ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-xm9f-vxmx-4m58
Data Flow Sanitation Issue Fix
### Impact Due to missing sanitation in data flow it was possible for admin users to upload arbitrary executable files to the server.
{'CVE-2021-32759'}
2021-08-30T17:20:41Z
2021-08-30T17:20:41Z
HIGH
0
{'CWE-20'}
{'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13', 'https://github.com/advisories/GHSA-xm9f-vxmx-4m58', 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32759', 'https://github.com/OpenMage/magento-lts/commit/34709ac642d554aa1824892059186dd329db744b', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58'}
null
GHSA
GHSA-cvp7-c586-cmf4
Withdrawn: Code Injection in loguru
# Withdrawn This advisory has been withdrawn after the maintainers of loguru noted this issue is not a security vulnerability and the CVE has been revoked. We have [stopped](https://github.com/Delgan/loguru/issues/563#issuecomment-1025223732) Dependabot alerts regarding this issue. ## Original Description In versions of loguru up to and including 0.5.3 a lack of sanitization on log serialization can lead to arbitrary code execution. The maintainer disputes the issue, but has altered behavior of the library in commit 4b0070a4f30cbf6d5e12e6274b242b62ea11c81b. See https://github.com/Delgan/loguru/issues/563 for further discussion of the issue. The function in question is intended for internal use only, but is not restricted. This has been patched in version 0.6.0.
{'CVE-2022-0329'}
2022-02-01T16:00:39Z
2022-01-28T22:01:45Z
LOW
0
{'CWE-94'}
{'https://tomforb.es/cve-2022-0329-and-the-problems-with-automated-vulnerability-management/', 'https://github.com/Delgan/loguru/issues/563', 'https://github.com/advisories/GHSA-cvp7-c586-cmf4', 'https://huntr.dev/bounties/1-pypi-loguru', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0329', 'https://github.com/delgan/loguru/commit/4b0070a4f30cbf6d5e12e6274b242b62ea11c81b'}
null
GHSA
GHSA-vwfx-hh3w-fj99
Potential XSS injection in the newsletter conditions field
### Impact An employee can inject javascript in the newsletter condition field that will then be executed on the front office ### Patches The issue has been fixed in 2.6.1
{'CVE-2021-21418'}
2021-04-06T17:24:14Z
2021-04-06T17:24:14Z
MODERATE
4.6
{'CWE-79'}
{'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70', 'https://github.com/PrestaShop/ps_emailsubscription/releases/tag/v2.6.1', 'https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21418', 'https://github.com/advisories/GHSA-vwfx-hh3w-fj99', 'https://packagist.org/packages/prestashop/ps_emailsubscription'}
null
GHSA
GHSA-r9ch-m4fh-fc7q
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the private value as well.
{'CVE-2016-1000341'}
2021-09-17T14:46:46Z
2018-10-17T16:24:00Z
MODERATE
5.9
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000341', 'https://usn.ubuntu.com/3727-1/', 'https://github.com/advisories/GHSA-r9ch-m4fh-fc7q', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927'}
null
GHSA
GHSA-3v6h-hqm4-2rg6
Arbitrary File Write in adm-zip
Versions of `adm-zip` before 0.4.9 are vulnerable to arbitrary file write when used to extract a specifically crafted archive that contains path traversal filenames (`../../file.txt` for example). ## Recommendation Update to version 0.4.9 or later.
{'CVE-2018-1002204'}
2021-01-08T19:58:40Z
2018-07-27T17:07:14Z
HIGH
0
{'CWE-22'}
{'http://www.securityfocus.com/bid/107001', 'https://github.com/cthackers/adm-zip/commit/62f64004fefb894c523a7143e8a88ebe6c84df25', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002204', 'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/cthackers/adm-zip/pull/212', 'https://www.npmjs.com/advisories/994', 'https://hackerone.com/reports/362118', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/advisories/GHSA-3v6h-hqm4-2rg6', 'https://snyk.io/vuln/npm:adm-zip:20180415', 'https://www.npmjs.com/advisories/681'}
null
GHSA
GHSA-f62v-xpxf-3v68
Code injection in Apache Ant
As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.
{'CVE-2020-11979'}
2022-04-22T17:18:45Z
2021-02-03T19:16:35Z
HIGH
7.5
{'CWE-94', 'CWE-74'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3NRQQ7ECII4ZNGW7GBC225LVYMPQEKB/', 'https://github.com/gradle/gradle/security/advisories/GHSA-j45w-qrgf-25vm', 'https://github.com/advisories/GHSA-f62v-xpxf-3v68', 'https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/apache/ant/commit/87ac51d3c22bcf7cfd0dc07cb0bd04a496e0d428', 'https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/', 'https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea%40%3Cdev.ant.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AALW42FWNQ35F7KB3JVRC6NBVV7AAYYI/', 'https://security.gentoo.org/glsa/202011-18', 'https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11979', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-5vr6-hm68-5j9p
Cross-site Scripting in LibreNMS
LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php.
{'CVE-2021-44279'}
2021-12-06T21:36:37Z
2021-12-03T20:49:16Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-5vr6-hm68-5j9p', 'https://github.com/librenms/librenms/pull/13554', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44279', 'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'}
null
GHSA
GHSA-mjjq-c88q-qhr6
Cross-Site Scripting in dompurify
Versions of `dompurify` prior to 2.0.7 are vulnerable to Cross-Site Scripting (XSS). It is possible to bypass the package sanitization through Mutation XSS, which may allow an attacker to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 2.0.7 or later.
null
2021-09-29T20:13:07Z
2020-09-03T21:22:00Z
CRITICAL
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1223', 'https://github.com/cure53/DOMPurify/releases/tag/2.0.7', 'https://github.com/advisories/GHSA-mjjq-c88q-qhr6'}
null
GHSA
GHSA-4hq8-v42x-9wx3
Malicious Package in bs85check
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:56:42Z
2020-09-04T16:51:52Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1379', 'https://github.com/advisories/GHSA-4hq8-v42x-9wx3'}
null
GHSA
GHSA-v936-j8gp-9q3p
Open redirects on some federation and push requests
### Impact Requests to user provided domains were not restricted to external IP addresses when calculating the key validity for third-party invite events and sending push notifications. This could cause Synapse to make requests to internal infrastructure. The type of request was not controlled by the user, although limited modification of request bodies was possible. For the most thorough protection server administrators should remove the deprecated `federation_ip_range_blacklist` from their settings after upgrading to Synapse v1.25.0 which will result in Synapse using the improved default IP address restrictions. See the new `ip_range_blacklist` and `ip_range_whitelist` settings if more specific control is necessary. ### Patches Issue is resolved by #8821. Further improvements to protect homeservers by default were made in #8870 and #8954. ### Workarounds Requests to internal IP addresses could be blocked at the system or network level.
{'CVE-2021-21273'}
2022-04-19T19:02:47Z
2021-02-26T17:28:34Z
LOW
3.1
{'CWE-601'}
{'https://github.com/matrix-org/synapse/security/advisories/GHSA-v936-j8gp-9q3p', 'https://github.com/matrix-org/synapse/pull/8821', 'https://github.com/advisories/GHSA-v936-j8gp-9q3p', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/commit/30fba6210834a4ecd91badf0c8f3eb278b72e746', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21273', 'https://github.com/matrix-org/synapse/releases/tag/v1.25.0'}
null
GHSA
GHSA-4f26-v6fr-9hmp
Improper Input Validation in Centreon Web
Centreon Web 19.04.4 allows Remote Code Execution by an administrator who can modify Macro Expression location settings.
{'CVE-2019-16405'}
2022-04-01T20:24:31Z
2021-07-28T17:52:45Z
HIGH
7.2
{'CWE-20'}
{'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html', 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.04.html', 'https://github.com/advisories/GHSA-4f26-v6fr-9hmp', 'https://github.com/centreon/centreon/releases/tag/19.04.5', 'https://github.com/centreon/centreon/pull/7884', 'http://packetstormsecurity.com/files/155999/Centreon-19.04-Remote-Code-Execution.html', 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8.html', 'https://github.com/centreon/centreon/pull/7864', 'https://thecybergeek.co.uk/cves/2019/09/17/CVE-2019-16405-06.html', 'https://thecybergeek.co.uk/cves/2019/09/19/CVEs.html', 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10.html', 'https://github.com/TheCyberGeek/CVE-2019-16405.rb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16405'}
null
GHSA
GHSA-wc43-7wj6-4ggr
Remote code execution in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1057, CVE-2020-1172.
{'CVE-2020-1180'}
2021-08-02T17:29:09Z
2021-08-02T17:29:09Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-wc43-7wj6-4ggr', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1180', 'https://github.com/microsoft/ChakraCore/pull/6500', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1180'}
null
GHSA
GHSA-jv6v-fvvx-4932
Arbitrary File Deletion vulnerability in OctoberCMS
### Impact An attacker can exploit this vulnerability to delete arbitrary local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. ### Patches Issue has been patched in Build 466 (v1.0.466). ### Workarounds Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466. ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1241" alt="Screen Shot 2020-03-31 at 12 16 53 PM" src="https://user-images.githubusercontent.com/7253840/78060872-89354d00-7349-11ea-8c2b-5881b0a50736.png">
{'CVE-2020-5296'}
2022-04-19T19:02:26Z
2020-06-03T21:58:21Z
MODERATE
6.2
{'CWE-73'}
{'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://github.com/octobercms/october/security/advisories/GHSA-jv6v-fvvx-4932', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/advisories/GHSA-jv6v-fvvx-4932', 'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5296'}
null
GHSA
GHSA-3393-hvrj-w7v3
Denial of Service in Elasticsearch
In Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to Elasticsearch could create a malicious Grok query that will crash the Elasticsearch node.
{'CVE-2021-22144'}
2022-04-22T15:44:37Z
2021-08-09T20:41:17Z
MODERATE
5.7
{'CWE-674'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20210827-0006/', 'https://discuss.elastic.co/t/elasticsearch-7-13-3-and-6-8-17-security-update/278100', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22144', 'https://github.com/advisories/GHSA-3393-hvrj-w7v3'}
null
GHSA
GHSA-qmhf-qg6f-pc4v
Directory Traversal in fbr-client
Affected versions of `fbr-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16217'}
2021-01-08T01:58:32Z
2018-07-23T20:39:51Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/fbr-client', 'https://github.com/advisories/GHSA-qmhf-qg6f-pc4v', 'https://nodesecurity.io/advisories/449', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16217', 'https://www.npmjs.com/advisories/449'}
null
GHSA
GHSA-4x25-pvhw-5224
Algorithms compute incorrect results in blake2
An issue was discovered in the blake2 crate before 0.8.1 for Rust. The BLAKE2b and BLAKE2s algorithms, when used with HMAC, produce incorrect results because the block sizes are half of the required sizes.
{'CVE-2019-16143'}
2021-08-25T20:44:20Z
2021-08-25T20:44:20Z
HIGH
9.8
{'CWE-327'}
{'https://rustsec.org/advisories/RUSTSEC-2019-0019.html', 'https://github.com/advisories/GHSA-4x25-pvhw-5224', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16143', 'https://github.com/RustCrypto/MACs/issues/19'}
null
GHSA
GHSA-26p8-xrj2-mv53
Apache NiFi process group information disclosure
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.
{'CVE-2019-10083'}
2021-08-19T16:02:35Z
2019-12-02T18:18:37Z
MODERATE
5.3
{'CWE-200'}
{'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-26p8-xrj2-mv53', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10083', 'https://nifi.apache.org/security.html#CVE-2019-10083'}
null
GHSA
GHSA-9jhm-8m8c-c3f4
SSRF in Sydent due to missing validation of hostnames
### Impact Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting. It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration. ### Patches Fixed in 9e57334, 8936925, 3d531ed, 0f00412 ### Workarounds A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources. ### For more information If you have any questions or comments about this advisory, email us at security@matrix.org.
{'CVE-2021-29431'}
2021-04-19T14:54:15Z
2021-04-19T14:54:15Z
HIGH
7.7
{'CWE-20', 'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29431', 'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-9jhm-8m8c-c3f4', 'https://github.com/advisories/GHSA-9jhm-8m8c-c3f4', 'https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a', 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3', 'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f', 'https://pypi.org/project/matrix-sydent/'}
null
GHSA
GHSA-662x-fhqg-9p8v
Regular Expression Denial of Service in ua-parser-js
The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.
{'CVE-2020-7733'}
2021-07-29T22:28:04Z
2021-05-07T16:18:19Z
HIGH
7.5
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-674666', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7733', 'https://snyk.io/vuln/SNYK-JS-UAPARSERJS-610226', 'https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-674665', 'https://github.com/advisories/GHSA-662x-fhqg-9p8v'}
null
GHSA
GHSA-v3mr-gp7j-pw5w
Possible SQL injection in tablelookupwizard Contao Extension
### Impact The currently selected widget values were not correctly sanitized before passing it to the database, leading to an SQL injection possibility. ### Patches The issue has been patched in `tablelookupwizard` version 3.3.5 and version 4.0.0. ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/terminal42/contao-tablelookupwizard * Email us at [info@terminal42.ch](mailto:info@terminal42.ch)
null
2022-02-10T22:33:46Z
2022-02-10T22:33:46Z
HIGH
0
{'CWE-89'}
{'https://github.com/advisories/GHSA-v3mr-gp7j-pw5w', 'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717', 'https://github.com/terminal42/contao-tablelookupwizard/security/advisories/GHSA-v3mr-gp7j-pw5w'}
null
GHSA
GHSA-h77r-rp97-7rv4
Privilage Escalation in moodle
In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
{'CVE-2020-25699'}
2021-10-20T17:37:40Z
2021-03-29T20:43:01Z
HIGH
7.5
{'CWE-863', 'CWE-269'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25699', 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895425', 'https://moodle.org/mod/forum/discuss.php?d=413936', 'https://github.com/advisories/GHSA-h77r-rp97-7rv4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}
null
GHSA
GHSA-5jqp-qgf6-3pvh
Use of "infinity" as an input to datetime and date fields causes infinite loop in pydantic
Impact Passing either 'infinity', 'inf' or float('inf') (or their negatives) to datetime or date fields causes validation to run forever with 100% CPU usage (on one CPU). Patches Pydantic is be patched with fixes available in the following versions: v1.8.2 v1.7.4 v1.6.2 All these versions are available on pypi, and will be available on conda-forge soon. See the changelog for details. Workarounds If you absolutely can't upgrade, you can work around this risk using a validator to catch these values, brief demo: from datetime import date from pydantic import BaseModel, validator class DemoModel(BaseModel): date_of_birth: date @validator('date_of_birth', pre=True) def skip_infinite_values(cls, v): try: seconds = float(v) except (ValueError, TypeError): return v else: if seconds == float('inf'): return date.max elif seconds == float('-inf'): return date.min else: return seconds Note: this is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic. If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic. References This was fixed in commit 7e83fdd.
{'CVE-2021-29510'}
2022-04-19T19:02:57Z
2021-05-13T20:23:17Z
LOW
3.3
{'CWE-835'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEFWM7DYKD2ZHE7R5YT5EQWJPV4ZKYRB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMKAJX4O6IGBBCE32CO2G7PZQCCQSBLV/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29510', 'https://github.com/advisories/GHSA-5jqp-qgf6-3pvh', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2HT266L6Q7H6ICP7DFGXOGBJHNNKMKB/', 'https://github.com/samuelcolvin/pydantic/security/advisories/GHSA-5jqp-qgf6-3pvh', 'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'}
null
GHSA
GHSA-xfrw-hxr5-ghqf
Cross-site Scripting in wagtail
### Impact When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`CharBlock`, `TextBlock` or a similar user-defined block derived from `FieldBlock`), and that block does not specify a template for rendering, the tag output is not properly escaped as HTML. This could allow users to insert arbitrary HTML or scripting. This vulnerability is only exploitable by users with the ability to author StreamField content (i.e. users with 'editor' access to the Wagtail admin). ### Patches Patched versions have been released as Wagtail 2.11.8 (for the LTS 2.11 branch), Wagtail 2.12.5, and Wagtail 2.13.2 (for the current 2.13 branch). Site implementors who wish to retain the existing behaviour of allowing editors to insert HTML content in these blocks (and are willing to accept the risk of untrusted editors inserting arbitrary code) may disable the escaping by surrounding the relevant `{% include_block %}` tag in `{% autoescape off %}...{% endautoescape %}`. ### Workarounds Site implementors who are unable to upgrade to a current supported version should audit their use of `{% include_block %}` to ensure it is not used to output `CharBlock` / `TextBlock` values with no associated template. Note that this only applies where `{% include_block %}` is used directly on that block (uses of `include_block` on a block _containing_ a CharBlock / TextBlock, such as a StructBlock, are unaffected). In these cases, the tag can be replaced with Django's `{{ ... }}` syntax - e.g. `{% include_block my_title_block %}` becomes `{{ my_title_block }}`. ### Acknowledgements Many thanks to Karen Tracey for reporting this issue. ### For more information If you have any questions or comments about this advisory: * Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html) * Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
{'CVE-2021-32681'}
2021-06-18T20:32:37Z
2021-06-17T20:10:42Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/wagtail/wagtail/releases/tag/v2.13.2', 'https://github.com/wagtail/wagtail/releases/tag/v2.12.5', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-xfrw-hxr5-ghqf', 'https://github.com/wagtail/wagtail/releases/tag/v2.11.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32681', 'https://github.com/advisories/GHSA-xfrw-hxr5-ghqf'}
null
GHSA
GHSA-wxjf-9f4g-3v44
Data races in noise_search
Affected versions of the `noise_search` crate unconditionally implement Send/Sync for `MvccRwLock`. This can lead to data races when types that are either `!Send` or `!Sync` (e.g. `Rc<T>`, `Arc<Cell<_>>`) are contained inside `MvccRwLock` and sent across thread boundaries. The data races can potentially lead to memory corruption (as demonstrated in the PoC from the original report issue). Also, safe APIs of `MvccRwLock` allow aliasing violations by allowing `&T` and `LockResult<MutexGuard<Box<T>>>` to co-exist in conflicting lifetime regions. The APIs of `MvccRwLock` should either be marked as `unsafe` or `MbccRwLock` should be changed to private or pub(crate).
{'CVE-2020-36461'}
2021-08-25T20:56:05Z
2021-08-25T20:56:05Z
MODERATE
8.1
{'CWE-362', 'CWE-77'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0141.html', 'https://github.com/pipedown/noise/issues/72', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36461', 'https://github.com/advisories/GHSA-wxjf-9f4g-3v44'}
null
GHSA
GHSA-r57r-j98g-587f
Pointer dereference in nanorand
An issue was discovered in the nanorand crate before 0.6.1 for Rust. There can be multiple mutable references to the same object because the TlsWyRand Deref implementation dereferences a raw pointer.
{'CVE-2021-45705'}
2022-01-07T18:29:46Z
2022-01-06T22:08:56Z
CRITICAL
9.8
null
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/nanorand/RUSTSEC-2021-0114.md', 'https://github.com/advisories/GHSA-r57r-j98g-587f', 'https://rustsec.org/advisories/RUSTSEC-2021-0114.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45705', 'https://github.com/Absolucy/nanorand-rs/issues/28'}
null
GHSA
GHSA-7hx8-2rxv-66xv
Denial of Service in hapi
All Versions of `hapi` are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation This package is deprecated and is now maintained as `@hapi/hapi`. Please update your dependencies to use `@hapi/hapi`.
null
2020-09-03T15:48:00Z
2020-09-03T15:48:00Z
HIGH
0
null
{'https://github.com/advisories/GHSA-7hx8-2rxv-66xv', 'https://www.npmjs.com/advisories/1481'}
null
GHSA
GHSA-9px9-f7jw-fwhj
Command Injection in priest-runner
All versions of `priest-runner` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to a `spawn` call, which may allow attackers to execute arbitrary code in the system. The `PriestController.prototype.createChild ` function is vulnerable since the `spawn` parameters come from a POST request body. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T21:06:46Z
2020-09-03T15:49:37Z
CRITICAL
0
{'CWE-77'}
{'https://www.npmjs.com/advisories/1492', 'https://github.com/advisories/GHSA-9px9-f7jw-fwhj'}
null
GHSA
GHSA-vvff-6wrr-4g7q
Missing Authentication for Critical Function in Foreman Ansible
An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-3589'}
2022-04-05T19:28:40Z
2022-03-24T00:00:17Z
CRITICAL
9.9
{'CWE-306'}
{'https://github.com/advisories/GHSA-vvff-6wrr-4g7q', 'https://access.redhat.com/security/cve/CVE-2021-3589', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3589', 'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5', 'https://bugzilla.redhat.com/show_bug.cgi?id=1969265'}
null
GHSA
GHSA-67f6-c8mx-4q2m
Uncontrolled Resource Consumption in JPA Server in HAPI FHIR
JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement that requires a full index scan, with an accompanying large amount of server resources if there are many simultaneous history requests.
{'CVE-2021-32053'}
2021-06-16T17:21:11Z
2021-06-16T17:21:11Z
MODERATE
5.3
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32053', 'https://hapifhir.io', 'https://github.com/hapifhir/hapi-fhir/issues/2641', 'https://github.com/hapifhir/hapi-fhir/pull/2642', 'https://github.com/advisories/GHSA-67f6-c8mx-4q2m'}
null
GHSA
GHSA-vvf2-ppj9-pp49
Inefficient Regular Expression Complexity in vuelidate
vuelidate is a simple, lightweight model-based validation for Vue.js 2.x & 3.0. A ReDoS (regular expression denial of service) flaw was found in the `@vuelidate/validators` package. An attacker that is able to provide crafted input to the url(input) function may cause an application to consume an excessive amount of CPU.
{'CVE-2021-3794'}
2022-05-04T03:24:56Z
2021-09-20T20:42:06Z
HIGH
7.5
{'CWE-400', 'CWE-697'}
{'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3794', 'https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7', 'https://github.com/advisories/GHSA-vvf2-ppj9-pp49'}
null
GHSA
GHSA-69r7-cw26-px6h
Downloads Resources over HTTP in google-closure-tools-latest
Affected versions of `google-closure-tools-latest` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `google-closure-tools-latest`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, and instead install the [closure compiler](https://github.com/google/closure-compiler) manually. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10677'}
2021-01-08T19:45:58Z
2019-02-18T23:42:14Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10677', 'https://github.com/advisories/GHSA-69r7-cw26-px6h', 'https://nodesecurity.io/advisories/274', 'https://www.npmjs.com/advisories/274'}
null
GHSA
GHSA-rcrv-228c-gprj
Invalid URL generation in bitlyshortener
### Impact Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.6.0 generate invalid short URLs. All users are affected and must update immediately. ### Patches Upgrading `bitlyshortener` to 0.6.0 or newer will prevent the generation such invalid short URLs. ### Workarounds A workaround is to replace "https://j.mp/" in each generated short URL with "https://bit.ly/". ### References * [Release notes](https://github.com/impredicative/bitlyshortener/releases)
null
2022-01-21T18:39:40Z
2022-01-21T18:39:40Z
MODERATE
0
null
{'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5', 'https://github.com/impredicative/bitlyshortener/releases/tag/0.6.0', 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-rcrv-228c-gprj', 'https://github.com/advisories/GHSA-rcrv-228c-gprj'}
null
GHSA
GHSA-49x3-8228-3w3m
Inefficient Regular Expression Complexity in code-server
code-server is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3810'}
2021-09-20T20:18:39Z
2021-09-20T20:18:39Z
HIGH
7.5
{'CWE-1333'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3810', 'https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223', 'https://github.com/advisories/GHSA-49x3-8228-3w3m', 'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5'}
null
GHSA
GHSA-frxq-v7fm-m4pv
Malicious Package in requuest
All versions of `requuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:05:00Z
2020-09-02T20:27:53Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/859', 'https://github.com/advisories/GHSA-frxq-v7fm-m4pv'}
null
GHSA
GHSA-hrhx-6h34-j5hc
Skip the router TLS configuration when the host header is an FQDN
### Impact People that configure mTLS between Traefik and clients. For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration. - When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS configuration falls back to the default configuration that might not correspond to the configured one. - If the CNAME flattening is enabled, the selected TLS configuration is the SNI one and the routing uses the CNAME value, so this can skip the expected TLS configuration. ### Patches Traefik v2.6.x: https://github.com/traefik/traefik/releases/tag/v2.6.1 ### Workarounds Add the FDQN to the host rule: Example: ```yml whoami: image: traefik/whoami:v1.7.1 labels: traefik.http.routers.whoami.rule: Host(`whoami.example.com`, `whoami.example.com.`) traefik.http.routers.whoami.tls: true traefik.http.routers.whoami.tls.options: mtls@file ``` There is no workaround if the CNAME flattening is enabled. ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues).
{'CVE-2022-23632'}
2022-04-19T19:03:23Z
2022-02-16T22:30:57Z
HIGH
7.4
{'CWE-295'}
{'https://github.com/advisories/GHSA-hrhx-6h34-j5hc', 'https://github.com/traefik/traefik/releases/tag/v2.6.1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23632', 'https://github.com/traefik/traefik/pull/8764', 'https://github.com/traefik/traefik/security/advisories/GHSA-hrhx-6h34-j5hc'}
null
GHSA
GHSA-qrmc-fj45-qfc2
Prototype Pollution in extend
Versions of `extend` prior to 3.0.2 (for 3.x) and 2.0.2 (for 2.x) are vulnerable to Prototype Pollution. The `extend()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects. ## Recommendation If you're using `extend` 3.x upgrade to 3.0.2 or later. If you're using `extend` 2.x upgrade to 2.0.2 or later.
{'CVE-2018-16492'}
2021-01-08T01:58:24Z
2019-02-07T18:03:28Z
MODERATE
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-qrmc-fj45-qfc2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16492', 'https://hackerone.com/reports/381185', 'https://www.npmjs.com/advisories/996'}
null
GHSA
GHSA-7r8m-45gc-m2c8
Downloads Resources over HTTP in mongodb-instance
Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mongodb-instance`. ## Recommendation Update to version 0.0.3 or later.
{'CVE-2016-10572'}
2021-01-08T19:14:35Z
2019-02-18T23:52:14Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-7r8m-45gc-m2c8', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572', 'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)', 'https://nodesecurity.io/advisories/235', 'https://www.npmjs.com/advisories/235'}
null
GHSA
GHSA-85rf-xh54-whp3
Malicious URL drafting attack against iodines static file server may allow path traversal
### Impact A path traversal vulnerability was detected in iodine's static file service. This vulnerability effects any application running iodine's static file server on an effected iodine version. Malicious URL drafting may cause the static file server to attempt a response containing data from files that shouldn't be normally accessible from the public folder. ### Patches The vulnerability was patched in version 0.7.34. Please upgrade to the latest version. ### Workarounds A possible workaround would be to disable the static file service and it's `X-Sendfile` support, sending static files using nginx or a source code solution (sending the data dynamically). However, it would be better to upgrade iodine to the latest version, as it also contains non-security related fixes. ### For more information If you have any questions or comments about this advisory: * Email [Boaz Segev](https://github.com/boazsegev)
null
2021-08-25T21:02:39Z
2019-10-07T16:52:13Z
LOW
0
{'CWE-22'}
{'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889', 'https://github.com/boazsegev/iodine/security/advisories/GHSA-85rf-xh54-whp3', 'https://github.com/advisories/GHSA-85rf-xh54-whp3'}
null
GHSA
GHSA-5m8f-chrv-7rw5
Denial of Service in Go-Ethereum
Go-Ethereum 1.10.9 nodes crash (denial of service) after receiving a serial of messages and cannot be recovered. They will crash with "runtime error: invalid memory address or nil pointer dereference" and arise a SEGV signal.
{'CVE-2021-43668'}
2021-11-24T19:38:54Z
2021-11-23T18:04:47Z
MODERATE
0
{'CWE-476'}
{'https://github.com/ethereum/go-ethereum/issues/23866', 'https://github.com/syndtr/goleveldb/issues/373', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43668', 'https://github.com/advisories/GHSA-5m8f-chrv-7rw5'}
null
GHSA
GHSA-8hq2-fcqm-39hq
Malicious Package in rimrafall
Version 1.0.0 of `rimrafall` contains malicious code as a preinstall script. The package attempts to remove all files in the system's root folder. ## Recommendation If you installed this package it is likely your machine was erased. If not, remove the package from your system and verify if any files were deleted.
null
2021-09-30T21:57:24Z
2020-09-02T21:46:05Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/913', 'https://github.com/advisories/GHSA-8hq2-fcqm-39hq'}
null
GHSA
GHSA-m53f-rhq8-q6hf
Moderate severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
null
2021-12-03T14:23:17Z
2018-09-17T21:55:03Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-m53f-rhq8-q6hf', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0751'}
null
GHSA
GHSA-gh38-x2wm-xmc8
Code injection in ShenYu
Groovy Code Injection & SpEL Injection which lead to Remote Code Execution. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
{'CVE-2021-45029'}
2022-01-31T21:45:31Z
2022-01-28T22:13:27Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45029', 'http://www.openwall.com/lists/oss-security/2022/01/25/8', 'http://www.openwall.com/lists/oss-security/2022/01/26/1', 'https://github.com/advisories/GHSA-gh38-x2wm-xmc8', 'https://lists.apache.org/thread/3zzmwvg3012tg306x8o893fvdcssx639'}
null
GHSA
GHSA-pmqp-h87c-mr78
XML Entity Expansion and Improper Input Validation in Kubernetes API server
Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.
{'CVE-2019-11253'}
2021-05-18T15:38:48Z
2021-05-18T15:38:48Z
HIGH
7.5
{'CWE-776', 'CWE-20'}
{'https://github.com/kubernetes/kubernetes/pull/83261', 'https://github.com/advisories/GHSA-pmqp-h87c-mr78', 'https://github.com/kubernetes/kubernetes/issues/83253', 'https://access.redhat.com/errata/RHSA-2019:3239', 'https://access.redhat.com/errata/RHSA-2019:3811', 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/jk8polzSUxs', 'https://gist.github.com/bgeesaman/0e0349e94cd22c48bf14d8a9b7d6b8f2', 'https://security.netapp.com/advisory/ntap-20191031-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11253', 'https://access.redhat.com/errata/RHSA-2019:3905'}
null
GHSA
GHSA-x83m-p7pv-ch8v
Division by 0 in `QuantizedAdd`
### Impact An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedAdd`: ```python import tensorflow as tf x = tf.constant([68, 228], shape=[2, 1], dtype=tf.quint8) y = tf.constant([], shape=[2, 0], dtype=tf.quint8) min_x = tf.constant(10.723421015884028) max_x = tf.constant(15.19578006631113) min_y = tf.constant(-5.539003866682977) max_y = tf.constant(42.18819949559947) tf.raw_ops.QuantizedAdd(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L289-L295) computes a modulo operation without validating that the divisor is not zero. ```cc void VectorTensorAddition(const T* vector_data, float min_vector, float max_vector, int64 vector_num_elements, const T* tensor_data, float min_tensor, float max_tensor, int64 tensor_num_elements, float output_min, float output_max, Toutput* output) { for (int i = 0; i < tensor_num_elements; ++i) { const int64 vector_i = i % vector_num_elements; ... } } ``` Since `vector_num_elements` is [determined based on input shapes](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L522-L544), a user can trigger scenarios where this quantity is 0. ### Patches We have patched the issue in GitHub commit [744009c9e5cc5d0447f0dc39d055f917e1fd9e16](https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29549'}
2021-05-21T14:23:38Z
2021-05-21T14:23:38Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x83m-p7pv-ch8v', 'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29549', 'https://github.com/advisories/GHSA-x83m-p7pv-ch8v'}
null
GHSA
GHSA-hxj6-v58r-cqv3
Cross Site Scripting in Subrion CMS
Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.2 when adding a blog and then editing an image file.
{'CVE-2020-22392'}
2021-09-01T18:31:45Z
2021-09-01T18:31:45Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-hxj6-v58r-cqv3', 'https://github.com/intelliants/subrion/issues/868', 'https://nvd.nist.gov/vuln/detail/CVE-2020-22392'}
null
GHSA
GHSA-r3xc-47qg-h929
Cross-Site Scripting in @ionic/core
Versions of `@ionic/core` prior to 4.0.3, 4.1.3, 4.2.1 or 4.3.1 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. This issue affects the components: - `<ion-alert>.message` - `<ion-searchbar>.placeholder` - `<ion-infinite-scroll-content>.loadingText` - `<ion-refresher-content>.pullingText` - `<ion-refresher-content>.refershingText` ## Recommendation - If you are using @ionic/core 4.0.x, upgrade to 4.0.3 or later. - If you are using @ionic/core 4.1.x, upgrade to 4.1.3 or later. - If you are using @ionic/core 4.2.x, upgrade to 4.2.1 or later. - If you are using @ionic/core 4.3.x, upgrade to 4.3.1 or later.
null
2021-09-28T17:38:46Z
2020-09-03T17:06:09Z
HIGH
0
{'CWE-79'}
{'https://github.com/ionic-team/ionic/issues/18065', 'https://www.npmjs.com/advisories/1023', 'https://github.com/advisories/GHSA-r3xc-47qg-h929'}
null
GHSA
GHSA-pj97-j597-ppm7
Malicious Package in rqeuest
All versions of `rqeuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-09-30T20:30:01Z
2020-09-02T21:15:22Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/870', 'https://github.com/advisories/GHSA-pj97-j597-ppm7'}
null
GHSA
GHSA-r2pp-x4mm-4999
Moderate severity vulnerability that affects org.neo4j.procedure:apoc
neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c.
{'CVE-2018-1000820'}
2021-06-10T21:09:53Z
2018-12-20T22:02:02Z
CRITICAL
10
{'CWE-611'}
{'https://github.com/neo4j-contrib/neo4j-apoc-procedures/issues/931', 'https://github.com/advisories/GHSA-r2pp-x4mm-4999', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000820', 'https://0dd.zone/2018/10/27/neo4f-apoc-procedures-XXE/'}
null
GHSA
GHSA-74xm-qj29-cq8p
Failed DTLS certificate verification doesn't stop data channel communication
### Impact Data channel communication was incorrectly allowed with users who have failed DTLS certificate verification. This attack requires * Attacker knows the ICE password. * Only take place during PeerConnection handshake. This attack can be detected by monitoring `PeerConnectionState` in all versions of Pion WebRTC. ### Patches Users should upgrade to v3.0.15. The exact patch is https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e ### Workarounds Users should listen for when `PeerConnectionState` changes to `PeerConnectionStateFailed`. When it enters this state users should not continue using the PeerConnection. ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/pion/webrtc * Email us at [team@pion.ly](mailto:team@pion.ly) Thank you to https://github.com/Gaukas for discovering this.
{'CVE-2021-28681'}
2021-05-25T18:42:42Z
2021-05-25T18:42:42Z
MODERATE
5.3
{'CWE-863'}
{'https://github.com/advisories/GHSA-74xm-qj29-cq8p', 'https://github.com/pion/webrtc/pull/1709', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28681', 'https://github.com/pion/webrtc/security/advisories/GHSA-74xm-qj29-cq8p', 'https://github.com/pion/webrtc/issues/1708'}
null
GHSA
GHSA-wq5h-f9p5-q7fx
Improper validation of URLs ('Cross-site Scripting') in Wagtail rich text fields
### Impact When saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. ### Patches Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch). ### Workarounds For sites that cannot easily upgrade to a current supported version, the vulnerability can be patched by adding the following code to a `wagtail_hooks.py` module in any installed app: ```python from draftjs_exporter.dom import DOM from wagtail.admin.rich_text.converters.html_to_contentstate import ExternalLinkElementHandler, PageLinkElementHandler from wagtail.core import hooks from wagtail.core.whitelist import check_url def link_entity(props): id_ = props.get('id') link_props = {} if id_ is not None: link_props['linktype'] = 'page' link_props['id'] = id_ else: link_props['href'] = check_url(props.get('url')) return DOM.create_element('a', link_props, props['children']) @hooks.register('register_rich_text_features', order=1) def register_link(features): features.register_converter_rule('contentstate', 'link', { 'from_database_format': { 'a[href]': ExternalLinkElementHandler('LINK'), 'a[linktype="page"]': PageLinkElementHandler('LINK'), }, 'to_database_format': { 'entity_decorators': {'LINK': link_entity} } }) ``` ### Acknowledgements Many thanks to Kevin Breen for reporting this issue. ### For more information If you have any questions or comments about this advisory: * Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html) * Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
{'CVE-2021-29434'}
2022-04-19T19:02:53Z
2021-04-20T14:02:30Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-wq5h-f9p5-q7fx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29434', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-wq5h-f9p5-q7fx', 'https://pypi.org/project/wagtail/'}
null
GHSA
GHSA-fxwj-v664-wv5g
Improper Control of a Resource Through its Lifetime in Mattermost
Mattermost 6.4.x and earlier fails to properly invalidate pending email invitations when the action is performed from the system console, which allows accidentally invited users to join the workspace and access information from the public teams and channels.
{'CVE-2022-1385'}
2022-04-28T19:49:34Z
2022-04-20T00:00:30Z
MODERATE
4.6
{'CWE-668', 'CWE-664'}
{'https://github.com/advisories/GHSA-fxwj-v664-wv5g', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1385', 'https://mattermost.com/security-updates/', 'https://hackerone.com/reports/1486820'}
null
GHSA
GHSA-v4h8-794j-g8mm
Arbitrary File Override in Docker Engine
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.
{'CVE-2015-3631'}
2022-04-12T22:13:10Z
2022-02-15T01:57:18Z
MODERATE
5.1
{'CWE-285'}
{'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'http://seclists.org/fulldisclosure/2015/May/28', 'https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html', 'http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html', 'https://github.com/moby/moby/compare/769acfec2928c47a35da5357d854145b1036448d...b6a9dc399be31c531e3753104e10d74760ed75a2', 'https://github.com/advisories/GHSA-v4h8-794j-g8mm', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3631', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3631'}
null
GHSA
GHSA-vpf5-82c8-9v36
Prototype Pollution in algoliasearch-helper
The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns.
{'CVE-2021-23433'}
2021-11-24T19:00:33Z
2021-11-23T21:15:35Z
MODERATE
0
{'CWE-1321', 'CWE-915'}
{'https://github.com/advisories/GHSA-vpf5-82c8-9v36', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23433', 'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd', 'https://github.com/algolia/algoliasearch-helper-js/blob/3.5.5/src/SearchParameters/index.js%23L291', 'https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421'}
null
GHSA
GHSA-j35p-q24r-5367
Dep Group Remote Memory Exhaustion (Denial of Service) in ckb
### Impact A remote attacker could exploit this vulnerability to exhaust ckb process memory of an affected node. ### Patches Upgrade to 0.43.1 or later. ### References After resolving the outpoints of one dep group, we put the corresponding content into a vec ( https://github.com/nervosnetwork/ckb/blob/v0.42.0/util/types/src/core/cell.rs#L600-L617 ), there is a vulnerability to a memory dos attack because there is no determination of whether the outpoints is duplicated. PoC: ``` before send dos tx rss: 105700 after rss: 2306932 ``` DoS cost: 25.6 KB * 150 + dep_tx out_points capacity ( 36 * 150 * 100 = 540000 ) = 4380000 CKB Send 50 dos_tx, memory exhausted: (25.6 KB * 150 * 100) * 50 = 19.2 GB
null
2022-04-22T20:23:05Z
2022-04-22T20:23:04Z
HIGH
0
null
{'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-j35p-q24r-5367', 'https://github.com/nervosnetwork/ckb/blob/v0.42.0/util/types/src/core/cell.rs#L600-L617', 'https://github.com/advisories/GHSA-j35p-q24r-5367'}
null
GHSA
GHSA-fmrr-mx6j-h3h5
Prototype Pollution in confucious
All versions of package confucious up to and including version 0.0.12 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7714'}
2021-07-29T21:04:58Z
2021-05-06T18:12:09Z
CRITICAL
9.8
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7714', 'https://snyk.io/vuln/SNYK-JS-CONFUCIOUS-598665', 'https://github.com/advisories/GHSA-fmrr-mx6j-h3h5'}
null
GHSA
GHSA-m7vp-hqwv-7m5x
Unbounded memory usage on exposed HTTP/2 (non-gRPC) endpoints
### Impact The net/http Go package has a reported vulnerability tracked under CVE-2021-44716 which allows attacker controlled HTTP/2 requests to trigger unbounded memory usage in HTTP/2 endpoints. gRPC endpoints are not vulnerable as they rely on their own HTTP/2 implementation instead of the net/http package. HTTP/2 endpoints consuming the net/http package within SPIRE server and agent (or other components in this repository) that are _on by default_ include the following: - OIDC Discovery Provider - K8s Workload Registrar in webhook mode The following endpoints are vulnerable _when enabled_: - SPIRE server bundle endpoint (i.e. Federation API) The following endpoints are _NOT_ vulnerable, since HTTP/2 support in go is not enabled on non-TLS protected endpoints: - SPIRE server/agent metrics endpoint when configured for Prometheus - SPIRE server/agent health endpoints - SPIRE server/agent profiling endpoints ### Patches SPIRE 1.0.3 and 1.1.3 have been released with an upgraded Go toolchain which patches the vulnerability ### Workarounds The vulnerability can be worked around entirely by including the `http2server=0` value in the `GODEBUG` environment variable (see https://github.com/golang/go/issues/50058). This turns off HTTP/2 support on all non-gRPC endpoints. They will still function with HTTP/1.1. The risk associated with this vulnerability can be somewhat mitigated by limiting the exposure of the endpoints in question. If necessary, vulnerable components or endpoints that are optionally configured can be disabled temporarily. ### References - https://github.com/golang/go/issues/50058 - https://go-review.googlesource.com/c/go/+/370574/ - https://nvd.nist.gov/vuln/detail/CVE-2021-44716
null
2022-01-12T22:33:04Z
2022-01-12T22:33:04Z
HIGH
0
null
{'https://github.com/spiffe/spire/security/advisories/GHSA-m7vp-hqwv-7m5x', 'https://github.com/advisories/GHSA-m7vp-hqwv-7m5x'}
null
GHSA
GHSA-wfjh-3hq2-r276
Malicious Package in node-spdy
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:27:37Z
2020-09-03T19:56:48Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-wfjh-3hq2-r276', 'https://www.npmjs.com/advisories/1138'}
null
GHSA
GHSA-g45g-g52h-39rg
Cross-site Scripting in Chartkick
The Chartkick gem through 3.1.0 for Ruby allows XSS.
{'CVE-2019-12732'}
2021-08-04T21:00:53Z
2019-06-07T20:56:42Z
MODERATE
4.7
{'CWE-79'}
{'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md', 'https://github.com/advisories/GHSA-g45g-g52h-39rg', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12732', 'https://github.com/ankane/chartkick/issues/488'}
null
GHSA
GHSA-377f-vvrc-9wgg
Malicious Package in zemen
Version 0.0.5 of `zemen` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2021-09-30T20:07:39Z
2020-09-03T19:09:07Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1101', 'https://github.com/advisories/GHSA-377f-vvrc-9wgg'}
null
GHSA
GHSA-vm5j-vqr6-v7v8
OS Command Injection in pixl-class
pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization.
{'CVE-2020-7640'}
2021-12-10T20:04:56Z
2021-12-10T20:04:56Z
HIGH
9.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/advisories/GHSA-vm5j-vqr6-v7v8', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'}
null
GHSA
GHSA-gfm8-g3vm-53jh
Malicious Package in leetlog
Versions 0.1.2 and 0.1.3 of `leetlog` contain malicious code. The package adds an arbitrary hardcoded SSH key identified as `hacker@evilmachine` to the system's `authorized_keys` ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T17:16:55Z
2020-09-03T17:21:19Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-gfm8-g3vm-53jh', 'https://www.npmjs.com/advisories/1041'}
null
GHSA
GHSA-9448-c9wq-jg9v
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf
In Apache Karaf prior to 4.2.0 release, if the sshd service in Karaf is left on so an administrator can manage the running instance, any user with rights to the Karaf console can pivot and read/write any file on the file system to which the Karaf process user has access. This can be locked down a bit by using chroot to change the root directory to protect files outside of the Karaf install directory; it can be further locked down by defining a security manager policy that limits file system access to those directories beneath the Karaf home that are necessary for the system to run. However, this still allows anyone with ssh access to the Karaf process to read and write a large number of files as the Karaf process user.
{'CVE-2018-11786'}
2021-09-07T20:40:06Z
2018-12-21T17:49:33Z
HIGH
8.8
{'CWE-269'}
{'http://karaf.apache.org/security/cve-2018-11786.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11786', 'https://issues.apache.org/jira/browse/KARAF-5427', 'https://lists.apache.org/thread.html/5b7ac762c6bbe77ac5d9389f093fc6dbf196c36d788e3d7629e6c1d9@%3Cdev.karaf.apache.org%3E', 'https://github.com/advisories/GHSA-9448-c9wq-jg9v'}
null
GHSA
GHSA-pcgf-qjx2-qv4q
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300.
{'CVE-2019-1217'}
2021-03-29T20:56:08Z
2021-03-29T20:56:08Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1217', 'https://github.com/advisories/GHSA-pcgf-qjx2-qv4q', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1217'}
null
GHSA
GHSA-5x4f-7xgq-r42x
Object state limitation has no effect
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
null
2022-04-29T15:39:21Z
2022-04-29T15:39:18Z
CRITICAL
0
{'CWE-281'}
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge', 'https://github.com/advisories/GHSA-5x4f-7xgq-r42x', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-5x4f-7xgq-r42x'}
null
GHSA
GHSA-4x5h-cr29-fhp6
Local file disclosure in PHPMailer
An issue was discovered in PHPMailer before 5.2.22. PHPMailer&#39;s `msgHTML` method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to `/`, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory. ### Impact Arbitrary local files can be attached to email messages. ### Patches Fixed in 5.2.22 ### Workarounds Validate input before using user-supplied file paths. ### References https://nvd.nist.gov/vuln/detail/CVE-2017-5223 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
{'CVE-2017-5223'}
2021-08-19T19:50:51Z
2020-03-05T22:09:10Z
MODERATE
5.5
{'CWE-200'}
{'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-4x5h-cr29-fhp6', 'https://www.exploit-db.com/exploits/43056/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2017-5223.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5223', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.22', 'https://github.com/advisories/GHSA-4x5h-cr29-fhp6', 'http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/', 'http://www.securityfocus.com/bid/95328', 'https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md'}
null
GHSA
GHSA-vmfg-rjjm-rjrj
Deserialization of Untrusted Data
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory.
{'CVE-2017-5929'}
2022-04-19T15:46:12Z
2021-06-07T16:07:36Z
CRITICAL
9.8
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2017:1832', 'https://lists.apache.org/thread.html/r0bb19330e48d5ad784fa20dacba9e5538d8d60f5cd9142e0f1432b4b@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/18d509024d9aeb07f0e9579066f80bf5d4dcf20467b0c240043890d1@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/a6db61616180d73711d6db25703085940026e2dbc40f153f9d22b203@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r632ec30791b441e2eb5a3129532bf1b689bf181d0ef7daf50bcf0fd6@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r2c2d57ca180e8173c90fe313ddf8eabbdcf8e3ae196f8b9f42599790@%3Ccommits.mnemonic.apache.org%3E', 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E', 'https://github.com/advisories/GHSA-vmfg-rjjm-rjrj', 'https://lists.apache.org/thread.html/ra007cec726a3927c918ec94c4316d05d1829c49eae8dc3648adc35e2@%3Ccommits.cassandra.apache.org%3E', 'https://logback.qos.ch/news.html', 'https://lists.apache.org/thread.html/r718f27bed898008a8e037d9cc848cfc1df4d18abcbaee0cb0c142cfb@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1675', 'https://access.redhat.com/errata/RHSA-2017:1676', 'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929', 'https://lists.apache.org/thread.html/fa4eaaa6ff41ac6f79811e053c152ee89b7c5da8a6ac848ae97df67f@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/re9b787727291786dfe088e3cd078c7d195c0b5781e15d3cd24a3b2fc@%3Cdev.mnemonic.apache.org%3E', 'https://lists.apache.org/thread.html/r4673642893562c58cbee60c151ded6c077e8a2d02296e862224a9161@%3Ccommits.cassandra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5929', 'https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rbb4dfca2f7e3e8f3570eec21c79832d33a51dfde6762725660b60169@%3Cdev.mnemonic.apache.org%3E', 'https://lists.apache.org/thread.html/r2a08573ddee4a86dc96d469485a5843a01710ee0dc2078dfca410c79@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rd2227af3c9ada2a72dc72ed05517f5857a34d487580e1f2803922ff9@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2927'}
null
GHSA
GHSA-q8xg-8xwf-m598
Machine-In-The-Middle in lix
All versions of `lix` are vulnerable to Machine-In-The-Middle. The package accepts downloads with `http` and follows `location` header redirects for package downloads. This allows for an attacker in a privileged network position to intercept a lix package installation and redirect the download to a malicious source. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2020-10800'}
2021-09-16T20:39:55Z
2020-04-16T03:14:59Z
HIGH
8.1
{'CWE-639', 'CWE-544'}
{'https://github.com/advisories/GHSA-q8xg-8xwf-m598', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10800', 'https://www.npmjs.com/advisories/1306'}
null
GHSA
GHSA-hhr9-7xvh-8xgc
Server side request forgery in LiveHelperChat
SSRF filter bypass port 80, 433 in LiveHelperChat prior to v3.67. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191
{'CVE-2022-1213'}
2022-04-19T17:55:45Z
2022-04-06T00:01:32Z
HIGH
7.7
{'CWE-918'}
{'https://github.com/advisories/GHSA-hhr9-7xvh-8xgc', 'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111', 'https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1213', 'https://github.com/LiveHelperChat/livehelperchat/issues/1752'}
null
GHSA
GHSA-58v4-qwx5-7f59
SQL Injection in knex
knex.js versions before 0.19.5 are vulnerable to SQL Injection attack. Identifiers are escaped incorrectly as part of the MSSQL dialect, allowing attackers to craft a malicious query to the host DB.
{'CVE-2019-10757'}
2021-08-18T21:50:50Z
2019-10-21T16:12:13Z
CRITICAL
9.8
{'CWE-89'}
{'https://snyk.io/vuln/SNYK-JS-KNEX-471962', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10757', 'https://github.com/advisories/GHSA-58v4-qwx5-7f59'}
null
GHSA
GHSA-xrcv-f9gm-v42c
Out-of-bounds Read in Pillow
path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path.
{'CVE-2022-22816'}
2022-02-17T23:26:15Z
2022-01-12T20:07:41Z
MODERATE
6.5
{'CWE-125'}
{'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://github.com/advisories/GHSA-xrcv-f9gm-v42c', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling', 'https://www.debian.org/security/2022/dsa-5053', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22816', 'https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331'}
null
GHSA
GHSA-8rm6-75mf-7r7r
Division by zero in TFLite's implementation of hashtable lookup
### Impact The TFLite implementation of hashtable lookup is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115): ```cc const int num_rows = SizeOfDimension(value, 0); const int row_bytes = value->bytes / num_rows; ``` An attacker can craft a model such that `values`'s first dimension would be 0. ### Patches We have patched the issue in GitHub commit [5117e0851348065ed59c991562c0ec80d9193db2](https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29604'}
2021-05-21T14:28:19Z
2021-05-21T14:28:19Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-8rm6-75mf-7r7r', 'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29604', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rm6-75mf-7r7r'}
null
GHSA
GHSA-r3gq-wxqf-q4gh
Cross-site Scripting in Gitea
Cross Site Scripting (XSS) vulnerability exists in Gitea before 1.5.1 via the repository settings inside the external wiki/issue tracker URL field.
{'CVE-2021-45329'}
2022-02-15T00:18:14Z
2022-02-10T00:00:32Z
MODERATE
6.1
{'CWE-79'}
{'https://blog.gitea.io/2018/09/gitea-1.5.1-is-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45329', 'https://github.com/advisories/GHSA-r3gq-wxqf-q4gh', 'https://github.com/go-gitea/gitea/pull/4710'}
null
GHSA
GHSA-gvm4-h8j3-rjrq
CHECK-fail in `LoadAndRemapMatrix`
### Impact An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from `tf.raw_ops.LoadAndRemapMatrix`: ```python import tensorflow as tf ckpt_path = tf.constant([], shape=[0], dtype=tf.string) old_tensor_name = tf.constant("") row_remapping = tf.constant([], shape=[0], dtype=tf.int64) col_remapping = tf.constant([1], shape=[1], dtype=tf.int64) initializing_values = tf.constant(1.0) tf.raw_ops.LoadAndRemapMatrix( ckpt_path=ckpt_path, old_tensor_name=old_tensor_name, row_remapping=row_remapping, col_remapping=col_remapping, initializing_values=initializing_values, num_rows=0, num_cols=1) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) assumes that the `ckpt_path` is always a valid scalar. ```cc const string& ckpt_path = ckpt_path_t->scalar<tstring>()(); ``` However, an attacker can send any other tensor as the first argument of `LoadAndRemapMatrix`. This would cause the rank `CHECK` in `scalar<T>()()` to trigger and terminate the process. ### Patches We have patched the issue in GitHub commit [77dd114513d7796e1e2b8aece214a380af26fbf4](https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29561'}
2021-05-21T14:24:59Z
2021-05-21T14:24:59Z
LOW
2.5
{'CWE-617'}
{'https://github.com/advisories/GHSA-gvm4-h8j3-rjrq', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gvm4-h8j3-rjrq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29561', 'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'}
null
GHSA
GHSA-8hc4-xxm3-5ppp
Regular Expression Denial-of-Service
The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
{'CVE-2021-22880'}
2022-01-06T20:01:16Z
2021-03-02T03:44:14Z
HIGH
7.5
{'CWE-400'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/', 'https://www.debian.org/security/2021/dsa-4929', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO5OJ3F4ZL3UXVLJO6ECANRVZBNRS2IH/', 'https://hackerone.com/reports/1023899', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22880', 'https://rubygems.org/gems/activerecord', 'https://security.netapp.com/advisory/ntap-20210805-0009/', 'https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129', 'https://github.com/advisories/GHSA-8hc4-xxm3-5ppp'}
null
GHSA
GHSA-cxx2-fp39-rf3r
Cross-Site Scripting in JSPWiki
A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
{'CVE-2019-10076'}
2021-08-04T19:53:12Z
2019-06-06T15:29:22Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/05/19/4', 'http://www.securityfocus.com/bid/108437', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10076', 'https://github.com/advisories/GHSA-cxx2-fp39-rf3r', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10076'}
null
GHSA
GHSA-773q-5334-5gf9
Memory over-allocation in evm-core
Prior to the patch, when executing specific EVM opcodes related to memory operations that use `evm_core::Memory::copy_large`, the crate can over-allocate memory when it is not needed, making it possible for an attacker to perform denial-of-service attack. The flaw was corrected in commit `19ade85`.
null
2021-08-25T20:55:36Z
2021-08-25T20:55:36Z
MODERATE
0
{'CWE-789'}
{'https://github.com/rust-blockchain/evm/commit/19ade85', 'https://rustsec.org/advisories/RUSTSEC-2021-0066.html', 'https://github.com/advisories/GHSA-773q-5334-5gf9'}
null
GHSA
GHSA-2h3h-q99f-3fhc
UNIX Symbolic Link (Symlink) Following in @npmcli/arborist
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. ### Patches 2.8.2 (included in npm v7.20.7 and above) ### Fix and Caveats There are two parts to the fix: 1. Immediately prior to extraction, if the target folder is not a directory, it is moved aside. (If the installation fails, filesystem entries moved aside in this manner are moved back as part of the rollback process.) 2. The `children` map that represents child nodes in the tree is replaced with a case-insensitive map object, such that `node.children.get('foo')` and `node.children.get('FOO')` will return the same object, enabling Arborist to detect and handle this class of tree collision. This second item imposes a caveat on case _sensitive_ filesystems where two packages with names which differ only in case may already exist at the same level in the tree, causing unpredictable behavior in this rare edge case. Note that in such cases, the `package-lock.json` already creates a situation which is hazardous to use on case-sensitive filesystems, and will likely lead to other problems. If affected by this caveat, please run `npm update` to rebuild your tree and generate a new `package-lock.json` file.
{'CVE-2021-39134'}
2022-03-11T20:21:11Z
2021-08-31T16:04:03Z
MODERATE
8.2
{'CWE-61', 'CWE-59'}
{'https://github.com/advisories/GHSA-2h3h-q99f-3fhc', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39134', 'https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc', 'https://www.npmjs.com/package/@npmcli/arborist'}
null
GHSA
GHSA-m7mf-vm62-7x3q
Insecure template handling in haml-coffee
haml-coffee is a JavaScript templating solution. haml-coffee mixes pure template data with engine configuration options through the Express render API. More specifically, haml-coffee supports overriding a series of HTML helper functions through its configuration options. A vulnerable application that passes user controlled request objects to the haml-coffee template engine may introduce RCE vulnerabilities. Additionally control over the escapeHtml parameter through template configuration pollution ensures that haml-coffee would not sanitize template inputs that may result in reflected Cross Site Scripting attacks against downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of haml-coffee is currently 1.14.1. For complete details refer to the referenced GHSL-2021-025.
{'CVE-2021-32818'}
2021-05-17T20:58:21Z
2021-05-17T20:58:21Z
HIGH
7.7
{'CWE-79'}
{'https://securitylab.github.com/advisories/GHSL-2021-025-haml-coffee/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32818', 'https://www.npmjs.com/package/haml-coffee', 'https://github.com/advisories/GHSA-m7mf-vm62-7x3q'}
null
GHSA
GHSA-wh37-37xw-54hr
Improper Authentication in requests-kerberos
python-requests-Kerberos through 0.5 does not handle mutual authentication
{'CVE-2014-8650'}
2022-03-23T20:33:23Z
2020-03-10T18:02:31Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/requests/requests-kerberos/blob/0.6/HISTORY.rst', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8650', 'https://github.com/requests/requests-kerberos/issues/35', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8650', 'http://www.openwall.com/lists/oss-security/2014/11/07/1', 'https://github.com/advisories/GHSA-wh37-37xw-54hr', 'http://www.securityfocus.com/bid/70909', 'https://github.com/requests/requests-kerberos/pull/36', 'https://github.com/mkomitee/requests-kerberos/commit/9c1e08cc17bb6950455a85d33d391ecd2bce6eb6', 'https://security-tracker.debian.org/tracker/CVE-2014-8650'}
null
GHSA
GHSA-72w9-fcj5-3fcg
Improper Authentication in Apache Shiro
Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
{'CVE-2020-11989'}
2022-05-04T01:54:59Z
2021-05-07T15:53:10Z
CRITICAL
9.8
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11989', 'https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cuser.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rcf3d8041e1232201fe5d74fc612a193e435784d64002409b448b58fe@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675%40%3Cuser.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cdev.shiro.apache.org%3E', 'https://github.com/advisories/GHSA-72w9-fcj5-3fcg', 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r408fe60bc8fdfd7c74135249d646d7abadb807ebf90f6fd2b014df21@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E'}
null
GHSA
GHSA-q42p-pg8m-cqh6
Prototype Pollution in handlebars
Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. ## Recommendation For handlebars 4.1.x upgrade to 4.1.2 or later. For handlebars 4.0.x upgrade to 4.0.14 or later.
null
2021-08-04T20:54:06Z
2019-06-05T14:07:48Z
HIGH
7.3
{'CWE-471'}
{'https://github.com/handlebars-lang/handlebars.js/issues/1495', 'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692', 'https://www.npmjs.com/advisories/755', 'https://github.com/advisories/GHSA-q42p-pg8m-cqh6'}
null
GHSA
GHSA-6pq3-928q-x6w6
Prototype Pollution
All versions of `utils-extend` are vulnerable to prototype pollution. The `extend` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2020-8147'}
2021-06-07T22:49:30Z
2020-09-03T15:51:28Z
HIGH
0
{'CWE-471'}
{'https://hackerone.com/reports/801522', 'https://www.npmjs.com/advisories/1502', 'https://github.com/advisories/GHSA-6pq3-928q-x6w6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8147'}
null
GHSA
GHSA-w32g-5hqp-gg6q
Cross-Site Scripting in mermaid
Versions of `mermaid` prior to 8.2.3 are vulnerable to Cross-Site Scripting. If malicious input such as `A["<img src=invalid onerror=alert('XSS')></img>"] ` is provided to the application, it will execute the code instead of rendering it as text due to improper output encoding. ## Recommendation Upgrade to version 8.2.3 or later
null
2021-09-27T13:34:07Z
2020-09-02T15:41:41Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/751', 'https://github.com/advisories/GHSA-w32g-5hqp-gg6q', 'https://github.com/knsv/mermaid/issues/847'}
null
GHSA
GHSA-q8wc-9xvp-g3c3
Cross-site scripting in Sakai
Sakai through 12.6 allows XSS via a chat user name.
{'CVE-2019-16148'}
2021-08-17T22:29:13Z
2019-09-23T18:33:18Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-q8wc-9xvp-g3c3', 'https://github.com/sakaiproject/sakai/pull/6971', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16148'}
null
GHSA
GHSA-pc7q-c837-3wjq
Malicious Package in wallet-address-validtaor
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T15:56:22Z
2020-09-03T17:02:58Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1413', 'https://github.com/advisories/GHSA-pc7q-c837-3wjq'}
null
GHSA
GHSA-8695-fr6h-9fq8
Command Injection in nuance-gulp-build-common
All versions of package nuance-gulp-build-common are vulnerable to Command Injection via the index.js file. PoC: /var a = require("nuance-gulp-build-common") a.run("touch JHU")
{'CVE-2020-28430'}
2021-08-30T23:13:49Z
2021-04-13T15:19:23Z
CRITICAL
9.8
{'CWE-77', 'CWE-78'}
{'https://github.com/advisories/GHSA-8695-fr6h-9fq8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28430', 'https://snyk.io/vuln/SNYK-JS-NUANCEGULPBUILDCOMMON-1050419'}
null
GHSA
GHSA-26cm-qrc6-mfgj
Improper Neutralization of Special Elements used in an LDAP Query in stevenweathers/thunderdome-planning-poker
### Impact LDAP injection vulnerability, only affects instances with LDAP authentication enabled. ### Patches Patch for vulnerability released with v1.16.3. ### Workarounds Disable LDAP feature if in use ### References [OWASP LDAP Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html ) ### For more information If you have any questions or comments about this advisory: * Open an issue in [Thunderdome Github Repository](https://github.com/StevenWeathers/thunderdome-planning-poker) * Email us at [steven@weathers.me](mailto:steven@weathers.me)
{'CVE-2021-41232'}
2022-04-19T19:03:13Z
2021-11-08T18:16:21Z
HIGH
8.1
{'CWE-74', 'CWE-90'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41232', 'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1', 'https://github.com/advisories/GHSA-26cm-qrc6-mfgj', 'https://github.com/StevenWeathers/thunderdome-planning-poker/security/advisories/GHSA-26cm-qrc6-mfgj', 'https://github.com/github/securitylab/issues/464#issuecomment-957094994'}
null
GHSA
GHSA-2vqv-hp3p-fmv8
Downloads Resources over HTTP in webdriver-launcher
Affected versions of `webdriver-launcher` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webdriver-launcher`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2011. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10651'}
2021-01-08T20:06:09Z
2019-02-18T23:47:03Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/246', 'https://nodesecurity.io/advisories/246', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10651', 'https://github.com/advisories/GHSA-2vqv-hp3p-fmv8'}
null
GHSA
GHSA-9652-78hp-w58c
Stored cross-site scripting in PressBooks
PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS.
{'CVE-2021-3271'}
2021-03-29T20:07:39Z
2021-03-29T20:07:39Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-9652-78hp-w58c', 'https://github.com/pressbooks/pressbooks', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3271', 'https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/', 'https://github.com/pressbooks/pressbooks/pull/2072', 'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'}
null
GHSA
GHSA-65cv-r6x7-79hv
Possible XSS vulnerability in ActionView
There is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. ### Impact There is a possible XSS vulnerability in the `j` and `escape_javascript` methods in ActionView. These methods are used for escaping JavaScript string literals. Impacted code will look something like this: ```erb <script>let a = `<%= j unknown_input %>`</script> ``` or ```erb <script>let a = `<%= escape_javascript unknown_input %>`</script> ``` ### Releases The 6.0.2.2 and 5.2.4.2 releases are available at the normal locations. ### Workarounds For those that can't upgrade, the following monkey patch may be used: ```ruby ActionView::Helpers::JavaScriptHelper::JS_ESCAPE_MAP.merge!( { "`" => "\\`", "$" => "\\$" } ) module ActionView::Helpers::JavaScriptHelper alias :old_ej :escape_javascript alias :old_j :j def escape_javascript(javascript) javascript = javascript.to_s if javascript.empty? result = "" else result = javascript.gsub(/(\\|<\/|\r\n|\342\200\250|\342\200\251|[\n\r"']|[`]|[$])/u, JS_ESCAPE_MAP) end javascript.html_safe? ? result.html_safe : result end alias :j :escape_javascript end ``` ### Patches To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * [5-2-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-5-2-js-helper-xss-patch) - Patch for 5.2 series * [6-0-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-6-0-js-helper-xss-patch) - Patch for 6.0 series Please note that only the 5.2 and 6.0 series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. ### Credits Thanks to Jesse Campos from Chef Secure
{'CVE-2020-5267'}
2022-04-19T19:02:25Z
2020-03-19T17:30:29Z
MODERATE
4
{'CWE-80'}
{'http://www.openwall.com/lists/oss-security/2020/03/19/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00022.html', 'https://github.com/advisories/GHSA-65cv-r6x7-79hv', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html', 'https://groups.google.com/forum/#!topic/rubyonrails-security/55reWMM_Pg8', 'https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-5267.yml', 'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5267'}
null
GHSA
GHSA-9xv2-548x-5h79
Arbitrary File Read in Snyk Broker
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
{'CVE-2020-7648'}
2021-07-29T17:47:00Z
2020-06-03T22:02:19Z
MODERATE
6.5
{'CWE-22'}
{'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570607', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7648', 'https://github.com/advisories/GHSA-9xv2-548x-5h79'}
null
GHSA
GHSA-v2r9-c84j-v7xm
Moderate severity vulnerability that affects rdoc
darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
{'CVE-2013-0256'}
2021-09-01T19:36:59Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-79'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=907820', 'http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2', 'http://rhn.redhat.com/errata/RHSA-2013-0728.html', 'http://www.ubuntu.com/usn/USN-1733-1', 'https://github.com/advisories/GHSA-v2r9-c84j-v7xm', 'http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/', 'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html', 'http://secunia.com/advisories/52774', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0256', 'http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html', 'http://rhn.redhat.com/errata/RHSA-2013-0701.html', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html'}
null
GHSA
GHSA-w4vp-3mq7-7v82
Cross-Site Scripting in lazysizes
Versions of `lazysizes` prior to 5.2.1-rc1 are vulnerable to Cross-Site Scripting. The `video-embed` plugin fails to sanitize the following attributes: data-vimeo, `data-vimeoparams`, `data-youtube` and `data-ytparams`. This allows attackers to execute arbitrary JavaScript in a victim's browser if the attacker has control over the vulnerable attributes. ## Recommendation Upgrade to version 5.2.1-rc1 or later.
null
2021-10-04T21:07:09Z
2020-09-03T15:49:48Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1493', 'https://github.com/advisories/GHSA-w4vp-3mq7-7v82', 'https://github.com/aFarkas/lazysizes/issues/764'}
null
GHSA
GHSA-gfx6-ph4q-q54q
Moderate severity vulnerability that affects com.typesafe.akka:akka-http-core_2.11 and com.typesafe.akka:akka-http-core_2.12
Akka HTTP versions <= 10.0.5 Illegal Media Range in Accept Header Causes StackOverflowError Leading to Denial of Service
{'CVE-2017-1000118'}
2021-09-10T21:05:02Z
2018-10-22T20:53:02Z
HIGH
7.5
{'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000118', 'https://doc.akka.io/docs/akka-http/10.0.6/security/2017-05-03-illegal-media-range-in-accept-header-causes-stackoverflowerror.html', 'https://github.com/advisories/GHSA-gfx6-ph4q-q54q'}
null
GHSA
GHSA-r28h-x6hv-2fq3
Improper Verification of Cryptographic Signature in starkbank-ecdsa
The verify function in the Stark Bank Java ECDSA library (ecdsa-java) 1.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
{'CVE-2021-43570'}
2021-11-15T14:43:05Z
2021-11-10T20:48:00Z
CRITICAL
9.8
{'CWE-347'}
{'https://github.com/starkbank/ecdsa-java/releases/tag/v1.0.1', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43570', 'https://github.com/advisories/GHSA-r28h-x6hv-2fq3'}
null
GHSA
GHSA-6qcc-whgp-pjj2
Cross-site Scripting in Pimcore
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
{'CVE-2022-0832'}
2022-03-11T23:22:51Z
2022-03-05T00:00:45Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-6qcc-whgp-pjj2', 'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0832', 'https://huntr.dev/bounties/be450b60-bc8f-4585-96a5-3c4069f1186a'}
null
GHSA
GHSA-3w73-fmf3-hg5c
Policies not properly enforced in OWASP Java HTML Sanitizer
The OWASP Java HTML Sanitizer before 20211018.1 does not properly enforce policies associated with the `SELECT`, `STYLE`, and `OPTION` elements.
{'CVE-2021-42575'}
2022-02-23T22:19:33Z
2021-10-19T20:15:50Z
CRITICAL
9.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-3w73-fmf3-hg5c', 'https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42575'}
null
GHSA
GHSA-8wp2-vxpg-xcvp
Cross site scripting in facturascripts
facturasripts is an open source ERP software. Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.
{'CVE-2022-1457'}
2022-05-05T13:47:30Z
2022-04-26T00:00:43Z
CRITICAL
9
{'CWE-79'}
{'https://github.com/advisories/GHSA-8wp2-vxpg-xcvp', 'https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046', 'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1457'}
null
GHSA
GHSA-2rq5-68hm-h4j8
Cross-Site Request Forgery in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at `/opennms/admin/userGroupView/users/updateUser`. This flaw allows assigning `ROLE_ADMIN` security role to a normal user. Using this flaw, an attacker can trick the admin user to assign administrator privileges to a normal user by enticing him to click upon an attacker-controlled website.
{'CVE-2021-25931'}
2021-05-28T22:26:41Z
2021-05-25T18:46:55Z
HIGH
8.8
{'CWE-352'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25931', 'https://github.com/advisories/GHSA-2rq5-68hm-h4j8', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'}
null
GHSA
GHSA-cc94-3v9c-7rm8
Apache ActiveMQ webconsole admin GUI is open to XSS
In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue.
{'CVE-2020-1941'}
2021-06-15T17:57:09Z
2020-05-21T21:08:56Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1941', 'https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://activemq.apache.org/security-advisories.data/CVE-2020-1941-announcement.txt', 'https://github.com/advisories/GHSA-cc94-3v9c-7rm8', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null