ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-xm9f-vxmx-4m58
|
Data Flow Sanitation Issue Fix
|
### Impact
Due to missing sanitation in data flow it was possible for admin users to upload arbitrary executable files to the server.
|
{'CVE-2021-32759'}
|
2021-08-30T17:20:41Z
|
2021-08-30T17:20:41Z
|
HIGH
| 0
|
{'CWE-20'}
|
{'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13', 'https://github.com/advisories/GHSA-xm9f-vxmx-4m58', 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32759', 'https://github.com/OpenMage/magento-lts/commit/34709ac642d554aa1824892059186dd329db744b', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58'}
| null |
GHSA
|
GHSA-cvp7-c586-cmf4
|
Withdrawn: Code Injection in loguru
|
# Withdrawn
This advisory has been withdrawn after the maintainers of loguru noted this issue is not a security vulnerability and the CVE has been revoked. We have [stopped](https://github.com/Delgan/loguru/issues/563#issuecomment-1025223732) Dependabot alerts regarding this issue.
## Original Description
In versions of loguru up to and including 0.5.3 a lack of sanitization on log serialization can lead to arbitrary code execution. The maintainer disputes the issue, but has altered behavior of the library in commit 4b0070a4f30cbf6d5e12e6274b242b62ea11c81b. See https://github.com/Delgan/loguru/issues/563 for further discussion of the issue. The function in question is intended for internal use only, but is not restricted. This has been patched in version 0.6.0.
|
{'CVE-2022-0329'}
|
2022-02-01T16:00:39Z
|
2022-01-28T22:01:45Z
|
LOW
| 0
|
{'CWE-94'}
|
{'https://tomforb.es/cve-2022-0329-and-the-problems-with-automated-vulnerability-management/', 'https://github.com/Delgan/loguru/issues/563', 'https://github.com/advisories/GHSA-cvp7-c586-cmf4', 'https://huntr.dev/bounties/1-pypi-loguru', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0329', 'https://github.com/delgan/loguru/commit/4b0070a4f30cbf6d5e12e6274b242b62ea11c81b'}
| null |
GHSA
|
GHSA-vwfx-hh3w-fj99
|
Potential XSS injection in the newsletter conditions field
|
### Impact
An employee can inject javascript in the newsletter condition field that will then be executed on the front office
### Patches
The issue has been fixed in 2.6.1
|
{'CVE-2021-21418'}
|
2021-04-06T17:24:14Z
|
2021-04-06T17:24:14Z
|
MODERATE
| 4.6
|
{'CWE-79'}
|
{'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70', 'https://github.com/PrestaShop/ps_emailsubscription/releases/tag/v2.6.1', 'https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21418', 'https://github.com/advisories/GHSA-vwfx-hh3w-fj99', 'https://packagist.org/packages/prestashop/ps_emailsubscription'}
| null |
GHSA
|
GHSA-r9ch-m4fh-fc7q
|
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
|
In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the private value as well.
|
{'CVE-2016-1000341'}
|
2021-09-17T14:46:46Z
|
2018-10-17T16:24:00Z
|
MODERATE
| 5.9
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000341', 'https://usn.ubuntu.com/3727-1/', 'https://github.com/advisories/GHSA-r9ch-m4fh-fc7q', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927'}
| null |
GHSA
|
GHSA-3v6h-hqm4-2rg6
|
Arbitrary File Write in adm-zip
|
Versions of `adm-zip` before 0.4.9 are vulnerable to arbitrary file write when used to extract a specifically crafted archive that contains path traversal filenames (`../../file.txt` for example).
## Recommendation
Update to version 0.4.9 or later.
|
{'CVE-2018-1002204'}
|
2021-01-08T19:58:40Z
|
2018-07-27T17:07:14Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'http://www.securityfocus.com/bid/107001', 'https://github.com/cthackers/adm-zip/commit/62f64004fefb894c523a7143e8a88ebe6c84df25', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002204', 'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/cthackers/adm-zip/pull/212', 'https://www.npmjs.com/advisories/994', 'https://hackerone.com/reports/362118', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/advisories/GHSA-3v6h-hqm4-2rg6', 'https://snyk.io/vuln/npm:adm-zip:20180415', 'https://www.npmjs.com/advisories/681'}
| null |
GHSA
|
GHSA-f62v-xpxf-3v68
|
Code injection in Apache Ant
|
As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.
|
{'CVE-2020-11979'}
|
2022-04-22T17:18:45Z
|
2021-02-03T19:16:35Z
|
HIGH
| 7.5
|
{'CWE-94', 'CWE-74'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3NRQQ7ECII4ZNGW7GBC225LVYMPQEKB/', 'https://github.com/gradle/gradle/security/advisories/GHSA-j45w-qrgf-25vm', 'https://github.com/advisories/GHSA-f62v-xpxf-3v68', 'https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/apache/ant/commit/87ac51d3c22bcf7cfd0dc07cb0bd04a496e0d428', 'https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/', 'https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea%40%3Cdev.ant.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AALW42FWNQ35F7KB3JVRC6NBVV7AAYYI/', 'https://security.gentoo.org/glsa/202011-18', 'https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11979', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-5vr6-hm68-5j9p
|
Cross-site Scripting in LibreNMS
|
LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php.
|
{'CVE-2021-44279'}
|
2021-12-06T21:36:37Z
|
2021-12-03T20:49:16Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-5vr6-hm68-5j9p', 'https://github.com/librenms/librenms/pull/13554', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44279', 'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'}
| null |
GHSA
|
GHSA-mjjq-c88q-qhr6
|
Cross-Site Scripting in dompurify
|
Versions of `dompurify` prior to 2.0.7 are vulnerable to Cross-Site Scripting (XSS). It is possible to bypass the package sanitization through Mutation XSS, which may allow an attacker to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 2.0.7 or later.
| null |
2021-09-29T20:13:07Z
|
2020-09-03T21:22:00Z
|
CRITICAL
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1223', 'https://github.com/cure53/DOMPurify/releases/tag/2.0.7', 'https://github.com/advisories/GHSA-mjjq-c88q-qhr6'}
| null |
GHSA
|
GHSA-4hq8-v42x-9wx3
|
Malicious Package in bs85check
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:56:42Z
|
2020-09-04T16:51:52Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1379', 'https://github.com/advisories/GHSA-4hq8-v42x-9wx3'}
| null |
GHSA
|
GHSA-v936-j8gp-9q3p
|
Open redirects on some federation and push requests
|
### Impact
Requests to user provided domains were not restricted to external IP addresses when calculating the key validity for third-party invite events and sending push notifications. This could cause Synapse to make requests to internal infrastructure. The type of request was not controlled by the user, although limited modification of request bodies was possible.
For the most thorough protection server administrators should remove the deprecated `federation_ip_range_blacklist` from their settings after upgrading to Synapse v1.25.0 which will result in Synapse using the improved default IP address restrictions. See the new `ip_range_blacklist` and `ip_range_whitelist` settings if more specific control is necessary.
### Patches
Issue is resolved by #8821. Further improvements to protect homeservers by default were made in #8870 and #8954.
### Workarounds
Requests to internal IP addresses could be blocked at the system or network level.
|
{'CVE-2021-21273'}
|
2022-04-19T19:02:47Z
|
2021-02-26T17:28:34Z
|
LOW
| 3.1
|
{'CWE-601'}
|
{'https://github.com/matrix-org/synapse/security/advisories/GHSA-v936-j8gp-9q3p', 'https://github.com/matrix-org/synapse/pull/8821', 'https://github.com/advisories/GHSA-v936-j8gp-9q3p', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/commit/30fba6210834a4ecd91badf0c8f3eb278b72e746', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21273', 'https://github.com/matrix-org/synapse/releases/tag/v1.25.0'}
| null |
GHSA
|
GHSA-4f26-v6fr-9hmp
|
Improper Input Validation in Centreon Web
|
Centreon Web 19.04.4 allows Remote Code Execution by an administrator who can modify Macro Expression location settings.
|
{'CVE-2019-16405'}
|
2022-04-01T20:24:31Z
|
2021-07-28T17:52:45Z
|
HIGH
| 7.2
|
{'CWE-20'}
|
{'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html', 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.04.html', 'https://github.com/advisories/GHSA-4f26-v6fr-9hmp', 'https://github.com/centreon/centreon/releases/tag/19.04.5', 'https://github.com/centreon/centreon/pull/7884', 'http://packetstormsecurity.com/files/155999/Centreon-19.04-Remote-Code-Execution.html', 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8.html', 'https://github.com/centreon/centreon/pull/7864', 'https://thecybergeek.co.uk/cves/2019/09/17/CVE-2019-16405-06.html', 'https://thecybergeek.co.uk/cves/2019/09/19/CVEs.html', 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10.html', 'https://github.com/TheCyberGeek/CVE-2019-16405.rb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16405'}
| null |
GHSA
|
GHSA-wc43-7wj6-4ggr
|
Remote code execution in ChakraCore
|
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1057, CVE-2020-1172.
|
{'CVE-2020-1180'}
|
2021-08-02T17:29:09Z
|
2021-08-02T17:29:09Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-wc43-7wj6-4ggr', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1180', 'https://github.com/microsoft/ChakraCore/pull/6500', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1180'}
| null |
GHSA
|
GHSA-jv6v-fvvx-4932
|
Arbitrary File Deletion vulnerability in OctoberCMS
|
### Impact
An attacker can exploit this vulnerability to delete arbitrary local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466.
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1241" alt="Screen Shot 2020-03-31 at 12 16 53 PM" src="https://user-images.githubusercontent.com/7253840/78060872-89354d00-7349-11ea-8c2b-5881b0a50736.png">
|
{'CVE-2020-5296'}
|
2022-04-19T19:02:26Z
|
2020-06-03T21:58:21Z
|
MODERATE
| 6.2
|
{'CWE-73'}
|
{'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://github.com/octobercms/october/security/advisories/GHSA-jv6v-fvvx-4932', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/advisories/GHSA-jv6v-fvvx-4932', 'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5296'}
| null |
GHSA
|
GHSA-3393-hvrj-w7v3
|
Denial of Service in Elasticsearch
|
In Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to Elasticsearch could create a malicious Grok query that will crash the Elasticsearch node.
|
{'CVE-2021-22144'}
|
2022-04-22T15:44:37Z
|
2021-08-09T20:41:17Z
|
MODERATE
| 5.7
|
{'CWE-674'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20210827-0006/', 'https://discuss.elastic.co/t/elasticsearch-7-13-3-and-6-8-17-security-update/278100', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22144', 'https://github.com/advisories/GHSA-3393-hvrj-w7v3'}
| null |
GHSA
|
GHSA-qmhf-qg6f-pc4v
|
Directory Traversal in fbr-client
|
Affected versions of `fbr-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16217'}
|
2021-01-08T01:58:32Z
|
2018-07-23T20:39:51Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/fbr-client', 'https://github.com/advisories/GHSA-qmhf-qg6f-pc4v', 'https://nodesecurity.io/advisories/449', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16217', 'https://www.npmjs.com/advisories/449'}
| null |
GHSA
|
GHSA-4x25-pvhw-5224
|
Algorithms compute incorrect results in blake2
|
An issue was discovered in the blake2 crate before 0.8.1 for Rust. The BLAKE2b and BLAKE2s algorithms, when used with HMAC, produce incorrect results because the block sizes are half of the required sizes.
|
{'CVE-2019-16143'}
|
2021-08-25T20:44:20Z
|
2021-08-25T20:44:20Z
|
HIGH
| 9.8
|
{'CWE-327'}
|
{'https://rustsec.org/advisories/RUSTSEC-2019-0019.html', 'https://github.com/advisories/GHSA-4x25-pvhw-5224', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16143', 'https://github.com/RustCrypto/MACs/issues/19'}
| null |
GHSA
|
GHSA-26p8-xrj2-mv53
|
Apache NiFi process group information disclosure
|
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.
|
{'CVE-2019-10083'}
|
2021-08-19T16:02:35Z
|
2019-12-02T18:18:37Z
|
MODERATE
| 5.3
|
{'CWE-200'}
|
{'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-26p8-xrj2-mv53', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10083', 'https://nifi.apache.org/security.html#CVE-2019-10083'}
| null |
GHSA
|
GHSA-9jhm-8m8c-c3f4
|
SSRF in Sydent due to missing validation of hostnames
|
### Impact
Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting.
It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration.
### Patches
Fixed in 9e57334, 8936925, 3d531ed, 0f00412
### Workarounds
A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org.
|
{'CVE-2021-29431'}
|
2021-04-19T14:54:15Z
|
2021-04-19T14:54:15Z
|
HIGH
| 7.7
|
{'CWE-20', 'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29431', 'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-9jhm-8m8c-c3f4', 'https://github.com/advisories/GHSA-9jhm-8m8c-c3f4', 'https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a', 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3', 'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f', 'https://pypi.org/project/matrix-sydent/'}
| null |
GHSA
|
GHSA-662x-fhqg-9p8v
|
Regular Expression Denial of Service in ua-parser-js
|
The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.
|
{'CVE-2020-7733'}
|
2021-07-29T22:28:04Z
|
2021-05-07T16:18:19Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-674666', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7733', 'https://snyk.io/vuln/SNYK-JS-UAPARSERJS-610226', 'https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-674665', 'https://github.com/advisories/GHSA-662x-fhqg-9p8v'}
| null |
GHSA
|
GHSA-v3mr-gp7j-pw5w
|
Possible SQL injection in tablelookupwizard Contao Extension
|
### Impact
The currently selected widget values were not correctly sanitized before passing it to the database, leading to an SQL injection possibility.
### Patches
The issue has been patched in `tablelookupwizard` version 3.3.5 and version 4.0.0.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/terminal42/contao-tablelookupwizard
* Email us at [info@terminal42.ch](mailto:info@terminal42.ch)
| null |
2022-02-10T22:33:46Z
|
2022-02-10T22:33:46Z
|
HIGH
| 0
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-v3mr-gp7j-pw5w', 'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717', 'https://github.com/terminal42/contao-tablelookupwizard/security/advisories/GHSA-v3mr-gp7j-pw5w'}
| null |
GHSA
|
GHSA-h77r-rp97-7rv4
|
Privilage Escalation in moodle
|
In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
|
{'CVE-2020-25699'}
|
2021-10-20T17:37:40Z
|
2021-03-29T20:43:01Z
|
HIGH
| 7.5
|
{'CWE-863', 'CWE-269'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25699', 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895425', 'https://moodle.org/mod/forum/discuss.php?d=413936', 'https://github.com/advisories/GHSA-h77r-rp97-7rv4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}
| null |
GHSA
|
GHSA-5jqp-qgf6-3pvh
|
Use of "infinity" as an input to datetime and date fields causes infinite loop in pydantic
|
Impact
Passing either 'infinity', 'inf' or float('inf') (or their negatives) to datetime or date fields causes validation to run forever with 100% CPU usage (on one CPU).
Patches
Pydantic is be patched with fixes available in the following versions:
v1.8.2
v1.7.4
v1.6.2
All these versions are available on pypi, and will be available on conda-forge soon.
See the changelog for details.
Workarounds
If you absolutely can't upgrade, you can work around this risk using a validator to catch these values, brief demo:
from datetime import date
from pydantic import BaseModel, validator
class DemoModel(BaseModel):
date_of_birth: date
@validator('date_of_birth', pre=True)
def skip_infinite_values(cls, v):
try:
seconds = float(v)
except (ValueError, TypeError):
return v
else:
if seconds == float('inf'):
return date.max
elif seconds == float('-inf'):
return date.min
else:
return seconds
Note: this is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic.
If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic.
References
This was fixed in commit 7e83fdd.
|
{'CVE-2021-29510'}
|
2022-04-19T19:02:57Z
|
2021-05-13T20:23:17Z
|
LOW
| 3.3
|
{'CWE-835'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEFWM7DYKD2ZHE7R5YT5EQWJPV4ZKYRB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMKAJX4O6IGBBCE32CO2G7PZQCCQSBLV/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29510', 'https://github.com/advisories/GHSA-5jqp-qgf6-3pvh', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2HT266L6Q7H6ICP7DFGXOGBJHNNKMKB/', 'https://github.com/samuelcolvin/pydantic/security/advisories/GHSA-5jqp-qgf6-3pvh', 'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'}
| null |
GHSA
|
GHSA-xfrw-hxr5-ghqf
|
Cross-site Scripting in wagtail
|
### Impact
When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`CharBlock`, `TextBlock` or a similar user-defined block derived from `FieldBlock`), and that block does not specify a template for rendering, the tag output is not properly escaped as HTML. This could allow users to insert arbitrary HTML or scripting. This vulnerability is only exploitable by users with the ability to author StreamField content (i.e. users with 'editor' access to the Wagtail admin).
### Patches
Patched versions have been released as Wagtail 2.11.8 (for the LTS 2.11 branch), Wagtail 2.12.5, and Wagtail 2.13.2 (for the current 2.13 branch).
Site implementors who wish to retain the existing behaviour of allowing editors to insert HTML content in these blocks (and are willing to accept the risk of untrusted editors inserting arbitrary code) may disable the escaping by surrounding the relevant `{% include_block %}` tag in `{% autoescape off %}...{% endautoescape %}`.
### Workarounds
Site implementors who are unable to upgrade to a current supported version should audit their use of `{% include_block %}` to ensure it is not used to output `CharBlock` / `TextBlock` values with no associated template. Note that this only applies where `{% include_block %}` is used directly on that block (uses of `include_block` on a block _containing_ a CharBlock / TextBlock, such as a StructBlock, are unaffected). In these cases, the tag can be replaced with Django's `{{ ... }}` syntax - e.g. `{% include_block my_title_block %}` becomes `{{ my_title_block }}`.
### Acknowledgements
Many thanks to Karen Tracey for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
|
{'CVE-2021-32681'}
|
2021-06-18T20:32:37Z
|
2021-06-17T20:10:42Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/wagtail/wagtail/releases/tag/v2.13.2', 'https://github.com/wagtail/wagtail/releases/tag/v2.12.5', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-xfrw-hxr5-ghqf', 'https://github.com/wagtail/wagtail/releases/tag/v2.11.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32681', 'https://github.com/advisories/GHSA-xfrw-hxr5-ghqf'}
| null |
GHSA
|
GHSA-wxjf-9f4g-3v44
|
Data races in noise_search
|
Affected versions of the `noise_search` crate unconditionally implement Send/Sync for `MvccRwLock`.
This can lead to data races when types that are either `!Send` or `!Sync` (e.g. `Rc<T>`, `Arc<Cell<_>>`) are contained inside `MvccRwLock` and sent across thread boundaries. The data races can potentially lead to memory corruption (as demonstrated in the PoC from the original report issue).
Also, safe APIs of `MvccRwLock` allow aliasing violations by allowing `&T` and `LockResult<MutexGuard<Box<T>>>` to co-exist in conflicting lifetime regions. The APIs of `MvccRwLock` should either be marked as `unsafe` or `MbccRwLock` should be changed to private or pub(crate).
|
{'CVE-2020-36461'}
|
2021-08-25T20:56:05Z
|
2021-08-25T20:56:05Z
|
MODERATE
| 8.1
|
{'CWE-362', 'CWE-77'}
|
{'https://rustsec.org/advisories/RUSTSEC-2020-0141.html', 'https://github.com/pipedown/noise/issues/72', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36461', 'https://github.com/advisories/GHSA-wxjf-9f4g-3v44'}
| null |
GHSA
|
GHSA-r57r-j98g-587f
|
Pointer dereference in nanorand
|
An issue was discovered in the nanorand crate before 0.6.1 for Rust. There can be multiple mutable references to the same object because the TlsWyRand Deref implementation dereferences a raw pointer.
|
{'CVE-2021-45705'}
|
2022-01-07T18:29:46Z
|
2022-01-06T22:08:56Z
|
CRITICAL
| 9.8
| null |
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/nanorand/RUSTSEC-2021-0114.md', 'https://github.com/advisories/GHSA-r57r-j98g-587f', 'https://rustsec.org/advisories/RUSTSEC-2021-0114.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45705', 'https://github.com/Absolucy/nanorand-rs/issues/28'}
| null |
GHSA
|
GHSA-7hx8-2rxv-66xv
|
Denial of Service in hapi
|
All Versions of `hapi` are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
This package is deprecated and is now maintained as `@hapi/hapi`. Please update your dependencies to use `@hapi/hapi`.
| null |
2020-09-03T15:48:00Z
|
2020-09-03T15:48:00Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-7hx8-2rxv-66xv', 'https://www.npmjs.com/advisories/1481'}
| null |
GHSA
|
GHSA-9px9-f7jw-fwhj
|
Command Injection in priest-runner
|
All versions of `priest-runner` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to a `spawn` call, which may allow attackers to execute arbitrary code in the system. The `PriestController.prototype.createChild ` function is vulnerable since the `spawn` parameters come from a POST request body.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-04T21:06:46Z
|
2020-09-03T15:49:37Z
|
CRITICAL
| 0
|
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1492', 'https://github.com/advisories/GHSA-9px9-f7jw-fwhj'}
| null |
GHSA
|
GHSA-vvff-6wrr-4g7q
|
Missing Authentication for Critical Function in Foreman Ansible
|
An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
{'CVE-2021-3589'}
|
2022-04-05T19:28:40Z
|
2022-03-24T00:00:17Z
|
CRITICAL
| 9.9
|
{'CWE-306'}
|
{'https://github.com/advisories/GHSA-vvff-6wrr-4g7q', 'https://access.redhat.com/security/cve/CVE-2021-3589', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3589', 'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5', 'https://bugzilla.redhat.com/show_bug.cgi?id=1969265'}
| null |
GHSA
|
GHSA-67f6-c8mx-4q2m
|
Uncontrolled Resource Consumption in JPA Server in HAPI FHIR
|
JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement that requires a full index scan, with an accompanying large amount of server resources if there are many simultaneous history requests.
|
{'CVE-2021-32053'}
|
2021-06-16T17:21:11Z
|
2021-06-16T17:21:11Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32053', 'https://hapifhir.io', 'https://github.com/hapifhir/hapi-fhir/issues/2641', 'https://github.com/hapifhir/hapi-fhir/pull/2642', 'https://github.com/advisories/GHSA-67f6-c8mx-4q2m'}
| null |
GHSA
|
GHSA-vvf2-ppj9-pp49
|
Inefficient Regular Expression Complexity in vuelidate
|
vuelidate is a simple, lightweight model-based validation for Vue.js 2.x & 3.0. A ReDoS (regular expression denial of service) flaw was found in the `@vuelidate/validators` package. An attacker that is able to provide crafted input to the url(input) function may cause an application to consume an excessive amount of CPU.
|
{'CVE-2021-3794'}
|
2022-05-04T03:24:56Z
|
2021-09-20T20:42:06Z
|
HIGH
| 7.5
|
{'CWE-400', 'CWE-697'}
|
{'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3794', 'https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7', 'https://github.com/advisories/GHSA-vvf2-ppj9-pp49'}
| null |
GHSA
|
GHSA-69r7-cw26-px6h
|
Downloads Resources over HTTP in google-closure-tools-latest
|
Affected versions of `google-closure-tools-latest` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `google-closure-tools-latest`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, and instead install the [closure compiler](https://github.com/google/closure-compiler) manually.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10677'}
|
2021-01-08T19:45:58Z
|
2019-02-18T23:42:14Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10677', 'https://github.com/advisories/GHSA-69r7-cw26-px6h', 'https://nodesecurity.io/advisories/274', 'https://www.npmjs.com/advisories/274'}
| null |
GHSA
|
GHSA-rcrv-228c-gprj
|
Invalid URL generation in bitlyshortener
|
### Impact
Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.6.0 generate invalid short URLs. All users are affected and must update immediately.
### Patches
Upgrading `bitlyshortener` to 0.6.0 or newer will prevent the generation such invalid short URLs.
### Workarounds
A workaround is to replace "https://j.mp/" in each generated short URL with "https://bit.ly/".
### References
* [Release notes](https://github.com/impredicative/bitlyshortener/releases)
| null |
2022-01-21T18:39:40Z
|
2022-01-21T18:39:40Z
|
MODERATE
| 0
| null |
{'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5', 'https://github.com/impredicative/bitlyshortener/releases/tag/0.6.0', 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-rcrv-228c-gprj', 'https://github.com/advisories/GHSA-rcrv-228c-gprj'}
| null |
GHSA
|
GHSA-49x3-8228-3w3m
|
Inefficient Regular Expression Complexity in code-server
|
code-server is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3810'}
|
2021-09-20T20:18:39Z
|
2021-09-20T20:18:39Z
|
HIGH
| 7.5
|
{'CWE-1333'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3810', 'https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223', 'https://github.com/advisories/GHSA-49x3-8228-3w3m', 'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5'}
| null |
GHSA
|
GHSA-frxq-v7fm-m4pv
|
Malicious Package in requuest
|
All versions of `requuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:05:00Z
|
2020-09-02T20:27:53Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/859', 'https://github.com/advisories/GHSA-frxq-v7fm-m4pv'}
| null |
GHSA
|
GHSA-hrhx-6h34-j5hc
|
Skip the router TLS configuration when the host header is an FQDN
|
### Impact
People that configure mTLS between Traefik and clients.
For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration.
- When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS configuration falls back to the default configuration that might not correspond to the configured one.
- If the CNAME flattening is enabled, the selected TLS configuration is the SNI one and the routing uses the CNAME value, so this can skip the expected TLS configuration.
### Patches
Traefik v2.6.x: https://github.com/traefik/traefik/releases/tag/v2.6.1
### Workarounds
Add the FDQN to the host rule:
Example:
```yml
whoami:
image: traefik/whoami:v1.7.1
labels:
traefik.http.routers.whoami.rule: Host(`whoami.example.com`, `whoami.example.com.`)
traefik.http.routers.whoami.tls: true
traefik.http.routers.whoami.tls.options: mtls@file
```
There is no workaround if the CNAME flattening is enabled.
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues).
|
{'CVE-2022-23632'}
|
2022-04-19T19:03:23Z
|
2022-02-16T22:30:57Z
|
HIGH
| 7.4
|
{'CWE-295'}
|
{'https://github.com/advisories/GHSA-hrhx-6h34-j5hc', 'https://github.com/traefik/traefik/releases/tag/v2.6.1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23632', 'https://github.com/traefik/traefik/pull/8764', 'https://github.com/traefik/traefik/security/advisories/GHSA-hrhx-6h34-j5hc'}
| null |
GHSA
|
GHSA-qrmc-fj45-qfc2
|
Prototype Pollution in extend
|
Versions of `extend` prior to 3.0.2 (for 3.x) and 2.0.2 (for 2.x) are vulnerable to Prototype Pollution. The `extend()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
If you're using `extend` 3.x upgrade to 3.0.2 or later.
If you're using `extend` 2.x upgrade to 2.0.2 or later.
|
{'CVE-2018-16492'}
|
2021-01-08T01:58:24Z
|
2019-02-07T18:03:28Z
|
MODERATE
| 0
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-qrmc-fj45-qfc2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16492', 'https://hackerone.com/reports/381185', 'https://www.npmjs.com/advisories/996'}
| null |
GHSA
|
GHSA-7r8m-45gc-m2c8
|
Downloads Resources over HTTP in mongodb-instance
|
Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mongodb-instance`.
## Recommendation
Update to version 0.0.3 or later.
|
{'CVE-2016-10572'}
|
2021-01-08T19:14:35Z
|
2019-02-18T23:52:14Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-7r8m-45gc-m2c8', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572', 'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)', 'https://nodesecurity.io/advisories/235', 'https://www.npmjs.com/advisories/235'}
| null |
GHSA
|
GHSA-85rf-xh54-whp3
|
Malicious URL drafting attack against iodines static file server may allow path traversal
|
### Impact
A path traversal vulnerability was detected in iodine's static file service. This vulnerability effects any application running iodine's static file server on an effected iodine version.
Malicious URL drafting may cause the static file server to attempt a response containing data from files that shouldn't be normally accessible from the public folder.
### Patches
The vulnerability was patched in version 0.7.34. Please upgrade to the latest version.
### Workarounds
A possible workaround would be to disable the static file service and it's `X-Sendfile` support, sending static files using nginx or a source code solution (sending the data dynamically).
However, it would be better to upgrade iodine to the latest version, as it also contains non-security related fixes.
### For more information
If you have any questions or comments about this advisory:
* Email [Boaz Segev](https://github.com/boazsegev)
| null |
2021-08-25T21:02:39Z
|
2019-10-07T16:52:13Z
|
LOW
| 0
|
{'CWE-22'}
|
{'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889', 'https://github.com/boazsegev/iodine/security/advisories/GHSA-85rf-xh54-whp3', 'https://github.com/advisories/GHSA-85rf-xh54-whp3'}
| null |
GHSA
|
GHSA-5m8f-chrv-7rw5
|
Denial of Service in Go-Ethereum
|
Go-Ethereum 1.10.9 nodes crash (denial of service) after receiving a serial of messages and cannot be recovered. They will crash with "runtime error: invalid memory address or nil pointer dereference" and arise a SEGV signal.
|
{'CVE-2021-43668'}
|
2021-11-24T19:38:54Z
|
2021-11-23T18:04:47Z
|
MODERATE
| 0
|
{'CWE-476'}
|
{'https://github.com/ethereum/go-ethereum/issues/23866', 'https://github.com/syndtr/goleveldb/issues/373', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43668', 'https://github.com/advisories/GHSA-5m8f-chrv-7rw5'}
| null |
GHSA
|
GHSA-8hq2-fcqm-39hq
|
Malicious Package in rimrafall
|
Version 1.0.0 of `rimrafall` contains malicious code as a preinstall script. The package attempts to remove all files in the system's root folder.
## Recommendation
If you installed this package it is likely your machine was erased. If not, remove the package from your system and verify if any files were deleted.
| null |
2021-09-30T21:57:24Z
|
2020-09-02T21:46:05Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/913', 'https://github.com/advisories/GHSA-8hq2-fcqm-39hq'}
| null |
GHSA
|
GHSA-m53f-rhq8-q6hf
|
Moderate severity vulnerability that affects actionpack
|
Withdrawn, accidental duplicate publish.
actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
| null |
2021-12-03T14:23:17Z
|
2018-09-17T21:55:03Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-m53f-rhq8-q6hf', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0751'}
| null |
GHSA
|
GHSA-gh38-x2wm-xmc8
|
Code injection in ShenYu
|
Groovy Code Injection & SpEL Injection which lead to Remote Code Execution. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
|
{'CVE-2021-45029'}
|
2022-01-31T21:45:31Z
|
2022-01-28T22:13:27Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45029', 'http://www.openwall.com/lists/oss-security/2022/01/25/8', 'http://www.openwall.com/lists/oss-security/2022/01/26/1', 'https://github.com/advisories/GHSA-gh38-x2wm-xmc8', 'https://lists.apache.org/thread/3zzmwvg3012tg306x8o893fvdcssx639'}
| null |
GHSA
|
GHSA-pmqp-h87c-mr78
|
XML Entity Expansion and Improper Input Validation in Kubernetes API server
|
Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.
|
{'CVE-2019-11253'}
|
2021-05-18T15:38:48Z
|
2021-05-18T15:38:48Z
|
HIGH
| 7.5
|
{'CWE-776', 'CWE-20'}
|
{'https://github.com/kubernetes/kubernetes/pull/83261', 'https://github.com/advisories/GHSA-pmqp-h87c-mr78', 'https://github.com/kubernetes/kubernetes/issues/83253', 'https://access.redhat.com/errata/RHSA-2019:3239', 'https://access.redhat.com/errata/RHSA-2019:3811', 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/jk8polzSUxs', 'https://gist.github.com/bgeesaman/0e0349e94cd22c48bf14d8a9b7d6b8f2', 'https://security.netapp.com/advisory/ntap-20191031-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11253', 'https://access.redhat.com/errata/RHSA-2019:3905'}
| null |
GHSA
|
GHSA-x83m-p7pv-ch8v
|
Division by 0 in `QuantizedAdd`
|
### Impact
An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedAdd`:
```python
import tensorflow as tf
x = tf.constant([68, 228], shape=[2, 1], dtype=tf.quint8)
y = tf.constant([], shape=[2, 0], dtype=tf.quint8)
min_x = tf.constant(10.723421015884028)
max_x = tf.constant(15.19578006631113)
min_y = tf.constant(-5.539003866682977)
max_y = tf.constant(42.18819949559947)
tf.raw_ops.QuantizedAdd(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L289-L295) computes a modulo operation without validating that the divisor is not zero.
```cc
void VectorTensorAddition(const T* vector_data, float min_vector,
float max_vector, int64 vector_num_elements,
const T* tensor_data, float min_tensor,
float max_tensor, int64 tensor_num_elements,
float output_min, float output_max, Toutput* output) {
for (int i = 0; i < tensor_num_elements; ++i) {
const int64 vector_i = i % vector_num_elements;
...
}
}
```
Since `vector_num_elements` is [determined based on input shapes](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L522-L544), a user can trigger scenarios where this quantity is 0.
### Patches
We have patched the issue in GitHub commit [744009c9e5cc5d0447f0dc39d055f917e1fd9e16](https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29549'}
|
2021-05-21T14:23:38Z
|
2021-05-21T14:23:38Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x83m-p7pv-ch8v', 'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29549', 'https://github.com/advisories/GHSA-x83m-p7pv-ch8v'}
| null |
GHSA
|
GHSA-hxj6-v58r-cqv3
|
Cross Site Scripting in Subrion CMS
|
Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.2 when adding a blog and then editing an image file.
|
{'CVE-2020-22392'}
|
2021-09-01T18:31:45Z
|
2021-09-01T18:31:45Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-hxj6-v58r-cqv3', 'https://github.com/intelliants/subrion/issues/868', 'https://nvd.nist.gov/vuln/detail/CVE-2020-22392'}
| null |
GHSA
|
GHSA-r3xc-47qg-h929
|
Cross-Site Scripting in @ionic/core
|
Versions of `@ionic/core` prior to 4.0.3, 4.1.3, 4.2.1 or 4.3.1 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. This issue affects the components:
- `<ion-alert>.message`
- `<ion-searchbar>.placeholder`
- `<ion-infinite-scroll-content>.loadingText`
- `<ion-refresher-content>.pullingText`
- `<ion-refresher-content>.refershingText`
## Recommendation
- If you are using @ionic/core 4.0.x, upgrade to 4.0.3 or later.
- If you are using @ionic/core 4.1.x, upgrade to 4.1.3 or later.
- If you are using @ionic/core 4.2.x, upgrade to 4.2.1 or later.
- If you are using @ionic/core 4.3.x, upgrade to 4.3.1 or later.
| null |
2021-09-28T17:38:46Z
|
2020-09-03T17:06:09Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/ionic-team/ionic/issues/18065', 'https://www.npmjs.com/advisories/1023', 'https://github.com/advisories/GHSA-r3xc-47qg-h929'}
| null |
GHSA
|
GHSA-pj97-j597-ppm7
|
Malicious Package in rqeuest
|
All versions of `rqeuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-09-30T20:30:01Z
|
2020-09-02T21:15:22Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/870', 'https://github.com/advisories/GHSA-pj97-j597-ppm7'}
| null |
GHSA
|
GHSA-r2pp-x4mm-4999
|
Moderate severity vulnerability that affects org.neo4j.procedure:apoc
|
neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c.
|
{'CVE-2018-1000820'}
|
2021-06-10T21:09:53Z
|
2018-12-20T22:02:02Z
|
CRITICAL
| 10
|
{'CWE-611'}
|
{'https://github.com/neo4j-contrib/neo4j-apoc-procedures/issues/931', 'https://github.com/advisories/GHSA-r2pp-x4mm-4999', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000820', 'https://0dd.zone/2018/10/27/neo4f-apoc-procedures-XXE/'}
| null |
GHSA
|
GHSA-74xm-qj29-cq8p
|
Failed DTLS certificate verification doesn't stop data channel communication
|
### Impact
Data channel communication was incorrectly allowed with users who have failed DTLS certificate verification.
This attack requires
* Attacker knows the ICE password.
* Only take place during PeerConnection handshake.
This attack can be detected by monitoring `PeerConnectionState` in all versions of Pion WebRTC.
### Patches
Users should upgrade to v3.0.15.
The exact patch is https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e
### Workarounds
Users should listen for when `PeerConnectionState` changes to `PeerConnectionStateFailed`. When it enters this state users should not continue using the PeerConnection.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/pion/webrtc
* Email us at [team@pion.ly](mailto:team@pion.ly)
Thank you to https://github.com/Gaukas for discovering this.
|
{'CVE-2021-28681'}
|
2021-05-25T18:42:42Z
|
2021-05-25T18:42:42Z
|
MODERATE
| 5.3
|
{'CWE-863'}
|
{'https://github.com/advisories/GHSA-74xm-qj29-cq8p', 'https://github.com/pion/webrtc/pull/1709', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28681', 'https://github.com/pion/webrtc/security/advisories/GHSA-74xm-qj29-cq8p', 'https://github.com/pion/webrtc/issues/1708'}
| null |
GHSA
|
GHSA-wq5h-f9p5-q7fx
|
Improper validation of URLs ('Cross-site Scripting') in Wagtail rich text fields
|
### Impact
When saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
### Patches
Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch).
### Workarounds
For sites that cannot easily upgrade to a current supported version, the vulnerability can be patched by adding the following code to a `wagtail_hooks.py` module in any installed app:
```python
from draftjs_exporter.dom import DOM
from wagtail.admin.rich_text.converters.html_to_contentstate import ExternalLinkElementHandler, PageLinkElementHandler
from wagtail.core import hooks
from wagtail.core.whitelist import check_url
def link_entity(props):
id_ = props.get('id')
link_props = {}
if id_ is not None:
link_props['linktype'] = 'page'
link_props['id'] = id_
else:
link_props['href'] = check_url(props.get('url'))
return DOM.create_element('a', link_props, props['children'])
@hooks.register('register_rich_text_features', order=1)
def register_link(features):
features.register_converter_rule('contentstate', 'link', {
'from_database_format': {
'a[href]': ExternalLinkElementHandler('LINK'),
'a[linktype="page"]': PageLinkElementHandler('LINK'),
},
'to_database_format': {
'entity_decorators': {'LINK': link_entity}
}
})
```
### Acknowledgements
Many thanks to Kevin Breen for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
|
{'CVE-2021-29434'}
|
2022-04-19T19:02:53Z
|
2021-04-20T14:02:30Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-wq5h-f9p5-q7fx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29434', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-wq5h-f9p5-q7fx', 'https://pypi.org/project/wagtail/'}
| null |
GHSA
|
GHSA-fxwj-v664-wv5g
|
Improper Control of a Resource Through its Lifetime in Mattermost
|
Mattermost 6.4.x and earlier fails to properly invalidate pending email invitations when the action is performed from the system console, which allows accidentally invited users to join the workspace and access information from the public teams and channels.
|
{'CVE-2022-1385'}
|
2022-04-28T19:49:34Z
|
2022-04-20T00:00:30Z
|
MODERATE
| 4.6
|
{'CWE-668', 'CWE-664'}
|
{'https://github.com/advisories/GHSA-fxwj-v664-wv5g', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1385', 'https://mattermost.com/security-updates/', 'https://hackerone.com/reports/1486820'}
| null |
GHSA
|
GHSA-v4h8-794j-g8mm
|
Arbitrary File Override in Docker Engine
|
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.
|
{'CVE-2015-3631'}
|
2022-04-12T22:13:10Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 5.1
|
{'CWE-285'}
|
{'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'http://seclists.org/fulldisclosure/2015/May/28', 'https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html', 'http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html', 'https://github.com/moby/moby/compare/769acfec2928c47a35da5357d854145b1036448d...b6a9dc399be31c531e3753104e10d74760ed75a2', 'https://github.com/advisories/GHSA-v4h8-794j-g8mm', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3631', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3631'}
| null |
GHSA
|
GHSA-vpf5-82c8-9v36
|
Prototype Pollution in algoliasearch-helper
|
The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns.
|
{'CVE-2021-23433'}
|
2021-11-24T19:00:33Z
|
2021-11-23T21:15:35Z
|
MODERATE
| 0
|
{'CWE-1321', 'CWE-915'}
|
{'https://github.com/advisories/GHSA-vpf5-82c8-9v36', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23433', 'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd', 'https://github.com/algolia/algoliasearch-helper-js/blob/3.5.5/src/SearchParameters/index.js%23L291', 'https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421'}
| null |
GHSA
|
GHSA-j35p-q24r-5367
|
Dep Group Remote Memory Exhaustion (Denial of Service) in ckb
|
### Impact
A remote attacker could exploit this vulnerability to exhaust ckb process memory of an affected node.
### Patches
Upgrade to 0.43.1 or later.
### References
After resolving the outpoints of one dep group, we put the corresponding content into a vec ( https://github.com/nervosnetwork/ckb/blob/v0.42.0/util/types/src/core/cell.rs#L600-L617 ), there is a vulnerability to a memory dos attack because there is no determination of whether the outpoints is duplicated.
PoC:
```
before send dos tx rss:
105700
after rss:
2306932
```
DoS cost: 25.6 KB * 150 + dep_tx out_points capacity ( 36 * 150 * 100 = 540000 ) = 4380000 CKB
Send 50 dos_tx, memory exhausted: (25.6 KB * 150 * 100) * 50 = 19.2 GB
| null |
2022-04-22T20:23:05Z
|
2022-04-22T20:23:04Z
|
HIGH
| 0
| null |
{'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-j35p-q24r-5367', 'https://github.com/nervosnetwork/ckb/blob/v0.42.0/util/types/src/core/cell.rs#L600-L617', 'https://github.com/advisories/GHSA-j35p-q24r-5367'}
| null |
GHSA
|
GHSA-fmrr-mx6j-h3h5
|
Prototype Pollution in confucious
|
All versions of package confucious up to and including version 0.0.12 are vulnerable to Prototype Pollution via the set function.
|
{'CVE-2020-7714'}
|
2021-07-29T21:04:58Z
|
2021-05-06T18:12:09Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7714', 'https://snyk.io/vuln/SNYK-JS-CONFUCIOUS-598665', 'https://github.com/advisories/GHSA-fmrr-mx6j-h3h5'}
| null |
GHSA
|
GHSA-m7vp-hqwv-7m5x
|
Unbounded memory usage on exposed HTTP/2 (non-gRPC) endpoints
|
### Impact
The net/http Go package has a reported vulnerability tracked under CVE-2021-44716 which allows attacker controlled HTTP/2 requests to trigger unbounded memory usage in HTTP/2 endpoints. gRPC endpoints are not vulnerable as they rely on their own HTTP/2 implementation instead of the net/http package. HTTP/2 endpoints consuming the net/http package within SPIRE server and agent (or other components in this repository) that are _on by default_ include the following:
- OIDC Discovery Provider
- K8s Workload Registrar in webhook mode
The following endpoints are vulnerable _when enabled_:
- SPIRE server bundle endpoint (i.e. Federation API)
The following endpoints are _NOT_ vulnerable, since HTTP/2 support in go is not enabled on non-TLS protected endpoints:
- SPIRE server/agent metrics endpoint when configured for Prometheus
- SPIRE server/agent health endpoints
- SPIRE server/agent profiling endpoints
### Patches
SPIRE 1.0.3 and 1.1.3 have been released with an upgraded Go toolchain which patches the vulnerability
### Workarounds
The vulnerability can be worked around entirely by including the `http2server=0` value in the `GODEBUG` environment variable (see https://github.com/golang/go/issues/50058). This turns off HTTP/2 support on all non-gRPC endpoints. They will still function with HTTP/1.1.
The risk associated with this vulnerability can be somewhat mitigated by limiting the exposure of the endpoints in question. If necessary, vulnerable components or endpoints that are optionally configured can be disabled temporarily.
### References
- https://github.com/golang/go/issues/50058
- https://go-review.googlesource.com/c/go/+/370574/
- https://nvd.nist.gov/vuln/detail/CVE-2021-44716
| null |
2022-01-12T22:33:04Z
|
2022-01-12T22:33:04Z
|
HIGH
| 0
| null |
{'https://github.com/spiffe/spire/security/advisories/GHSA-m7vp-hqwv-7m5x', 'https://github.com/advisories/GHSA-m7vp-hqwv-7m5x'}
| null |
GHSA
|
GHSA-wfjh-3hq2-r276
|
Malicious Package in node-spdy
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:27:37Z
|
2020-09-03T19:56:48Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-wfjh-3hq2-r276', 'https://www.npmjs.com/advisories/1138'}
| null |
GHSA
|
GHSA-g45g-g52h-39rg
|
Cross-site Scripting in Chartkick
|
The Chartkick gem through 3.1.0 for Ruby allows XSS.
|
{'CVE-2019-12732'}
|
2021-08-04T21:00:53Z
|
2019-06-07T20:56:42Z
|
MODERATE
| 4.7
|
{'CWE-79'}
|
{'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md', 'https://github.com/advisories/GHSA-g45g-g52h-39rg', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12732', 'https://github.com/ankane/chartkick/issues/488'}
| null |
GHSA
|
GHSA-377f-vvrc-9wgg
|
Malicious Package in zemen
|
Version 0.0.5 of `zemen` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-30T20:07:39Z
|
2020-09-03T19:09:07Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1101', 'https://github.com/advisories/GHSA-377f-vvrc-9wgg'}
| null |
GHSA
|
GHSA-vm5j-vqr6-v7v8
|
OS Command Injection in pixl-class
|
pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization.
|
{'CVE-2020-7640'}
|
2021-12-10T20:04:56Z
|
2021-12-10T20:04:56Z
|
HIGH
| 9.8
|
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/advisories/GHSA-vm5j-vqr6-v7v8', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'}
| null |
GHSA
|
GHSA-gfm8-g3vm-53jh
|
Malicious Package in leetlog
|
Versions 0.1.2 and 0.1.3 of `leetlog` contain malicious code. The package adds an arbitrary hardcoded SSH key identified as `hacker@evilmachine` to the system's `authorized_keys`
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T17:16:55Z
|
2020-09-03T17:21:19Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-gfm8-g3vm-53jh', 'https://www.npmjs.com/advisories/1041'}
| null |
GHSA
|
GHSA-9448-c9wq-jg9v
|
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf
|
In Apache Karaf prior to 4.2.0 release, if the sshd service in Karaf is left on so an administrator can manage the running instance, any user with rights to the Karaf console can pivot and read/write any file on the file system to which the Karaf process user has access. This can be locked down a bit by using chroot to change the root directory to protect files outside of the Karaf install directory; it can be further locked down by defining a security manager policy that limits file system access to those directories beneath the Karaf home that are necessary for the system to run. However, this still allows anyone with ssh access to the Karaf process to read and write a large number of files as the Karaf process user.
|
{'CVE-2018-11786'}
|
2021-09-07T20:40:06Z
|
2018-12-21T17:49:33Z
|
HIGH
| 8.8
|
{'CWE-269'}
|
{'http://karaf.apache.org/security/cve-2018-11786.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11786', 'https://issues.apache.org/jira/browse/KARAF-5427', 'https://lists.apache.org/thread.html/5b7ac762c6bbe77ac5d9389f093fc6dbf196c36d788e3d7629e6c1d9@%3Cdev.karaf.apache.org%3E', 'https://github.com/advisories/GHSA-9448-c9wq-jg9v'}
| null |
GHSA
|
GHSA-pcgf-qjx2-qv4q
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300.
|
{'CVE-2019-1217'}
|
2021-03-29T20:56:08Z
|
2021-03-29T20:56:08Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1217', 'https://github.com/advisories/GHSA-pcgf-qjx2-qv4q', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1217'}
| null |
GHSA
|
GHSA-5x4f-7xgq-r42x
|
Object state limitation has no effect
|
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
| null |
2022-04-29T15:39:21Z
|
2022-04-29T15:39:18Z
|
CRITICAL
| 0
|
{'CWE-281'}
|
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge', 'https://github.com/advisories/GHSA-5x4f-7xgq-r42x', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-5x4f-7xgq-r42x'}
| null |
GHSA
|
GHSA-4x5h-cr29-fhp6
|
Local file disclosure in PHPMailer
|
An issue was discovered in PHPMailer before 5.2.22. PHPMailer's `msgHTML` method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to `/`, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory.
### Impact
Arbitrary local files can be attached to email messages.
### Patches
Fixed in 5.2.22
### Workarounds
Validate input before using user-supplied file paths.
### References
https://nvd.nist.gov/vuln/detail/CVE-2017-5223
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
|
{'CVE-2017-5223'}
|
2021-08-19T19:50:51Z
|
2020-03-05T22:09:10Z
|
MODERATE
| 5.5
|
{'CWE-200'}
|
{'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-4x5h-cr29-fhp6', 'https://www.exploit-db.com/exploits/43056/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2017-5223.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5223', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.22', 'https://github.com/advisories/GHSA-4x5h-cr29-fhp6', 'http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/', 'http://www.securityfocus.com/bid/95328', 'https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md'}
| null |
GHSA
|
GHSA-vmfg-rjjm-rjrj
|
Deserialization of Untrusted Data
|
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory.
|
{'CVE-2017-5929'}
|
2022-04-19T15:46:12Z
|
2021-06-07T16:07:36Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://access.redhat.com/errata/RHSA-2017:1832', 'https://lists.apache.org/thread.html/r0bb19330e48d5ad784fa20dacba9e5538d8d60f5cd9142e0f1432b4b@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/18d509024d9aeb07f0e9579066f80bf5d4dcf20467b0c240043890d1@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/a6db61616180d73711d6db25703085940026e2dbc40f153f9d22b203@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r632ec30791b441e2eb5a3129532bf1b689bf181d0ef7daf50bcf0fd6@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r2c2d57ca180e8173c90fe313ddf8eabbdcf8e3ae196f8b9f42599790@%3Ccommits.mnemonic.apache.org%3E', 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E', 'https://github.com/advisories/GHSA-vmfg-rjjm-rjrj', 'https://lists.apache.org/thread.html/ra007cec726a3927c918ec94c4316d05d1829c49eae8dc3648adc35e2@%3Ccommits.cassandra.apache.org%3E', 'https://logback.qos.ch/news.html', 'https://lists.apache.org/thread.html/r718f27bed898008a8e037d9cc848cfc1df4d18abcbaee0cb0c142cfb@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1675', 'https://access.redhat.com/errata/RHSA-2017:1676', 'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929', 'https://lists.apache.org/thread.html/fa4eaaa6ff41ac6f79811e053c152ee89b7c5da8a6ac848ae97df67f@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/re9b787727291786dfe088e3cd078c7d195c0b5781e15d3cd24a3b2fc@%3Cdev.mnemonic.apache.org%3E', 'https://lists.apache.org/thread.html/r4673642893562c58cbee60c151ded6c077e8a2d02296e862224a9161@%3Ccommits.cassandra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5929', 'https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rbb4dfca2f7e3e8f3570eec21c79832d33a51dfde6762725660b60169@%3Cdev.mnemonic.apache.org%3E', 'https://lists.apache.org/thread.html/r2a08573ddee4a86dc96d469485a5843a01710ee0dc2078dfca410c79@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rd2227af3c9ada2a72dc72ed05517f5857a34d487580e1f2803922ff9@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2927'}
| null |
GHSA
|
GHSA-q8xg-8xwf-m598
|
Machine-In-The-Middle in lix
|
All versions of `lix` are vulnerable to Machine-In-The-Middle. The package accepts downloads with `http` and follows `location` header redirects for package downloads. This allows for an attacker in a privileged network position to intercept a lix package installation and redirect the download to a malicious source.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2020-10800'}
|
2021-09-16T20:39:55Z
|
2020-04-16T03:14:59Z
|
HIGH
| 8.1
|
{'CWE-639', 'CWE-544'}
|
{'https://github.com/advisories/GHSA-q8xg-8xwf-m598', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10800', 'https://www.npmjs.com/advisories/1306'}
| null |
GHSA
|
GHSA-hhr9-7xvh-8xgc
|
Server side request forgery in LiveHelperChat
|
SSRF filter bypass port 80, 433 in LiveHelperChat prior to v3.67. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191
|
{'CVE-2022-1213'}
|
2022-04-19T17:55:45Z
|
2022-04-06T00:01:32Z
|
HIGH
| 7.7
|
{'CWE-918'}
|
{'https://github.com/advisories/GHSA-hhr9-7xvh-8xgc', 'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111', 'https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1213', 'https://github.com/LiveHelperChat/livehelperchat/issues/1752'}
| null |
GHSA
|
GHSA-58v4-qwx5-7f59
|
SQL Injection in knex
|
knex.js versions before 0.19.5 are vulnerable to SQL Injection attack. Identifiers are escaped incorrectly as part of the MSSQL dialect, allowing attackers to craft a malicious query to the host DB.
|
{'CVE-2019-10757'}
|
2021-08-18T21:50:50Z
|
2019-10-21T16:12:13Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://snyk.io/vuln/SNYK-JS-KNEX-471962', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10757', 'https://github.com/advisories/GHSA-58v4-qwx5-7f59'}
| null |
GHSA
|
GHSA-xrcv-f9gm-v42c
|
Out-of-bounds Read in Pillow
|
path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path.
|
{'CVE-2022-22816'}
|
2022-02-17T23:26:15Z
|
2022-01-12T20:07:41Z
|
MODERATE
| 6.5
|
{'CWE-125'}
|
{'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://github.com/advisories/GHSA-xrcv-f9gm-v42c', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling', 'https://www.debian.org/security/2022/dsa-5053', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22816', 'https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331'}
| null |
GHSA
|
GHSA-8rm6-75mf-7r7r
|
Division by zero in TFLite's implementation of hashtable lookup
|
### Impact
The TFLite implementation of hashtable lookup is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115):
```cc
const int num_rows = SizeOfDimension(value, 0);
const int row_bytes = value->bytes / num_rows;
```
An attacker can craft a model such that `values`'s first dimension would be 0.
### Patches
We have patched the issue in GitHub commit [5117e0851348065ed59c991562c0ec80d9193db2](https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29604'}
|
2021-05-21T14:28:19Z
|
2021-05-21T14:28:19Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/advisories/GHSA-8rm6-75mf-7r7r', 'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29604', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rm6-75mf-7r7r'}
| null |
GHSA
|
GHSA-r3gq-wxqf-q4gh
|
Cross-site Scripting in Gitea
|
Cross Site Scripting (XSS) vulnerability exists in Gitea before 1.5.1 via the repository settings inside the external wiki/issue tracker URL field.
|
{'CVE-2021-45329'}
|
2022-02-15T00:18:14Z
|
2022-02-10T00:00:32Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://blog.gitea.io/2018/09/gitea-1.5.1-is-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45329', 'https://github.com/advisories/GHSA-r3gq-wxqf-q4gh', 'https://github.com/go-gitea/gitea/pull/4710'}
| null |
GHSA
|
GHSA-gvm4-h8j3-rjrq
|
CHECK-fail in `LoadAndRemapMatrix`
|
### Impact
An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from `tf.raw_ops.LoadAndRemapMatrix`:
```python
import tensorflow as tf
ckpt_path = tf.constant([], shape=[0], dtype=tf.string)
old_tensor_name = tf.constant("")
row_remapping = tf.constant([], shape=[0], dtype=tf.int64)
col_remapping = tf.constant([1], shape=[1], dtype=tf.int64)
initializing_values = tf.constant(1.0)
tf.raw_ops.LoadAndRemapMatrix(
ckpt_path=ckpt_path, old_tensor_name=old_tensor_name,
row_remapping=row_remapping, col_remapping=col_remapping,
initializing_values=initializing_values, num_rows=0, num_cols=1)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) assumes that the `ckpt_path` is always a valid scalar.
```cc
const string& ckpt_path = ckpt_path_t->scalar<tstring>()();
```
However, an attacker can send any other tensor as the first argument of `LoadAndRemapMatrix`. This would cause the rank `CHECK` in `scalar<T>()()` to trigger and terminate the process.
### Patches
We have patched the issue in GitHub commit [77dd114513d7796e1e2b8aece214a380af26fbf4](https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29561'}
|
2021-05-21T14:24:59Z
|
2021-05-21T14:24:59Z
|
LOW
| 2.5
|
{'CWE-617'}
|
{'https://github.com/advisories/GHSA-gvm4-h8j3-rjrq', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gvm4-h8j3-rjrq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29561', 'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'}
| null |
GHSA
|
GHSA-8hc4-xxm3-5ppp
|
Regular Expression Denial-of-Service
|
The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
|
{'CVE-2021-22880'}
|
2022-01-06T20:01:16Z
|
2021-03-02T03:44:14Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/', 'https://www.debian.org/security/2021/dsa-4929', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO5OJ3F4ZL3UXVLJO6ECANRVZBNRS2IH/', 'https://hackerone.com/reports/1023899', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22880', 'https://rubygems.org/gems/activerecord', 'https://security.netapp.com/advisory/ntap-20210805-0009/', 'https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129', 'https://github.com/advisories/GHSA-8hc4-xxm3-5ppp'}
| null |
GHSA
|
GHSA-cxx2-fp39-rf3r
|
Cross-Site Scripting in JSPWiki
|
A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
|
{'CVE-2019-10076'}
|
2021-08-04T19:53:12Z
|
2019-06-06T15:29:22Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/05/19/4', 'http://www.securityfocus.com/bid/108437', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10076', 'https://github.com/advisories/GHSA-cxx2-fp39-rf3r', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10076'}
| null |
GHSA
|
GHSA-773q-5334-5gf9
|
Memory over-allocation in evm-core
|
Prior to the patch, when executing specific EVM opcodes related
to memory operations that use `evm_core::Memory::copy_large`, the
crate can over-allocate memory when it is not needed, making it
possible for an attacker to perform denial-of-service attack.
The flaw was corrected in commit `19ade85`.
| null |
2021-08-25T20:55:36Z
|
2021-08-25T20:55:36Z
|
MODERATE
| 0
|
{'CWE-789'}
|
{'https://github.com/rust-blockchain/evm/commit/19ade85', 'https://rustsec.org/advisories/RUSTSEC-2021-0066.html', 'https://github.com/advisories/GHSA-773q-5334-5gf9'}
| null |
GHSA
|
GHSA-2h3h-q99f-3fhc
|
UNIX Symbolic Link (Symlink) Following in @npmcli/arborist
|
### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder.
This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies.
When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem.
For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed.
Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected.
### Patches
2.8.2 (included in npm v7.20.7 and above)
### Fix and Caveats
There are two parts to the fix:
1. Immediately prior to extraction, if the target folder is not a directory, it is moved aside. (If the installation fails, filesystem entries moved aside in this manner are moved back as part of the rollback process.)
2. The `children` map that represents child nodes in the tree is replaced with a case-insensitive map object, such that `node.children.get('foo')` and `node.children.get('FOO')` will return the same object, enabling Arborist to detect and handle this class of tree collision.
This second item imposes a caveat on case _sensitive_ filesystems where two packages with names which differ only in case may already exist at the same level in the tree, causing unpredictable behavior in this rare edge case. Note that in such cases, the `package-lock.json` already creates a situation which is hazardous to use on case-sensitive filesystems, and will likely lead to other problems.
If affected by this caveat, please run `npm update` to rebuild your tree and generate a new `package-lock.json` file.
|
{'CVE-2021-39134'}
|
2022-03-11T20:21:11Z
|
2021-08-31T16:04:03Z
|
MODERATE
| 8.2
|
{'CWE-61', 'CWE-59'}
|
{'https://github.com/advisories/GHSA-2h3h-q99f-3fhc', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39134', 'https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc', 'https://www.npmjs.com/package/@npmcli/arborist'}
| null |
GHSA
|
GHSA-m7mf-vm62-7x3q
|
Insecure template handling in haml-coffee
|
haml-coffee is a JavaScript templating solution. haml-coffee mixes pure template data with engine configuration options through the Express render API. More specifically, haml-coffee supports overriding a series of HTML helper functions through its configuration options. A vulnerable application that passes user controlled request objects to the haml-coffee template engine may introduce RCE vulnerabilities. Additionally control over the escapeHtml parameter through template configuration pollution ensures that haml-coffee would not sanitize template inputs that may result in reflected Cross Site Scripting attacks against downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of haml-coffee is currently 1.14.1. For complete details refer to the referenced GHSL-2021-025.
|
{'CVE-2021-32818'}
|
2021-05-17T20:58:21Z
|
2021-05-17T20:58:21Z
|
HIGH
| 7.7
|
{'CWE-79'}
|
{'https://securitylab.github.com/advisories/GHSL-2021-025-haml-coffee/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32818', 'https://www.npmjs.com/package/haml-coffee', 'https://github.com/advisories/GHSA-m7mf-vm62-7x3q'}
| null |
GHSA
|
GHSA-wh37-37xw-54hr
|
Improper Authentication in requests-kerberos
|
python-requests-Kerberos through 0.5 does not handle mutual authentication
|
{'CVE-2014-8650'}
|
2022-03-23T20:33:23Z
|
2020-03-10T18:02:31Z
|
CRITICAL
| 9.8
|
{'CWE-287'}
|
{'https://github.com/requests/requests-kerberos/blob/0.6/HISTORY.rst', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8650', 'https://github.com/requests/requests-kerberos/issues/35', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8650', 'http://www.openwall.com/lists/oss-security/2014/11/07/1', 'https://github.com/advisories/GHSA-wh37-37xw-54hr', 'http://www.securityfocus.com/bid/70909', 'https://github.com/requests/requests-kerberos/pull/36', 'https://github.com/mkomitee/requests-kerberos/commit/9c1e08cc17bb6950455a85d33d391ecd2bce6eb6', 'https://security-tracker.debian.org/tracker/CVE-2014-8650'}
| null |
GHSA
|
GHSA-72w9-fcj5-3fcg
|
Improper Authentication in Apache Shiro
|
Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
|
{'CVE-2020-11989'}
|
2022-05-04T01:54:59Z
|
2021-05-07T15:53:10Z
|
CRITICAL
| 9.8
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11989', 'https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cuser.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rcf3d8041e1232201fe5d74fc612a193e435784d64002409b448b58fe@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675%40%3Cuser.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cdev.shiro.apache.org%3E', 'https://github.com/advisories/GHSA-72w9-fcj5-3fcg', 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r408fe60bc8fdfd7c74135249d646d7abadb807ebf90f6fd2b014df21@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E'}
| null |
GHSA
|
GHSA-q42p-pg8m-cqh6
|
Prototype Pollution in handlebars
|
Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server.
## Recommendation
For handlebars 4.1.x upgrade to 4.1.2 or later.
For handlebars 4.0.x upgrade to 4.0.14 or later.
| null |
2021-08-04T20:54:06Z
|
2019-06-05T14:07:48Z
|
HIGH
| 7.3
|
{'CWE-471'}
|
{'https://github.com/handlebars-lang/handlebars.js/issues/1495', 'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692', 'https://www.npmjs.com/advisories/755', 'https://github.com/advisories/GHSA-q42p-pg8m-cqh6'}
| null |
GHSA
|
GHSA-6pq3-928q-x6w6
|
Prototype Pollution
|
All versions of `utils-extend` are vulnerable to prototype pollution. The `extend` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2020-8147'}
|
2021-06-07T22:49:30Z
|
2020-09-03T15:51:28Z
|
HIGH
| 0
|
{'CWE-471'}
|
{'https://hackerone.com/reports/801522', 'https://www.npmjs.com/advisories/1502', 'https://github.com/advisories/GHSA-6pq3-928q-x6w6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8147'}
| null |
GHSA
|
GHSA-w32g-5hqp-gg6q
|
Cross-Site Scripting in mermaid
|
Versions of `mermaid` prior to 8.2.3 are vulnerable to Cross-Site Scripting. If malicious input such as `A["<img src=invalid onerror=alert('XSS')></img>"] ` is provided to the application, it will execute the code instead of rendering it as text due to improper output encoding.
## Recommendation
Upgrade to version 8.2.3 or later
| null |
2021-09-27T13:34:07Z
|
2020-09-02T15:41:41Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/751', 'https://github.com/advisories/GHSA-w32g-5hqp-gg6q', 'https://github.com/knsv/mermaid/issues/847'}
| null |
GHSA
|
GHSA-q8wc-9xvp-g3c3
|
Cross-site scripting in Sakai
|
Sakai through 12.6 allows XSS via a chat user name.
|
{'CVE-2019-16148'}
|
2021-08-17T22:29:13Z
|
2019-09-23T18:33:18Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-q8wc-9xvp-g3c3', 'https://github.com/sakaiproject/sakai/pull/6971', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16148'}
| null |
GHSA
|
GHSA-pc7q-c837-3wjq
|
Malicious Package in wallet-address-validtaor
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T15:56:22Z
|
2020-09-03T17:02:58Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1413', 'https://github.com/advisories/GHSA-pc7q-c837-3wjq'}
| null |
GHSA
|
GHSA-8695-fr6h-9fq8
|
Command Injection in nuance-gulp-build-common
|
All versions of package nuance-gulp-build-common are vulnerable to Command Injection via the index.js file. PoC: /var a = require("nuance-gulp-build-common") a.run("touch JHU")
|
{'CVE-2020-28430'}
|
2021-08-30T23:13:49Z
|
2021-04-13T15:19:23Z
|
CRITICAL
| 9.8
|
{'CWE-77', 'CWE-78'}
|
{'https://github.com/advisories/GHSA-8695-fr6h-9fq8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28430', 'https://snyk.io/vuln/SNYK-JS-NUANCEGULPBUILDCOMMON-1050419'}
| null |
GHSA
|
GHSA-26cm-qrc6-mfgj
|
Improper Neutralization of Special Elements used in an LDAP Query in stevenweathers/thunderdome-planning-poker
|
### Impact
LDAP injection vulnerability, only affects instances with LDAP authentication enabled.
### Patches
Patch for vulnerability released with v1.16.3.
### Workarounds
Disable LDAP feature if in use
### References
[OWASP LDAP Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html
)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Thunderdome Github Repository](https://github.com/StevenWeathers/thunderdome-planning-poker)
* Email us at [steven@weathers.me](mailto:steven@weathers.me)
|
{'CVE-2021-41232'}
|
2022-04-19T19:03:13Z
|
2021-11-08T18:16:21Z
|
HIGH
| 8.1
|
{'CWE-74', 'CWE-90'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41232', 'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1', 'https://github.com/advisories/GHSA-26cm-qrc6-mfgj', 'https://github.com/StevenWeathers/thunderdome-planning-poker/security/advisories/GHSA-26cm-qrc6-mfgj', 'https://github.com/github/securitylab/issues/464#issuecomment-957094994'}
| null |
GHSA
|
GHSA-2vqv-hp3p-fmv8
|
Downloads Resources over HTTP in webdriver-launcher
|
Affected versions of `webdriver-launcher` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webdriver-launcher`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2011.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10651'}
|
2021-01-08T20:06:09Z
|
2019-02-18T23:47:03Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/246', 'https://nodesecurity.io/advisories/246', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10651', 'https://github.com/advisories/GHSA-2vqv-hp3p-fmv8'}
| null |
GHSA
|
GHSA-9652-78hp-w58c
|
Stored cross-site scripting in PressBooks
|
PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS.
|
{'CVE-2021-3271'}
|
2021-03-29T20:07:39Z
|
2021-03-29T20:07:39Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-9652-78hp-w58c', 'https://github.com/pressbooks/pressbooks', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3271', 'https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/', 'https://github.com/pressbooks/pressbooks/pull/2072', 'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'}
| null |
GHSA
|
GHSA-65cv-r6x7-79hv
|
Possible XSS vulnerability in ActionView
|
There is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks.
### Impact
There is a possible XSS vulnerability in the `j` and `escape_javascript` methods in ActionView. These methods are used for escaping JavaScript string literals. Impacted code will look something like this:
```erb
<script>let a = `<%= j unknown_input %>`</script>
```
or
```erb
<script>let a = `<%= escape_javascript unknown_input %>`</script>
```
### Releases
The 6.0.2.2 and 5.2.4.2 releases are available at the normal locations.
### Workarounds
For those that can't upgrade, the following monkey patch may be used:
```ruby
ActionView::Helpers::JavaScriptHelper::JS_ESCAPE_MAP.merge!(
{
"`" => "\\`",
"$" => "\\$"
}
)
module ActionView::Helpers::JavaScriptHelper
alias :old_ej :escape_javascript
alias :old_j :j
def escape_javascript(javascript)
javascript = javascript.to_s
if javascript.empty?
result = ""
else
result = javascript.gsub(/(\\|<\/|\r\n|\342\200\250|\342\200\251|[\n\r"']|[`]|[$])/u, JS_ESCAPE_MAP)
end
javascript.html_safe? ? result.html_safe : result
end
alias :j :escape_javascript
end
```
### Patches
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* [5-2-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-5-2-js-helper-xss-patch) - Patch for 5.2 series
* [6-0-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-6-0-js-helper-xss-patch) - Patch for 6.0 series
Please note that only the 5.2 and 6.0 series are supported at present. Users
of earlier unsupported releases are advised to upgrade as soon as possible as we
cannot guarantee the continued availability of security fixes for unsupported
releases.
### Credits
Thanks to Jesse Campos from Chef Secure
|
{'CVE-2020-5267'}
|
2022-04-19T19:02:25Z
|
2020-03-19T17:30:29Z
|
MODERATE
| 4
|
{'CWE-80'}
|
{'http://www.openwall.com/lists/oss-security/2020/03/19/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00022.html', 'https://github.com/advisories/GHSA-65cv-r6x7-79hv', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html', 'https://groups.google.com/forum/#!topic/rubyonrails-security/55reWMM_Pg8', 'https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-5267.yml', 'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5267'}
| null |
GHSA
|
GHSA-9xv2-548x-5h79
|
Arbitrary File Read in Snyk Broker
|
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
|
{'CVE-2020-7648'}
|
2021-07-29T17:47:00Z
|
2020-06-03T22:02:19Z
|
MODERATE
| 6.5
|
{'CWE-22'}
|
{'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570607', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7648', 'https://github.com/advisories/GHSA-9xv2-548x-5h79'}
| null |
GHSA
|
GHSA-v2r9-c84j-v7xm
|
Moderate severity vulnerability that affects rdoc
|
darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
|
{'CVE-2013-0256'}
|
2021-09-01T19:36:59Z
|
2017-10-24T18:33:37Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=907820', 'http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2', 'http://rhn.redhat.com/errata/RHSA-2013-0728.html', 'http://www.ubuntu.com/usn/USN-1733-1', 'https://github.com/advisories/GHSA-v2r9-c84j-v7xm', 'http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/', 'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html', 'http://secunia.com/advisories/52774', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0256', 'http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html', 'http://rhn.redhat.com/errata/RHSA-2013-0701.html', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html'}
| null |
GHSA
|
GHSA-w4vp-3mq7-7v82
|
Cross-Site Scripting in lazysizes
|
Versions of `lazysizes` prior to 5.2.1-rc1 are vulnerable to Cross-Site Scripting. The `video-embed` plugin fails to sanitize the following attributes: data-vimeo, `data-vimeoparams`, `data-youtube` and `data-ytparams`. This allows attackers to execute arbitrary JavaScript in a victim's browser if the attacker has control over the vulnerable attributes.
## Recommendation
Upgrade to version 5.2.1-rc1 or later.
| null |
2021-10-04T21:07:09Z
|
2020-09-03T15:49:48Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1493', 'https://github.com/advisories/GHSA-w4vp-3mq7-7v82', 'https://github.com/aFarkas/lazysizes/issues/764'}
| null |
GHSA
|
GHSA-gfx6-ph4q-q54q
|
Moderate severity vulnerability that affects com.typesafe.akka:akka-http-core_2.11 and com.typesafe.akka:akka-http-core_2.12
|
Akka HTTP versions <= 10.0.5 Illegal Media Range in Accept Header Causes StackOverflowError Leading to Denial of Service
|
{'CVE-2017-1000118'}
|
2021-09-10T21:05:02Z
|
2018-10-22T20:53:02Z
|
HIGH
| 7.5
|
{'CWE-119'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000118', 'https://doc.akka.io/docs/akka-http/10.0.6/security/2017-05-03-illegal-media-range-in-accept-header-causes-stackoverflowerror.html', 'https://github.com/advisories/GHSA-gfx6-ph4q-q54q'}
| null |
GHSA
|
GHSA-r28h-x6hv-2fq3
|
Improper Verification of Cryptographic Signature in starkbank-ecdsa
|
The verify function in the Stark Bank Java ECDSA library (ecdsa-java) 1.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
|
{'CVE-2021-43570'}
|
2021-11-15T14:43:05Z
|
2021-11-10T20:48:00Z
|
CRITICAL
| 9.8
|
{'CWE-347'}
|
{'https://github.com/starkbank/ecdsa-java/releases/tag/v1.0.1', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43570', 'https://github.com/advisories/GHSA-r28h-x6hv-2fq3'}
| null |
GHSA
|
GHSA-6qcc-whgp-pjj2
|
Cross-site Scripting in Pimcore
|
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
|
{'CVE-2022-0832'}
|
2022-03-11T23:22:51Z
|
2022-03-05T00:00:45Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-6qcc-whgp-pjj2', 'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0832', 'https://huntr.dev/bounties/be450b60-bc8f-4585-96a5-3c4069f1186a'}
| null |
GHSA
|
GHSA-3w73-fmf3-hg5c
|
Policies not properly enforced in OWASP Java HTML Sanitizer
|
The OWASP Java HTML Sanitizer before 20211018.1 does not properly enforce policies associated with the `SELECT`, `STYLE`, and `OPTION` elements.
|
{'CVE-2021-42575'}
|
2022-02-23T22:19:33Z
|
2021-10-19T20:15:50Z
|
CRITICAL
| 9.8
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-3w73-fmf3-hg5c', 'https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42575'}
| null |
GHSA
|
GHSA-8wp2-vxpg-xcvp
|
Cross site scripting in facturascripts
|
facturasripts is an open source ERP software. Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.
|
{'CVE-2022-1457'}
|
2022-05-05T13:47:30Z
|
2022-04-26T00:00:43Z
|
CRITICAL
| 9
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-8wp2-vxpg-xcvp', 'https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046', 'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1457'}
| null |
GHSA
|
GHSA-2rq5-68hm-h4j8
|
Cross-Site Request Forgery in OpenNMS Horizon
|
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at `/opennms/admin/userGroupView/users/updateUser`. This flaw allows assigning `ROLE_ADMIN` security role to a normal user. Using this flaw, an attacker can trick the admin user to assign administrator privileges to a normal user by enticing him to click upon an attacker-controlled website.
|
{'CVE-2021-25931'}
|
2021-05-28T22:26:41Z
|
2021-05-25T18:46:55Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25931', 'https://github.com/advisories/GHSA-2rq5-68hm-h4j8', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'}
| null |
GHSA
|
GHSA-cc94-3v9c-7rm8
|
Apache ActiveMQ webconsole admin GUI is open to XSS
|
In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue.
|
{'CVE-2020-1941'}
|
2021-06-15T17:57:09Z
|
2020-05-21T21:08:56Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1941', 'https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://activemq.apache.org/security-advisories.data/CVE-2020-1941-announcement.txt', 'https://github.com/advisories/GHSA-cc94-3v9c-7rm8', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.