ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-5fm9-jmv7-fcx5
|
Malicious Package in asynnc
|
All versions of `asynnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:47:06Z
|
2020-09-02T18:35:26Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-5fm9-jmv7-fcx5', 'https://www.npmjs.com/advisories/842'}
| null |
GHSA
|
GHSA-hf6p-4rv2-9qrp
|
Path Traversal in bikshed
|
This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing include, include-code or include-raw block is processed. The contents of arbitrary files could be disclosed in the HTML output.
|
{'CVE-2021-23423'}
|
2021-08-30T16:25:42Z
|
2021-08-30T16:25:42Z
|
MODERATE
| 5.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-hf6p-4rv2-9qrp', 'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23423', 'https://snyk.io/vuln/SNYK-PYTHON-BIKESHED-1537647'}
| null |
GHSA
|
GHSA-87qw-7v97-w34r
|
Malicious Package in asinc
|
All versions of `asinc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:46:37Z
|
2020-09-02T18:33:18Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-87qw-7v97-w34r', 'https://www.npmjs.com/advisories/840'}
| null |
GHSA
|
GHSA-5whq-j5qg-wjvp
|
Stored Cross-Site Scripting vulnerability in admin component of DotNetNuke
|
Cross-site scripting (XSS) is possible in DNN (formerly DotNetNuke) before 9.4.0 by remote authenticated users via the Display Name field in the admin notification function.
|
{'CVE-2019-12562'}
|
2021-08-18T22:33:30Z
|
2019-11-18T17:16:06Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12562', 'http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html', 'https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/', 'https://github.com/advisories/GHSA-5whq-j5qg-wjvp'}
| null |
GHSA
|
GHSA-h6hq-c896-w882
|
Low severity vulnerability that affects Plone
|
Cross-site scripting (XSS) vulnerability in the safe_html filter in Products.PortalTransforms in Plone 2.1 through 4.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2010-2422.
|
{'CVE-2011-1949'}
|
2021-09-14T15:28:53Z
|
2018-07-23T21:01:10Z
|
LOW
| 0
|
{'CWE-79'}
|
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/67694', 'http://osvdb.org/72728', 'http://plone.org/products/plone/security/advisories/CVE-2011-1949', 'http://secunia.com/advisories/44775', 'http://secunia.com/advisories/44776', 'https://github.com/advisories/GHSA-h6hq-c896-w882', 'http://securityreason.com/securityalert/8269', 'http://www.securityfocus.com/bid/48005', 'http://www.securityfocus.com/archive/1/518155/100/0/threaded', 'https://nvd.nist.gov/vuln/detail/CVE-2011-1949'}
| null |
GHSA
|
GHSA-878x-85hc-gc4g
|
SQL Injection in LibreNMS
|
An issue was discovered in LibreNMS 1.50.1. A SQL injection flaw was identified in the ajax_rulesuggest.php file where the term parameter is used insecurely in a database query for showing columns of a table, as demonstrated by an ajax_rulesuggest.php?debug=1&term= request.
|
{'CVE-2019-12465'}
|
2021-08-18T18:58:36Z
|
2019-10-11T18:43:29Z
|
HIGH
| 8.1
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-878x-85hc-gc4g', 'https://www.darkmatter.ae/xen1thlabs/librenms-sql-injection-vulnerability-xl-19-024/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12465'}
| null |
GHSA
|
GHSA-q897-9jxf-jg9r
|
Security check skip in Apache Dubbo
|
The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.
|
{'CVE-2021-37579'}
|
2021-09-20T20:18:29Z
|
2021-09-10T17:56:23Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://lists.apache.org/thread.html/r898afa109cdbb4b79724308648ff0718152ebe1d3d6dfc7202d958bc%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37579', 'https://github.com/advisories/GHSA-q897-9jxf-jg9r'}
| null |
GHSA
|
GHSA-f7wm-x4gw-6m23
|
Insert tag injection in forms
|
### Impact
It is possible to inject insert tags in front end forms which will be replaced when the page is rendered.
### Patches
Update to Contao 4.4.52, 4.9.6 or 4.10.1.
### Workarounds
Disable the front end login form and do not use form fields with array keys such as `fieldname[]`.
### References
https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
|
{'CVE-2020-25768'}
|
2021-08-02T15:23:31Z
|
2020-09-24T16:23:54Z
|
MODERATE
| 5.3
|
{'CWE-74', 'CWE-20'}
|
{'https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html', 'https://github.com/advisories/GHSA-f7wm-x4gw-6m23', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25768', 'https://community.contao.org/en/forumdisplay.php?4-Announcements', 'https://github.com/contao/contao/security/advisories/GHSA-f7wm-x4gw-6m23'}
| null |
GHSA
|
GHSA-cxw4-9qv9-vx5h
|
High severity vulnerability that affects PeterO.Cbor
|
### Impact
The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as `EncodeToBytes`, `ToString`, or `ToJSONString`, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved.
The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication.
### Patches
This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library.
### Workarounds
Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution.
In version 3.6, if the method used `CBORObject.Read()` or `CBORObject.DecodeFromBytes()` to decode a serialized CBOR object, call the overload that takes `CBOREncodeOptions` as follows:
CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions("resolvereferences=false"));
In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows:
if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) {
cbor.EncodeToBytes();
}
Alternatively, for such versions, the application can use `WriteTo` to decode the CBOR object to a so-called "limited memory stream", that is, a `Stream` that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory.
using(var stream = new LimitedMemoryStream(100000)) { // Limit to 100000 bytes
cbor.WriteTo(stream);
return stream.ToBytes();
}
To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings).
### References
See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
| null |
2022-01-18T23:06:10Z
|
2019-09-30T19:42:28Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-cxw4-9qv9-vx5h', 'https://github.com/peteroupc/CBOR/security/advisories/GHSA-cxw4-9qv9-vx5h'}
| null |
GHSA
|
GHSA-7cqg-8449-rmfv
|
Observable Discrepancy in libsecp256k1-rs
|
A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
|
{'CVE-2019-20399'}
|
2021-08-25T21:01:27Z
|
2021-08-25T21:01:27Z
|
MODERATE
| 5.9
|
{'CWE-362', 'CWE-203'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-20399', 'https://github.com/paritytech/libsecp256k1/commit/11ba23a9766a5079918cd9f515bc100bc8164b50', 'https://github.com/advisories/GHSA-7cqg-8449-rmfv'}
| null |
GHSA
|
GHSA-ffjp-66mx-3qpj
|
Privilege escalation in beego
|
An issue was discovered in file profile.go. The MemProf and GetCPUProfile functions do not correctly check whether the created file exists. As a result attackers can launch attacks symlink attacks locally. Attackers can use this vulnerability to escalate privileges.
|
{'CVE-2021-27116'}
|
2022-04-19T14:07:24Z
|
2022-04-06T00:01:30Z
|
HIGH
| 7.8
|
{'CWE-59'}
|
{'https://github.com/beego/beego/issues/4484', 'https://github.com/advisories/GHSA-ffjp-66mx-3qpj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27116'}
| null |
GHSA
|
GHSA-923p-fr2c-g5m2
|
Exposure of Sensitive Information to an Unauthorized Actor in Ansible
|
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
|
{'CVE-2020-1739'}
|
2022-04-04T21:22:08Z
|
2021-04-07T20:30:44Z
|
LOW
| 3.9
|
{'CWE-200'}
|
{'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html', 'https://www.debian.org/security/2021/dsa-4950', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/', 'https://github.com/ansible/ansible/issues/67797', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1739', 'https://github.com/advisories/GHSA-923p-fr2c-g5m2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739'}
| null |
GHSA
|
GHSA-rxmr-c9jm-7mm8
|
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
|
In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false.
|
{'CVE-2018-1284'}
|
2021-09-20T14:46:09Z
|
2018-11-21T22:24:22Z
|
LOW
| 3.7
|
{'CWE-200'}
|
{'https://lists.apache.org/thread.html/29184dbce4a37be2af36e539ecb479b1d27868f73ccfdff46c7174b4@%3Cdev.hive.apache.org%3E', 'http://www.securityfocus.com/bid/103750', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1284', 'https://github.com/advisories/GHSA-rxmr-c9jm-7mm8'}
| null |
GHSA
|
GHSA-46m8-42hm-wvvw
|
Cross-Site Scripting in emojione
|
Affected versions of `emojione` are vulnerable to cross-site scripting when user input is passed into the `toShort()`, `shortnameToImage()`, `unicodeToImage()`, and `toImage()` functions.
## Recommendation
Update to version 1.3.1 or later.
|
{'CVE-2016-1000231'}
|
2021-09-23T21:33:01Z
|
2020-09-01T15:34:16Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-46m8-42hm-wvvw', 'https://github.com/Ranks/emojione/issues/61', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000231', 'https://www.npmjs.com/advisories/129'}
| null |
GHSA
|
GHSA-cvgx-3v3q-m36c
|
Heap OOB in shape inference for `QuantizeV2`
|
### Impact
The [shape inference code for `QuantizeV2`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/framework/common_shape_fns.cc#L2509-L2530) can trigger a read outside of bounds of heap allocated array:
```python
import tensorflow as tf
@tf.function
def test():
data=tf.raw_ops.QuantizeV2(
input=[1.0,1.0],
min_range=[1.0,10.0],
max_range=[1.0,10.0],
T=tf.qint32,
mode='MIN_COMBINED',
round_mode='HALF_TO_EVEN',
narrow_range=False,
axis=-100,
ensure_minimum_range=10)
return data
test()
```
This occurs whenever `axis` is a negative value less than `-1`. In this case, we are accessing data before the start of a heap buffer:
```cc
int axis = -1;
Status s = c->GetAttr("axis", &axis);
if (!s.ok() && s.code() != error::NOT_FOUND) {
return s;
}
...
if (axis != -1) {
...
TF_RETURN_IF_ERROR(
c->Merge(c->Dim(minmax, 0), c->Dim(input, axis), &depth));
}
```
The code allows `axis` to be an optional argument (`s` would contain an `error::NOT_FOUND` error code). Otherwise, it assumes that `axis` is a valid index into the dimensions of the `input` tensor. If `axis` is less than `-1` then this results in a heap OOB read.
### Patches
We have patched the issue in GitHub commit [a0d64445116c43cf46a5666bd4eee28e7a82f244](https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-41211'}
|
2021-11-10T19:01:03Z
|
2021-11-10T19:01:03Z
|
HIGH
| 7.1
|
{'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvgx-3v3q-m36c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41211', 'https://github.com/advisories/GHSA-cvgx-3v3q-m36c', 'https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244'}
| null |
GHSA
|
GHSA-9689-rx4v-cqgc
|
Open Redirect
|
Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse.
|
{'CVE-2018-15798'}
|
2022-04-12T22:10:05Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 5.4
|
{'CWE-601'}
|
{'https://github.com/concourse/concourse/blob/release/5.2.x/release-notes/v5.2.8.md', 'https://pivotal.io/security/cve-2018-15798', 'https://github.com/advisories/GHSA-9689-rx4v-cqgc', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15798', 'https://github.com/concourse/concourse/pull/5350/commits/38cb4cc025e5ed28764b4adc363a0bbf41f3c7cb'}
| null |
GHSA
|
GHSA-hc33-32vw-rpp9
|
Remote Code Execution Vulnerability in Session Storage
|
### Impact
A malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store.
If your application does not use Ratpack's session mechanism, it is not vulnerable.
### Details
Attackers with the ability to write to session data, can potentially craft payloads that deserialize unsafe objects, leading to the ability to remotely execute arbitrary code.
This is known as an “[insecure deserialization](https://portswigger.net/web-security/deserialization)” vulnerability, or “gadget vulnerability”.
Ratpack allows session data to be stored server side in an external system such as a relational database, or client side via user cookies.
When using server side storage, the attacker would need to obtain the ability to write to the session data store.
When using client side storage, the attacker would need to obtain the secrets used to encrypt and/or sign the session data stored in user cookies.
Ratpack's session mechanism allows storing serialized objects, of arbitrary types.
The type must be specified when writing the data and when reading, with data only deserialized when there is an exact type match.
However, in the process of deserializing an object of a known/trusted/deserialization-safe type, it may attempt to deserialize unsafe types.
By default Ratpack uses Java's built-in serialization mechanism, though other serialization providers can be used.
The exact types of payloads required to enable an exploit depend on the exact serialization mechanism used.
To mitigate this vulnerability, Ratpack now employs a “strict allow-list” when deserializing (and serializing) objects to session data.
All concrete types of objects serialized must be explicitly declared as safe.
Some standard well known JDK types are registered by default.
Serialization is provided by implementations of [`SessionSerializer`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html).
Its existing methods have been deprecated, and replaced with a [new methods](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html#deserialize(java.lang.Class,java.io.InputStream,ratpack.session.SessionTypeFilter)) that accept a [`SessionTypeFilter`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionTypeFilter.html) that can be used to assert whether a type is allowed when serializing and deserializing.
The default serializer implementation has been updated to use this mechanism.
Any proprietary implementations should also be updated to consult the type filter _before_ serializing or deserializing data.
Warnings will be logged any time an implementation that does not implement the new methods is used.
Upon upgrading to Ratpack 1.9, users of the built-in serialization mechanism will need to change their application to declare all types currently being serialized as being safe. This can be done using the new [`SessionModule.allowTypes()`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionModule.html#allowTypes(com.google.inject.Binder,java.lang.Class...)) method. Please see its documentation for details...))
### Patches
Ratpack 1.9.0 introduces a strict allow-list mechanism that mitigates this vulnerability when used.
### Workarounds
The simplest mitigation for users of earlier versions is to reduce the likelihood of attackers being able to write to the session data store.
Alternatively or additionally, the allow-list mechanism could be manually back ported by providing an alternative implementation of `SessionSerializer` that uses an allow-list.
### References
- https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
- https://owasp.org/www-community/vulnerabilities/Deserialization_of_untrusted_data
|
{'CVE-2021-29485'}
|
2022-04-19T19:02:29Z
|
2021-07-01T17:01:16Z
|
CRITICAL
| 9.9
|
{'CWE-502'}
|
{'https://github.com/ratpack/ratpack/security/advisories/GHSA-hc33-32vw-rpp9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29485', 'https://mvnrepository.com/artifact/io.ratpack/ratpack-core', 'https://github.com/advisories/GHSA-hc33-32vw-rpp9'}
| null |
GHSA
|
GHSA-m852-866j-69j8
|
Malicious Package in eslint-config-airbnb-standard
|
Version 2.0.0 of `eslint-config-airbnb-standard` was published with a bundled version of `eslint-scope` that was found to contain malicious code. This code would read the users `.npmrc` file and send it's contents to a remote server.
## Recommendation
The best course of action if you found this package installed in your environment is to revoke all your npm tokens and use a different version of the module. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
| null |
2021-10-01T13:27:58Z
|
2020-09-01T20:47:01Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/675', 'https://github.com/advisories/GHSA-m852-866j-69j8'}
| null |
GHSA
|
GHSA-wh87-3959-vfrq
|
Malicious Package in buffer-hor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:58:38Z
|
2020-09-03T21:51:58Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-wh87-3959-vfrq', 'https://www.npmjs.com/advisories/1242'}
| null |
GHSA
|
GHSA-62g9-6hw5-rwfp
|
Path Traversal in resolve-path
|
Versions of `resolve-path` before 1.4.0 are vulnerable to path traversal. `resolve-path` relative path resolving suffers from a lack of file path sanitization for windows based paths.
## Recommendation
Update to version 1.4.0 or later.
|
{'CVE-2018-3732'}
|
2021-01-08T21:07:10Z
|
2018-07-18T21:20:25Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://hackerone.com/reports/315760', 'https://www.npmjs.com/advisories/573', 'https://github.com/advisories/GHSA-62g9-6hw5-rwfp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3732', 'https://github.com/pillarjs/resolve-path/commit/fe5b8052cafd35fcdafe9210e100e9050b37d2a0'}
| null |
GHSA
|
GHSA-cq27-v7xp-c356
|
Moderate severity vulnerability that affects pycrypto
|
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
|
{'CVE-2013-7459'}
|
2021-09-09T20:09:53Z
|
2018-12-14T18:51:38Z
|
CRITICAL
| 9.8
|
{'CWE-119'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJ37R2YLX56YZABFNAOWV4VTHTGYREAE/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7459', 'https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4', 'http://www.openwall.com/lists/oss-security/2016/12/27/8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C6BWNADPLKDBBQBUT3P75W7HAJCE7M3B/', 'https://github.com/advisories/GHSA-cq27-v7xp-c356', 'http://www.securityfocus.com/bid/95122', 'https://bugzilla.redhat.com/show_bug.cgi?id=1409754', 'https://github.com/dlitz/pycrypto/issues/176', 'https://security.gentoo.org/glsa/201702-14', 'https://pony7.fr/ctf:public:32c3:cryptmsg'}
| null |
GHSA
|
GHSA-82mf-mmh7-hxp5
|
Directory traversal in development mode handler in Vaadin 14 and 15-17
|
Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.
- https://vaadin.com/security/cve-2020-36321
| null |
2021-10-08T21:24:02Z
|
2021-04-19T14:48:15Z
|
MODERATE
| 5.9
|
{'CWE-20'}
|
{'https://vaadin.com/security/cve-2020-36321', 'https://github.com/vaadin/platform/security/advisories/GHSA-82mf-mmh7-hxp5', 'https://github.com/advisories/GHSA-82mf-mmh7-hxp5'}
| null |
GHSA
|
GHSA-wmjf-jpjj-9f3j
|
Low severity vulnerability that affects rubocop
|
RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local users to exploit this to tamper with cache files belonging to other users.
|
{'CVE-2017-8418'}
|
2021-09-21T21:13:14Z
|
2017-11-15T20:39:47Z
|
LOW
| 3.3
|
{'CWE-668'}
|
{'http://www.openwall.com/lists/oss-security/2017/05/01/14', 'https://nvd.nist.gov/vuln/detail/CVE-2017-8418', 'https://github.com/bbatsov/rubocop/issues/4336', 'https://github.com/advisories/GHSA-wmjf-jpjj-9f3j'}
| null |
GHSA
|
GHSA-wvhm-4hhf-97x9
|
Cross-Site Scripting in Prism
|
### Impact
The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer.
This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 to v1.9.0).
### Patches
This problem is patched in v1.21.0.
### Workarounds
To workaround the issue without upgrading, [disable the easing preview](https://prismjs.com/plugins/previewers/#disabling-a-previewer) on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround.
### References
The vulnerability was introduced by this [commit](https://github.com/PrismJS/prism/commit/4303c940d3d3a20e8ce7635bf23331c75060f5c5) on Sep 29, 2015 and fixed by [Masato Kinugawa](https://twitter.com/kinugawamasato) (#2506).
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/PrismJS/prism/issues).
|
{'CVE-2020-15138'}
|
2022-04-19T19:02:32Z
|
2020-08-07T22:28:30Z
|
HIGH
| 7.1
|
{'CWE-79'}
|
{'https://github.com/PrismJS/prism/security/advisories/GHSA-wvhm-4hhf-97x9', 'https://prismjs.com/plugins/previewers/#disabling-a-previewer', 'https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c', 'https://github.com/advisories/GHSA-wvhm-4hhf-97x9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15138'}
| null |
GHSA
|
GHSA-pr34-8jfr-xhv8
|
Downloads Resources over HTTP in selenium-wrapper
|
Affected versions of `selenium-wrapper` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-wrapper`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10628'}
|
2021-01-08T18:20:01Z
|
2019-02-18T23:47:21Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/224', 'https://www.npmjs.com/advisories/224', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10628', 'https://github.com/advisories/GHSA-pr34-8jfr-xhv8'}
| null |
GHSA
|
GHSA-3cv4-xxv7-934q
|
Improper Verification of Cryptographic Signature in Apache Pulsar
|
If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins).
|
{'CVE-2021-22160'}
|
2021-06-07T20:49:23Z
|
2021-06-01T21:53:49Z
|
CRITICAL
| 9.8
|
{'CWE-347'}
|
{'https://lists.apache.org/thread.html/r9a12b4da2f26ce9b8f7e7117a879efaa973dab7e54717bbc7923fab1%40%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8e545559781231a83bf0644548c660255859e52feb86bbfcd42590da@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rca54f4b26ba5e6f2e39732b47ec51640e89f57e3b6a38ac3bab314df@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r347650d15a3e9c5f58b83e918b6ad6dedc2a63d3eb63da8e6a7be87e%40%3Cusers.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-3cv4-xxv7-934q', 'https://lists.apache.org/thread.html/rf54fefc25c49d4715d484133d438f13bf2e515a5fed5d3a745d4f6e7@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/re2ae364e0c02093dc721699698c6f23cfbba0220c78b5e28cafeae81@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rbe845aa1573a61769b9c5916c62971f4b10de87c2ea5f38a97f0cf84@%3Cdev.pulsar.apache.org%3E', 'https://github.com/apache/pulsar/releases/tag/v2.7.2', 'https://lists.apache.org/thread.html/rf2e90942996dceebac8296abf39257cfeb5ae918f82f7af3d37a48c5@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cusers.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22160', 'https://lists.apache.org/thread.html/r08c7df60cae031361df7fbac39d08b6d5b5079e74db5195d409db9a2@%3Cdev.pulsar.apache.org%3E'}
| null |
GHSA
|
GHSA-wp34-mqw5-jj85
|
Use after free in nano_arena
|
An issue was discovered in the nano_arena crate before 0.5.2 for Rust. There is an aliasing violation in split_at because two mutable references can exist for the same element, if Borrow<Idx> behaves in certain ways. This can have a resultant out-of-bounds write or use-after-free.
|
{'CVE-2021-28032'}
|
2021-08-25T20:52:00Z
|
2021-08-25T20:52:00Z
|
CRITICAL
| 9.8
|
{'CWE-416'}
|
{'https://rustsec.org/advisories/RUSTSEC-2021-0031.html', 'https://github.com/advisories/GHSA-wp34-mqw5-jj85', 'https://github.com/bennetthardwick/nano-arena/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28032'}
| null |
GHSA
|
GHSA-88cw-3m6x-49f7
|
Out-of-bounds Write in ChakraCore
|
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.
|
{'CVE-2020-17054'}
|
2021-08-02T17:25:58Z
|
2021-08-02T17:25:58Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/chakra-core/ChakraCore/pull/6528', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17054', 'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1', 'https://github.com/advisories/GHSA-88cw-3m6x-49f7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17054'}
| null |
GHSA
|
GHSA-57f3-gghm-9mhc
|
Regular Expression Denial of Service (ReDoS)
|
This affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function.
|
{'CVE-2021-23353'}
|
2021-03-25T00:18:31Z
|
2021-03-12T21:28:46Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23353', 'https://snyk.io/vuln/SNYK-JS-JSPDF-1073626', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288', 'https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286', 'https://github.com/advisories/GHSA-57f3-gghm-9mhc', 'https://github.com/MrRio/jsPDF/pull/3091'}
| null |
GHSA
|
GHSA-hg78-c92r-hvwr
|
Denial of Service in mqtt
|
Affected versions of `mqtt` will cause the node process to crash when receiving specially crafted MQTT packets, making the application vulnerable to a denial of service condition.
## Recommendation
Update to v1.0.0 or later
|
{'CVE-2016-1000242'}
|
2021-09-23T21:37:39Z
|
2020-09-01T16:01:24Z
|
HIGH
| 7.5
|
{'CWE-248'}
|
{'https://snyk.io/vuln/npm:mqtt:20160817', 'https://github.com/advisories/GHSA-hg78-c92r-hvwr', 'https://github.com/mqttjs/MQTT.js/blob/388a084d7803934b18b43c1146c817deaa1396b1/lib/parse.js#L230', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000242', 'https://www.npmjs.com/advisories/140'}
| null |
GHSA
|
GHSA-c78w-2gw7-gjv3
|
XSS in TinyMCE
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in: the core parser and `media` plugin. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.9 or lower and TinyMCE 5.2.1 or lower.
### Patches
This vulnerability has been patched in TinyMCE 4.9.10 and 5.2.2 by improved HTML parsing and sanitization logic.
### Workarounds
The workarounds available are:
- disable the media plugin and manually sanitize CDATA content (see below)
or
- upgrade to either TinyMCE 4.9.10 or TinyMCE 5.2.2
#### Example: Manually strip CDATA elements
```js
setup: function(editor) {
editor.on('PreInit', function() {
editor.parser.addNodeFilter('#cdata', function(nodes) {
for (var i = 0; i < nodes.length; i++) {
nodes[i].remove();
}
});
});
}
```
### Acknowledgements
Tiny Technologies would like to thank Michał Bentkowski and [intivesec](https://github.com/intivesec) for discovering these vulnerabilities.
### References
https://www.tiny.cloud/docs/release-notes/release-notes522/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
|
{'CVE-2019-1010091'}
|
2021-01-14T17:50:10Z
|
2020-05-11T20:00:15Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-c78w-2gw7-gjv3', 'https://github.com/tinymce/tinymce/issues/4394', 'https://github.com/advisories/GHSA-c78w-2gw7-gjv3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010091'}
| null |
GHSA
|
GHSA-5fxf-x22x-5q38
|
Cross-site Scripting in microweber
|
XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.12.
|
{'CVE-2022-0929'}
|
2022-03-22T20:02:31Z
|
2022-03-13T00:00:54Z
|
MODERATE
| 6.8
|
{'CWE-79'}
|
{'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0929', 'https://huntr.dev/bounties/66abf7ec-2dd7-4cb7-87f5-e91375883f03', 'https://github.com/advisories/GHSA-5fxf-x22x-5q38'}
| null |
GHSA
|
GHSA-c6jq-h4jp-72pr
|
NULL Pointer Dereference in aubio
|
aubio v0.4.0 to v0.4.8 has a new_aubio_onset NULL pointer dereference.
|
{'CVE-2018-19802'}
|
2021-08-17T19:08:16Z
|
2019-07-26T16:10:25Z
|
HIGH
| 7.5
|
{'CWE-476'}
|
{'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog', 'https://github.com/advisories/GHSA-c6jq-h4jp-72pr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19802'}
| null |
GHSA
|
GHSA-8wr4-2wm6-w3pr
|
B2 Command Line Tool TOCTOU application key disclosure
|
### Impact
Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition.
The command line tool saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/account_info`, `~/.b2_account_info` or a user-defined path) when `b2 authorize-account` is first run. This happens regardless of whether a valid key is provided or not. When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory is readable by a local attacker and the user did not yet run `b2 authorize-account` then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it.
### Remediation
Users that have not yet run `b2 authorize-account` should upgrade to B2 Command-Line Tool v3.2.1 before running it.
Users that have run `b2 authorize-account` are safe if at the time of the file creation no other local users had read access to the local configuration file.
Users that have run `b2 authorize-account` where the designated path could be opened by another local user should upgrade to B2 Command-Line Tool v3.2.1 and remove the database and regenerate all application keys. Note that `b2 clear-account` does not remove the database file and it should not be used to ensure that all open handles to the file are invalidated.
### Workarounds
If B2 Command-Line Tool cannot be upgraded to v3.2.1 due to a dependency conflict, a binary release can be used instead. Alternatively a new version could be installed within a virtualenv, or the permissions can be changed to prevent local users from opening the database file.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [B2 Command-Line Tool](https://github.com/Backblaze/B2_Command_Line_Tool) mentioning the CVE id in the issue title
* Email us at [security@backblaze.com](mailto:security@backblaze.com)
|
{'CVE-2022-23653'}
|
2022-04-19T19:03:23Z
|
2022-02-24T13:11:51Z
|
MODERATE
| 4.7
|
{'CWE-367'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23653', 'https://github.com/advisories/GHSA-8wr4-2wm6-w3pr', 'https://github.com/Backblaze/B2_Command_Line_Tool/commit/c74029f9f75065e8f7e3c3ec8e0a23fb8204feeb', 'https://github.com/Backblaze/B2_Command_Line_Tool/security/advisories/GHSA-8wr4-2wm6-w3pr'}
| null |
GHSA
|
GHSA-m3rf-7m4w-r66q
|
Improper Authentication in Flask-AppBuilder
|
### Impact
Improper authentication on the REST API. Allows for a malicious actor with a carefully crafted request to successfully authenticate and gain access to existing protected REST API endpoints. Only affects non database authentication types, and new REST API endpoints.
### Patches
Upgrade to Flask-AppBuilder 3.3.4
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/dpgaspar/Flask-AppBuilder
|
{'CVE-2021-41265'}
|
2021-12-10T18:29:56Z
|
2021-12-09T19:09:07Z
|
HIGH
| 8.1
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41265', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-m3rf-7m4w-r66q', 'https://github.com/dpgaspar/Flask-AppBuilder/commit/eba517aab121afa3f3f2edb011ec6bc4efd61fbc', 'https://github.com/advisories/GHSA-m3rf-7m4w-r66q', 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.3.4'}
| null |
GHSA
|
GHSA-5946-mpw5-pqxx
|
Incorrect Default Permissions in Cobbler
|
An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.
|
{'CVE-2021-45083'}
|
2022-03-29T22:17:11Z
|
2022-02-21T00:00:20Z
|
HIGH
| 7.1
|
{'CWE-276'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/', 'https://github.com/advisories/GHSA-5946-mpw5-pqxx', 'https://github.com/cobbler/cobbler/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45083', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCXMOUW4DH4DYWIJN44SMSU6R3CZDZBE/', 'https://github.com/cobbler/cobbler/pull/2945', 'https://www.openwall.com/lists/oss-security/2022/02/18/3', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.1', 'https://bugzilla.suse.com/show_bug.cgi?id=1193671'}
| null |
GHSA
|
GHSA-mj6m-246h-9w56
|
Improper regex in htaccess file
|
### Impact
the default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application.
This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path.
### Patches
Please upgrade to 3.3.5 or 4.2.0
### Workarounds
No
### References
- Release post: https://www.mautic.org/blog/community/mautic-4-2-one-small-step-mautic
- Internally tracked under MST-32
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2022-25769'}
|
2022-04-19T19:03:25Z
|
2022-03-01T22:05:34Z
|
MODERATE
| 0
| null |
{'https://github.com/mautic/mautic/security/advisories/GHSA-mj6m-246h-9w56', 'https://github.com/advisories/GHSA-mj6m-246h-9w56'}
| null |
GHSA
|
GHSA-jqpv-jm4m-86j9
|
Use After Free in libpulse-binding
|
An issue was discovered in the libpulse-binding crate before 1.2.1 for Rust. get_context can cause a use-after-free.
|
{'CVE-2018-25028'}
|
2022-01-06T22:17:50Z
|
2022-01-06T22:17:50Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/libpulse-binding/RUSTSEC-2018-0021.md', 'https://github.com/advisories/GHSA-jqpv-jm4m-86j9', 'https://rustsec.org/advisories/RUSTSEC-2018-0021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25028'}
| null |
GHSA
|
GHSA-m8pw-hgvj-cwcm
|
Directory Traversal in sgqserve
|
Affected versions of `sgqserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16215'}
|
2021-01-14T15:45:34Z
|
2020-09-01T18:08:55Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sgqserve', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16215', 'https://nodesecurity.io/advisories/419', 'https://github.com/advisories/GHSA-m8pw-hgvj-cwcm', 'https://www.npmjs.com/advisories/419'}
| null |
GHSA
|
GHSA-69p6-wvmq-27gg
|
Command injection in ruby-git
|
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
|
{'CVE-2022-25648'}
|
2022-04-28T21:13:23Z
|
2022-04-20T00:00:33Z
|
CRITICAL
| 9.8
|
{'CWE-88'}
|
{'https://github.com/ruby-git/ruby-git/releases/tag/v1.11.0', 'https://github.com/advisories/GHSA-69p6-wvmq-27gg', 'https://github.com/ruby-git/ruby-git/pull/569', 'https://snyk.io/vuln/SNYK-RUBY-GIT-2421270', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25648'}
| null |
GHSA
|
GHSA-2c25-xfpq-8w9r
|
Cross-site scripting in jfinal
|
An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.
|
{'CVE-2021-33348'}
|
2021-08-13T15:22:14Z
|
2021-08-13T15:22:14Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/jfinal/jfinal/issues/188', 'https://github.com/advisories/GHSA-2c25-xfpq-8w9r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33348'}
| null |
GHSA
|
GHSA-8fx9-5hx8-crhm
|
Apache Struts 2.0.1 uses an unintentional expression in a Freemarker tag instead of string literal
|
In Apache Struts 2.0.1 through 2.3.33 and 2.5 through 2.5.10, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
|
{'CVE-2017-12611'}
|
2022-04-26T18:59:37Z
|
2018-10-16T19:35:40Z
|
CRITICAL
| 9.8
|
{'CWE-20'}
|
{'https://struts.apache.org/docs/s2-053.html', 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12611', 'https://github.com/advisories/GHSA-8fx9-5hx8-crhm', 'http://www.securityfocus.com/bid/100829', 'https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001'}
| null |
GHSA
|
GHSA-c738-77x8-wmq5
|
Uncontrolled Resource Consumption in XNIO
|
A vulnerability was discovered in XNIO where file descriptor leak caused by growing amounts of NIO Selector file handles between garbage collection cycles. It may allow the attacker to cause a denial of service. It affects XNIO versions 3.6.0.Beta1 through 3.8.1.Final.
|
{'CVE-2020-14340'}
|
2022-04-22T15:48:33Z
|
2021-06-08T22:29:29Z
|
MODERATE
| 5.9
|
{'CWE-400'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1860218', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14340', 'https://github.com/advisories/GHSA-c738-77x8-wmq5', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-gjph-xf5q-6mfq
|
Denial of Service in @hapi/ammo
|
Versions of `@hapi/ammo` prior to 3.1.2 or 5.0.1 are vulnerable to Denial of Service. The Range HTTP header parser has a vulnerability which will cause the function to throw a system error if the header is set to an invalid value. Because hapi is not expecting the function to ever throw, the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to version 3.1.2 or 5.0.1.
| null |
2020-09-03T15:46:02Z
|
2020-09-03T15:46:02Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-gjph-xf5q-6mfq', 'https://www.npmjs.com/advisories/1474'}
| null |
GHSA
|
GHSA-v7m9-9497-p9gr
|
Possible pod name collisions in jupyterhub-kubespawner
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
JupyterHub deployments using:
- KubeSpawner <= 0.11.1 (e.g. zero-to-jupyterhub 0.9.0) and
- enabled named_servers (not default), and
- an Authenticator that allows:
- usernames with hyphens or other characters that require escape (e.g. `user-hyphen` or `user@email`), and
- usernames which may match other usernames up to but not including the escaped character (e.g. `user` in the above cases)
In this circumstance, certain usernames will be able to craft particular server names which will grant them access to the default server of other users who have matching usernames.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Patch will be released in kubespawner 0.12 and zero-to-jupyterhub 0.9.1
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
#### KubeSpawner
Specify configuration:
for KubeSpawner
```python
from traitlets import default
from kubespawner import KubeSpawner
class PatchedKubeSpawner(KubeSpawner):
@default("pod_name_template")
def _default_pod_name_template(self):
if self.name:
return "jupyter-{username}-{servername}"
else:
return "jupyter-{username}"
@default("pvc_name_template")
def _default_pvc_name_template(self):
if self.name:
return "claim-{username}-{servername}"
else:
return "claim-{username}"
c.JupyterHub.spawner_class = PatchedKubeSpawner
```
**Note for KubeSpawner:** this configuration will behave differently before and after the upgrade, so will need to be removed when upgrading. Only apply this configuration while still using KubeSpawner ≤ 0.11.1 and remove it after upgrade to ensure consistent pod and pvc naming.
Changing the name template means pvcs for named servers will have different names. This will result in orphaned PVCs for named servers across Hub upgrade! This may appear as data loss for users, depending on configuration, but the orphaned PVCs will still be around and data can be migrated manually (or new PVCs created manually to reference existing PVs) before deleting the old PVCs and/or PVs.
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [kubespawner](https://github.com/jupyterhub/kubespawner)
* Email us at [security@ipython.org](mailto:security@ipython.org)
Credit: Jining Huang
|
{'CVE-2020-15110'}
|
2021-11-19T15:44:02Z
|
2020-07-22T23:07:16Z
|
MODERATE
| 6.8
|
{'CWE-863'}
|
{'https://github.com/jupyterhub/kubespawner/commit/3dfe870a7f5e98e2e398b01996ca6b8eff4bb1d0', 'https://github.com/jupyterhub/kubespawner/security/advisories/GHSA-v7m9-9497-p9gr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15110', 'https://github.com/advisories/GHSA-v7m9-9497-p9gr'}
| null |
GHSA
|
GHSA-vxrc-68xx-x48g
|
Sandbox Information Disclosure
|
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.
|
{'CVE-2019-9942'}
|
2022-04-06T20:28:17Z
|
2022-03-26T00:25:25Z
|
LOW
| 3.7
| null |
{'https://seclists.org/bugtraq/2019/Mar/60', 'https://symfony.com/blog/twig-sandbox-information-disclosure', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9942', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2019-9942.yaml', 'https://www.debian.org/security/2019/dsa-4419', 'https://github.com/advisories/GHSA-vxrc-68xx-x48g', 'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'}
| null |
GHSA
|
GHSA-v73w-r9xg-7cr9
|
Use of insecure jQuery version in OctoberCMS
|
### Impact
Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code.
### Patches
Issue has been patched in Build 466 (v1.0.466) by applying the recommended patch from @jquery.
### Workarounds
Apply https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892 to your installation manually if unable to upgrade to Build 466.
### References
- https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022
- https://jquery.com/upgrade-guide/3.5/
### For more information
If you have any questions or comments about this advisory:
* Email us at [octobercms@luketowers.ca](mailto:octobercms@luketowers.ca) & [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat Assessment
Assessed as Moderate by the @jquery team.
### Acknowledgements
Thanks to @mrgswift for reporting the issue to the October CMS team.
| null |
2022-04-19T19:02:27Z
|
2020-06-05T19:37:49Z
|
MODERATE
| 0
| null |
{'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892', 'https://github.com/advisories/GHSA-v73w-r9xg-7cr9', 'https://github.com/octobercms/october/security/advisories/GHSA-v73w-r9xg-7cr9', 'https://github.com/octobercms/october/issues/5097'}
| null |
GHSA
|
GHSA-vjqw-r3ww-wj2w
|
Expression Language Injection in Apache Syncope
|
A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.
|
{'CVE-2020-1959'}
|
2021-07-29T16:57:06Z
|
2021-06-16T17:18:58Z
|
CRITICAL
| 9.8
|
{'CWE-917'}
|
{'http://syncope.apache.org/security', 'https://github.com/advisories/GHSA-vjqw-r3ww-wj2w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1959'}
| null |
GHSA
|
GHSA-8843-m7mw-mxqm
|
Buffer overflow in Pillow
|
In Pillow before 6.2.3 and 7.x before 7.0.1, there are two Buffer Overflows in libImaging/TiffDecode.c.
|
{'CVE-2020-10379'}
|
2021-09-22T21:45:09Z
|
2020-07-27T21:52:41Z
|
HIGH
| 7.8
|
{'CWE-120'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/', 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging', 'https://github.com/python-pillow/Pillow/pull/4538', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10379', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html', 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574577', 'https://usn.ubuntu.com/4430-2/', 'https://github.com/advisories/GHSA-8843-m7mw-mxqm', 'https://github.com/python-pillow/Pillow/commit/46f4a349b88915787fea3fb91348bb1665831bbb#diff-9478f2787e3ae9668a15123b165c23ac', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/', 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}
| null |
GHSA
|
GHSA-m2wv-m5pf-284r
|
Cross-site Scripting in teampass
|
Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO. Someone must open a link for the Teampass Password Manager index page containing malicious payload.
|
{'CVE-2022-26980'}
|
2022-04-05T21:07:47Z
|
2022-03-29T00:01:09Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2', 'https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26980', 'https://github.com/advisories/GHSA-m2wv-m5pf-284r'}
| null |
GHSA
|
GHSA-694m-jhr9-pf77
|
High severity vulnerability that affects doorkeeper
|
Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.
|
{'CVE-2018-1000211'}
|
2021-09-02T15:43:13Z
|
2018-08-13T20:46:41Z
|
HIGH
| 7.5
|
{'CWE-732'}
|
{'https://github.com/advisories/GHSA-694m-jhr9-pf77', 'https://github.com/doorkeeper-gem/doorkeeper/pull/1119', 'https://github.com/doorkeeper-gem/doorkeeper/issues/891', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000211'}
| null |
GHSA
|
GHSA-5mxh-2qfv-4g7j
|
NUL character in ROA causes OctoRPKI to crash
|
OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded `NUL` (`\0`) character).
## Patches
## For more information
If you have any questions or comments about this advisory email us at security@cloudflare.com
|
{'CVE-2021-3910'}
|
2022-04-05T19:29:26Z
|
2021-11-10T20:15:06Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3910', 'https://www.debian.org/security/2022/dsa-5041', 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-5mxh-2qfv-4g7j', 'https://github.com/advisories/GHSA-5mxh-2qfv-4g7j', 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'}
| null |
GHSA
|
GHSA-wp7m-mrvf-599c
|
Command Injection in node-df
|
All versions of `node-df` are vulnerable to Command Injection. The package fails to sanitize filenames passed to the `file` option. If this value is user-controlled it may allow attackers to run arbitrary commands in the server.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-15597'}
|
2021-11-01T14:12:07Z
|
2020-02-14T23:09:10Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15597', 'https://www.npmjs.com/advisories/1431', 'https://hackerone.com/reports/703412', 'https://github.com/advisories/GHSA-wp7m-mrvf-599c'}
| null |
GHSA
|
GHSA-gx7g-wjxg-jwwj
|
Cross-Site Request Forgery in YOURLS
|
YOURLS versions 1.8.2 and prior are vulnerable to Cross-Site Request Forgery.
|
{'CVE-2022-0088'}
|
2022-04-18T22:17:43Z
|
2022-04-04T00:00:55Z
|
LOW
| 3.5
|
{'CWE-352'}
|
{'https://github.com/YOURLS/YOURLS/pull/3264', 'https://github.com/advisories/GHSA-gx7g-wjxg-jwwj', 'https://github.com/YOURLS/YOURLS/issues/3170', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0088', 'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59', 'https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29'}
| null |
GHSA
|
GHSA-9hgc-wpc5-v8p9
|
An attacker can execute malicious javascript in Live Helper Chat
|
Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious javascript on application.
|
{'CVE-2022-1530'}
|
2022-05-03T20:49:16Z
|
2022-04-30T00:00:37Z
|
LOW
| 0
|
{'CWE-79'}
|
{'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1530', 'https://github.com/advisories/GHSA-9hgc-wpc5-v8p9', 'https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6'}
| null |
GHSA
|
GHSA-rpvr-mw7r-25xx
|
Path traversal in MCMS
|
MCMS v5.2.5 was discovered to contain an arbitrary file deletion vulnerability via the component oldFileName.
|
{'CVE-2021-46062'}
|
2022-03-01T21:24:01Z
|
2022-02-19T00:01:24Z
|
HIGH
| 7.1
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-rpvr-mw7r-25xx', 'https://github.com/ming-soft/MCMS/issues/59', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46062'}
| null |
GHSA
|
GHSA-h5g2-38x9-4gv3
|
High severity vulnerability that affects archive-tar-minitar and minitar
|
Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry.
|
{'CVE-2016-10173'}
|
2021-09-13T16:33:15Z
|
2017-10-24T18:33:35Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10173', 'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4', 'http://www.openwall.com/lists/oss-security/2017/01/29/1', 'http://www.securityfocus.com/bid/95874', 'https://security.gentoo.org/glsa/201702-32', 'http://www.openwall.com/lists/oss-security/2017/01/24/7', 'https://github.com/halostatue/minitar/issues/16', 'https://puppet.com/security/cve/cve-2016-10173', 'https://github.com/advisories/GHSA-h5g2-38x9-4gv3', 'http://www.debian.org/security/2017/dsa-3778'}
| null |
GHSA
|
GHSA-x7m2-6g99-84w5
|
Arbitrary File Read in Snyk Broker
|
All versions of snyk-broker before 4.80.0 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users with access to Snyk's internal network via directory traversal.
|
{'CVE-2020-7652'}
|
2021-08-25T21:46:47Z
|
2020-06-03T22:02:24Z
|
MODERATE
| 6.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-x7m2-6g99-84w5', 'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570611', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7652'}
| null |
GHSA
|
GHSA-m98g-63qj-fp8j
|
Reflected XSS on clients-registrations endpoint
|
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak. When a malicious request is sent to the client registration endpoint, the error message is not properly escaped, allowing an attacker to execute malicious scripts into the user's browser.
### Acknowledgement
Keycloak would like to thank Quentin TEXIER (Pentester at Opencyber) for reporting this issue.
| null |
2022-04-28T21:01:29Z
|
2022-04-28T21:01:28Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-m98g-63qj-fp8j', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-m98g-63qj-fp8j'}
| null |
GHSA
|
GHSA-v222-6mr4-qj29
|
Command Injection vulnerability in asciidoctor-include-ext
|
### Impact
Applications using [Asciidoctor (Ruby)](https://github.com/asciidoctor/asciidoctor) with [asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext) (prior to version 0.4.0), which render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. ~~This attack is possible even when `allow-uri-read` is disabled!~~ (EDIT: it’s not)
### Patches
The vulnerability has been fixed in commit c7ea001 (and further improved in cbaccf3), which is included in version [0.4.0](https://rubygems.org/gems/asciidoctor-include-ext/versions/0.4.0).
### Workarounds
```rb
require 'asciidoctor/include_ext'
class Asciidoctor::IncludeExt::IncludeProcessor
# Overrides superclass private method to mitigate Command Injection
# vulnerability in asciidoctor-include-ext <0.4.0.
def target_uri?(target)
target.downcase.start_with?('http://', 'https://') \
&& URI.parse(target).is_a?(URI::HTTP)
rescue URI::InvalidURIError
false
end
end
```
### References
* https://sakurity.com/blog/2015/02/28/openuri.html
### Credits
This vulnerability was discovered by Joern Schneeweisz from the GitLab Security Research Team.
### For more information
See commit message c7ea001.
If you have any questions or comments about this advisory open an issue in [jirutka/asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext/issues/).
|
{'CVE-2022-24803'}
|
2022-04-06T21:24:00Z
|
2022-03-31T23:27:15Z
|
CRITICAL
| 10
|
{'CWE-78'}
|
{'https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae155', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24803', 'https://github.com/advisories/GHSA-v222-6mr4-qj29', 'https://github.com/jirutka/asciidoctor-include-ext/security/advisories/GHSA-v222-6mr4-qj29', 'https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee'}
| null |
GHSA
|
GHSA-w8hg-mxvh-9h57
|
Malicious Package in angular-bmap
|
Version 0.0.9 of `angular-bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.9 of this module is found installed you will want to replace it with a version before or after 0.0.9. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T14:49:20Z
|
2020-09-01T19:42:49Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/shenfw1987/angular-bmap', 'https://github.com/advisories/GHSA-w8hg-mxvh-9h57', 'https://snyk.io/vuln/SNYK-JS-ANGULARBMAP-451017', 'https://www.npmjs.com/advisories/614'}
| null |
GHSA
|
GHSA-5gjh-5j4f-cpwv
|
Unrestricted Upload of File with Dangerous Type in Gogs
|
### Impact
The malicious user is able to upload a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected.
### Patches
Repository file uploads are prohibited to its `.git` directory. Users should upgrade to 0.12.6 or the latest 0.13.0+dev.
### Workarounds
[Disable repository files upload](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L128-L129).
### References
https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902/
### For more information
If you have any questions or comments about this advisory, please post on #6833.
|
{'CVE-2022-0415'}
|
2022-03-29T22:02:35Z
|
2022-03-28T16:46:41Z
|
HIGH
| 8.8
|
{'CWE-434', 'CWE-20'}
|
{'https://github.com/gogs/gogs/pull/6838', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0415', 'https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902', 'https://github.com/gogs/gogs/commit/0fef3c9082269e9a4e817274942a5d7c50617284', 'https://github.com/gogs/gogs/issues/6833', 'https://github.com/advisories/GHSA-5gjh-5j4f-cpwv', 'https://github.com/gogs/gogs/security/advisories/GHSA-5gjh-5j4f-cpwv'}
| null |
GHSA
|
GHSA-6898-wx94-8jq8
|
Potential Command Injection in libnotify
|
Versions 1.0.3 and earlier of libnotify are affected by a shell command injection vulnerability. This may result in execution of arbitrary shell commands, if user input is passed into libnotify.notify.
Untrusted input passed in the call to libnotify.notify could result in execution of shell commands. Callers may be unaware of this.
### Example
```
var libnotify = require('libnotify')
libnotify.notify('UNTRUSTED INPUT', { title: \"\" }, function () {
console.log(arguments);
})
```
Special thanks to Neal Poole for submitting the pull request to fix this issue.
## Recommendation
Update to version 1.0.4 or greater
|
{'CVE-2013-7381'}
|
2021-09-23T20:55:30Z
|
2020-08-31T22:50:48Z
|
CRITICAL
| 9.8
|
{'CWE-74'}
|
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://github.com/mytrile/node-libnotify/commit/dfe7801d73a0dda10663a0ff3d0ec8b4d5f0d448', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7381', 'https://nodesecurity.io/advisories/libnotify_potential_command_injection_in_libnotify.notify', 'https://www.npmjs.com/advisories/20', 'https://github.com/advisories/GHSA-6898-wx94-8jq8', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
| null |
GHSA
|
GHSA-qpgv-g792-wh6x
|
Uncontrolled Resource Consumption in parse_duration
|
An issue was discovered in the parse_duration crate through 2021-03-18 for Rust. It allows attackers to cause a denial of service (CPU and memory consumption) via a duration string with a large exponent.
|
{'CVE-2021-29932'}
|
2021-08-25T20:54:04Z
|
2021-08-25T20:54:04Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-qpgv-g792-wh6x', 'https://rustsec.org/advisories/RUSTSEC-2021-0041.html', 'https://github.com/zeta12ti/parse_duration/issues/21', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29932'}
| null |
GHSA
|
GHSA-fjqm-246c-mwqg
|
In Bouncy Castle JCE Provider the other party DH public key is not fully validated
|
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.
|
{'CVE-2016-1000346'}
|
2022-04-27T13:35:25Z
|
2018-10-17T16:27:28Z
|
LOW
| 3.7
| null |
{'https://usn.ubuntu.com/3727-1/', 'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000346', 'https://github.com/advisories/GHSA-fjqm-246c-mwqg', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927'}
| null |
GHSA
|
GHSA-62mh-w5cv-p88c
|
Import token permissions checking not enforced
|
(This advisory is canonically <https://advisories.nats.io/CVE/CVE-2021-3127.txt>)
## Problem Description
The NATS server provides for Subjects which are namespaced by Account; all Subjects are supposed to be private to an account, with an Export/Import system used to grant cross-account access to some Subjects. Some Exports are public, such that anyone can import the
relevant subjects, and some Exports are private, such that the Import requires a token JWT to prove permission.
The JWT library's validation of the bindings in the Import Token incorrectly warned on mismatches, instead of outright rejecting the token.
As a result, any account can take an Import token used by any other account and re-use it for themselves because the binding to the
importing account is not rejected, and use it to import *any* Subject from the Exporting account, not just the Subject referenced in the Import Token.
The NATS account-server system treats account JWTs as semi-public information, such that an attacker can easily enumerate all account JWTs and retrieve all Import Tokens from those account JWTs.
The CVE identifier should cover the JWT library repair and the nats-server containing the fixed JWT library, and any other application depending upon the fixed JWT library.
## Affected versions
#### JWT library
* all versions prior to 2.0.1
* fixed after nats-io/jwt#149 landed (2021-03-14)
#### NATS Server
* Version 2 prior to 2.2.0
+ 2.0.0 through and including 2.1.9 are vulnerable
* fixed with nats-io/nats-server@423b79440c (2021-03-14)
## Impact
In deployments with untrusted accounts able to update the Account Server with imports, a malicious account can access any Subject from an account which provides Exported Subjects.
Abuse of this facility requires the malicious actor to upload their tampered Account JWT to the Account Server, providing the service operator with a data-store which can be scanned for signs of abuse.
## Workaround
Deny access to clients to update their account JWT in the account server.
## Solution
Upgrade the JWT dependency in any application using it.
Upgrade the NATS server if using NATS Accounts (with private Exports; Account owners can create those at any time though).
Audit all accounts JWTs to scan for exploit attempts; a Python script to audit the accounts can be found at <https://gist.github.com/philpennock/09d49524ad98043ff11d8a40c2bb0d5a>.
| null |
2022-02-15T00:42:57Z
|
2022-02-15T00:42:28Z
|
CRITICAL
| 0
|
{'CWE-863'}
|
{'https://github.com/advisories/GHSA-62mh-w5cv-p88c', 'https://github.com/nats-io/jwt/security/advisories/GHSA-62mh-w5cv-p88c'}
| null |
GHSA
|
GHSA-h6xq-3h62-99qx
|
Cross-site scripting in Apache Atlas
|
Apache Atlas before 2.1.0 contain a XSS vulnerability. While saving search or rendering elements values are not sanitized correctly and because of that it triggers the XSS vulnerability.
|
{'CVE-2020-13928'}
|
2022-02-10T20:51:46Z
|
2022-02-10T20:51:46Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/ra468036f913be41b0c8fea74f91d53e273b0bfa838a4b140a5dcd463%40%3Cuser.atlas.apache.org%3E', 'https://github.com/advisories/GHSA-h6xq-3h62-99qx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13928', 'https://mvnrepository.com/artifact/org.apache.atlas/apache-atlas'}
| null |
GHSA
|
GHSA-66p5-j55p-32r9
|
smallvec creates uninitialized value of any type
|
Affected versions of this crate called `mem::uninitialized()` to create values of a user-supplied type `T`.
This is unsound e.g. if `T` is a reference type (which must be non-null and thus may not remain uninitialized).
The flaw was corrected by avoiding the use of `mem::uninitialized()`, using `MaybeUninit` instead.
| null |
2021-08-25T21:00:25Z
|
2021-08-25T21:00:25Z
|
MODERATE
| 0
|
{'CWE-457'}
|
{'https://rustsec.org/advisories/RUSTSEC-2018-0018.html', 'https://github.com/advisories/GHSA-66p5-j55p-32r9', 'https://github.com/servo/rust-smallvec/pull/162', 'https://github.com/servo/rust-smallvec/issues/126'}
| null |
GHSA
|
GHSA-2p89-5f22-8qvf
|
Exposure of Sensitive Information to an Unauthorized Actor
|
Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021
|
{'CVE-2021-32711'}
|
2021-09-08T18:00:32Z
|
2021-09-08T18:00:32Z
|
CRITICAL
| 9.1
|
{'CWE-200'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32711', 'https://github.com/advisories/GHSA-2p89-5f22-8qvf', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021', 'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'}
| null |
GHSA
|
GHSA-ph98-v78f-jqrm
|
SQL injection in jackalope/jackalope-doctrine-dbal
|
### Impact
Users can provoke SQL injections if they can specify a node name or query.
### Patches
Upgrade to version 1.7.4
If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`.
### Workarounds
Node names and xpaths can contain `"` or `;` according to the JCR specification. The jackalope component that translates the query object model into doctrine dbal queries does not properly escape the names and paths, so that a accordingly crafted node name can lead to an SQL injection.
If queries are never done from user input, or if you validate the user input to not contain `;`, you are not affected.
### References
No further references.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [jackalope/jackalope-doctrine-dbal repo](https://github.com/jackalope/jackalope-doctrine-dbal/issues)
|
{'CVE-2021-43822'}
|
2022-04-19T19:03:17Z
|
2021-12-14T21:08:13Z
|
HIGH
| 8.5
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43822', 'https://github.com/advisories/GHSA-ph98-v78f-jqrm', 'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db', 'https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm'}
| null |
GHSA
|
GHSA-qvc5-cfrr-384v
|
RCE in Third Party Library in Shopware
|
### Impact
RCE in Third Party Library
### Patches
We recommend to update to the current version 6.3.1.1. You can get the update to 6.3.1.1 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### References
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020
| null |
2022-04-19T19:02:35Z
|
2020-09-23T17:20:28Z
|
LOW
| 0
| null |
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020', 'https://github.com/advisories/GHSA-qvc5-cfrr-384v', 'https://github.com/shopware/platform/security/advisories/GHSA-qvc5-cfrr-384v'}
| null |
GHSA
|
GHSA-fgv8-vj5c-2ppq
|
Incorrect Authorization in runc
|
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
|
{'CVE-2019-16884'}
|
2022-02-26T01:52:03Z
|
2022-02-22T15:38:08Z
|
HIGH
| 5.4
|
{'CWE-863'}
|
{'https://github.com/crosbymichael/runc/commit/78dce1cf1ec36bbe7fe6767bdb81f7cbf6d34d70', 'http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00073.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00009.html', 'https://access.redhat.com/errata/RHSA-2019:4269', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00010.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGK6IV5JGVDXHOXEKJOJWKOVNZLT6MYR/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16884', 'https://github.com/opencontainers/runc/issues/2128', 'https://github.com/advisories/GHSA-fgv8-vj5c-2ppq', 'https://access.redhat.com/errata/RHSA-2019:4074', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPK4JWP32BUIVDJ3YODZSOEVEW6BHQCF/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD/', 'https://security.gentoo.org/glsa/202003-21', 'https://security.netapp.com/advisory/ntap-20220221-0004/', 'https://usn.ubuntu.com/4297-1/', 'https://access.redhat.com/errata/RHSA-2019:3940', 'https://github.com/opencontainers/runc/pull/2129'}
| null |
GHSA
|
GHSA-5w8q-x7hc-jhp6
|
Directory Traversal in node-simple-router
|
Affected versions of `node-simple-router` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
Update to v0.10.1 or later.
|
{'CVE-2017-16083'}
|
2021-01-08T19:48:06Z
|
2018-07-24T19:42:39Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/352', 'https://github.com/sandy98/node-simple-router/commit/dfdd52e2e80607af433097d940b3834fd96df488', 'https://github.com/advisories/GHSA-5w8q-x7hc-jhp6', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-simple-router', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16083', 'https://www.npmjs.com/advisories/352'}
| null |
GHSA
|
GHSA-f93p-f762-vr53
|
Reflected Cross-Site Scripting in Apache CXF
|
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.
|
{'CVE-2019-17573'}
|
2021-06-17T19:57:01Z
|
2020-06-10T20:02:33Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17573', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/11/12/2', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-f93p-f762-vr53', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rf3b50583fefce2810cbd37c3d358cbcd9a03e750005950bf54546194@%3Cannounce.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E'}
| null |
GHSA
|
GHSA-2382-qx5h-rvqh
|
SQL Injection in odata4j
|
odata4j 0.7.0 allows ExecuteCountQueryCommand.java SQL injection. NOTE, this product is apparently discontinued.
|
{'CVE-2016-11023'}
|
2021-05-07T15:52:56Z
|
2021-05-07T15:52:56Z
|
HIGH
| 9.8
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-2382-qx5h-rvqh', 'https://nvd.nist.gov/vuln/detail/CVE-2016-11023', 'https://groups.google.com/d/msg/odata4j-discuss/_lBwwXP30g0/Av6zkZMdBwAJ'}
| null |
GHSA
|
GHSA-9qgc-p27w-3hjg
|
High severity vulnerability that affects com.typesafe.akka:akka-http-core_2.11 and com.typesafe.akka:akka-http-core_2.12
|
The decodeRequest and decodeRequestWith directives in Lightbend Akka HTTP 10.1.x through 10.1.4 and 10.0.x through 10.0.13 allow remote attackers to cause a denial of service (memory consumption and daemon crash) via a ZIP bomb.
|
{'CVE-2018-16131'}
|
2021-09-08T20:46:55Z
|
2018-10-22T20:37:07Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://akka.io/blog/news/2018/08/30/akka-http-dos-vulnerability-found', 'https://github.com/akka/akka-http/issues/2137', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16131', 'https://groups.google.com/forum/#!topic/akka-security/Dj7INsYWdjg', 'https://doc.akka.io/docs/akka-http/current/security/2018-09-05-denial-of-service-via-decodeRequest.html', 'https://github.com/advisories/GHSA-9qgc-p27w-3hjg'}
| null |
GHSA
|
GHSA-xgrx-xpv2-6vp4
|
Improper Authentication in Apache ActiveMQ
|
Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.
|
{'CVE-2020-13920'}
|
2022-02-09T22:15:00Z
|
2022-02-09T22:15:00Z
|
MODERATE
| 5.9
|
{'CWE-306'}
|
{'https://github.com/advisories/GHSA-xgrx-xpv2-6vp4', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00013.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://activemq.apache.org/security-advisories.data/CVE-2020-13920-announcement.txt', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13920'}
| null |
GHSA
|
GHSA-wpgh-hmv4-r3v5
|
Prototype pollution in safe-obj
|
Prototype pollution vulnerability in 'safe-obj' versions 1.0.0 through 1.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25928'}
|
2021-06-21T17:18:20Z
|
2021-06-21T17:18:20Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/mantacode/safe-obj/blob/6ab63529182b6cf11704ac84f10800290afd3f9f/lib/index.js#L122', 'https://github.com/advisories/GHSA-wpgh-hmv4-r3v5', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25928', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25928'}
| null |
GHSA
|
GHSA-6p52-jr3q-c94g
|
Arbitrary code execution due to YAML deserialization
|
### Impact
Nameko can be tricked to perform arbitrary code execution when deserialising a YAML config file. Example:
``` yaml
# malicious.yaml
!!python/object/new:type
args: ['z', !!python/tuple [], {'extend': !!python/name:exec }]
listitems: "__import__('os').system('cat /etc/passwd')"
```
``` shell
$ nameko run --config malicious.yaml test
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
...
```
### Patches
The problem was fixed in https://github.com/nameko/nameko/pull/722 and released in version 2.14.0, and in rc10 of the v3 pre-release.
Versions prior to 2.14.0, and v3.0.0rc0 through v3.0.0rc9 are still vulnerable.
### Workarounds
The vulnerability is exploited by config files with malicious content. It can be avoided by only using config files that you trust.
|
{'CVE-2021-41078'}
|
2021-11-01T14:06:22Z
|
2021-10-19T15:28:57Z
|
HIGH
| 8.6
|
{'CWE-502'}
|
{'https://github.com/nameko/nameko/security/advisories/GHSA-6p52-jr3q-c94g', 'https://github.com/advisories/GHSA-6p52-jr3q-c94g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41078', 'https://github.com/nameko/nameko', 'https://github.com/nameko/nameko/releases/tag/v2.14.0', 'https://github.com/nameko/nameko/releases/tag/v3.0.0-rc10'}
| null |
GHSA
|
GHSA-w725-67p7-xv22
|
Command Injection in local-devices
|
Versions of `local-devices` prior to 3.0.0 are vulnerable to Command Injection. The package does not validate input on ip addresses and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.
## Recommendation
Upgrade to version 3.0.0 or later.
| null |
2021-09-28T17:35:45Z
|
2020-09-03T17:05:04Z
|
HIGH
| 0
|
{'CWE-77'}
|
{'https://github.com/DylanPiercey/local-devices/pull/16', 'https://github.com/advisories/GHSA-w725-67p7-xv22', 'https://www.npmjs.com/advisories/1020'}
| null |
GHSA
|
GHSA-qvf8-p83w-v58j
|
Podman's default inheritable capabilities for linux container not empty
|
A bug was found in Podman where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).
This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.
|
{'CVE-2022-27649'}
|
2022-05-02T17:42:54Z
|
2022-04-01T20:52:29Z
|
HIGH
| 7.5
|
{'CWE-276'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=2066568', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX/', 'https://github.com/advisories/GHSA-qvf8-p83w-v58j', 'https://github.com/containers/podman/releases/tag/v4.0.3', 'https://github.com/containers/podman/security/advisories/GHSA-qvf8-p83w-v58j', 'https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27649'}
| null |
GHSA
|
GHSA-fjh3-g8gq-9q92
|
Cross-Site Scripting in Content Preview
|
> ### Meta
> * CVSS: `AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.0)
> * CWE-79
> * Status: **DRAFT**
### Problem
It has been discovered that database fields used as _descriptionColumn_ are vulnerable to cross-site scripting when their content gets previewed in the page module. A valid backend user account is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 10.4.14, 11.1.1 that fix the problem described.
### Credits
Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-007](https://typo3.org/security/advisory/typo3-core-sa-2021-007)
|
{'CVE-2021-21340'}
|
2022-04-19T19:02:50Z
|
2021-03-23T01:53:47Z
|
LOW
| 0
|
{'CWE-79'}
|
{'https://packagist.org/packages/typo3/cms-backend', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-fjh3-g8gq-9q92', 'https://typo3.org/security/advisory/typo3-core-sa-2021-007', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21340', 'https://github.com/advisories/GHSA-fjh3-g8gq-9q92'}
| null |
GHSA
|
GHSA-89mq-4x47-5v83
|
Prototype Pollution in angular
|
Versions of `angular ` prior to 1.7.9 are vulnerable to prototype pollution. The deprecated API function `merge()` does not restrict the modification of an Object's prototype in the , which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
Upgrade to version 1.7.9 or later. The function was already deprecated and upgrades are not expected to break functionality.
|
{'CVE-2019-10768'}
|
2022-01-04T19:51:21Z
|
2019-11-20T15:29:43Z
|
HIGH
| 7.5
|
{'CWE-20', 'CWE-915'}
|
{'https://github.com/advisories/GHSA-89mq-4x47-5v83', 'https://github.com/angular/angular.js/pull/16913', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-534884', 'https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://www.npmjs.com/advisories/1343', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10768'}
| null |
GHSA
|
GHSA-2f9x-5v75-3qv4
|
Moderate severity vulnerability that affects django
|
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
|
{'CVE-2018-7537'}
|
2021-08-30T16:29:21Z
|
2019-01-04T17:50:00Z
|
MODERATE
| 5.3
|
{'CWE-185'}
|
{'https://www.debian.org/security/2018/dsa-4161', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html', 'https://github.com/advisories/GHSA-2f9x-5v75-3qv4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7537', 'http://www.securityfocus.com/bid/103357', 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://usn.ubuntu.com/3591-1/', 'https://access.redhat.com/errata/RHSA-2019:0265'}
| null |
GHSA
|
GHSA-wf5p-f5xr-c4jj
|
SQL Injection in rosariosis
|
An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.
|
{'CVE-2021-44427'}
|
2021-12-02T17:48:53Z
|
2021-12-02T17:48:53Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44427', 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://gitlab.com/francoisjacquet/rosariosis/blob/mobile/CHANGES.md#changes-in-811', 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/328', 'https://github.com/advisories/GHSA-wf5p-f5xr-c4jj', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}
| null |
GHSA
|
GHSA-hmw2-mvvh-jf5j
|
OS Command Injection in enpeem
|
enpeem through 2.2.0 allows execution of arbitrary commands. The "options.dir" argument is provided to the "exec" function without any sanitization.
|
{'CVE-2019-10801'}
|
2021-04-13T15:22:47Z
|
2021-04-13T15:22:47Z
|
HIGH
| 9.8
|
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-ENPEEM-559007', 'https://github.com/advisories/GHSA-hmw2-mvvh-jf5j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10801', 'https://github.com/balderdashy/enpeem/blob/master/index.js#L114'}
| null |
GHSA
|
GHSA-hqw4-8893-j4h7
|
Directory Traversal in simple-npm-registry
|
Affected versions of `simple-npm-registry` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16132'}
|
2021-01-08T18:39:41Z
|
2018-07-23T20:49:28Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/452', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry', 'https://github.com/advisories/GHSA-hqw4-8893-j4h7', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16132', 'https://nodesecurity.io/advisories/452'}
| null |
GHSA
|
GHSA-2x54-j4m3-r6wx
|
High severity vulnerability that affects sqla-yaml-fixtures
|
Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.
|
{'CVE-2019-3575'}
|
2021-08-31T20:18:40Z
|
2019-01-04T17:44:48Z
|
HIGH
| 7.8
|
{'CWE-94'}
|
{'https://github.com/schettino72/sqla_yaml_fixtures/issues/20', 'https://github.com/advisories/GHSA-2x54-j4m3-r6wx', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3575'}
| null |
GHSA
|
GHSA-fjqg-w8g6-hhq8
|
Improper Authentication and Improper Access Control in Dolibarr
|
In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name.
|
{'CVE-2021-25956'}
|
2021-10-21T14:19:44Z
|
2021-09-02T17:16:28Z
|
HIGH
| 7.2
|
{'CWE-287', 'CWE-284'}
|
{'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25956', 'https://github.com/advisories/GHSA-fjqg-w8g6-hhq8', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956'}
| null |
GHSA
|
GHSA-22h7-7wwg-qmgg
|
Prototype Pollution in @hapi/hoek
|
Versions of `@hapi/hoek` prior to 8.5.1 and 9.0.3 are vulnerable to Prototype Pollution. The `clone` function fails to prevent the modification of the Object prototype when passed specially-crafted input. Attackers may use this to change existing properties that exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances.
This issue __does not__ affect hapi applications since the framework protects against such malicious inputs. Applications that use `@hapi/hoek` outside of the hapi ecosystem may be vulnerable.
## Recommendation
Update to version 8.5.1, 9.0.3 or later.
| null |
2021-10-04T20:54:07Z
|
2020-09-04T17:56:39Z
|
LOW
| 0
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-22h7-7wwg-qmgg', 'https://www.npmjs.com/advisories/1468'}
| null |
GHSA
|
GHSA-pgww-xf46-h92r
|
XSS in lxml
|
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
|
{'CVE-2020-27783'}
|
2021-05-25T21:45:11Z
|
2021-01-07T21:54:01Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://advisory.checkmarx.net/advisory/CX-2020-4286', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27783', 'https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7', 'https://snyk.io/vuln/SNYK-PYTHON-LXML-1047473', 'https://security.netapp.com/advisory/ntap-20210521-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/', 'https://pypi.org/project/lxml/', 'https://www.debian.org/security/2020/dsa-4810', 'https://bugzilla.redhat.com/show_bug.cgi?id=1901633', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/', 'https://github.com/advisories/GHSA-pgww-xf46-h92r', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00028.html'}
| null |
GHSA
|
GHSA-w4hp-pcp8-qhf3
|
Cross-site Scripting in livehelperchat
|
Stored XSS is found in Settings>Live help configuration>Departments->Departments groups->edit When a user creates a new webhook under the NAME field and puts a payload {{constructor.constructor('alert(1)')()}}, the input gets stored, at user edit groupname , the payload gets executed.
|
{'CVE-2022-0387'}
|
2022-02-03T20:16:40Z
|
2022-01-28T23:06:32Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/2e09035b-8f98-4930-b7e8-7abe5f722b98', 'https://github.com/advisories/GHSA-w4hp-pcp8-qhf3', 'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0387'}
| null |
GHSA
|
GHSA-rgg3-3wh7-w935
|
Unrestricted Upload of File with Dangerous Type in Zenario CMS
|
Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
|
{'CVE-2021-42171'}
|
2022-04-01T20:11:34Z
|
2022-03-15T00:00:58Z
|
CRITICAL
| 9.8
|
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42171', 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/2', 'https://github.com/advisories/GHSA-rgg3-3wh7-w935', 'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007', 'https://minhnq22.medium.com/file-upload-to-rce-on-zenario-9-0-54156-cms-fa05fcc6cf74', 'https://github.com/TribalSystems/Zenario/releases/tag/9.0.55141'}
| null |
GHSA
|
GHSA-p426-qw2p-v95v
|
Argument Injection in Apache Geode server
|
When an Apache Geode server versions 1.0.0 to 1.8.0 is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster.
|
{'CVE-2017-15694'}
|
2021-08-17T14:51:31Z
|
2019-06-26T01:09:35Z
|
MODERATE
| 6.5
|
{'CWE-88'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15694', 'https://lists.apache.org/thread.html/311505e7b7a045aaa246f0a1935703acacf41b954621b1363c40bf6f@%3Cuser.geode.apache.org%3E', 'https://github.com/advisories/GHSA-p426-qw2p-v95v'}
| null |
GHSA
|
GHSA-rqj9-cq6j-958r
|
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
|
In Apache Hadoop 2.7.4 to 2.7.6, the security fix for CVE-2016-6811 is incomplete. A user who can escalate to yarn user can possibly run arbitrary commands as root user.
|
{'CVE-2018-11766'}
|
2021-09-17T20:39:11Z
|
2018-12-21T17:50:26Z
|
HIGH
| 8.8
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2018-11766', 'http://www.securityfocus.com/bid/106035', 'https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E', 'https://github.com/advisories/GHSA-rqj9-cq6j-958r'}
| null |
GHSA
|
GHSA-4r9c-jghc-cx5m
|
Cross-site Scripting in apostrophe
|
Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.
|
{'CVE-2021-25978'}
|
2021-11-10T16:45:34Z
|
2021-11-10T16:45:34Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59', 'https://github.com/advisories/GHSA-4r9c-jghc-cx5m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25978'}
| null |
GHSA
|
GHSA-r3gr-cxrf-hg25
|
Serialization gadgets exploit in jackson-databind
|
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.
|
{'CVE-2020-35491'}
|
2022-04-22T17:27:15Z
|
2021-12-09T19:15:11Z
|
HIGH
| 8.1
|
{'CWE-913', 'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/2986', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20210122-0005/', 'https://github.com/advisories/GHSA-r3gr-cxrf-hg25', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35491', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
| null |
GHSA
|
GHSA-m9cj-v55f-8x26
|
Authentication Bypass in keycloak
|
A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application.
|
{'CVE-2020-27826'}
|
2022-03-21T20:47:56Z
|
2022-03-18T17:55:26Z
|
HIGH
| 8.8
|
{'CWE-250'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=1905089', 'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27826', 'https://access.redhat.com/security/cve/cve-2020-27826', 'https://github.com/advisories/GHSA-m9cj-v55f-8x26'}
| null |
GHSA
|
GHSA-xrr4-74mc-rpjc
|
Pyro mishandles pid files in temporary directory locations and opening the pid file as root
|
pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks.
|
{'CVE-2011-2765'}
|
2022-04-26T18:22:27Z
|
2018-08-21T17:01:29Z
|
HIGH
| 7.5
|
{'CWE-59'}
|
{'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e', 'https://bugs.debian.org/631912', 'https://github.com/advisories/GHSA-xrr4-74mc-rpjc', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2765', 'https://pythonhosted.org/Pyro/12-changes.html'}
| null |
GHSA
|
GHSA-8j72-p2wm-6738
|
Persistent XSS vulnerability in filename of attached file in PrivateBin
|
On 24th of December 2019 one of the [property based unit tests](https://github.com/PrivateBin/PrivateBin/blob/master/tst/README.md#property-based-unit-testing) reported a [failure](https://travis-ci.org/PrivateBin/PrivateBin/jobs/629180605#L782). Upon investigation, [@elrido](https://github.com/elrido) discovered that the failure was due to unescaped HTML, which allowed the user provided attachment file name to inject HTML under certain conditions leading to a persistent [Cross-site scripting (XSS)](https://en.wikipedia.org/wiki/Cross-site_scripting) vulnerability. After committing an [initial fix](https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6) to the master branch, the [issue was reported](https://github.com/PrivateBin/PrivateBin/issues/554) on 25th of December. Vulnerability write-up done by [@rugk](https://github.com/rugk) and [@elrido](https://github.com/elrido).
The vulnerability has been fixed in [PrivateBin v1.3.2 & v1.2.2](https://privatebin.info/news/v1.3.2-v1.2.2-release.html). Admins are urged to upgrade to these versions to protect the affected users.
## Affected versions
Any PrivateBin version since 1.2.
## Conditions
* The configuration setting `fileupload` has to be enabled, as 1.3 displays an error when trying to open a paste with attachment.
* The CSP header rules don't get applied. For example:
* They are unsupported or disabled in the visitors browser.
* They are filtered out by a some proxy server at the server or client side.
* The header is disabled/commented in the PHP-logic.
* The rules have been relaxed in the `cspheader` configuration setting.
* A paste with a malicious filename is created.
* A visitor of that paste clicks on the "Clone" button.
## Proof of concept
The following method is just one possibility to exploit this issue and is provided as a proof of concept with steps to reproduce the issue. To avoid having to create an actual file with a rogue filename, one could use the [Python CLI client for PrivateBin](https://github.com/r4sas/PBinCLI/) and [edit line 56 in `format.py`](https://github.com/r4sas/PBinCLI/blob/682b47fbd3e24a8a53c3b484ba896a5dbc85cda2/pbincli/format.py#L56) as follows:
```diff
- self._attachment_name = path_leaf(path)
+ self._attachment_name = '<script>alert("☹️");//<a'
```
The paste then can be created on a vulnerable instance:
```shell
$ python pbincli/cli.py send -t " " -f /dev/null -s https://privatebin.net/
```
Visiting the created paste on a vulnerable instance, with `fileupload` enabled and the CSP header weakened or disabled, and clicking the clone button will insert the HTML unescaped. In the above example, a pop-up would appear, when the script is executed.
## Impact
On a vulnerable site pastes with malicious filenames can be created and users visiting these could inadvertently trigger the code execution when they click the "Clone" button. They could be instigated to do so via social engineering, like a paste text suggesting to "clone and share" the paste in question.
The attached file itself doesn't have to be empty and could be an image or document that would still be displayed inline as usual. The execution of the script triggered by clicking on the "Clone" button may occur silently in the background without showing any noticeable signs in browser. It may for instance be used to track visitors, start drive-by-downloads or similar. While we focus on script injection here, as it is the easiest exploit vector, it has to be said that anything else can be injected like CSS, images, videos, although the default CSP will block inline CSS and images, e.g.
On first visit, the filename isn't visible and is properly escaped when inserted into the download attribute. Only when clicking the "Download attachment" link would open a file save dialog with an odd name pre-filled, although browsers will convert illegal characters into valid ones, so it may not be identical to the one provided. Only when the "Clone" button has been clicked and after the exploit has already been triggered, the filename gets displayed. Note that an attacker can of course prevent this indicator of compromise to be shown and e.g. change the displayed text or obfuscate the filename by starting it with something harmless, like `image.png`, before opening the HTML tag.
### Impact restrictions
The impact is mitigated by the fact that the vulnerability is, as far as our investigation concluded, paste-specific, i.e. opening a vulnerable paste can only compromise this one paste and no other pastes.
Furthermore, as stated before, the impact is mitigated by the fact that we deploy a strong [CSP](https://content-security-policy.com/) that, by default, does not allow inline JS or other potentially easy methods that would allow an easy exploitation of the vulnerability.
That said, we have to make users aware, that there may always be tricks to bypass such a CSP and the simple injection of HTML tags, e.g. destroying, faking or somehow phishing an HTML page does always remain a possibility.
As such, we treat this as a security vulnerability with medium severity. It is critical on it's own, but we believe that the deployed security mechanisms should prevent an exploit in practice in most cases.
## Real-life impact
We checked all instances listed in the [PrivateBin directory in the Wiki](https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-Directory) and didn't find any 1.1, 1.2 or 1.3 instances that had the CSP headers disabled or in a state we know to be vulnerable. We used the following script, that may be adapted to check the CSP headers of any single instance:
```shell
for URL in $(
curl -s https://raw.githubusercontent.com/wiki/PrivateBin/PrivateBin/PrivateBin-Directory.md | grep -Po '^http.*?(?= )'
)
do
echo -n "$URL: "
curl -sLI $URL | grep -Poi 'content-security-policy.*script-src.?\K.*?(?=;)' || echo 'No CSP detected!'
done
```
Some of the above sites do offer file uploads. On these instances, it is still possible that a visitor could have CSP support disabled in their browser, i.e. via a transparent proxy at their internet uplink or due to a browser plugin or some other locally installed, misguided security solution.
**Important:** This scan is only a cursory check and _must not_ be taken as a security analysis of any means! You are always responsible for the security of your own instance. Please do check it manually!
## Mitigation
As server administrators can't detect if a paste contains file attachments at all (apart from their size) in version 1.3 and due to the encrypted filename in older versions, as well as the risk for clients that don't apply the CSP settings, we urge them to upgrade to versions 1.3.2 or 1.2.2.
If you use v1.3, you could disable the `fileupload` setting to prevent pastes from getting displayed that may contain this vulnerability. Note that this will break all existing pastes with uploads, however, so we do _not_ recommend this, but advise you to upgrade to a fixed version instead.
## Further information
We want to make potential third-party client authors aware of this vulnerability and urge them to double-check their implementations. If they develop a client that displays untrusted foreign data from a paste in a HTML site, please make sure to escape it to prevent XSS attacks. Such attacks can only be prevented when the paste is displayed, a mitigation when a paste is created is pointless, as a different client can be used during creation.
We do also acknowledge and want to highlight the benefit of the CSP, which has first been [introduced in PrivateBin v1.0](https://github.com/PrivateBin/PrivateBin/issues/10).
However, we want to make you again aware that a whitelist-based CSP as we use, may [sometimes still be bypassed](https://csp.withgoogle.com/docs/faq.html#problems-with-whitelists), e.g. if you host a copy of the Angular library on the same domain as your PrivateBin instance.
We are aware of that and [do consider](https://github.com/PrivateBin/PrivateBin/issues/108) upgrading to a stronger CSP in the future.
### Issue discovery
While it is satisfying that our hard work on introducing unit tests has payed off in the discovery and mitigation of this vulnerability, it does also show a limitation of unit testing. A third party doing a code review would have certainly focused on how the project handles user provided input and may have discovered this much quicker.
The discovery wasn't due to the unit test checking for HTML input to get properly escaped, on the contrary, the test assumed input would not be changed. So other instances of HTML tags generated would have happily passed the test. Only when the test generated a fragment of a link (`<a`) it failed, because the DOM silently removed it when it inserted the string, as links within links aren't allowed. While the test was written to throw arbitrary strings at the `AttachmentViewer.moveAttachmentTo()` method, the test would only check that these got inserted into the DOM unchanged, oblivious of their potential significance when interpreted as HTML.
The [test had been introduced](https://github.com/PrivateBin/PrivateBin/commit/39860dfdc434c00d18342b4fb3bc6f5d0960030d) on December 3rd, 2017, 570 commits ago. Every commit on master and in PRs since introduction in that commit triggers these tests to run for every supported PHP version. Additional test cycles get run on developers local environments during working on commits. Hence the test suite must have run a few thousand times, testing 100 random strings each time. And only after more then 2 years a string containing `<a` got generated, triggered the error condition and 22 shrinks later the smallest failing test case was presented as:
```
Failed after 65 tests and 22 shrinks. rngState: 8b8f0d4ec2a67139b5; Counterexample: "image/png"; ""; "\u0000"; "<a"; "";
```
Discussion about a potential problem with that code, [did spark last September](https://github.com/PrivateBin/PrivateBin/pull/508#commitcomment-34943221), when the vulnerable code part was changed to the one before before the current fix, but was [incorrectly judged](https://github.com/PrivateBin/PrivateBin/pull/508#commitcomment-34944396) as not being a problem, because all of our translation strings are hardcoded. The fact that we do actually add some untrusted user-provided content, wasn't considered at that point.
It should also be mentioned, that the coverage report released for version 1.3.1 did highlight the line that caused this vulnerability as not being covered during testing:

So, in conclusion, it is great to have all of these tools at our disposal, but the code quality would benefit a lot more from having more eyeballs and brains on it.
## Timeline
* 2019-12-24 – Property based unit test fails in a commit pushed to a PR.
* 2019-12-25 – Issue investigated, preliminary patch and issue description published.
* 2019-12-30 – Further investigations, proof-of-concept exploit demonstrated on a vulnerable test instance.
* 2020-01-03 – Discussed broader mitigation of user provided content injections, reviewed other possible cases.
* 2020-01-04 – Published a second patch based on review, escapes HTML in translation.
* 2020-01-05 – Started writing vulnerability report.
* 2020-01-07 – Backported fix for 1.2.1.
* 2020-01-11 – [Release published](https://github.com/PrivateBin/PrivateBin/releases/tag/1.3.2).
* 2020-01-11 – Vulnerability details published.
|
{'CVE-2020-5223'}
|
2021-01-14T17:43:41Z
|
2020-01-14T20:19:33Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738', 'https://github.com/PrivateBin/PrivateBin/issues/554', 'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6', 'https://github.com/advisories/GHSA-8j72-p2wm-6738', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5223', 'https://privatebin.info/news/v1.3.2-v1.2.2-release.html'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.