f-jqrm
SQL injection in jackalope/jackalope-doctrine-dbal
### Impact Users can provoke SQL injections if they can specify a node name or query. ### Patches Upgrade to version 1.7.4 If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`. ### Workarounds Node names and xpaths can contain `"` or `;` according to the JCR specification. The jackalope component that translates the query object model into doctrine dbal queries does not properly escape the names and paths, so that a accordingly crafted node name can lead to an SQL injection. If queries are never done from user input, or if you validate the user input to not contain `;`, you are not affected. ### References No further references. ### For more information If you have any questions or comments about this advisory: * Open an issue in [jackalope/jackalope-doctrine-dbal repo](https://github.com/jackalope/jackalope-doctrine-dbal/issues)
{'CVE-2021-43822'}
2022-04-19T19:03:17Z
2021-12-14T21:08:13Z
HIGH
8.5
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43822', 'https://github.com/advisories/GHSA-ph98-v78f-jqrm', 'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db', 'https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm'}
null
GHSA
GHSA-qvc5-cfrr-384v
RCE in Third Party Library in Shopware
### Impact RCE in Third Party Library ### Patches We recommend to update to the current version 6.3.1.1. You can get the update to 6.3.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### References https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020
null
2022-04-19T19:02:35Z
2020-09-23T17:20:28Z
LOW
0
null
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020', 'https://github.com/advisories/GHSA-qvc5-cfrr-384v', 'https://github.com/shopware/platform/security/advisories/GHSA-qvc5-cfrr-384v'}
null
GHSA
GHSA-fgv8-vj5c-2ppq
Incorrect Authorization in runc
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
{'CVE-2019-16884'}
2022-02-26T01:52:03Z
2022-02-22T15:38:08Z
HIGH
5.4
{'CWE-863'}
{'https://github.com/crosbymichael/runc/commit/78dce1cf1ec36bbe7fe6767bdb81f7cbf6d34d70', 'http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00073.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00009.html', 'https://access.redhat.com/errata/RHSA-2019:4269', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00010.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16884', 'https://github.com/opencontainers/runc/issues/2128', 'https://github.com/advisories/GHSA-fgv8-vj5c-2ppq', 'https://access.redhat.com/errata/RHSA-2019:4074', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD/', 'https://security.gentoo.org/glsa/202003-21', 'https://security.netapp.com/advisory/ntap-20220221-0004/', 'https://usn.ubuntu.com/4297-1/', 'https://access.redhat.com/errata/RHSA-2019:3940', 'https://github.com/opencontainers/runc/pull/2129'}
null
GHSA
GHSA-5w8q-x7hc-jhp6
Directory Traversal in node-simple-router
Affected versions of `node-simple-router` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation Update to v0.10.1 or later.
{'CVE-2017-16083'}
2021-01-08T19:48:06Z
2018-07-24T19:42:39Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/352', 'https://github.com/sandy98/node-simple-router/commit/dfdd52e2e80607af433097d940b3834fd96df488', 'https://github.com/advisories/GHSA-5w8q-x7hc-jhp6', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-simple-router', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16083', 'https://www.npmjs.com/advisories/352'}
null
GHSA
GHSA-f93p-f762-vr53
Reflected Cross-Site Scripting in Apache CXF
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.
{'CVE-2019-17573'}
2021-06-17T19:57:01Z
2020-06-10T20:02:33Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17573', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/11/12/2', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-f93p-f762-vr53', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rf3b50583fefce2810cbd37c3d358cbcd9a03e750005950bf54546194@%3Cannounce.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E'}
null
GHSA
GHSA-2382-qx5h-rvqh
SQL Injection in odata4j
odata4j 0.7.0 allows ExecuteCountQueryCommand.java SQL injection. NOTE, this product is apparently discontinued.
{'CVE-2016-11023'}
2021-05-07T15:52:56Z
2021-05-07T15:52:56Z
HIGH
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-2382-qx5h-rvqh', 'https://nvd.nist.gov/vuln/detail/CVE-2016-11023', 'https://groups.google.com/d/msg/odata4j-discuss/_lBwwXP30g0/Av6zkZMdBwAJ'}
null
GHSA
GHSA-9qgc-p27w-3hjg
High severity vulnerability that affects com.typesafe.akka:akka-http-core_2.11 and com.typesafe.akka:akka-http-core_2.12
The decodeRequest and decodeRequestWith directives in Lightbend Akka HTTP 10.1.x through 10.1.4 and 10.0.x through 10.0.13 allow remote attackers to cause a denial of service (memory consumption and daemon crash) via a ZIP bomb.
{'CVE-2018-16131'}
2021-09-08T20:46:55Z
2018-10-22T20:37:07Z
HIGH
7.5
{'CWE-400'}
{'https://akka.io/blog/news/2018/08/30/akka-http-dos-vulnerability-found', 'https://github.com/akka/akka-http/issues/2137', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16131', 'https://groups.google.com/forum/#!topic/akka-security/Dj7INsYWdjg', 'https://doc.akka.io/docs/akka-http/current/security/2018-09-05-denial-of-service-via-decodeRequest.html', 'https://github.com/advisories/GHSA-9qgc-p27w-3hjg'}
null
GHSA
GHSA-xgrx-xpv2-6vp4
Improper Authentication in Apache ActiveMQ
Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.
{'CVE-2020-13920'}
2022-02-09T22:15:00Z
2022-02-09T22:15:00Z
MODERATE
5.9
{'CWE-306'}
{'https://github.com/advisories/GHSA-xgrx-xpv2-6vp4', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00013.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://activemq.apache.org/security-advisories.data/CVE-2020-13920-announcement.txt', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13920'}
null
GHSA
GHSA-wpgh-hmv4-r3v5
Prototype pollution in safe-obj
Prototype pollution vulnerability in 'safe-obj' versions 1.0.0 through 1.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25928'}
2021-06-21T17:18:20Z
2021-06-21T17:18:20Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/mantacode/safe-obj/blob/6ab63529182b6cf11704ac84f10800290afd3f9f/lib/index.js#L122', 'https://github.com/advisories/GHSA-wpgh-hmv4-r3v5', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25928', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25928'}
null
GHSA
GHSA-6p52-jr3q-c94g
Arbitrary code execution due to YAML deserialization
### Impact Nameko can be tricked to perform arbitrary code execution when deserialising a YAML config file. Example: ``` yaml # malicious.yaml !!python/object/new:type args: ['z', !!python/tuple [], {'extend': !!python/name:exec }] listitems: "__import__('os').system('cat /etc/passwd')" ``` ``` shell $ nameko run --config malicious.yaml test root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin bin:x:2:2:bin:/bin:/usr/sbin/nologin sys:x:3:3:sys:/dev:/usr/sbin/nologin sync:x:4:65534:sync:/bin:/bin/sync games:x:5:60:games:/usr/games:/usr/sbin/nologin ... ``` ### Patches The problem was fixed in https://github.com/nameko/nameko/pull/722 and released in version 2.14.0, and in rc10 of the v3 pre-release. Versions prior to 2.14.0, and v3.0.0rc0 through v3.0.0rc9 are still vulnerable. ### Workarounds The vulnerability is exploited by config files with malicious content. It can be avoided by only using config files that you trust.
{'CVE-2021-41078'}
2021-11-01T14:06:22Z
2021-10-19T15:28:57Z
HIGH
8.6
{'CWE-502'}
{'https://github.com/nameko/nameko/security/advisories/GHSA-6p52-jr3q-c94g', 'https://github.com/advisories/GHSA-6p52-jr3q-c94g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41078', 'https://github.com/nameko/nameko', 'https://github.com/nameko/nameko/releases/tag/v2.14.0', 'https://github.com/nameko/nameko/releases/tag/v3.0.0-rc10'}
null
GHSA
GHSA-w725-67p7-xv22
Command Injection in local-devices
Versions of `local-devices` prior to 3.0.0 are vulnerable to Command Injection. The package does not validate input on ip addresses and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system. ## Recommendation Upgrade to version 3.0.0 or later.
null
2021-09-28T17:35:45Z
2020-09-03T17:05:04Z
HIGH
0
{'CWE-77'}
{'https://github.com/DylanPiercey/local-devices/pull/16', 'https://github.com/advisories/GHSA-w725-67p7-xv22', 'https://www.npmjs.com/advisories/1020'}
null
GHSA
GHSA-qvf8-p83w-v58j
Podman's default inheritable capabilities for linux container not empty
A bug was found in Podman where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.
{'CVE-2022-27649'}
2022-05-02T17:42:54Z
2022-04-01T20:52:29Z
HIGH
7.5
{'CWE-276'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=2066568', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX/', 'https://github.com/advisories/GHSA-qvf8-p83w-v58j', 'https://github.com/containers/podman/releases/tag/v4.0.3', 'https://github.com/containers/podman/security/advisories/GHSA-qvf8-p83w-v58j', 'https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27649'}
null
GHSA
GHSA-fjh3-g8gq-9q92
Cross-Site Scripting in Content Preview
> ### Meta > * CVSS: `AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.0) > * CWE-79 > * Status: **DRAFT** ### Problem It has been discovered that database fields used as _descriptionColumn_ are vulnerable to cross-site scripting when their content gets previewed in the page module. A valid backend user account is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue. ### References * [TYPO3-CORE-SA-2021-007](https://typo3.org/security/advisory/typo3-core-sa-2021-007)
{'CVE-2021-21340'}
2022-04-19T19:02:50Z
2021-03-23T01:53:47Z
LOW
0
{'CWE-79'}
{'https://packagist.org/packages/typo3/cms-backend', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-fjh3-g8gq-9q92', 'https://typo3.org/security/advisory/typo3-core-sa-2021-007', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21340', 'https://github.com/advisories/GHSA-fjh3-g8gq-9q92'}
null
GHSA
GHSA-89mq-4x47-5v83
Prototype Pollution in angular
Versions of `angular ` prior to 1.7.9 are vulnerable to prototype pollution. The deprecated API function `merge()` does not restrict the modification of an Object's prototype in the , which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation Upgrade to version 1.7.9 or later. The function was already deprecated and upgrades are not expected to break functionality.
{'CVE-2019-10768'}
2022-01-04T19:51:21Z
2019-11-20T15:29:43Z
HIGH
7.5
{'CWE-20', 'CWE-915'}
{'https://github.com/advisories/GHSA-89mq-4x47-5v83', 'https://github.com/angular/angular.js/pull/16913', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-534884', 'https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://www.npmjs.com/advisories/1343', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10768'}
null
GHSA
GHSA-2f9x-5v75-3qv4
Moderate severity vulnerability that affects django
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
{'CVE-2018-7537'}
2021-08-30T16:29:21Z
2019-01-04T17:50:00Z
MODERATE
5.3
{'CWE-185'}
{'https://www.debian.org/security/2018/dsa-4161', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html', 'https://github.com/advisories/GHSA-2f9x-5v75-3qv4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7537', 'http://www.securityfocus.com/bid/103357', 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://usn.ubuntu.com/3591-1/', 'https://access.redhat.com/errata/RHSA-2019:0265'}
null
GHSA
GHSA-wf5p-f5xr-c4jj
SQL Injection in rosariosis
An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.
{'CVE-2021-44427'}
2021-12-02T17:48:53Z
2021-12-02T17:48:53Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44427', 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://gitlab.com/francoisjacquet/rosariosis/blob/mobile/CHANGES.md#changes-in-811', 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/328', 'https://github.com/advisories/GHSA-wf5p-f5xr-c4jj', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}
null
GHSA
GHSA-hmw2-mvvh-jf5j
OS Command Injection in enpeem
enpeem through 2.2.0 allows execution of arbitrary commands. The &quot;options.dir&quot; argument is provided to the &quot;exec&quot; function without any sanitization.
{'CVE-2019-10801'}
2021-04-13T15:22:47Z
2021-04-13T15:22:47Z
HIGH
9.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-ENPEEM-559007', 'https://github.com/advisories/GHSA-hmw2-mvvh-jf5j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10801', 'https://github.com/balderdashy/enpeem/blob/master/index.js#L114'}
null
GHSA
GHSA-hqw4-8893-j4h7
Directory Traversal in simple-npm-registry
Affected versions of `simple-npm-registry` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16132'}
2021-01-08T18:39:41Z
2018-07-23T20:49:28Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/452', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry', 'https://github.com/advisories/GHSA-hqw4-8893-j4h7', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16132', 'https://nodesecurity.io/advisories/452'}
null
GHSA
GHSA-2x54-j4m3-r6wx
High severity vulnerability that affects sqla-yaml-fixtures
Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.
{'CVE-2019-3575'}
2021-08-31T20:18:40Z
2019-01-04T17:44:48Z
HIGH
7.8
{'CWE-94'}
{'https://github.com/schettino72/sqla_yaml_fixtures/issues/20', 'https://github.com/advisories/GHSA-2x54-j4m3-r6wx', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3575'}
null
GHSA
GHSA-fjqg-w8g6-hhq8
Improper Authentication and Improper Access Control in Dolibarr
In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name.
{'CVE-2021-25956'}
2021-10-21T14:19:44Z
2021-09-02T17:16:28Z
HIGH
7.2
{'CWE-287', 'CWE-284'}
{'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25956', 'https://github.com/advisories/GHSA-fjqg-w8g6-hhq8', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956'}
null
GHSA
GHSA-22h7-7wwg-qmgg
Prototype Pollution in @hapi/hoek
Versions of `@hapi/hoek` prior to 8.5.1 and 9.0.3 are vulnerable to Prototype Pollution. The `clone` function fails to prevent the modification of the Object prototype when passed specially-crafted input. Attackers may use this to change existing properties that exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances. This issue __does not__ affect hapi applications since the framework protects against such malicious inputs. Applications that use `@hapi/hoek` outside of the hapi ecosystem may be vulnerable. ## Recommendation Update to version 8.5.1, 9.0.3 or later.
null
2021-10-04T20:54:07Z
2020-09-04T17:56:39Z
LOW
0
{'CWE-1321'}
{'https://github.com/advisories/GHSA-22h7-7wwg-qmgg', 'https://www.npmjs.com/advisories/1468'}
null
GHSA
GHSA-pgww-xf46-h92r
XSS in lxml
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
{'CVE-2020-27783'}
2021-05-25T21:45:11Z
2021-01-07T21:54:01Z
MODERATE
6.1
{'CWE-79'}
{'https://advisory.checkmarx.net/advisory/CX-2020-4286', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27783', 'https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7', 'https://snyk.io/vuln/SNYK-PYTHON-LXML-1047473', 'https://security.netapp.com/advisory/ntap-20210521-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/', 'https://pypi.org/project/lxml/', 'https://www.debian.org/security/2020/dsa-4810', 'https://bugzilla.redhat.com/show_bug.cgi?id=1901633', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/', 'https://github.com/advisories/GHSA-pgww-xf46-h92r', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00028.html'}
null
GHSA
GHSA-w4hp-pcp8-qhf3
Cross-site Scripting in livehelperchat
Stored XSS is found in Settings>Live help configuration>Departments->Departments groups->edit When a user creates a new webhook under the NAME field and puts a payload {{constructor.constructor('alert(1)')()}}, the input gets stored, at user edit groupname , the payload gets executed.
{'CVE-2022-0387'}
2022-02-03T20:16:40Z
2022-01-28T23:06:32Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/2e09035b-8f98-4930-b7e8-7abe5f722b98', 'https://github.com/advisories/GHSA-w4hp-pcp8-qhf3', 'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0387'}
null
GHSA
GHSA-rgg3-3wh7-w935
Unrestricted Upload of File with Dangerous Type in Zenario CMS
Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
{'CVE-2021-42171'}
2022-04-01T20:11:34Z
2022-03-15T00:00:58Z
CRITICAL
9.8
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42171', 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/2', 'https://github.com/advisories/GHSA-rgg3-3wh7-w935', 'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007', 'https://minhnq22.medium.com/file-upload-to-rce-on-zenario-9-0-54156-cms-fa05fcc6cf74', 'https://github.com/TribalSystems/Zenario/releases/tag/9.0.55141'}
null
GHSA
GHSA-p426-qw2p-v95v
Argument Injection in Apache Geode server
When an Apache Geode server versions 1.0.0 to 1.8.0 is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster.
{'CVE-2017-15694'}
2021-08-17T14:51:31Z
2019-06-26T01:09:35Z
MODERATE
6.5
{'CWE-88'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15694', 'https://lists.apache.org/thread.html/311505e7b7a045aaa246f0a1935703acacf41b954621b1363c40bf6f@%3Cuser.geode.apache.org%3E', 'https://github.com/advisories/GHSA-p426-qw2p-v95v'}
null
GHSA
GHSA-rqj9-cq6j-958r
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
In Apache Hadoop 2.7.4 to 2.7.6, the security fix for CVE-2016-6811 is incomplete. A user who can escalate to yarn user can possibly run arbitrary commands as root user.
{'CVE-2018-11766'}
2021-09-17T20:39:11Z
2018-12-21T17:50:26Z
HIGH
8.8
null
{'https://nvd.nist.gov/vuln/detail/CVE-2018-11766', 'http://www.securityfocus.com/bid/106035', 'https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E', 'https://github.com/advisories/GHSA-rqj9-cq6j-958r'}
null
GHSA
GHSA-4r9c-jghc-cx5m
Cross-site Scripting in apostrophe
Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.
{'CVE-2021-25978'}
2021-11-10T16:45:34Z
2021-11-10T16:45:34Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59', 'https://github.com/advisories/GHSA-4r9c-jghc-cx5m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25978'}
null
GHSA
GHSA-r3gr-cxrf-hg25
Serialization gadgets exploit in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.
{'CVE-2020-35491'}
2022-04-22T17:27:15Z
2021-12-09T19:15:11Z
HIGH
8.1
{'CWE-913', 'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/2986', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20210122-0005/', 'https://github.com/advisories/GHSA-r3gr-cxrf-hg25', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35491', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
GHSA
GHSA-m9cj-v55f-8x26
Authentication Bypass in keycloak
A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application.
{'CVE-2020-27826'}
2022-03-21T20:47:56Z
2022-03-18T17:55:26Z
HIGH
8.8
{'CWE-250'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1905089', 'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27826', 'https://access.redhat.com/security/cve/cve-2020-27826', 'https://github.com/advisories/GHSA-m9cj-v55f-8x26'}
null
GHSA
GHSA-xrr4-74mc-rpjc
Pyro mishandles pid files in temporary directory locations and opening the pid file as root
pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks.
{'CVE-2011-2765'}
2022-04-26T18:22:27Z
2018-08-21T17:01:29Z
HIGH
7.5
{'CWE-59'}
{'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e', 'https://bugs.debian.org/631912', 'https://github.com/advisories/GHSA-xrr4-74mc-rpjc', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2765', 'https://pythonhosted.org/Pyro/12-changes.html'}
null
GHSA
GHSA-8j72-p2wm-6738
Persistent XSS vulnerability in filename of attached file in PrivateBin
On 24th of December 2019 one of the [property based unit tests](https://github.com/PrivateBin/PrivateBin/blob/master/tst/README.md#property-based-unit-testing) reported a [failure](https://travis-ci.org/PrivateBin/PrivateBin/jobs/629180605#L782). Upon investigation, [@elrido](https://github.com/elrido) discovered that the failure was due to unescaped HTML, which allowed the user provided attachment file name to inject HTML under certain conditions leading to a persistent [Cross-site scripting (XSS)](https://en.wikipedia.org/wiki/Cross-site_scripting) vulnerability. After committing an [initial fix](https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6) to the master branch, the [issue was reported](https://github.com/PrivateBin/PrivateBin/issues/554) on 25th of December. Vulnerability write-up done by [@rugk](https://github.com/rugk) and [@elrido](https://github.com/elrido). The vulnerability has been fixed in [PrivateBin v1.3.2 & v1.2.2](https://privatebin.info/news/v1.3.2-v1.2.2-release.html). Admins are urged to upgrade to these versions to protect the affected users. ## Affected versions Any PrivateBin version since 1.2. ## Conditions * The configuration setting `fileupload` has to be enabled, as 1.3 displays an error when trying to open a paste with attachment. * The CSP header rules don't get applied. For example: * They are unsupported or disabled in the visitors browser. * They are filtered out by a some proxy server at the server or client side. * The header is disabled/commented in the PHP-logic. * The rules have been relaxed in the `cspheader` configuration setting. * A paste with a malicious filename is created. * A visitor of that paste clicks on the "Clone" button. ## Proof of concept The following method is just one possibility to exploit this issue and is provided as a proof of concept with steps to reproduce the issue. To avoid having to create an actual file with a rogue filename, one could use the [Python CLI client for PrivateBin](https://github.com/r4sas/PBinCLI/) and [edit line 56 in `format.py`](https://github.com/r4sas/PBinCLI/blob/682b47fbd3e24a8a53c3b484ba896a5dbc85cda2/pbincli/format.py#L56) as follows: ```diff - self._attachment_name = path_leaf(path) + self._attachment_name = '<script>alert("☹️");//<a' ``` The paste then can be created on a vulnerable instance: ```shell $ python pbincli/cli.py send -t " " -f /dev/null -s https://privatebin.net/ ``` Visiting the created paste on a vulnerable instance, with `fileupload` enabled and the CSP header weakened or disabled, and clicking the clone button will insert the HTML unescaped. In the above example, a pop-up would appear, when the script is executed. ## Impact On a vulnerable site pastes with malicious filenames can be created and users visiting these could inadvertently trigger the code execution when they click the "Clone" button. They could be instigated to do so via social engineering, like a paste text suggesting to "clone and share" the paste in question. The attached file itself doesn't have to be empty and could be an image or document that would still be displayed inline as usual. The execution of the script triggered by clicking on the "Clone" button may occur silently in the background without showing any noticeable signs in browser. It may for instance be used to track visitors, start drive-by-downloads or similar. While we focus on script injection here, as it is the easiest exploit vector, it has to be said that anything else can be injected like CSS, images, videos, although the default CSP will block inline CSS and images, e.g. On first visit, the filename isn't visible and is properly escaped when inserted into the download attribute. Only when clicking the "Download attachment" link would open a file save dialog with an odd name pre-filled, although browsers will convert illegal characters into valid ones, so it may not be identical to the one provided. Only when the "Clone" button has been clicked and after the exploit has already been triggered, the filename gets displayed. Note that an attacker can of course prevent this indicator of compromise to be shown and e.g. change the displayed text or obfuscate the filename by starting it with something harmless, like `image.png`, before opening the HTML tag. ### Impact restrictions The impact is mitigated by the fact that the vulnerability is, as far as our investigation concluded, paste-specific, i.e. opening a vulnerable paste can only compromise this one paste and no other pastes. Furthermore, as stated before, the impact is mitigated by the fact that we deploy a strong [CSP](https://content-security-policy.com/) that, by default, does not allow inline JS or other potentially easy methods that would allow an easy exploitation of the vulnerability. That said, we have to make users aware, that there may always be tricks to bypass such a CSP and the simple injection of HTML tags, e.g. destroying, faking or somehow phishing an HTML page does always remain a possibility. As such, we treat this as a security vulnerability with medium severity. It is critical on it's own, but we believe that the deployed security mechanisms should prevent an exploit in practice in most cases. ## Real-life impact We checked all instances listed in the [PrivateBin directory in the Wiki](https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-Directory) and didn't find any 1.1, 1.2 or 1.3 instances that had the CSP headers disabled or in a state we know to be vulnerable. We used the following script, that may be adapted to check the CSP headers of any single instance: ```shell for URL in $( curl -s https://raw.githubusercontent.com/wiki/PrivateBin/PrivateBin/PrivateBin-Directory.md | grep -Po '^http.*?(?= )' ) do echo -n "$URL: " curl -sLI $URL | grep -Poi 'content-security-policy.*script-src.?\K.*?(?=;)' || echo 'No CSP detected!' done ``` Some of the above sites do offer file uploads. On these instances, it is still possible that a visitor could have CSP support disabled in their browser, i.e. via a transparent proxy at their internet uplink or due to a browser plugin or some other locally installed, misguided security solution. **Important:** This scan is only a cursory check and _must not_ be taken as a security analysis of any means! You are always responsible for the security of your own instance. Please do check it manually! ## Mitigation As server administrators can't detect if a paste contains file attachments at all (apart from their size) in version 1.3 and due to the encrypted filename in older versions, as well as the risk for clients that don't apply the CSP settings, we urge them to upgrade to versions 1.3.2 or 1.2.2. If you use v1.3, you could disable the `fileupload` setting to prevent pastes from getting displayed that may contain this vulnerability. Note that this will break all existing pastes with uploads, however, so we do _not_ recommend this, but advise you to upgrade to a fixed version instead. ## Further information We want to make potential third-party client authors aware of this vulnerability and urge them to double-check their implementations. If they develop a client that displays untrusted foreign data from a paste in a HTML site, please make sure to escape it to prevent XSS attacks. Such attacks can only be prevented when the paste is displayed, a mitigation when a paste is created is pointless, as a different client can be used during creation. We do also acknowledge and want to highlight the benefit of the CSP, which has first been [introduced in PrivateBin v1.0](https://github.com/PrivateBin/PrivateBin/issues/10). However, we want to make you again aware that a whitelist-based CSP as we use, may [sometimes still be bypassed](https://csp.withgoogle.com/docs/faq.html#problems-with-whitelists), e.g. if you host a copy of the Angular library on the same domain as your PrivateBin instance. We are aware of that and [do consider](https://github.com/PrivateBin/PrivateBin/issues/108) upgrading to a stronger CSP in the future. ### Issue discovery While it is satisfying that our hard work on introducing unit tests has payed off in the discovery and mitigation of this vulnerability, it does also show a limitation of unit testing. A third party doing a code review would have certainly focused on how the project handles user provided input and may have discovered this much quicker. The discovery wasn't due to the unit test checking for HTML input to get properly escaped, on the contrary, the test assumed input would not be changed. So other instances of HTML tags generated would have happily passed the test. Only when the test generated a fragment of a link (`<a`) it failed, because the DOM silently removed it when it inserted the string, as links within links aren't allowed. While the test was written to throw arbitrary strings at the `AttachmentViewer.moveAttachmentTo()` method, the test would only check that these got inserted into the DOM unchanged, oblivious of their potential significance when interpreted as HTML. The [test had been introduced](https://github.com/PrivateBin/PrivateBin/commit/39860dfdc434c00d18342b4fb3bc6f5d0960030d) on December 3rd, 2017, 570 commits ago. Every commit on master and in PRs since introduction in that commit triggers these tests to run for every supported PHP version. Additional test cycles get run on developers local environments during working on commits. Hence the test suite must have run a few thousand times, testing 100 random strings each time. And only after more then 2 years a string containing `<a` got generated, triggered the error condition and 22 shrinks later the smallest failing test case was presented as: ``` Failed after 65 tests and 22 shrinks. rngState: 8b8f0d4ec2a67139b5; Counterexample: "image/png"; ""; "\u0000"; "<a"; ""; ``` Discussion about a potential problem with that code, [did spark last September](https://github.com/PrivateBin/PrivateBin/pull/508#commitcomment-34943221), when the vulnerable code part was changed to the one before before the current fix, but was [incorrectly judged](https://github.com/PrivateBin/PrivateBin/pull/508#commitcomment-34944396) as not being a problem, because all of our translation strings are hardcoded. The fact that we do actually add some untrusted user-provided content, wasn't considered at that point. It should also be mentioned, that the coverage report released for version 1.3.1 did highlight the line that caused this vulnerability as not being covered during testing: ![Coverage report for version 1.3.1 showing missing test coverage for line causing vulnerability]({static}/img/vulnerability-2020-01-11/coverage.png) So, in conclusion, it is great to have all of these tools at our disposal, but the code quality would benefit a lot more from having more eyeballs and brains on it. ## Timeline * 2019-12-24 – Property based unit test fails in a commit pushed to a PR. * 2019-12-25 – Issue investigated, preliminary patch and issue description published. * 2019-12-30 – Further investigations, proof-of-concept exploit demonstrated on a vulnerable test instance. * 2020-01-03 – Discussed broader mitigation of user provided content injections, reviewed other possible cases. * 2020-01-04 – Published a second patch based on review, escapes HTML in translation. * 2020-01-05 – Started writing vulnerability report. * 2020-01-07 – Backported fix for 1.2.1. * 2020-01-11 – [Release published](https://github.com/PrivateBin/PrivateBin/releases/tag/1.3.2). * 2020-01-11 – Vulnerability details published.
{'CVE-2020-5223'}
2021-01-14T17:43:41Z
2020-01-14T20:19:33Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738', 'https://github.com/PrivateBin/PrivateBin/issues/554', 'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6', 'https://github.com/advisories/GHSA-8j72-p2wm-6738', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5223', 'https://privatebin.info/news/v1.3.2-v1.2.2-release.html'}
null