ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Packagist
|
GHSA-3pcr-4982-548m
|
Exposure of .env if project root is configured as web root in shopware/production
|
### Impact
The .env and other sensitive files can be leaked if the project root and not `/public` is configured as the web root.
### Patches
We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
You should always use `/public` as the web root.
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021
| null |
2021-04-12T22:33:05Z
|
2021-04-13T15:13:37Z
|
MODERATE
| null |
{'CWE-552'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-3pcr-4982-548m'}
| null |
Packagist
|
GHSA-2ccx-2gf3-8xvv
|
.dev domains and some reverse proxy setups were treated as local in Kirby
|
### Impact
#### About our registration block
In order to protect new installations on public servers that don't have an admin account for the Panel yet, we block account registration there by default. This is a security feature, which we implemented years ago in Kirby 2. It helps to avoid that you forget registering your first admin account on a public server.
In this case – without our security block – someone else might theoretically be able to find your site, find out it's running on Kirby, find the Panel and then register the account first. It's an unlikely situation, but it's still a certain risk.
To be able to register the first Panel account on a public server, you have to enforce the installer via a config setting. This helps to push all users to the best practice of registering your first Panel account on your local machine and upload it together with the rest of the site.
#### The issue
As noted by [Jukka Rautanen](https://github.com/jukra), this installation block implementation in Kirby versions before 3.3.6 still assumed that .dev domains are local domains, which is no longer true. In the meantime, those domains became publicly available. This means that our installation block is no longer working as expected if you use a .dev domain for your Kirby site.
In fixing this issue, we've also found out that the local installation check may also fail if your site is behind a reverse proxy.
#### Am I affected?
You are only affected if:
1. you use a .dev domain or your site is behind a reverse proxy &
2. you have not yet registered your first Panel account on the public server &
3. someone finds your site and tries to login at `yourdomain.dev/panel` before you register your first account.
You are not affected if you have already created one or multiple Panel accounts (no matter if on a .dev domain or behind a reverse proxy).
### Patches
The problem has been patched in [Kirby 2.5.14](https://github.com/getkirby-v2/panel/releases/tag/2.5.14) and [Kirby 3.3.6](https://github.com/getkirby/kirby/releases/tag/3.3.6). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases) to fix the vulnerability.
**Note:** Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14.
### Workarounds
Kirby 2 sites on older releases can also be patched by applying the [changes from this commit](https://github.com/getkirby-v2/panel/commit/7f9ac1876bacb89fd8f142f5e561a02ebb725baa).
|
{'CVE-2020-26253'}
|
2021-07-02T16:52:32Z
|
2021-01-14T19:15:19Z
|
MODERATE
| null |
{'CWE-346'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26253', 'https://packagist.org/packages/getkirby/cms', 'https://github.com/getkirby/kirby/releases/tag/3.3.6', 'https://github.com/getkirby-v2/panel/commit/7f9ac1876bacb89fd8f142f5e561a02ebb725baa', 'https://github.com/getkirby/kirby/security/advisories/GHSA-2ccx-2gf3-8xvv', 'https://packagist.org/packages/getkirby/panel'}
| null |
Packagist
|
GHSA-vvmr-8829-6whx
|
CSRF token missing in Symfony
|
Description
-----------
The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user.
When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the configuration is not specified, by default, the mechanism is enabled as long as the session is enabled.
In a recent change in the way the configuration is loaded, the default behavior has been dropped and, as a result, the CSRF protection is not enabled in form when not explicitly enabled, which makes the application sensible to CSRF attacks.
Resolution
----------
Symfony restored the default configuration to enable the CSRF protection by default.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/f0ffb775febdf07e57117aabadac96fa37857f50) for branch 5.3.
Credits
-------
We would like to thank Catalin Dan and David Lochner for reporting the issue and Jérémy Derussé for fixing the issue.
|
{'CVE-2022-23601'}
|
2022-02-07T22:11:10Z
|
2022-02-01T00:46:57Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23601', 'https://github.com/symfony/symfony/', 'https://github.com/symfony/symfony/security/advisories/GHSA-vvmr-8829-6whx', 'https://github.com/symfony/symfony/commit/f0ffb775febdf07e57117aabadac96fa37857f50'}
| null |
Packagist
|
GHSA-g3p2-hfqr-9m25
|
Improper file handling in concrete5/core
|
A bypass of adding remote files in Concrete CMS (previously concrete5) File Manager leads to remote code execution in Concrete CMS (concrete5) versions 8.5.6 and below. The external file upload feature stages files in the public directory even if they have disallowed file extensions. They are stored in a directory with a random name, but it's possible to stall the uploads and brute force the directory name. You have to be an admin with the ability to upload files, but this bug gives you the ability to upload restricted file types and execute them depending on server configuration. To fix this, a check for allowed file extensions was added before downloading files to a tmp directory
|
{'CVE-2021-22968'}
|
2021-11-22T19:41:50Z
|
2021-11-23T17:54:26Z
|
MODERATE
| null |
{'CWE-98'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22968', 'https://hackerone.com/reports/1350444', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}
| null |
Packagist
|
GHSA-26rr-v2j2-25fh
|
Layout XML Arbitrary Code Fix
|
### Impact
Layout XML enabled admin users to execute arbitrary commands via block methods.
|
{'CVE-2021-32758'}
|
2021-08-30T16:42:41Z
|
2021-08-30T17:20:52Z
|
HIGH
| null |
{'CWE-91'}
|
{'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh', 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15', 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13', 'https://github.com/OpenMage/magento-lts/commit/b99307d00b59c4a226a1e3e4083f02cf2fc8fce7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32758'}
| null |
Packagist
|
GHSA-8c76-mxv5-w4g8
|
Stored Cross-site Scripting in Microweber
|
Microweber 1.2.11 and prior contains multiple stored cross-site scripting vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods.
|
{'CVE-2022-0954'}
|
2022-03-28T17:25:37Z
|
2022-03-16T00:00:48Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/b99517c0-37fc-4efa-ab1a-3591da7f4d26', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0954', 'https://github.com/microweber/microweber/commit/955471c27e671c49e4b012e3b120b004082ac3f7'}
| null |
Packagist
|
GHSA-h86j-6h6m-qjqw
|
Cross-Site Request Forgery in remdex/livehelperchat
|
An attacker is able to log out a user if a logged-in user visits the attacker's website. While this cannot harm a user's account, it can be a great annoyance and is a valid CSRF.
|
{'CVE-2021-4049'}
|
2021-12-09T17:55:01Z
|
2021-12-10T20:26:34Z
|
LOW
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4049', 'https://huntr.dev/bounties/62408fa4-2c16-4fcd-8b34-41fcdccb779e', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/e7fe1aa6a087d4d21b2e8a0dadd2e08f42acbb57'}
| null |
Packagist
|
GHSA-5mv2-rx3q-4w2v
|
Code injection in Twig
|
# Description
When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions.
# Resolution
We now disallow calling non Closure in the `sort` filter like we already did for some other filters.
# Credits
We would like to thank Marlon Starkloff for reporting the issue and Fabien Potencier for fixing the issue.
|
{'CVE-2022-23614'}
|
2022-02-11T19:16:32Z
|
2022-02-10T22:21:48Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIGZCFSYLPP7UVJ4E4NLHSOQSKYNXSAD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2PVV5DUTRUECTIHMTWRI5Z7DVNYQ2YO/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTN4273U4RHVIXED64T7DSMJ3VYTPRE7/', 'https://github.com/twigphp/Twig/', 'https://github.com/twigphp/Twig/security/advisories/GHSA-5mv2-rx3q-4w2v', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PECHIY2XLWUH2WLCNPDGNFMPHPRPCEDZ/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23614', 'https://www.debian.org/security/2022/dsa-5107', 'https://github.com/twigphp/Twig/commit/2eb33080558611201b55079d07ac88f207b466d5'}
| null |
Packagist
|
GHSA-cpxc-67rc-c775
|
Cross Site Scripting in baserCMS
|
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS).
* Impact: XSS via Arbitrary script execution.
* Attack vector is: Administrator must be logged in.
* Components are: content_fields.php, content_info.php, content_options.php, content_related.php, index_list_tree.php, jquery.bcTree.js
* Tested baserCMS Version : 4.3.6 (Latest)
* Affected baserCMS Version : 4.0.0 ~ 4.3.6
* Patches : https://basercms.net/security/20200827
Found by Aquilao Null
|
{'CVE-2020-15154'}
|
2021-01-07T23:39:30Z
|
2020-08-28T20:48:12Z
|
LOW
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15154', 'https://basercms.net/security/20200827', 'https://github.com/baserproject/basercms/security/advisories/GHSA-cpxc-67rc-c775', 'https://github.com/baserproject/basercms/commit/7f4b905b90954e394ec10dd35bad2a5dec505371'}
| null |
Packagist
|
GHSA-769f-539v-f5jg
|
PrestaShop gamification module ZIP archives were vulnerable from CVE-2017-9841
|
### Impact
We have identified that some gamification module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
This vulnerability impacts
- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841)
- phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers)
You can read PrestaShop official statement about this vulnerability [here](https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/).
### Patches
In the [security patch](https://github.com/PrestaShop/gamification/releases/tag/v2.3.2), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading.
### Workarounds
Users can also simply remove the unwanted vendor/phpunit folder.
### References
https://nvd.nist.gov/vuln/detail/CVE-2017-9841
### For more information
If you have any questions or comments about this advisory, email us at security@prestashop.com
| null |
2020-01-08T03:10:06Z
|
2020-01-08T03:10:44Z
|
HIGH
| null | null |
{'https://github.com/PrestaShop/gamification/commit/5044bda903a7ea9596c21faa2b9a42244763568c', 'https://github.com/PrestaShop/gamification/security/advisories/GHSA-769f-539v-f5jg', 'https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/'}
| null |
Packagist
|
GHSA-6m26-25q2-cq46
|
Cross-site Scripting in microweber
|
Microweber Cross-site Scripting (XSS) - Stored XSS vulnerability on admin page up to version 1.3.
|
{'CVE-2022-0763'}
|
2022-03-09T20:36:46Z
|
2022-02-27T00:00:15Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0763', 'https://github.com/microweber/microweber/commit/c897d0dc159849763a813184d9b75b966c6360bf', 'https://huntr.dev/bounties/6de9c621-740d-4d7a-9d77-d90c6c87f3b6'}
| null |
Packagist
|
GHSA-wppj-3pjr-9w79
|
crater is vulnerable to Unrestricted Upload of File with Dangerous Type
|
crater is vulnerable to Unrestricted Upload of File with Dangerous Type
|
{'CVE-2021-4080'}
|
2022-01-20T15:08:18Z
|
2022-01-21T23:55:11Z
|
HIGH
| null |
{'CWE-434'}
|
{'https://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db', 'https://github.com/crater-invoice/crater', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4080', 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}
| null |
Packagist
|
GHSA-553q-hpvp-q8pc
|
Server-Side Request Forgery in snipe/snipe-it
|
Admin users on the external network can perform blind POST-based SSRF (issue requests on behalf of the server into the internal network) via the Slack Integration. This vulnerability is capable of port-scanning of the internal network, issue POST requests to web servers on the internal network which can be escalated to higher-impact.
|
{'CVE-2021-4075'}
|
2021-12-07T21:24:53Z
|
2021-12-10T20:22:15Z
|
HIGH
| null |
{'CWE-918'}
|
{'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e', 'https://huntr.dev/bounties/4386fd8b-8c80-42bb-87b8-b506c46597de', 'https://github.com/snipe/snipe-it', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4075'}
| null |
Packagist
|
GHSA-gjq4-69wj-p6pr
|
Path traversal in pimcore
|
The application doesn't perform a check/filter against the value of "importFile" parameter at endpoint "/admin/translation/import". After the API is executed, PHP unlink function will proceed to delete the file.
|
{'CVE-2022-0665'}
|
2022-03-02T21:16:04Z
|
2022-02-23T00:00:59Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0665', 'https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e', 'https://huntr.dev/bounties/423df64d-c591-4ad9-bf1c-411bcbc06ba3', 'https://github.com/pimcore/pimcore'}
| null |
Packagist
|
GHSA-r7c9-c69m-rph8
|
Code Injection in PHPUnit
|
Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a `<?php ` substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
|
{'CVE-2017-9841'}
|
2022-04-19T20:16:49Z
|
2022-03-26T00:19:30Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/sebastianbergmann/phpunit/pull/1956', 'https://github.com/sebastianbergmann/phpunit/commit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.securitytracker.com/id/1039812', 'https://security.gentoo.org/glsa/201711-15', 'https://github.com/sebastianbergmann/phpunit/pull/1955', 'http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/', 'https://github.com/sebastianbergmann/phpunit', 'https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5', 'http://www.securityfocus.com/bid/101798', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9841'}
| null |
Packagist
|
GHSA-qgp4-5qx6-548g
|
Cross-site scripting (XSS) from unsanitized uploaded SVG files in Kirby
|
### Impact
An editor with write access to the Kirby Panel can upload an SVG or XML file that contains harmful content like `<script>` tags. The direct link to that file can be sent to other users or visitors of the site. If the victim opens that link in a browser where they are logged in to Kirby, the script will run and can for example trigger requests to Kirby's API with the permissions of the victim.
This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible.
Visitors without Panel access can only use this attack vector if your site allows SVG or XML file uploads in frontend forms and you don't already validate or sanitize uploaded SVG or XML files.
The attack requires user interaction by another user or visitor and *cannot* be automated.
### Patches
#### Uploads in the Panel
The problem has been patched in [Kirby 3.5.4](https://github.com/getkirby/kirby/releases/tag/3.5.4) by validating uploaded SVG and XML files and rejecting potentially harmful files. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability.
#### Frontend upload forms
Frontend upload forms need to be patched separately depending on how they store the uploaded file(s). If you use `File::create()`, you are protected by updating to Kirby 3.5.4+.
#### Validate existing files
Already uploaded files are *not* automatically validated again. If you are not sure if you have been impacted by this vulnerability in the past, we recommend to run all site files through the validator classes after updating to Kirby 3.5.4. You can use the following test script by pasting it into a template or uploading it to your web root:
```php
<?php
@include_once __DIR__ . '/kirby/bootstrap.php';
if (version_compare(kirby()->version(), '3.5.4', '<') === true) {
die('This script requires Kirby 3.5.4+.');
}
$objects = [
// the site itself
site(),
// all pages and drafts
...site()->index(true)->values(),
// all users
...kirby()->users()->values()
];
$errors = false;
foreach ($objects as $object) {
foreach ($object->files() as $file) {
try {
// validate the contents lazily
// (if a validator exists)
$file->validateContents(true);
} catch (\Kirby\Exception\InvalidArgumentException $e) {
echo $file->id() . ': ' . $e->getMessage() . "<br>\n";
$errors = true;
}
}
}
if ($errors === false) {
echo 'No validation errors found.';
}
```
You only need to run this validator script once as future uploads will automatically be validated. If the script prints "No validation errors found", you have not been impacted by the vulnerability so far.
Errors that it lists may or may not be critical as our validator classes also catch files with an invalid data structure or less harmful attacks like the ["billion laughs" denial-of-service attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) or the usage of external sources. We recommend to review and fix each listed error manually until the script no longer finds any validation errors.
**Please delete the script again after you have used it.**
### Workarounds
If you cannot update to Kirby 3.5.4, you can disable the upload of SVG and XML files in your [file blueprints](https://getkirby.com/docs/reference/panel/blueprints/file#accept) and validate or replace your already uploaded files once.
### Credits
Thanks to @sreenathr10 for reporting the problem.
|
{'CVE-2021-29460'}
|
2021-04-27T20:11:58Z
|
2021-04-30T17:30:06Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29460', 'http://packetstormsecurity.com/files/162359/Kirby-CMS-3.5.3.1-Cross-Site-Scripting.html', 'https://github.com/getkirby/kirby/releases/tag/3.5.4', 'https://github.com/getkirby/kirby/security/advisories/GHSA-qgp4-5qx6-548g'}
| null |
Packagist
|
GHSA-h9ph-jcgh-gf69
|
Cross-site Scripting in Limesurvey
|
The "File upload question" functionality in LimeSurvey 3.x-LTS through 3.27.18 allows XSS in assets/scripts/modaldialog.js and assets/scripts/uploader.js.
|
{'CVE-2021-42112'}
|
2021-10-19T14:51:30Z
|
2021-10-12T16:40:28Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_limesurvey_-_cve-2021-42112.pdf', 'https://bugs.limesurvey.org/view.php?id=17562', 'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50cfd191bbffd0adb660638a5e438070d', 'https://github.com/LimeSurvey/LimeSurvey', 'https://github.com/LimeSurvey/LimeSurvey/pull/2044', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42112'}
| null |
Packagist
|
GHSA-4mvc-qc5w-v5qr
|
Information disclosure in the Contao back end
|
### Impact
Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them.
### Patches
Update to Contao 4.4.46 or 4.8.6.
### Workarounds
None.
### References
https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
|
{'CVE-2019-19712'}
|
2021-08-19T16:09:47Z
|
2019-12-17T22:53:34Z
|
MODERATE
| null |
{'CWE-276'}
|
{'https://github.com/contao/contao/security/advisories/GHSA-4mvc-qc5w-v5qr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19712', 'https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html', 'https://contao.org/en/news.html', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19712.yaml'}
| null |
Packagist
|
GHSA-frxp-xxx8-hrg6
|
Missing Authorization in DayByDay CRM
|
In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information.
|
{'CVE-2022-22108'}
|
2022-01-07T20:43:46Z
|
2022-01-08T00:31:52Z
|
MODERATE
| null |
{'CWE-862'}
|
{'https://github.com/Bottelet/DaybydayCRM/', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22108', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22108', 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'}
| null |
Packagist
|
GHSA-f7q6-xxph-mfm8
|
Cross-site Scripting in Pimcore
|
Pimcore prior to version 10.2.10 contains a cross-site scripting vulnerability.
|
{'CVE-2022-0251'}
|
2022-02-03T17:53:53Z
|
2022-01-27T00:01:26Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/3ae96b9d41c117aafa45873ad10077d4b873a3cb', 'https://huntr.dev/bounties/eb4b08f9-cf8b-4335-b3b8-ed44e5fa80a5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0251'}
| null |
Packagist
|
GHSA-m3xv-x3ph-mq22
|
Server-side Template Injection in nystudio107/craft-seomatic
|
A Server-side Template Injection (SSTI) vulnerability exists in Nystudio107 Seomatic prior to 3.4.12 in src/helpers/UrlHelper.php via the host header.
|
{'CVE-2021-44618'}
|
2022-03-24T13:44:50Z
|
2022-03-12T00:00:34Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://github.com/nystudio107/craft-seomatic/commit/0c5c0c0e0cb61000d12ec55ebf174745a5bf6469', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44618', 'https://github.com/nystudio107/craft-seomatic/releases/tag/3.4.12', 'https://github.com/nystudio107/craft-seomatic'}
| null |
Packagist
|
GHSA-954j-f27r-cj52
|
Cleartext storage of session identifier
|
User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system.
### Solution
Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.
### Credits
Thanks to TYPO3 security team member Helmut Hummel who reported this issue and to TYPO3 core & security team members Benni Mack & Oliver Hader as well as TYPO3 contributor Markus Klein who fixed the issue.
|
{'CVE-2020-26228'}
|
2021-01-07T22:40:37Z
|
2020-11-23T21:18:36Z
|
HIGH
| null |
{'CWE-312'}
|
{'https://typo3.org/security/advisory/typo3-core-sa-2020-011', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26228', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-954j-f27r-cj52'}
| null |
Packagist
|
GHSA-2xwq-h7r9-6w27
|
Cross-site Scripting in kimai2
|
Cross site request forgery vulnerability is present in delete functionality of doctor feature. This vulnerability is capable of deleting system logs
|
{'CVE-2021-3957'}
|
2021-11-22T18:46:48Z
|
2021-11-23T17:59:40Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3957', 'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3'}
| null |
Packagist
|
GHSA-cvh5-p6r6-g2qc
|
Exposed phpinfo() leadked via documentation files
|
### Impact
The `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc).
### Patches
Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5.
Older versions such as v5, v4 are not longer supported and will **NOT** be patched.
### Workarounds
Protect the `/vendor` directory from public access.
### References
The first issue revealing this vulnerability is located here: https://github.com/flextype/flextype/issues/567
V6 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/815
V7 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/814
V8 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/813
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/PHPSocialNetwork/phpfastcache/issues)
* Email us at [security@geolim4.com](mailto:security@geolim4.com)
|
{'CVE-2021-37704'}
|
2021-08-26T20:11:49Z
|
2021-08-30T16:13:40Z
|
MODERATE
| null |
{'CWE-668', 'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37704', 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc', 'https://github.com/PHPSocialNetwork/phpfastcache/pull/814', 'https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51', 'https://packagist.org/packages/phpfastcache/phpfastcache', 'https://github.com/PHPSocialNetwork/phpfastcache/pull/815', 'https://github.com/flextype/flextype/issues/567', 'https://github.com/PHPSocialNetwork/phpfastcache/blob/master/CHANGELOG.md#807', 'https://github.com/PHPSocialNetwork/phpfastcache/pull/813'}
| null |
Packagist
|
GHSA-2q95-593f-g7h7
|
OS Command Injection in Centreon
|
/graphStatus/displayServiceStatus.php in Centreon 19.10.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the RRDdatabase_path parameter.
|
{'CVE-2020-22345'}
|
2021-08-26T14:59:25Z
|
2021-09-02T17:16:06Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-22345', 'https://github.com/centreon/centreon/pull/8467#event-3163627607', 'https://github.com/centreon/centreon', 'https://engindemirbilek.github.io/centreon-19.10-rce'}
| null |
Packagist
|
GHSA-54qq-9chj-rxhv
|
Cross-site Scripting in LiveHelperChat
|
LiveHelperChat prior to version 3.93 contains a cross-site scripting vulnerability.
|
{'CVE-2022-0395'}
|
2022-02-04T16:53:54Z
|
2022-01-29T00:00:33Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb', 'https://huntr.dev/bounties/36abbd6e-239e-4739-8c77-ba212b946a4a', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0395'}
| null |
Packagist
|
GHSA-jjp3-m93h-5jm4
|
Cross-site Scripting in microweber
|
Microweber drag and drop website builder and CMS with e-commerce. Cross-site Scripting (XSS) discovered in microweber prior to 1.2.12. There is currently no known workaround, users are recommended to update to version 1.2.12.
|
{'CVE-2022-0928'}
|
2022-03-24T23:19:35Z
|
2022-03-12T00:00:34Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0928', 'https://huntr.dev/bounties/085aafdd-ba50-44c7-9650-fa573da29bcd'}
| null |
Packagist
|
GHSA-9wrv-g75h-8ccc
|
Improper Access Control in Shopware
|
Shopware 6 is an open commerce platform based on Symfony Framework and Vue and supported by a worldwide community and more than 1.500 community extensions. Permissions set to sales channel context by admin-api are still useable within normal user session. We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
{'CVE-2022-24872'}
|
2022-05-04T03:52:17Z
|
2022-04-22T21:04:27Z
|
HIGH
| null |
{'CWE-732'}
|
{'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24872', 'https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022', 'https://github.com/shopware/platform'}
| null |
Packagist
|
GHSA-c6fg-99pr-25m9
|
Uncapped length of skin data fields submitted by players
|
### Impact
Some skin data fields (e.g. skinID, geometryName) are not capped in length. These fields are typically saved in the NBT data of a player when the player quits the server, or during an autosave.
This is problematic due to the 32767 byte limit on `TAG_String`s. If any of these fields exceeds 32767 bytes, an exception will be thrown during data saving, which will cause the server to crash.
Other fields (such as skinGeometryData) are also uncapped, but those have a much larger 2 GB length limit, so this is not a concern for those, particularly considering the decompressed packet size limit of 2 MB.
### Patches
PM3: 958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb
PM4: 6492cac5c10f9fa8443ceddd2191a7b65b73f601
### Workarounds
A plugin may check player skins during `PlayerLoginEvent` and `PlayerSkinChangeEvent` and ensure that the offending fields are not larger than 32767 bytes.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null |
2022-01-06T19:47:00Z
|
2022-01-06T23:53:58Z
|
HIGH
| null | null |
{'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-c6fg-99pr-25m9', 'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb'}
| null |
Packagist
|
GHSA-4r8q-gv9j-3xx6
|
Open Redirect
|
### Impact
In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL.
This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `true` (default: `false`)
### Patches
Version 5.7.2 contains the relevant patches to fix this bug. Stripping the URL from special characters to prevent specially crafted URL's from being redirected to.
### Workarounds
There is a simple way to work around the security issue
- Set the `force_https` to every tenant to `false`
### References
https://nvd.nist.gov/vuln/detail/CVE-2018-11784
### For more information
If you have any questions or comments about this advisory:
* Contact us in Discord: https://tenancy.dev/chat
|
{'CVE-2021-32645'}
|
2022-03-18T17:55:07Z
|
2022-03-18T17:55:07Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://packagist.org/packages/hyn/multi-tenant', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645', 'https://github.com/tenancy/multi-tenant/security/advisories/GHSA-4r8q-gv9j-3xx6', 'https://webmasters.googleblog.com/2009/01/open-redirect-urls-is-your-site-being.html', 'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'}
| null |
Packagist
|
GHSA-j29f-m23h-3p8p
|
Cross-site Scripting in Pimcore
|
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
|
{'CVE-2022-0911'}
|
2022-03-29T15:16:19Z
|
2022-03-17T00:00:48Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/11447', 'https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0911', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
| null |
Packagist
|
GHSA-pwwm-pwx2-2hw7
|
Generation of Error Message Containing Sensitive Information in Snipe-IT
|
Snipe-IT prior to version 5.3.11 is vulnerable to Generation of Error Message Containing Sensitive Information.
|
{'CVE-2022-0622'}
|
2022-02-22T18:12:11Z
|
2022-02-18T00:00:37Z
|
MODERATE
| null |
{'CWE-209'}
|
{'https://huntr.dev/bounties/4ed99dab-5319-4b6b-919a-84a9acd0061a', 'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0622', 'https://github.com/snipe/snipe-it'}
| null |
Packagist
|
GHSA-j4mv-2rv7-v2j9
|
Improper Privilege Management in Concrete CMS
|
Privilege escalation from Editor to Admin using Groups in Concrete CMS versions 8.5.6 and below. If a group is granted "view" permissions on the bulkupdate page, then users in that group can escalate to being an administrator with a specially crafted curl. Fixed by adding a check for group permissions before allowing a group to be moved.
|
{'CVE-2021-22966'}
|
2021-11-22T18:31:34Z
|
2021-11-23T18:18:07Z
|
MODERATE
| null |
{'CWE-269'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22966', 'https://hackerone.com/reports/1362747', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}
| null |
Packagist
|
GHSA-q67f-3jq4-mww2
|
Cross-site Scripting in Pimcore
|
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
|
{'CVE-2022-0831'}
|
2022-03-11T20:36:49Z
|
2022-03-05T00:00:45Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/4152e3a7-27a1-49eb-a6eb-a57506af104f', 'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0831', 'https://github.com/pimcore/pimcore'}
| null |
Packagist
|
GHSA-g996-q5r8-w7g2
|
Escape validation messages in the PHP templating engine
|
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle.
|
{'CVE-2019-10909'}
|
2021-08-18T22:15:15Z
|
2019-11-12T23:00:53Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml', 'https://symfony.com/cve-2019-10909', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2', 'https://www.drupal.org/sa-core-2019-005', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10909', 'https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine'}
| null |
Packagist
|
GHSA-frqg-7g38-6gcf
|
Improper escaping of command arguments on Windows leading to command injection
|
### Impact
Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected.
### Patches
1.10.23 and 2.1.9 fix the issue
### Workarounds
None
|
{'CVE-2021-41116'}
|
2021-10-11T18:39:06Z
|
2021-10-05T20:23:18Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf', 'https://www.tenable.com/security/tns-2022-09', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41116', 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa', 'https://github.com/composer/composer'}
| null |
Packagist
|
GHSA-ghhm-xrwp-75m9
|
bookstack is vulnerable to Improper Access Control
|
bookstack is vulnerable to Improper Access Control
|
{'CVE-2021-4194'}
|
2022-01-07T22:38:34Z
|
2022-01-08T00:34:12Z
|
MODERATE
| null |
{'CWE-668', 'CWE-284'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4194', 'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad', 'https://github.com/bookstackapp/bookstack', 'https://huntr.dev/bounties/0bc8b3f7-9057-4eb7-a989-24cd5689f114'}
| null |
Packagist
|
GHSA-vf7h-6246-hm43
|
The disqualify lead action may be executed without CSRF token check
|
### Summary
The attacker is able to disqualify any Lead with a Cross-Site Request Forgery (CSRF) attack.
### Workarounds
There are no workarounds that address this vulnerability.
|
{'CVE-2021-39198'}
|
2021-11-18T21:49:46Z
|
2021-11-19T20:18:54Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/oroinc/crm', 'https://github.com/oroinc/crm/security/advisories/GHSA-vf7h-6246-hm43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39198'}
| null |
Packagist
|
GHSA-w8qp-hmh5-4v9v
|
Object state limitation has no effect
|
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
| null |
2022-04-29T16:22:58Z
|
2022-04-29T16:22:58Z
|
CRITICAL
| null |
{'CWE-281'}
|
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge', 'https://github.com/ezsystems/ezplatform-kernel', 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-w8qp-hmh5-4v9v'}
| null |
Packagist
|
GHSA-7rg4-266c-jqw6
|
Predictable CSRF tokens in centreon/centreon
|
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user.
|
{'CVE-2021-28055'}
|
2021-05-07T15:18:01Z
|
2021-06-08T20:12:56Z
|
MODERATE
| null |
{'CWE-330', 'CWE-352'}
|
{'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f', 'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://github.com/centreon/centreon/releases/tag/19.10.23', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28055', 'https://github.com/centreon/centreon/pull/9612', 'https://github.com/centreon/centreon/releases/tag/2.8.37'}
| null |
Packagist
|
GHSA-w2f4-hxpm-mq98
|
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type
|
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type.
|
{'CVE-2021-3915'}
|
2021-11-17T21:12:00Z
|
2021-11-15T23:17:37Z
|
HIGH
| null |
{'CWE-434'}
|
{'https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079', 'https://github.com/BookStackApp/BookStack', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3915', 'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'}
| null |
Packagist
|
GHSA-748f-wv76-x9hg
|
Arbitrary file upload in Fork CMS
|
Arbitrary file upload vulnerability in Fork CMS 5.9.2 allows attackers to create or replace arbitrary files in the /themes directory via a crafted zip file uploaded to the Themes panel.
|
{'CVE-2021-28931'}
|
2021-07-13T15:53:15Z
|
2021-09-08T17:26:26Z
|
HIGH
| null |
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28931', 'https://github.com/bousalman/ForkCMS-arbitrary-upload/blob/main/README.md', 'https://github.com/forkcms/forkcms/releases/tag/5.9.2', 'https://github.com/forkcms/forkcms/pull/3351'}
| null |
Packagist
|
GHSA-h676-pjr4-hgqx
|
Path Traversal in S-Cart
|
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup.
|
{'CVE-2021-44111'}
|
2022-02-23T15:52:20Z
|
2022-02-12T00:00:42Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da', 'https://github.com/s-cart/s-cart', 'https://github.com/s-cart/s-cart/issues/102', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44111'}
| null |
Packagist
|
GHSA-jgjc-332c-8cmc
|
SQL injection in phpMyAdmin
|
An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.
|
{'CVE-2019-18622'}
|
2021-08-19T16:24:16Z
|
2020-01-16T21:56:15Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html', 'https://security.gentoo.org/glsa/202003-39', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18622', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/', 'https://www.phpmyadmin.net/security/PMASA-2019-5/', 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html', 'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7'}
| null |
Packagist
|
GHSA-qq74-vgcf-54c3
|
Cross-site Scripting in ShowDoc
|
ShowDoc is vulnerable to stored cross-site scripting via viva cshtm file upload in in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
|
{'CVE-2022-0946'}
|
2022-03-23T15:37:53Z
|
2022-03-15T00:01:00Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0946', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a', 'https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1'}
| null |
Packagist
|
GHSA-9328-7pcw-vw69
|
Cross-Site Request Forgery in Moodle
|
Moodle before version 3.7.2 is vulnerable to information exposure of service tokens for users enrolled in the same course.
|
{'CVE-2020-1692'}
|
2022-01-04T16:32:38Z
|
2022-01-06T18:34:53Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1692', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1692', 'https://github.com/moodle/moodle'}
| null |
Packagist
|
GHSA-2xw8-j43j-5vxp
|
elgg is vulnerable to Cross-site Scripting
|
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-4072'}
|
2022-01-05T17:56:06Z
|
2022-01-06T21:35:42Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4072', 'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0', 'https://github.com/elgg/elgg', 'https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955'}
| null |
Packagist
|
GHSA-jpwx-ffjq-wr4w
|
Content object state fetch functions open to SQL injection
|
### Impact
This Security Update is about a vulnerability in eZ Publish Legacy. The content object state code could be vulnerable to SQL injection. There is no known exploit, but one might be possible. If you use Legacy in any way, we strongly recommend that you install this update as soon as possible.
### Patches
The fix is distributed via Composer, see "Patched versions".
| null |
2021-09-03T20:10:38Z
|
2021-09-07T22:54:23Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42', 'https://github.com/ezsystems/ezpublish-legacy/security/advisories/GHSA-jpwx-ffjq-wr4w', 'https://github.com/ezsystems/ezpublish-legacy', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-005-content-object-state-fetch-functions-open-to-sql-injection'}
| null |
Packagist
|
GHSA-6jmh-9gqm-5xrx
|
Cross-Site Request Forgery (CSRF) in livehelperchat
|
A CSRF issue is found in the audit configuration under settings. It was found that no CSRF token validation is getting done on the server-side. If we remove the CSRF token and keep the CSRF token field empty, the action is getting performed.
|
{'CVE-2022-0226'}
|
2022-01-24T21:11:02Z
|
2022-01-26T20:21:03Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0226', 'https://huntr.dev/bounties/635d0abf-7680-47f6-a277-d9a91471c73f', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370'}
| null |
Packagist
|
GHSA-7g7r-gr46-q4p5
|
Cross-Site Request Forgery in yetiforce
|
Versions of yetiforce 6.3.0 and prior are subject to privilege escalation via a cross site request forgery bug. This allows an attacker to create a new admin account even with SameSite: Strict enabled. This vulnerability can be exploited by any user on the system including guest users.
|
{'CVE-2022-0269'}
|
2022-01-31T21:47:28Z
|
2022-01-27T16:21:33Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff', 'https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0', ' https://github.com/yetiforcecompany/yetiforcecrm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0269'}
| null |
Packagist
|
GHSA-4r3m-j6x5-48m3
|
Cross Site Scripting(XSS) Vulnerability in Latest Release 4.3.6 Site basic settings
|
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components is toolbar.php. The issue is fixed in version 4.3.7.
|
{'CVE-2020-15155'}
|
2021-01-07T23:39:22Z
|
2020-08-28T21:20:42Z
|
LOW
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15155', 'https://github.com/baserproject/basercms/security/advisories/GHSA-4r3m-j6x5-48m3', 'https://basercms.net/security/20200827', 'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'}
| null |
Packagist
|
GHSA-qr95-4mq5-r3fh
|
Phar unserialization vulnerability in phpMussel
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
Anyone using >= v1.0.0 < v1.6.0.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes. Upgrading to at least >= v1.6.0 will resolve the problem (though upgrading to v2, which is the current major version, would be preferable, seeing as v1 is kind of old now and will most likely be marked as EoL when v3 is released in the near future).
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Yes. In the package's configuration, disable archive checking by setting `check_archives` to `false` (thus avoiding execution of the affected parts of the codebase entirely).
### References
_Are there any links users can visit to find out more?_
Yes. The vulnerability is documented at [SECURITY.md](https://github.com/phpMussel/phpMussel/security/policy) and also at [#167](https://github.com/phpMussel/phpMussel/issues/167).
### For more information
If you have any questions or comments about this advisory:
* Comment at the issue linked to this advisory, or..
* Contact [the package author](https://github.com/Maikuolan) ([082e6bc1046fab95](https://peegeepee.com/046FAB95)).
|
{'CVE-2020-4043'}
|
2021-01-08T20:12:50Z
|
2020-06-10T19:40:30Z
|
HIGH
| null |
{'CWE-502'}
|
{'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4', 'https://github.com/phpMussel/phpMussel/pull/173', 'https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities', 'https://github.com/phpMussel/phpMussel/issues/167', 'https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4043'}
| null |
Packagist
|
GHSA-qf2g-q4mc-w7rr
|
Cross-site Scripting in Fork CMS
|
Fork CMS prior to 5.11.1 is vulnerable to stored cross-site scripting. When uploading a new module, the description of the module can contain JavaScript code. The JavaScript code may be executed after uploading the new module and looking at the `Details` page.
|
{'CVE-2022-0145'}
|
2022-03-30T21:04:25Z
|
2022-03-25T00:00:34Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0145', 'https://github.com/forkcms/forkcms', 'https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba', 'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'}
| null |
Packagist
|
GHSA-43jj-2rwc-2m3f
|
Broken access control on files
|
In SilverStripe assets 4.0, there is broken access control on files.
|
{'CVE-2019-14273'}
|
2021-09-22T21:03:46Z
|
2020-07-15T17:38:04Z
|
MODERATE
| null |
{'CWE-552'}
|
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2019-14273.yaml', 'https://www.silverstripe.org/download/security-releases/CVE-2019-14273', 'https://github.com/FriendsOfPHP/security-advisories', 'https://www.silverstripe.org/blog/tag/release', 'https://www.silverstripe.org/download/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14273', 'https://forum.silverstripe.org/c/releases'}
| null |
Packagist
|
GHSA-jf9v-q8vh-3fmc
|
Cross-site scripting in ICEcoder
|
In ICEcoder 8.0 allows, a reflected XSS vulnerability was identified in the multipe-results.php page due to insufficient sanitization of the _GET['replace'] variable. As a result, arbitrary Javascript code can get executed.
|
{'CVE-2021-32106'}
|
2021-09-09T14:17:19Z
|
2021-09-09T17:11:11Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://groups.google.com/g/icecoder/c/xcAc8_1UPxQ', 'https://github.com/icecoder/ICEcoder', 'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32106', 'https://prophaze.com/cve/icecoder-8-0-multipe-results-php-replace-cross-site-scripting/'}
| null |
Packagist
|
GHSA-p8q8-jfcv-g2h2
|
Directory Traversal in Archive_Tar
|
In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193.
|
{'CVE-2021-32610'}
|
2021-09-20T20:26:41Z
|
2021-08-09T20:40:06Z
|
HIGH
| null |
{'CWE-59'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5LTY6COQYNMMHQJ3QIOJHEWCKD4XDFH/', 'https://www.drupal.org/sa-core-2021-004', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAODVMHGL5MHQWQAQTXQ7G7OE3VQZ7LS/', 'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32610', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00023.html', 'https://github.com/pear/Archive_Tar/releases/tag/1.4.14', 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://github.com/pear/Archive_Tar'}
| null |
Packagist
|
GHSA-9w7h-3wwh-6m5q
|
Cross-site Scripting in Microweber
|
Microweber prior to 1.2.15 is vulnerable to reflected cross-site scripting on demo.microweber.org/demo/module/. This allows the execution of arbitrary JavaScript as the attacked user.
|
{'CVE-2022-1439'}
|
2022-04-26T13:14:56Z
|
2022-04-23T00:03:02Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8', 'https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1439'}
| null |
Packagist
|
GHSA-gcvv-gq92-x94r
|
Authenticated server-side request forgery in file upload via URL.
|
### Impact
Authenticated server-side request forgery in file upload via URL.
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
{'CVE-2021-37711'}
|
2021-08-23T17:22:58Z
|
2021-08-23T19:42:49Z
|
HIGH
| null |
{'CWE-918'}
|
{'https://github.com/shopware/platform', 'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37711', 'https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r'}
| null |
Packagist
|
GHSA-c383-q5vf-hx55
|
Integer Overflow or Wraparound in Microweber
|
Microweber prior to 1.2.12 is vulnerable to Integer Overflow or Wraparound.
|
{'CVE-2022-0913'}
|
2022-03-23T15:33:00Z
|
2022-03-12T00:00:36Z
|
HIGH
| null |
{'CWE-190'}
|
{'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f', 'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0913'}
| null |
Packagist
|
GHSA-6gv9-7q4g-pmvm
|
Persistent XSS in customer module in Shopware
|
### Impact
Persistent XSS in customer module
### Patches
We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020
| null |
2020-11-13T01:17:58Z
|
2020-11-13T15:47:36Z
|
LOW
| null |
{'CWE-79'}
|
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020', 'https://github.com/shopware/shopware/security/advisories/GHSA-6gv9-7q4g-pmvm'}
| null |
Packagist
|
GHSA-3q55-66g3-p8xq
|
Cross-site Scripting in microweber
|
File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.
|
{'CVE-2022-0926'}
|
2022-03-22T19:36:42Z
|
2022-03-13T00:00:54Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/dc5d1555-0108-4627-b542-93352f35fa17', 'https://github.com/microweber/microweber/commit/89200cfcc2cfefe5554721e7fa3cf52f6a2a9120', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0926'}
| null |
Packagist
|
GHSA-fwh7-v4gf-xv7w
|
yetiforcecrm is vulnerable to Cross-site Scripting
|
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
|
{'CVE-2021-4116'}
|
2022-01-03T15:55:40Z
|
2021-12-16T21:00:45Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/9cdb012ca64ff1f719f8120d5fd162cd5ef1013f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4116', 'https://huntr.dev/bounties/7561bae7-9053-4dc8-aa59-b71acfb1712c', 'https://github.com/yetiforcecompany/yetiforcecrm'}
| null |
Packagist
|
GHSA-vqqx-jw6p-q3rf
|
Cross-Site Scripting in Fluid view helpers
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7)
> * CWE-79
### Problem
It has been discovered that system extension Fluid (`typo3/cms-fluid`) of the TYPO3 core is vulnerable to cross-site scripting passing user-controlled data as argument to Fluid view helpers.
```
<f:form ... fieldNamePrefix="{payload}" />
<f:be.labels.csh ... label="{payload}" />
<f:be.menus.actionMenu ... label="{payload}" />
```
### Solution
Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported this issue and to TYPO3 security team members Helmut Hummel & Oliver Hader who fixed the issue.
### References
* [TYPO3-CORE-SA-2020-010](https://typo3.org/security/advisory/typo3-core-sa-2020-010)
|
{'CVE-2020-26227'}
|
2021-01-07T22:34:28Z
|
2020-12-21T16:28:11Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26227', 'https://packagist.org/packages/typo3/cms-core', 'https://typo3.org/security/advisory/typo3-core-sa-2020-010', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-vqqx-jw6p-q3rf'}
| null |
Packagist
|
GHSA-6xj3-fhrf-rjgc
|
Cross-site Scripting in microweber
|
XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks.
|
{'CVE-2022-1504'}
|
2022-04-28T21:11:45Z
|
2022-04-28T00:00:34Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1504', 'https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e', 'https://huntr.dev/bounties/b8e5c324-3dfe-46b4-8095-1697c6b0a6d6'}
| null |
Packagist
|
GHSA-9f46-5r25-5wfm
|
Time-of-check Time-of-use (TOCTOU) Race Condition in league/flysystem
|
### Impact
The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely.
The conditions:
- A user is allowed to supply the path or filename of an uploaded file.
- The supplied path or filename is not checked against unicode chars.
- The supplied pathname checked against an extension deny-list, not an allow-list.
- The supplied path or filename contains a unicode whitespace char in the extension.
- The uploaded file is stored in a directory that allows PHP code to be executed.
Given these conditions are met a user can upload and execute arbitrary code on the system under attack.
### Patches
The unicode whitespace removal has been replaced with a rejection (exception).
The library has been patched in:
- 1.x: https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32
- 2.x: https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74
### Workarounds
For 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1.
|
{'CVE-2021-32708'}
|
2021-09-21T14:55:38Z
|
2021-06-29T03:13:28Z
|
CRITICAL
| null |
{'CWE-367'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNZSWK4GOMJOOHKLZEOE5AQSLC4DNCRZ/', 'https://github.com/thephpleague/flysystem/security/advisories/GHSA-9f46-5r25-5wfm', 'https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32', 'https://github.com/thephpleague/flysystem', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWPTENBYKI2IG47GI4DHAACLNRLTWUR5/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32708', 'https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74', 'https://packagist.org/packages/league/flysystem'}
| null |
Packagist
|
GHSA-wwvv-x5mq-h3jj
|
Use of Cryptographically Weak Pseudo-Random Number Generator in yiisoft/yii2-dev
|
yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator
|
{'CVE-2021-3692'}
|
2021-08-30T20:28:42Z
|
2021-09-01T18:35:26Z
|
MODERATE
| null |
{'CWE-338', 'CWE-330'}
|
{'https://huntr.dev/bounties/55517f19-5c28-4db2-8b00-f78f841e8aba', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3692', 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46', 'https://github.com/yiisoft/yii2'}
| null |
Packagist
|
GHSA-fvrf-9428-527m
|
Backport for CVE-2021-21024 Blind SQLi from Magento 2
|
### Impact
This vulnerability allows an administrator unauthorized access to restricted resources.
We fixed a vulnerability in the MySQL adapter to prevent SQL injection attacks. This is a backport of CVE-2021-21024 https://helpx.adobe.com/security/products/magento/apsb21-08.html.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
> v20.0.9 v19.4.13
|
{'CVE-2021-21427'}
|
2021-04-30T20:20:59Z
|
2021-04-22T16:11:01Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21427', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m'}
| null |
Packagist
|
GHSA-3pg8-c473-w6rr
|
Stored Cross-site Scripting in showdoc
|
ShowDoc is a tool for an IT team to share documents online. showdoc contains a stored cross-site scripting vulnerability in the File Library page when uploading a file in .ofd format in versions prior to 2.10.4. At this time, there is no known workaround. Users should update to version 2.10.4.
|
{'CVE-2022-0967'}
|
2022-03-25T00:07:36Z
|
2022-03-16T00:00:46Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/9dea3c98-7609-480d-902d-149067bd1e2a', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0967', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
| null |
Packagist
|
GHSA-v2f3-f8x4-m3w8
|
Cross Site Scripting in LavaLite CMS
|
Cross Site Scripting (XSS) vulnerabiity exists in LavaLite CMS 5.8.0 via the Menu Blocks feature, which can be bypassed by using HTML event handlers, such as "ontoggle,".
|
{'CVE-2020-23234'}
|
2021-08-02T21:50:55Z
|
2021-08-09T20:38:54Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23234', 'https://github.com/LavaLite/cms/issues/320'}
| null |
Packagist
|
GHSA-r6g8-jmj9-g945
|
Improper Restriction of Rendered UI Layers or Frames in yourls
|
yourls is vulnerable to Improper Restriction of Rendered UI Layers or Frames
|
{'CVE-2021-3734'}
|
2021-08-27T12:54:01Z
|
2021-08-30T16:22:16Z
|
MODERATE
| null |
{'CWE-352', 'CWE-1021'}
|
{'https://github.com/yourls/yourls', 'https://github.com/yourls/yourls/commit/0a70acdcfb5fcbc63dbc5750018d608288eba3fe', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3734', 'https://huntr.dev/bounties/dd2e2dbe-efe5-49ec-be11-7a7e7c41debd'}
| null |
Packagist
|
GHSA-8jmh-c6vr-pmvm
|
SQL Injection in pimcore
|
"The package pimcore/pimcore from 6.7.2 and before 6.8.3 are vulnerable to SQL Injection in data classification functionality in ClassificationstoreController. This can be exploited by sending a specifically-crafted input in the relationIds parameter as demonstrated by the following request: http://vulnerable.pimcore.example/admin/classificationstore/relations?relationIds=[{"keyId"%3a"''","groupId"%3a"'asd'))+or+1%3d1+union+(select+1,2,3,4,5,6,name,8,password,'',11,12,'',14+from+users)+--+"}]"
|
{'CVE-2020-7759'}
|
2021-04-20T17:18:14Z
|
2021-05-06T18:53:55Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1017405', 'https://github.com/pimcore/pimcore/pull/7315', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7759'}
| null |
Packagist
|
GHSA-p696-gf58-9w97
|
Missing Authentication for Critical Function
|
Shopware is an open source eCommerce platform. Creation of order credits was not validated by ACL in admin orders. Users are recommend to update to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
{'CVE-2021-32709'}
|
2021-06-25T15:36:05Z
|
2021-06-29T17:23:10Z
|
MODERATE
| null |
{'CWE-306'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32', 'https://www.shopware.com/en/changelog/#6-4-1-1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32709'}
| null |
Packagist
|
GHSA-qvhr-55hg-3qwv
|
Non-persistent XSS in the Storefront in Shopware
|
### Impact
Non-persistent XSS in the Storefront
### Patches
We recommend to update to the current version 6.3.1.1. You can get the update to 6.3.1.1 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### References
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020
| null |
2021-10-04T21:20:31Z
|
2020-09-23T17:20:39Z
|
LOW
| null |
{'CWE-79'}
|
{'https://github.com/shopware/platform', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020', 'https://github.com/shopware/platform/security/advisories/GHSA-qvhr-55hg-3qwv'}
| null |
Packagist
|
GHSA-28fw-88hq-6jmm
|
Persistent XSS in shopping worlds
|
### Impact
Persistent XSS in shopping worlds
### Patches
We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020
| null |
2020-11-13T18:25:26Z
|
2020-11-13T18:26:03Z
|
LOW
| null |
{'CWE-79'}
|
{'https://github.com/shopware/shopware/security/advisories/GHSA-28fw-88hq-6jmm'}
| null |
Packagist
|
GHSA-3rpf-5rqv-689q
|
PHP Code Injection by malicious function name in smarty
|
Template authors could inject php code by choosing a malicous {function} name. Sites that cannot fully trust template authors should update as soon as possible. Please upgrade to 3.1.39 or higher.
|
{'CVE-2021-26120'}
|
2022-05-03T03:01:58Z
|
2021-02-26T19:53:24Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html', 'https://security.gentoo.org/glsa/202105-06', 'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html', 'https://github.com/smarty-php/smarty/security/advisories/GHSA-3rpf-5rqv-689q', 'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md#3139---2021-02-17', 'https://github.com/smarty-php/smarty/commit/165f1bd4d2eec328cfeaca517a725b46001de838', 'https://github.com/smarty-php/smarty', 'https://srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-escape-vulnerabilities.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26120'}
| null |
Packagist
|
GHSA-c676-mcw3-qg55
|
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
|
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
|
{'CVE-2021-3730'}
|
2021-08-27T12:48:30Z
|
2021-08-25T14:50:08Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://huntr.dev/bounties/ea181323-51f8-46a2-a60f-6a401907feb7', 'https://github.com/firefly-iii/firefly-iii/', 'https://github.com/firefly-iii/firefly-iii/commit/f80178b1b2b7864d17500a131d570c353c9a26f6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3730'}
| null |
Packagist
|
GHSA-6w4v-qr4m-97gg
|
Multi-Factor Authentication issue in Laravel Fortify
|
Laravel Fortify before 1.11.1 allows reuse within a short time window, thus calling into question the "OT" part of the "TOTP" concept.
|
{'CVE-2022-25838'}
|
2022-03-09T21:15:50Z
|
2022-02-25T00:01:01Z
|
HIGH
| null |
{'CWE-294'}
|
{'https://github.com/laravel/fortify/pull/358', 'https://github.com/laravel/fortify/issues/201', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25838', 'https://github.com/laravel/fortify/pull/357', 'https://github.com/laravel/fortify/issues/201#issuecomment-1009282153', 'https://github.com/laravel/fortify'}
| null |
Packagist
|
GHSA-m298-fh5c-jc66
|
Object injection in PHPMailer/PHPMailer
|
### Impact
This is a reintroduction of an earlier issue (CVE-2018-19296) by an unrelated bug fix in PHPMailer 6.1.8. An external file may be unexpectedly executable if it is used as a path to an attachment file via PHP's support for `.phar` files`. Exploitation requires that an attacker is able to provide an unfiltered path to a file to attach, or to trick calling code into generating one. See [this article](https://knasmueller.net/5-answers-about-php-phar-exploitation) for more info.
### Patches
This issue was patched in the PHPMailer 6.4.1 release. This release also implements stricter filtering for attachment paths; paths that look like *any* kind of URL are rejected.
### Workarounds
Validate paths to loaded files using the same pattern as used in [`isPermittedPath()`](https://github.com/PHPMailer/PHPMailer/blob/master/src/PHPMailer.php#L1815) before using them in *any* PHP file function, such as `file_exists`. This method can't be used directly because it is protected, but you can implement the same thing in calling code. Note that this should be applied to *all* user-supplied paths passed into such functions; it's not a problem specific to PHPMailer.
### Credit
This issue was found by Fariskhi Vidyan, reported and managed via Tidelift.
|
{'CVE-2020-36326'}
|
2021-05-10T19:27:44Z
|
2021-05-04T17:42:13Z
|
CRITICAL
| null |
{'CWE-502', 'CWE-641'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36326', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-m298-fh5c-jc66', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPU66INRFY5BQ3ESVPRUXJR4DXQAFJVT/', 'https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9'}
| null |
Packagist
|
GHSA-62m3-fc7f-jpp8
|
Class-Name Injection
|
Parsedown before 1.7.2, when safe mode is used and HTML markup is disabled, might allow attackers to execute arbitrary JavaScript code if a script (already running on the affected page) executes the contents of any element with a specific class. This occurs because spaces are permitted in code block infostrings, which interferes with the intended behavior of a single class name beginning with the language- substring.
|
{'CVE-2019-10905'}
|
2022-03-26T00:09:58Z
|
2022-03-26T00:09:58Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/erusev/parsedown', 'https://github.com/erusev/parsedown/issues/699', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/erusev/parsedown/CVE-2019-10905.yaml'}
| null |
Packagist
|
GHSA-ch3r-vp46-8g22
|
Code injection in topthink/think
|
A remote code execution (RCE) vulnerability in /library/think/App.php of Twothink v2.0 allows attackers to execute arbitrary PHP code.
|
{'CVE-2020-17952'}
|
2021-08-31T21:00:31Z
|
2021-08-09T20:39:52Z
|
CRITICAL
| null |
{'CWE-74'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-17952', 'https://github.com/twothink/twothink/issues/1', 'https://github.com/twothink/twothink'}
| null |
Packagist
|
GHSA-hhw9-35p2-q2c5
|
Steam Socialite Provider v1 does not correctly validate openid server
|
### Impact
The outdated version 1 of the Steam Socialite Provider doesn't check properly if the login comes from `steamcommunity.com`, allowing a malicious actor to substitute their own openID server.
### Patches
This vulnerability only affects the outdated v1.x versions of the package. These are no longer maintained, users should upgrade to v3 or v4, which use a hardcoded endpoint to verify the login.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [SocialiteProviders/Providers](https://github.com/SocialiteProviders/Providers)
* Email us at [socialite@atymic.dev](mailto:socialite@atymic.dev)
| null |
2021-01-29T20:39:56Z
|
2021-01-29T20:51:30Z
|
CRITICAL
| null |
{'CWE-346'}
|
{'https://github.com/SocialiteProviders/Steam/security/advisories/GHSA-hhw9-35p2-q2c5', 'https://packagist.org/packages/socialiteproviders/steam'}
| null |
Packagist
|
GHSA-4jp3-q2qm-9fmw
|
Improper Restriction of Rendered UI Layers or Frames in Sylius
|
### Impact
It is possible for a page controlled by an attacker to load the website within an iframe. This will enable a clickjacking attack, in which the attacker's page overlays the target application's interface with a different interface provided by the attacker
### Patches
The issue is fixed in versions: 1.9.10, 1.10.11, 1.11.2, and above.
### Workarounds
Every response from app should have an X-Frame-Options header set to: ``sameorigin``. To achieve that you just need to add a new **subscriber** in your app.
```php
<?php
// src/EventListener/XFrameOptionsSubscriber.php
namespace App\EventListener
final class XFrameOptionsSubscriber implements EventSubscriberInterface
{
public static function getSubscribedEvents(): array
{
return [
KernelEvents::RESPONSE => 'onKernelResponse',
];
}
public function onKernelResponse(ResponseEvent $event): void
{
if (!$this->isMainRequest($event)) {
return;
}
$response = $event->getResponse();
$response->headers->set('X-Frame-Options', 'sameorigin');
}
private function isMainRequest(ResponseEvent $event): bool
{
if (\method_exists($event, 'isMainRequest')) {
return $event->isMainRequest();
}
return $event->isMasterRequest();
}
}
```
And register it in the container:
```yaml
# config/services.yaml
services:
# ...
App\EventListener\XFrameOptionsSubscriber:
tags: ['kernel.event_subscriber']
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues)
* Email us at [security@sylius.com](mailto:security@sylius.com)
|
{'CVE-2022-24733'}
|
2022-03-28T22:31:17Z
|
2022-03-14T21:55:33Z
|
MODERATE
| null |
{'CWE-1021'}
|
{'https://github.com/Sylius/Sylius', 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24733', 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11', 'https://github.com/Sylius/Sylius/releases/tag/v1.9.10', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-4jp3-q2qm-9fmw'}
| null |
Packagist
|
GHSA-w68r-5p45-5rqp
|
Improper Input Validation in Laravel
|
An issue was discovered in Laravel before 6.18.35 and 7.x before 7.24.0. The $guarded property is mishandled in some situations involving requests with JSON column nesting expressions.
|
{'CVE-2020-24941'}
|
2021-05-04T22:46:50Z
|
2021-05-06T18:54:20Z
|
HIGH
| null |
{'CWE-863'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-24941', 'https://blog.laravel.com/security-release-laravel-61835-7240', 'https://github.com/laravel/framework/commit/897d107775737a958dbd0b2f3ea37877c7526371'}
| null |
Packagist
|
GHSA-r67m-m8c7-jp83
|
Forced reinstall
|
### Impact
Authenticated users, regardless of their privileges (_User_ or _Admin_), can trick Cachet and install the instance again, leading to arbitrary code execution on the server.
### Patches
This issue was addressed by improving the middleware `ReadyForUse`, which now performs a stricter validation of the instance name.
### Workarounds
Only allow trusted source IP addresses to access to the administration dashboard.
### References
- https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection
### For more information
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
- The maintainers, by opening an issue on this repository.
|
{'CVE-2021-39173'}
|
2021-10-06T20:38:01Z
|
2021-08-30T16:11:33Z
|
HIGH
| null |
{'CWE-704'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39173', 'https://github.com/fiveai/Cachet/releases/tag/v2.5.1', 'https://github.com/fiveai/Cachet/security/advisories/GHSA-r67m-m8c7-jp83', 'https://github.com/fiveai/Cachet'}
| null |
Packagist
|
GHSA-5vf7-q87h-pg6w
|
Cross-Site Scripting in BookStack
|
### Impact
A user with permission to create comments could POST HTML directly to the system to be saved in a comment, which would then be executed/displayed to others users viewing the comment. Through this vulnerability custom JavaScript code could be injected and therefore ran on other user machines.
This most impacts scenarios where not-trusted users are given permission to create comments.
### Patches
The issue was addressed in BookStack v0.29.2.
After upgrading, The command `php artisan bookstack:regenerate-comment-content` should be ran to remove any pre-existing dangerous content.
### Workarounds
Comments can be disabled in the system settings to prevent them being shown to users. Alternatively, comment creation permissions can be altered as required to only those who are trusted but this will not address existing exploitation of this vulnerability.
### References
* [BookStack Beta v0.29.2](https://github.com/BookStackApp/BookStack/releases/tag/v0.29.2)
* JVN#41035278
* [BookStack Blog Post](https://bookstackapp.com/blog/beta-release-v0-29-2/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the BookStack GitHub repository](BookStackApp/BookStack/issues).
* Ask on the [BookStack Discord chat](https://discord.gg/ztkBqR2).
* Follow the [BookStack Security Advice](https://github.com/BookStackApp/BookStack#-security) to contact someone privately.
|
{'CVE-2020-11055'}
|
2021-01-08T20:20:35Z
|
2020-05-07T21:10:26Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/BookStackApp/BookStack/releases/tag/v0.29.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11055', 'https://github.com/BookStackApp/BookStack/security/advisories/GHSA-5vf7-q87h-pg6w', 'https://bookstackapp.com/blog/beta-release-v0-29-2/', 'http://jvn.jp/en/jp/JVN41035278/index.html'}
| null |
Packagist
|
GHSA-36m2-8rhx-f36j
|
Sandbox bypass in Latte templates
|
### Impact
The problem affects users who use the sandbox in Latte and templates from untrusted sources.
### Patches
Sandbox first appeared in Latte 2.8.0. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8.
### References
The issues were discovered by
- JinYiTong (https://github.com/JinYiTong)
- 赵钰迪 <20212010122@fudan.edu.cn>
|
{'CVE-2022-21648'}
|
2022-01-14T19:42:25Z
|
2022-01-06T23:17:07Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21648', 'https://github.com/nette/latte/security/advisories/GHSA-36m2-8rhx-f36j', 'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0', 'https://github.com/nette/latte'}
| null |
Packagist
|
GHSA-3r8j-pmch-5j2h
|
Internal exception message exposure for login action in Sylius
|
## Internal exception message exposure for login action
### Impact
Exception messages from internal exceptions (like database exception) are wrapped by `\Symfony\Component\Security\Core\Exception\AuthenticationServiceException` and propagated through the system to UI. Therefore, some internal system information may leak and be visible to the customer.
A validation message with the exception details will be presented to the user when one will try to log into the shop.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
### Workarounds
The `src/Sylius/Bundle/UiBundle/Resources/views/Security/_login.html.twig` file should be overridden and lines https://github.com/Sylius/Sylius/blob/1.4/src/Sylius/Bundle/UiBundle/Resources/views/Security/_login.html.twig#L13-L17 should be replaced with
```twig
{% if last_error %}
<div class="ui left aligned basic segment">
{{ messages.error(last_error.messageKey) }}
</div>
{% endif %}
```
The `messageKey` field should be used instead of the `message`.
|
{'CVE-2019-16768'}
|
2021-01-08T21:20:32Z
|
2019-12-05T19:57:04Z
|
LOW
| null |
{'CWE-209'}
|
{'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16768', 'https://github.com/advisories/GHSA-3r8j-pmch-5j2h', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-3r8j-pmch-5j2h'}
| null |
Packagist
|
GHSA-jc4v-vvg6-xg78
|
SQL Injection in ImpressCMS
|
ImpressCMS before 1.4.3 allows include/findusers.php groups SQL Injection.
|
{'CVE-2021-26599'}
|
2022-04-01T17:14:52Z
|
2022-03-29T00:01:16Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26599', 'https://github.com/ImpressCMS/impresscms', 'https://hackerone.com/reports/1081145', 'http://seclists.org/fulldisclosure/2022/Mar/46', 'http://karmainsecurity.com/KIS-2022-04', 'http://packetstormsecurity.com/files/166404/ImpressCMS-1.4.2-SQL-Injection.html'}
| null |
Packagist
|
GHSA-x8wj-cqmp-3wmm
|
Cross-site Scripting in Zenario CMS
|
Zenario CMS 9.0.54156 is vulnerable to Cross Site Scripting (XSS) via upload file to *.SVG. An attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS.
|
{'CVE-2021-41952'}
|
2022-03-28T22:21:45Z
|
2022-03-15T00:00:59Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/TribalSystems/Zenario', 'https://github.com/TribalSystems/Zenario/releases/tag/9.0.55141', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41952', 'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007', 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/1'}
| null |
Packagist
|
GHSA-fpff-384j-vxq7
|
Data leakage via SQL Injection in Pimcore
|
pimcore/pimcore before 6.3.0 is vulnerable to SQL Injection. An attacker with limited privileges (classes permission) can achieve a SQL injection that can lead in data leakage. The vulnerability can be exploited via 'id', 'storeId', 'pageSize' and 'tables' parameters, using a payload for trigger a time based or error based sql injection.
|
{'CVE-2019-10763'}
|
2021-08-19T15:10:08Z
|
2019-12-02T18:05:13Z
|
MODERATE
| null |
{'CWE-89'}
|
{'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-480391', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10763', 'https://blog.certimetergroup.com/it/articolo/security/sql_injection_in_pimcore_6.2.3'}
| null |
Packagist
|
GHSA-mcxr-fx5f-96qq
|
Server-Side Request Forgery in Concrete CMS
|
Concrete CMS (formerly concrete5) versions below 8.5.7 has a SSRF mitigation bypass using DNS Rebind attack giving an attacker the ability to fetch cloud IAAS (ex AWS) IAM keys.To fix this Concrete CMS no longer allows downloads from the local network and specifies the validated IP when downloading rather than relying on DNS.Discoverer.
|
{'CVE-2021-22969'}
|
2021-11-22T18:30:27Z
|
2021-11-23T18:18:35Z
|
MODERATE
| null |
{'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22969', 'https://hackerone.com/reports/1369312', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}
| null |
Packagist
|
GHSA-hwqc-pgjw-vjqp
|
Cross-Site Request Forgery in GilaCMS
|
A Cross-Site Request Forgery (CSRF) in GilaCMS v1.11.4 allows authenticated attackers to arbitrarily add administrator accounts.
|
{'CVE-2020-20693'}
|
2021-10-04T13:51:41Z
|
2021-09-30T17:13:11Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-20693', 'https://github.com/GilaCMS/gila', 'https://github.com/GilaCMS/gila/issues/51'}
| null |
Packagist
|
GHSA-g2qj-pmxm-9f8f
|
User enumeration in authentication mechanisms
|
Description
-----------
The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authenticating a non-existing user.
Resolution
----------
We now ensure that 403s are returned whether the user exists or not if the password is invalid or if the user does not exist.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011) for branch 3.4.
Credits
-------
I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue.
| null |
2021-10-08T21:21:12Z
|
2021-05-17T20:52:32Z
|
LOW
| null |
{'CWE-200'}
|
{'https://github.com/symfony/symfony', 'https://github.com/symfony/symfony/security/advisories/GHSA-g2qj-pmxm-9f8f', 'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'}
| null |
Packagist
|
GHSA-68q3-7wjp-7q3j
|
The filename of uploaded files vulnerable to stored XSS
|
### Impact
The filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it.
Additionally, the measures to prevent renaming the file to disallowed filename extensions could be circumvented.
### Patches
This is fixed in Bolt 3.7.1.
### References
Related issue: https://github.com/bolt/bolt/pull/7853
|
{'CVE-2020-4041'}
|
2021-01-08T20:13:40Z
|
2020-06-09T00:25:34Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/bolt/bolt/pull/7853', 'http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4041', 'http://seclists.org/fulldisclosure/2020/Jul/4', 'https://github.com/bolt/bolt/security/advisories/GHSA-68q3-7wjp-7q3j'}
| null |
Packagist
|
GHSA-58mj-pw57-4vm2
|
Cross-site scripting in PHPMailer
|
PHPMailer versions prior to 5.2.24 (released July 26th 2017) have an XSS vulnerability in one of the code examples, CVE-2017-11503. The code_generator.phps example did not filter user input prior to output. This file is distributed with a `.phps` extension, so it it not normally executable unless it is explicitly renamed, and the file is not included when PHPMailer is loaded through composer, so it is safe by default. There was also an undisclosed potential XSS vulnerability in the default exception handler (unused by default). Patches for both issues kindly provided by Patrick Monnerat of the Fedora Project.
### Impact
PHPMailer 5.2.23 has XSS in the "From Email Address" and "To Email Address" fields of code_generator.php.
### Patches
Fixed in 5.2.24
### Workarounds
None.
### References
https://nvd.nist.gov/vuln/detail/CVE-2017-11503
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
|
{'CVE-2017-11503'}
|
2021-08-19T19:44:10Z
|
2020-03-05T22:09:13Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-58mj-pw57-4vm2', 'http://www.securitytracker.com/id/1039026', 'https://cxsecurity.com/issue/WLB-2017060181', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11503', 'http://www.securityfocus.com/bid/99293/', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.24', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2017-11503.yaml', 'https://packetstormsecurity.com/files/143138/phpmailer-xss.txt'}
| null |
Packagist
|
GHSA-4w23-c97g-fq5v
|
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
|
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
|
{'CVE-2021-4130'}
|
2022-01-04T20:20:07Z
|
2022-01-05T20:33:16Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4130', 'https://huntr.dev/bounties/ccf073cd-7f54-4d51-89f2-6b4a2e4ae81e', 'https://github.com/snipe/snipe-it'}
| null |
Packagist
|
GHSA-2r2w-jrh2-p4gr
|
Cross-site Scripting in LibreNMS
|
In LibreNMS < 21.3.0, a stored XSS vulnerability was identified in the API Access page due to insufficient sanitization of the $api->description variable. As a result, arbitrary Javascript code can get executed.
|
{'CVE-2021-31274'}
|
2021-09-09T13:32:48Z
|
2021-09-09T17:08:55Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/librenms/librenms', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31274', 'https://github.com/librenms/librenms/pull/12739', 'https://community.librenms.org/t/vulnerability-report-cross-site-scripting-xss-in-the-api-access-page/15431', 'https://github.com/librenms/librenms/'}
| null |
Packagist
|
GHSA-5h7w-hmxc-99g5
|
Cross site scripting in safe-svg
|
The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks).
|
{'CVE-2022-1091'}
|
2022-04-28T21:15:03Z
|
2022-04-19T00:00:45Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/10up/safe-svg/pull/28', 'https://github.com/10up/safe-svg', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1091', 'https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3'}
| null |
Packagist
|
GHSA-p9cm-r7jg-8q3g
|
Incorrect signature verification in SimpleSAMLphp
|
### Background
An incorrect check of return values in the signature validation utilities allows an attacker to get invalid signatures accepted as valid by forcing an error during validation.
### Description
The `SimpleSAML_XML_Validator` class allows the verification of the XML digital signature of a SAML 1 message with a given key. In particular, the constructor of the class receives an XML node and a key to verify it and throws an exception in case there is an error, either caused by incorrect input or an invalid signature. This method uses the `verify()` method from the `RobRichards\XMLSecDSig` class to verify the signature with the given key, which in turn will end up calling `openssl_verify()` depending on the signature algorithm used.
The `openssl_verify()` function returns `1` when the signature was successfully verified, `0` if it failed to verify with the given key and `-1` in case an error occurs. PHP allows translating numerical values to boolean implicitly, with the following correspondences:
- `0` equals `false`
- Non-zero equals `true`
This means that an implicit conversion to _boolean_ of the values returned by `openssl_verify()` will convert an error state, signaled by the value `-1`, to successful verification of the signature (represented by the _boolean_ `true`).
The aforementioned constructor was performing an implicit conversion to boolean of the values returned by the `verify()` method, which subsequently will return the same output as `openssl_verify()` under most circumstances. This means an error during signature verification is treated as a successful verification by the method.
### Affected versions
All SimpleSAMLphp versions prior to **1.14.11**.
### Impact
Upon successful exploitation, an invalid signature would be regarded as valid by an affected version of the software. This allows attackers to modify or manually craft **SAML 1 response messages** and, by triggering a signature validation error in the affected party, get those messages accepted as valid and coming from a trusted entity. In practice, this means full capabilities to impersonate any individual at a given service provider.
The issue can be exploited to get other invalid messages accepted as valid, though the security implications there are minor.
In order to exploit the issue, **SAML 1.1 metadata must be registered by the vulnerable Service Provider for the Identity Provider targeted by the attacker** (in `metadata/shib13-idp-remote.php`), and an incorrect context must be fed to the signature validation routines, or an exceptional error must be triggered. So far, the following cases have been identified:
- Using a DSA public key to validate an XML signature made with an RSA-related algorithm.
- Using an RSA public key to validate an XML signature made with a DSA-related algorithm.
- Exhausting available memory while verifying the signature.
SimpleSAMLphp **does not support DSA signatures or keys**. Therefore, it is not possible for an attacker to feed an incorrect context by sending a signature with an incorrect algorithm. Upon reception of a DSA-SHA1 signature, SimpleSAMLphp will refuse to perform the validation due to the algorithm not being supported. On the other hand, if an attacker manages to trick a service provider operator to change the public key associated to a certain IdP to a DSA key, signatures made with any combination of the RSA algorithm will be accepted, regardless of whether they are valid or not. This means some serious misconfiguration or social engineering is needed in this case for a successful attack.
Regarding memory exhaustion, it is in theory possible to attack a service provider causing the consumption of all available memory while a message with an invalid signature is being validated. However, memory exhaustion must happen only during signature validation and not immediately before or after. This means exploitation of this case is extremely difficult due to the small time window available for the attacker and the precise control that is needed over the service provider.
All in all, the consequences of this issue are critical, so even though we consider it difficult to exploit, and considering that other ways to trigger failures in signature validation could be possible but so far unidentified, we recommend updating the affected software as soon as possible.
### Resolution
Upgrade to the latest version.
### Credit
This security issue was discovered and reported on December 3, 2016 by Thijs Kinkhorst.
|
{'CVE-2016-9955'}
|
2021-08-19T16:43:43Z
|
2020-01-24T21:27:42Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://lists.debian.org/debian-lts-announce/2018/03/msg00001.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9955', 'https://simplesamlphp.org/security/201612-02', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-p9cm-r7jg-8q3g', 'http://www.securityfocus.com/bid/94946'}
| null |
Packagist
|
GHSA-gqpw-9q54-9x28
|
Server-Side Request Forgery in Concrete CMS
|
Concrete CMS (formerly concrete5) versions 8.5.6 and below and version 9.0.0 allow local IP importing causing the system to be vulnerable to SSRF attacks on the private LAN to servers by reading files from the local LAN. An attacker can pivot in the private LAN and exploit local network appsandb.
|
{'CVE-2021-22970'}
|
2021-11-22T18:24:09Z
|
2021-11-23T18:18:43Z
|
MODERATE
| null |
{'CWE-918'}
|
{'https://documentation.concretecms.org/developers/introduction/version-history/901-release-notes', 'https://hackerone.com/reports/1364797', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22970', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.