ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Packagist
|
GHSA-m496-x567-f98c
|
Fixes a bug in Zend Framework's Stream HTTP Wrapper
|
### Impact
CVE-2021-3007: Backport of Zend_Http_Response_Stream, added certain type checking as a way to prevent exploitation. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3007
This vulnerability is caused by the unsecured deserialization of an object. In versions higher than Zend Framework 3.0.0, the attacker abuses the Zend3 feature that loads classes from objects in order to upload and execute malicious code in the server. The code can be uploaded using the “callback” parameter, which in this case inserts a malicious code instead of the “callbackOptions” array.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
v20.0.9 v19.4.13
|
{'CVE-2021-21426'}
|
2021-04-30T20:19:58Z
|
2021-04-22T16:10:49Z
|
CRITICAL
| null |
{'CWE-502'}
|
{'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21426'}
| null |
Packagist
|
GHSA-7v7w-f7c6-f829
|
yetiforcecrm is vulnerable to Business Logic Errors
|
yetiforcecrm is vulnerable to Business Logic Errors.
|
{'CVE-2021-4111'}
|
2022-01-03T15:47:58Z
|
2021-12-16T21:01:15Z
|
HIGH
| null | null |
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4111', 'https://github.com/yetiforcecompany/yetiforcecrm', 'https://huntr.dev/bounties/8afc8981-baff-4082-b640-be535b29eb9a'}
| null |
Packagist
|
GHSA-952p-fqcp-g8pc
|
HTML injection possibility in voucher code form in Shopware
|
### Impact
HTML injection possibility in voucher code form
## Patches
Patched in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
{'CVE-2022-24746'}
|
2022-03-18T20:14:15Z
|
2022-03-10T17:49:26Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-952p-fqcp-g8pc', 'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022?category=security-updates', 'https://github.com/shopware/platform', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24746'}
| null |
Packagist
|
GHSA-v3f6-f29f-rgvp
|
Missing Authorization in Drupal
|
In Drupal 8.x prior to 8.3.7 When creating a view, you can optionally use Ajax to update the displayed data via filter parameters. The views subsystem/module did not restrict access to the Ajax endpoint to only views configured to use Ajax. This is mitigated if you have access restrictions on the view. It is best practice to always include some form of access restrictions on all views, even if you are using another module to display them.
|
{'CVE-2017-6923'}
|
2021-08-18T21:44:06Z
|
2019-10-10T19:31:31Z
|
MODERATE
| null |
{'CWE-862'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-6923', 'https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-08-16/drupal-core-multiple', 'http://www.securityfocus.com/bid/100368', 'http://www.securitytracker.com/id/1039200'}
| null |
Packagist
|
GHSA-gpmh-g94g-qrhr
|
Internal hidden fields are visible on to many associations in admin api
|
### Impact
The admin api has exposed some internal hidden fields when an association has been loaded with a to many reference
### Patches
We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
| null |
2021-06-24T19:20:56Z
|
2021-06-28T18:20:53Z
|
MODERATE
| null | null |
{'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr'}
| null |
Packagist
|
GHSA-77rm-9x9h-xj3g
|
NULL Pointer Dereference in Protocol Buffers
|
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
|
{'CVE-2021-22570'}
|
2022-05-03T04:47:56.706467Z
|
2022-01-27T00:01:15Z
|
HIGH
| null |
{'CWE-476'}
|
{'https://security.netapp.com/advisory/ntap-20220429-0005/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ/', 'https://github.com/protocolbuffers/protobuf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22570', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVTWVQRB5OCCTMKEQFY5MYED3DXDVSLP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA/', 'https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/'}
| null |
Packagist
|
GHSA-699q-wcff-g9mj
|
Unsafe deserialization in Yii 2
|
### Impact
Remote code execution in case application calls `unserialize()` on user input containing specially crafted string.
### Patches
2.0.38
### Workarounds
Add the following to BatchQueryResult.php:
```php
public function __sleep()
{
throw new \BadMethodCallException('Cannot serialize '.__CLASS__);
}
public function __wakeup()
{
throw new \BadMethodCallException('Cannot unserialize '.__CLASS__);
}
```
### For more information
If you have any questions or comments about this advisory, [contact us through security form](https://www.yiiframework.com/security).
|
{'CVE-2020-15148'}
|
2021-01-07T22:56:34Z
|
2020-09-15T18:19:56Z
|
HIGH
| null |
{'CWE-502'}
|
{'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15148', 'https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj'}
| null |
Packagist
|
GHSA-5jxc-hmqf-3f73
|
Cross-Site Scripting in grav
|
grav prior to version 1.7.24 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
|
{'CVE-2021-3904'}
|
2021-11-01T14:06:13Z
|
2021-11-01T19:17:31Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d', 'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3904', 'https://github.com/getgrav/grav/'}
| null |
Packagist
|
GHSA-fp63-499m-hq6m
|
Files or Directories Accessible to External Parties in ether/logs
|
### Impact
A vulnerability was found that allowed authenticated admin users to access any file on the server.
### Patches
The vulnerability has been fixed in 3.0.4.
### Workarounds
We recommend disabling the plugin if untrustworthy sources have admin access.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [ether/logs](https://github.com/ethercreative/logs/issues)
|
{'CVE-2021-32752'}
|
2021-07-09T14:04:21Z
|
2021-07-12T16:53:00Z
|
HIGH
| null |
{'CWE-552'}
|
{'https://github.com/ethercreative/logs/releases/tag/3.0.4', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'https://github.com/ethercreative/logs/security/advisories/GHSA-fp63-499m-hq6m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32752'}
| null |
Packagist
|
GHSA-5vfx-8w6m-h3v4
|
Authentication bypass due to improper user-provided security token verification
|
A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account with two-factor authentication enabled, and then must provide a correct two-factor authentication token before being authenticated as that user.
## Impact
Due to a validation flaw in the logic handling user authentication during the two-factor authentication process a malicious user can trick the system into loading credentials for an arbitrary user by modifying the token sent to the server. This authentication flaw is present in the `LoginCheckpointController@__invoke` method which handles two-factor authentication for a user.
This controller looks for a request input parameter called `confirmation_token` which is expected to be a 64 character random alpha-numeric string that references a value within the Panel's cache containing a `user_id` value. This value is then used to fetch the user that attempted to login, and lookup their two-factor authentication token. Due to the design of this system, any element in the cache that contains only digits could be referenced by a malicious user, and whatever value is stored at that position would be used as the `user_id`.
There are a few different areas of the Panel that store values into the cache that are integers, and a user who determines what those cache keys are could pass one of those keys which would cause this code pathway to reference an arbitrary user.
## Scope
At its heart this is a high-risk login bypass vulnerability. However, there are a few additional conditions that must be met in order for this to be successfully executed, notably:
1.) The account referenced by the malicious cache key **must** have two-factor authentication enabled. An account without two-factor authentication would cause an exception to be triggered by the authentication logic, thusly exiting this authentication flow.
2.) Even if the malicious user is able to reference a valid cache key that references a valid user account with two-factor authentication, they **must** provide a valid two-factor authentication token.
However, due to the design of this endpoint once a valid user account is found with two-factor authentication enabled there is no rate-limiting present, thusly allowing an attacker to brute force combinations until successful. This leads to a third condition that must be met:
3.) For the duration of this attack sequence the cache key being referenced must continue to exist with a valid `user_id` value. Depending on the specific key being used for this attack, this value may disappear quickly, or be changed by other random user interactions on the Panel, outside the control of the attacker.
### About the Severity
As you may have noticed, this is not a trivial authentication bypass bug to exploit, and is likely incredibly difficult for a layperson to pull off. However, the severity of this disclosure has been prepared based on the nature of the bug and the potential for unexpected administrative account access under very rare conditions.
## Mitigation
In order to mitigate this vulnerability the underlying authentication logic was changed to use an encrypted session store that the user is therefore unable to control the value of. This completely removed the use of a user-controlled value being used. In addition, the code was audited to ensure this type of vulnerability is not present elsewhere.
If you have any questions or concerns about the content of this disclosure please contact `Tactical Fish#8008` on Discord, or email `dane ät pterodactyl.io`.
|
{'CVE-2021-41129'}
|
2021-10-12T21:45:10Z
|
2021-10-04T20:14:13Z
|
HIGH
| null |
{'CWE-639', 'CWE-502', 'CWE-807'}
|
{'https://github.com/pterodactyl/panel/security/advisories/GHSA-5vfx-8w6m-h3v4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41129', 'https://github.com/pterodactyl/panel/releases/tag/v1.6.2', 'https://github.com/pterodactyl/panel', 'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977', 'https://github.com/pterodactyl/panel/blob/v1.6.2/CHANGELOG.md#v162'}
| null |
Packagist
|
GHSA-53m6-44rc-h2q5
|
Missing server signature validation in OctoberCMS
|
### Impact
This advisory affects authors of plugins and themes listed on the October CMS marketplace where an end-user will inadvertently expose authors to potential financial loss by entering their private license key into a compromised server.
It has been disclosed that a project fork of October CMS v1.0 is using a compromised gateway to access the October CMS marketplace service. The compromised gateway captures the personal/business information of users and authors, including private source code files. It was also disclosed that captured plugin files are freely redistributed to other users without authorization.
1. End-users are provided with a forked version of October CMS v1.0. The provided software is modified to use a compromised gateway server.
2. The user is instructed to enter their October CMS license key into the administration panel to access the October CMS marketplace. The key is sent to the compromised server while appearing to access the genuine October CMS gateway server.
3. The compromised gateway server uses a "man in the middle" mechanism that captures information while forwarding the request to the genuine October CMS gateway and relaying the response back to the client.
4. The compromised gateway server stores the license key and other information about the user account including client name, email address and contents of purchased plugins and privately uploaded plugin files.
5. The stored plugin files are made available to other users of the compromised gateway server.
### Patches
The issue has been patched in Build 475 (v1.0.475) and v1.1.11.
### Workarounds
Apply https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a to your installation manually if unable to upgrade to Build 475 or v1.1.11.
### Recommendations
We recommend the following steps to make sure your account information stays secure:
- Do not share your license key with anyone except October CMS.
- Check to make sure that your gateway update server has not been modified.
- Be aware of phishing websites, including other platforms that use the same appearance.
- For authors, you may contact us for help requesting the removal of affected plugins.
- Before providing plugin support, verify that the user holds a legitimate copy of the plugin.
### References
Credits for research on this exploit:
• Nikita Khaetsky
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
|
{'CVE-2022-23655'}
|
2022-03-08T18:23:38Z
|
2022-02-24T13:09:30Z
|
MODERATE
| null |
{'CWE-347'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23655', 'https://github.com/octobercms/october', 'https://github.com/octobercms/october/security/advisories/GHSA-53m6-44rc-h2q5', 'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a'}
| null |
Packagist
|
GHSA-qwpp-fgrj-h78q
|
Exposure of Sensitive Information to an Unauthorized Actor
|
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 are vulnerable to system information leakage in error handling. Users are recommend to update to version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
|
{'CVE-2021-32712'}
|
2021-06-25T15:32:28Z
|
2021-09-08T17:59:46Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32712', 'https://github.com/shopware/shopware/security/advisories/GHSA-9vxv-wpv4-f52p', 'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d'}
| null |
Packagist
|
GHSA-g4m9-5hpf-hx72
|
Firewall configured with unanimous strategy was not actually unanimous in Symfony
|
Description
-----------
On Symfony before 4.4.0, when a `Firewall` checks an access control rule (using the unanimous strategy), it iterates over all rule attributes and grant access only if *all* calls to the `accessDecisionManager` decide to grant access.
As of Symfony 4.4.0, a bug was introduced that prevents the check of attributes as soon as `accessDecisionManager` decide to grant access on one attribute.
Resolution
----------
The `accessDecisionManager` is now called with all attributes at once, allowing the unanimous strategy being applied on each attribute.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf) for the 4.4 branch.
Credits
-------
I would like to thank Antonio J. García Lagar for reporting & Robin Chalas for fixing the issue.
|
{'CVE-2020-5275'}
|
2021-01-14T17:48:29Z
|
2020-03-30T20:09:44Z
|
HIGH
| null |
{'CWE-285'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5275', 'https://github.com/symfony/symfony/security/advisories/GHSA-g4m9-5hpf-hx72', 'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/'}
| null |
Packagist
|
GHSA-59qh-g7m4-j9m9
|
Cross-site Scripting in livehelperchat
|
Stored XSS attacks exist in new the form creation flow. New forms can be given a title which will render javascript.
|
{'CVE-2022-0374'}
|
2022-02-02T16:05:01Z
|
2022-01-28T23:06:12Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0374', 'https://huntr.dev/bounties/f8b560a6-aa19-4262-8ae4-cf88204310ef', 'https://github.com/livehelperchat/livehelperchat/'}
| null |
Packagist
|
GHSA-m5vr-3m74-jwxp
|
Missing Required Cryptographic Step Leading to Sensitive Information Disclosure in TYPO3 CMS
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2)
> * CWE-325, CWE-20, CWE-200, CWE-502
### Problem
It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message authentication code (HMAC-SHA1) and can lead to various attack chains as described below.
* [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007), [CVE-2020-15099](https://nvd.nist.gov/vuln/detail/CVE-2020-15099): Potential Privilege Escalation
+ the database server used for a TYPO3 installation must be accessible for an attacker (either via internet or shared hosting network)
+ `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5, high)
* [TYPO3-CORE-SA-2016-013](https://typo3.org/security/advisory/typo3-core-sa-2016-013), [CVE-2016-5091](https://nvd.nist.gov/vuln/detail/CVE-2016-5091): Insecure Deserialization & Remote Code Execution
+ an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation
+ `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1, critical)
The overall severity of this vulnerability is **high (8.2)** based on mentioned attack chains and the requirement of having a valid backend user session (authenticated).
### Solution
Update to TYPO3 versions 9.5.20 or 10.4.6 that fix the problem described.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2020-008](https://typo3.org/security/advisory/typo3-core-sa-2020-008)
|
{'CVE-2020-15098'}
|
2021-11-19T15:43:34Z
|
2020-07-29T16:15:19Z
|
HIGH
| null |
{'CWE-327', 'CWE-200', 'CWE-325', 'CWE-20', 'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15098', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5091', 'https://typo3.org/security/advisory/typo3-core-sa-2020-008', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-m5vr-3m74-jwxp', 'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1', 'https://github.com/TYPO3/TYPO3.CMS', 'https://typo3.org/security/advisory/typo3-core-sa-2016-013'}
| null |
Packagist
|
GHSA-r8hm-w5f7-wj39
|
Cross-site scripting vulnerability in TinyMCE plugins
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in the URL processing logic of the `image` and `link` plugins. The vulnerability allowed arbitrary JavaScript execution when updating an image or link using a specially crafted URL. This issue only impacted users while editing and the dangerous URLs were stripped in any content extracted from the editor. This impacts all users who are using TinyMCE 5.9.2 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.10.0 by improved sanitization logic when updating URLs in the relevant plugins.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.10.0 or higher
- Disable the `image` and `link` plugins
### Acknowledgements
Tiny Technologies would like to thank Yakir6 for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes510/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
| null |
2022-03-03T05:13:05.261265Z
|
2021-11-02T15:42:52Z
|
MODERATE
| null |
{'CWE-64', 'CWE-79'}
|
{'https://github.com/jazzband/django-tinymce/issues/366', 'https://github.com/tinymce/tinymce', 'https://github.com/jazzband/django-tinymce/releases/tag/3.4.0', 'https://pypi.org/project/django-tinymce/3.4.0/', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-r8hm-w5f7-wj39'}
| null |
Packagist
|
GHSA-2v82-5746-vwqc
|
XSS in doc_link
|
### Impact
Users of MySQL, MariaDB, PgSQL and SQLite are affected. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer versions 4.6.1 to 4.8.0 are affected.
### Patches
Patched by 4043092, included in version [4.8.1](https://github.com/vrana/adminer/releases/tag/v4.8.1).
### Workarounds
Do both:
* Use browser supporting strict CSP.
* Enable the native PHP extensions (e.g. `mysqli`) or disable displaying PHP errors (`display_errors`).
### References
https://sourceforge.net/p/adminer/bugs-and-features/797/
### For more information
If you have any questions or comments about this advisory:
* Comment at 4043092.
|
{'CVE-2021-29625'}
|
2022-03-18T17:49:28Z
|
2022-03-18T17:49:28Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29625', 'https://sourceforge.net/p/adminer/bugs-and-features/797/', 'https://packagist.org/packages/vrana/adminer', 'https://github.com/vrana/adminer/security/advisories/GHSA-2v82-5746-vwqc', 'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7'}
| null |
Packagist
|
GHSA-3pc2-fm7p-q2vg
|
Cross-site Scripting in October
|
### Impact
Pasting content copied from malicious websites into the Froala richeditor could result in a successful self-XSS attack.
### Patches
Issue has been patched in Build 467 (v1.0.467).
### Workarounds
Apply https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5 to your installation manually if unable to upgrade to Build 467.
### References
- https://research.securitum.com/the-curious-case-of-copy-paste/
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat Assessment
Assessed as Low given that by the nature of the attack it can only impact users that do it to themselves by copying and pasting from malicious websites.
### Acknowledgements
Thanks to [Michał Bentkowski of Securitum](https://research.securitum.com/authors/michal-bentkowski/) for finding the original issue in Froala and @tomaszstrojny for reporting the issue to the October CMS team.
|
{'CVE-2020-4061'}
|
2021-03-04T18:26:09Z
|
2020-07-02T16:55:11Z
|
LOW
| null |
{'CWE-79'}
|
{'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5', 'https://research.securitum.com/the-curious-case-of-copy-paste/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4061', 'https://github.com/octobercms/october/security/advisories/GHSA-3pc2-fm7p-q2vg'}
| null |
Packagist
|
GHSA-hf9p-9r39-r2h3
|
Unrestricted Uploads in Concrete5
|
Concrete5 before 8.5.3 allows Unrestricted Upload of File with Dangerous Type such as a .phar file.
|
{'CVE-2020-11476'}
|
2021-11-02T18:39:03Z
|
2021-11-03T17:29:29Z
|
HIGH
| null |
{'CWE-434'}
|
{'https://github.com/concrete5/concrete5', 'https://github.com/concrete5/concrete5/pull/8713', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11476', 'https://github.com/concrete5/concrete5/releases/tag/8.5.3', 'https://herolab.usd.de/security-advisories/usd-2020-0041/'}
| null |
Packagist
|
GHSA-f7xw-46vh-5jw2
|
livehelperchat is vulnerable to Cross-site Scripting
|
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-4132'}
|
2022-01-04T20:12:09Z
|
2022-01-05T20:33:47Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/7eb80e7c-bb7a-478d-9760-0ea2fa9dc0c2', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4132'}
| null |
Packagist
|
GHSA-rgcg-28xm-8mmw
|
Cross-Site Scripting in Backend Grid View
|
### Problem
Failing to properly encode settings for _backend layouts_, the corresponding grid view is vulnerable to persistent cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described.
### Credits
Thanks to TYPO3 core merger Oliver Bartsch who reported and fixed the issue.
|
{'CVE-2021-32669'}
|
2021-07-22T19:37:32Z
|
2021-07-22T19:37:41Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://typo3.org/security/advisory/typo3-core-sa-2021-011', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-rgcg-28xm-8mmw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32669'}
| null |
Packagist
|
GHSA-8c5p-4362-9333
|
Path traversal in grav
|
grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
{'CVE-2021-3924'}
|
2021-11-08T21:30:39Z
|
2021-11-10T16:48:15Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3924', 'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce', 'https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2', 'https://github.com/getgrav/grav'}
| null |
Packagist
|
GHSA-2v88-qq7x-xq5f
|
Improper Encoding or Escaping of Output in Asset Metadata Component
|
Pimcore is an open source data & experience management platform. Prior to version 10.1.2, an authenticated user could add XSS code as a value of custom metadata on assets. There is a patch for this issue in Pimcore version 10.1.2. As a workaround, users may apply the patch manually.
|
{'CVE-2021-39170'}
|
2021-09-01T18:20:20Z
|
2021-09-01T18:21:55Z
|
HIGH
| null |
{'CWE-79', 'CWE-116'}
|
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/10178', 'https://huntr.dev/bounties/e4cb9cd8-89cf-427c-8d2e-37ca40099bf2/', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-2v88-qq7x-xq5f', 'https://github.com/pimcore/pimcore/pull/10206', 'https://huntr.dev/bounties/c3e4cf79-a4b5-4982-af27-729f66281501/', 'https://github.com/pimcore/pimcore/pull/10178.patch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39170'}
| null |
Packagist
|
GHSA-6gw4-x63h-5499
|
Ability to switch customer email address on account detail page and stay verified
|
### Impact
The user may register in a shop by email mail@example.com, verify it, change it to the mail another@domain.com and stay verified and enabled. This may lead to having accounts addressed to totally different emails, that were verified. Note, that this way one is not able to take over any existing account (guest or normal one).
### Patches
Patch has been provided for Sylius 1.6.x and newer - 1.6.9, 1.7.9, 1.8.3. Versions older than 1.6 are not covered by our security support anymore.
### Workarounds
If for whatever reason you are not able to upgrade your application version, you may resolve this issue on your own by creating a custom event listener, which will listen to the `sylius.customer.pre_update` event. You can determine that email has been changed if customer email and user username are different. They are synchronized later on. Pay attention, to email changing behavior for administrators. You may need to skip this logic for them. In order to achieve this, you should either check master request path info, if it does not contain `/admin` prefix or adjust event triggered during customer update in the shop. You can find more information on how to customize the event here.
### Acknowledgements
This security issue has been reported by Mircea Silviu (@decemvre), thanks a lot!
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@sylius.com](mailto:security@sylius.com)
|
{'CVE-2020-15245'}
|
2021-11-19T13:51:50Z
|
2020-10-19T20:40:59Z
|
MODERATE
| null |
{'CWE-79', 'CWE-862'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15245', 'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf', 'https://github.com/Sylius/Sylius', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-6gw4-x63h-5499'}
| null |
Packagist
|
GHSA-m72g-42q6-gvc2
|
Cross-site Scripting in LaraCMS
|
LaraCMS contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content editor.
|
{'CVE-2020-20129'}
|
2021-10-04T14:22:45Z
|
2021-10-04T20:13:11Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-20129', 'https://github.com/wanglelecc/laracms', 'https://github.com/wanglelecc/laracms/issues/34'}
| null |
Packagist
|
GHSA-f4hh-xxqh-wgpq
|
Exposure of Sensitive Information to an Unauthorized Actor in LibreNMS
|
An issue was discovered in LibreNMS through 1.47. Information disclosure can occur: an attacker can fingerprint the exact code version installed and disclose local file paths.
|
{'CVE-2019-10667'}
|
2021-08-18T17:23:13Z
|
2019-10-11T18:43:20Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10667', 'https://www.darkmatter.ae/xen1thlabs/librenms-information-disclosure-vulnerability-xl-19-018/'}
| null |
Packagist
|
GHSA-q8hg-pf8v-cxrv
|
Non-constant time comparison in UriSigner
|
When checking the signature of an URI (an ESI fragment URL for instance), the URISigner did not used a constant time string comparison function, resulting in a potential remote timing attack vulnerability.
|
{'CVE-2019-18887'}
|
2022-03-26T00:22:49Z
|
2022-03-26T00:22:49Z
|
HIGH
| null | null |
{'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18887.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://symfony.com/cve-2019-18887', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-kernel/CVE-2019-18887.yaml', 'https://symfony.com/blog/cve-2019-18887-use-constant-time-comparison-in-urisigner', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18887'}
| null |
Packagist
|
GHSA-xhr8-mpwq-2rr2
|
Automatic named constructor discovery in Valinor
|
## Design issue - automatic constructor discovery
The issue arises when upgrading from `cuyz/valinor:0.3.0` to a newer system on an existing application, which broke due to the wrong constructor being picked.
Still, a bigger security concern is problematic, and it is akin to https://github.com/rails/rails/issues/5228.
## Example exploit
Take following DTO example:
```php
final class UserDTO
{
public function __construct(
public int $id,
public string $name
) {}
public static function fromDb(
PDO $connection,
int $id
): self { /* ... code to fetch the DTO here ... */ }
}
```
There is nothing inherently unsafe about the above `UserDTO`, but when mixed with `cuyz/valinor:^0.5.0` ( specifically https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b ), it is an explosive mix:
```php
// this could be coming from user input:
$maliciousPayload = [
'connection' => [
'dsn' => 'mysql:host=some-host;database=some-database',
'username' => 'root',
'password' => 'root',
'options' => [
// PDO::MYSQL_ATTR_INIT_COMMAND === 1002
1002 => 'DROP DATABASE all-the-moneys'
]
],
'id' => 123,
];
$treeMapper->map(
UserDTO::class,
$maliciousPayload
); // your DB is gone :D
```
The above payload is represented in PHP form, but may as well be input JSON, HTML or x-form-urlencoded.
## Mitigation
Version 0.7.0 contains a patch for this issue.
Automatic named constructor resolution should be disabled - only explicitly mapped named constructors should be used/discovered.
| null |
2022-04-01T13:39:45Z
|
2022-04-01T13:39:45Z
|
HIGH
| null | null |
{'https://github.com/CuyZ/Valinor', 'https://github.com/CuyZ/Valinor/releases/tag/0.7.0', 'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b', 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-xhr8-mpwq-2rr2'}
| null |
Packagist
|
GHSA-xcf7-cj8q-pcjm
|
XSS vulnerability in Author URL of themes in Mautic
|
### Impact
An XSS vulnerability was discovered in Mautic 2.13.1 in the Author URL of themes.
### Patches
Update to 2.14 or later
### Workarounds
None
### References
https://github.com/mautic/mautic/releases/tag/2.14.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2018-11198'}
|
2021-01-19T21:15:40Z
|
2021-01-19T21:16:14Z
|
LOW
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-11198', 'https://github.com/mautic/mautic/security/advisories/GHSA-xcf7-cj8q-pcjm', 'https://github.com/mautic/mautic/releases', 'https://github.com/mautic/mautic/releases/tag/2.14.0'}
| null |
Packagist
|
GHSA-5jfw-35xp-5m42
|
Buffer length underflow in LoginPacket causing unchecked exceptions to be thrown
|
### Impact
`LoginPacket` uses `BinaryStream->getLInt()` to read the lengths of JSON payloads it wants to decode. Unfortunately, `BinaryStream->getLInt()` returns a signed integer, meaning that a malicious client can craft a packet with a large uint32 value for payload buffer size (which would be interpreted as a negative signed int32), causing `BinaryStream->get()` to throw an exception.
In the context of PocketMine-MP, this leads to a server crash when the vulnerability is exploited.
### Patches
e3fce7632b94e83fd6a518a87dcaf6a11681c4ac
### Workarounds
This can be worked around by registering a custom `LoginPacket` implementation into `PacketPool` which overrides [this code](https://github.com/pmmp/BedrockProtocol/blob/47532c95ea37d5f0365b23f734d70d943ff95295/src/LoginPacket.php#L54) to patch it.
### For more information
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null |
2022-04-05T17:53:22Z
|
2022-04-05T17:53:22Z
|
HIGH
| null |
{'CWE-124'}
|
{'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac', 'https://github.com/pmmp/BedrockProtocol', 'https://github.com/pmmp/BedrockProtocol/security/advisories/GHSA-5jfw-35xp-5m42'}
| null |
Packagist
|
GHSA-57qf-82hh-2hmc
|
Cross-site Scripting in LiveHelperChat
|
LiveHelperChat prior to version 3.93 is vulnerable to cross-site scripting.
|
{'CVE-2022-0502'}
|
2022-02-14T22:30:19Z
|
2022-02-07T00:00:30Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0502', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706', 'https://huntr.dev/bounties/34f2aa30-de7f-432a-8749-b43d2774140f'}
| null |
Packagist
|
GHSA-8c9x-wfgj-v78w
|
Open Redirect in showdoc
|
showdoc is vulnerable to URL Redirection to Untrusted Site
|
{'CVE-2021-4000'}
|
2021-12-06T21:57:44Z
|
2021-12-16T15:31:58Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962', 'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4000'}
| null |
Packagist
|
GHSA-h9vc-2p9g-63gp
|
Exposure of Sensitive Information to an Unauthorized Actor in pimcore
|
Exposure of Sensitive Information to an Unauthorized Actor in Packagist pimcore/pimcore prior to 10.3.1.
|
{'CVE-2022-0565'}
|
2022-02-24T13:10:51Z
|
2022-02-15T00:02:47Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245', 'https://github.com/pimcore/pimcore/', 'https://huntr.dev/bounties/b0b29656-4bbe-41cf-92f6-8579df0b6de5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0565'}
| null |
Packagist
|
GHSA-7vxc-chqj-h83g
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-4168'}
|
2022-01-07T16:11:21Z
|
2022-01-06T22:02:18Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/f14431e2-f1f6-4331-ba91-a4ea8b26be0c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4168'}
| null |
Packagist
|
GHSA-xhfx-hgmf-v6vp
|
Potential Host Header Poisoning on misconfigured servers
|
### Impact
When running on servers that are configured to accept a wildcard as a hostname (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. See the following resources for more information on Host Header Poisoning:
- https://portswigger.net/web-security/host-header
- https://dzone.com/articles/what-is-a-host-header-attack
### Patches
A feature has been added in v1.1.2 to allow a set of trusted hosts to be specified in the application.
### Workarounds
- Apply https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6 & https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0 to your installation manually if unable to upgrade to v1.1.2.
- Check that the configuration setting `cms.linkPolicy` is set to `force`.
### Alternative Workaround
Check to make sure that your web server does not accept any hostname when serving your web application.
1. Add an entry called `testing.tld` to your computer's host file and direct it to your server's IP address
2. Open the address `testing.tld` in your web browser
3. Make sure an October CMS website is not available at this address
If an October CMS website is returned, configure your webserver to only allow known hostnames. If you require assistance with this, please contact your server administrator.
### References
Reported by [Abdullah Hussam](https://github.com/ahussam)
### For More Information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat Assessment
<img width="1108" alt="Screen Shot 2021-01-15 at 4 12 57 PM" src="https://user-images.githubusercontent.com/7253840/104783859-92fb3600-574c-11eb-9e21-c0dc05d230a9.png">
|
{'CVE-2021-21265'}
|
2021-03-10T21:07:08Z
|
2021-03-10T21:07:25Z
|
LOW
| null |
{'CWE-644'}
|
{'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0', 'https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6vp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21265', 'https://packagist.org/packages/october/backend'}
| null |
Packagist
|
GHSA-9chx-2vqw-8vq5
|
Path Traversal in the Logs plugin for Craft CMS
|
The Logs plugin before 3.0.4 for Craft CMS allows remote attackers to read arbitrary files via input to actionStream in Controller.php.
|
{'CVE-2022-23409'}
|
2022-02-08T16:08:49Z
|
2022-02-01T00:01:00Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23409', 'https://plugins.craftcms.com/logs', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'https://sec-consult.com/vulnerability-lab/', 'https://github.com/ethercreative/logs', 'http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html'}
| null |
Packagist
|
GHSA-gqcf-83rq-gpfr
|
Any storage file can be downloaded from p.sh if full server path is known
|
The default configuration for platform.sh (.platform.app.yaml) allows access to uploaded files if you know or can guess their location, regardless of whether roles grant content read access to the content containing those files. If you're using Legacy Bridge, the default configuration also allows access to certain legacy files that should not be readable, including the legacy var directory and extension directories.
| null |
2021-09-14T18:35:35Z
|
2021-09-14T20:24:44Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/ibexa/post-install/security/advisories/GHSA-gqcf-83rq-gpfr', 'https://github.com/ibexa/post-install', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-006-storage-and-legacy-files-accessible-if-path-is-known'}
| null |
Packagist
|
GHSA-rr8m-29g8-8cgc
|
SQL Injection in Fork CMS
|
Fork CMS is vulnerable to SQL injection through marking blog comments on bulk as spam in versions prior to 5.11.1.
|
{'CVE-2022-1064'}
|
2022-04-01T20:06:24Z
|
2022-03-26T00:00:32Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1064', 'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069', 'https://github.com/forkcms/forkcms', 'https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40'}
| null |
Packagist
|
GHSA-2xhg-w2g5-w95x
|
CSV Injection in symfony/serializer
|
Description
-----------
CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. When a spreadsheet program opens a CSV, any cell starting with `=` is interpreted by the software as a formula and could be abused by an attacker.
In Symfony 4.1, we've added the opt-in `csv_escape_formulas` option in `CsvEncoder`, to prefix all cells starting by `=`, `+`, `-` or `@` by a tab `\t`.
Since then, OWASP added 2 chars in that list:
- Tab (0x09)
- Carriage return (0x0D)
This makes our previous prefix char (Tab `\t`) part of the vulnerable characters, and [OWASP suggests](https://owasp.org/www-community/attacks/CSV_Injection) using the single quote `'` for prefixing the value.
Resolution
----------
Symfony now follows the OWASP recommendations and use the single quote `'` to prefix formulas and adds the prefix to cells starting by `\t`, `\r` as well as `=`, `+`, `-` and `@`.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8) for branch 4.4.
Credits
-------
We would like to thank Jake Barwell for reporting the issue and Jérémy Derussé for fixing the issue.
|
{'CVE-2021-41270'}
|
2021-12-06T21:36:47Z
|
2021-11-24T21:01:23Z
|
MODERATE
| null |
{'CWE-1236'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3BPT4SF6SIXFMZARDWED5T32J7JEH3EP/', 'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41270', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QSREFD2TJT5LWKM6S4MD3W26NQQ5WJUP/', 'https://github.com/symfony/symfony', 'https://github.com/symfony/symfony/security/advisories/GHSA-2xhg-w2g5-w95x', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12'}
| null |
Packagist
|
GHSA-x7g2-wrrp-r6h3
|
Use of a Broken or Risky Cryptographic Algorithm
|
## ✍️ Description
The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control
## 🕵️♂️ Proof of Concept
Numerous examples and attack implementations can be found in this paper . If you're looking for a practical tool that can crack your mt_rand implementation's seed value, see this project and run the following commands in a console with php5 and OpenWall's tool installed:
`root$ php -r 'mt_srand(13333337); echo mt_rand( ), "\n";'`
After that, copy the output (1863134308) and execute the following commands:
`root$ gcc php_mt_seed.c -o php_mt_seedroot$ ./php_mt_seed 1863134308`
After waiting ~1 minute you should have a few possible seeds corresponding to their PHP versions, next to your installed PHP version you should see something akin to:
seed = 0x00cb7359 = 13333337 (PHP 7.1.0+)
Hey, that's your seed!
## 💥 Impact
An attacker could takeover accounts at random by enumerating and using access tokens.
## 📝 References
- https://openwall.com/php_mt_seedhttps://crypto.di.uoa.gr/CRYPTO.SEC/Randomness_Attacks_files/paper.pdf
- https://github.com/mautic/mautic/blob/5213e320b4ef4d0c51bb84c1d46a1071e8e4f7fc/app/bundles/PointBundle/Controller/TriggerController.php#L187
- https://github.com/mautic/mautic/releases/tag/3.3.4
- https://github.com/mautic/mautic/releases/tag/4.0.0
|
{'CVE-2021-27913'}
|
2021-10-21T14:28:25Z
|
2021-09-01T18:41:06Z
|
LOW
| null |
{'CWE-327'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27913', 'https://github.com/mautic/mautic', 'https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3'}
| null |
Packagist
|
GHSA-rf3w-29h3-r636
|
Arbitrary Code Execution in feehi/cms
|
An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file.
|
{'CVE-2020-21322'}
|
2021-09-17T17:54:21Z
|
2021-09-20T20:45:35Z
|
HIGH
| null |
{'CWE-434'}
|
{'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9', 'https://github.com/liufee/cms', 'https://nvd.nist.gov/vuln/detail/CVE-2020-21322', 'https://github.com/liufee/cms/issues/44'}
| null |
Packagist
|
GHSA-6gjf-7w99-j7x7
|
Deleted Admin Can Sign In to Admin Interface
|
### Impact
Assuming an administrator once had previous access to the admin interface, they may still be able to sign in to the backend using October CMS v2.0.
### Patches
The issue has been patched in v2.1.12
### Workarounds
- Reset the password of the deleted accounts to prevent them from signing in.
- Please contact hello@octobercms.com for code change instructions if you are unable to upgrade.
### References
Credits to:
• Daniel Bidala
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
|
{'CVE-2021-41126'}
|
2021-11-09T20:32:24Z
|
2021-10-06T17:46:40Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41126', 'https://github.com/octobercms/october', 'https://github.com/octobercms/october/security/advisories/GHSA-6gjf-7w99-j7x7', 'https://octobercms.com/changelog'}
| null |
Packagist
|
GHSA-pccm-j6vj-jwwf
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webma` file upload.
|
{'CVE-2022-0962'}
|
2022-03-29T18:54:13Z
|
2022-03-15T00:00:54Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0962', 'https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
| null |
Packagist
|
GHSA-pq2f-3fg3-rw99
|
SQL Injection in WordPress Zero Spam WordPress plugin
|
The WordPress Zero Spam WordPress plugin before 5.2.13 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard, leading to a SQL injection
|
{'CVE-2022-0254'}
|
2022-03-29T15:26:17Z
|
2022-03-15T00:00:57Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0254', 'https://plugins.trac.wordpress.org/changeset/2680906', 'https://plugins.trac.wordpress.org/changeset/2660225', 'https://github.com/Highfivery/zero-spam-for-wordpress', 'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3', 'https://wpscan.com/vulnerability/ae54681f-7b89-408c-b0ee-ba4a520db997'}
| null |
Packagist
|
GHSA-v4cr-m5f8-gxw8
|
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF)
|
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-4092'}
|
2021-12-15T15:20:43Z
|
2021-12-16T14:14:56Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e', 'https://github.com/yetiforcecompany/yetiforcecrm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4092', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'}
| null |
Packagist
|
GHSA-m8rp-q82r-c5mf
|
Cross-site Scripting in microweber
|
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
|
{'CVE-2022-0278'}
|
2022-01-27T18:31:46Z
|
2022-01-21T18:06:49Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0278', 'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7'}
| null |
Packagist
|
GHSA-x3g3-jh26-76cf
|
Cross-site Scripting in livehelperchat
|
LiveHelperChat is vulnerable to Stored XSS at the Name field in the Admin themes of System configuration.
|
{'CVE-2022-0375'}
|
2022-02-02T16:05:32Z
|
2022-01-28T23:06:00Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://github.com/livehelperchat/livehelperchat/', 'https://huntr.dev/bounties/28e1c356-6eaa-4d93-af56-938e3b4d40a7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0375'}
| null |
Packagist
|
GHSA-pcwq-7wrw-r8jv
|
Cross-site Scripting in intelliants/subrion
|
Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion CMS v4.2.1 in the Configuration panel.
|
{'CVE-2020-18325'}
|
2022-03-14T23:02:20Z
|
2022-03-05T00:00:45Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/intelliants/subrion', 'https://nvd.nist.gov/vuln/detail/CVE-2020-18325', 'https://github.com/hamm0nz/CVE-2020-18325'}
| null |
Packagist
|
GHSA-6vx5-cg2p-7g5v
|
Unrestricted Upload of File with Dangerous Type in microweber
|
Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.12.
|
{'CVE-2022-0912'}
|
2022-03-22T21:37:48Z
|
2022-03-12T00:00:35Z
|
MODERATE
| null |
{'CWE-434'}
|
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789', 'https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0912'}
| null |
Packagist
|
GHSA-jc43-qrrp-98f5
|
Insert tag injection in the Contao login module
|
Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. It is possible to inject insert tags into the login module which will be replaced when the page is rendered. It is recommended to update to Contao 4.8.6. There are currently no known workarounds at this time.
|
{'CVE-2019-19714'}
|
2022-05-05T16:47:15Z
|
2019-12-17T22:53:40Z
|
MODERATE
| null |
{'CWE-116'}
|
{'https://github.com/contao/contao/security/advisories/GHSA-jc43-qrrp-98f5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19714', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19714.yaml', 'https://github.com/contao/contao', 'https://contao.org/en/news.html', 'https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html'}
| null |
Packagist
|
GHSA-qjhr-c23f-w76q
|
Inline JS XSS vulnerability in Mautic
|
### Impact
Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form.
### Patches
Upgrade to 2.12.0 or later.
### Workarounds
None
### References
https://github.com/mautic/mautic/releases/tag/2.12.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2017-1000488'}
|
2021-01-19T21:14:13Z
|
2021-01-19T21:16:24Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000488', 'https://github.com/mautic/mautic/security/advisories/GHSA-qjhr-c23f-w76q', 'https://github.com/mautic/mautic/releases/tag/2.12.0'}
| null |
Packagist
|
GHSA-4cx9-7xqc-2jxm
|
Reflected cross-site scripting in francoisjacquet/rosariosis
|
Reflected Cross-Site Scripting vulnerability in Modules.php in RosarioSIS Student Information System < 6.5.1 allows remote attackers to execute arbitrary web script via embedding javascript or HTML tags in a GET request.
|
{'CVE-2020-13278'}
|
2021-05-05T22:12:14Z
|
2021-05-06T18:54:48Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://gitlab.com/francoisjacquet/rosariosis/-/issues/282', 'https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13278.json', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/9cb4fec5fe177f1d3716708b46d1958eac477ebe', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13278'}
| null |
Packagist
|
GHSA-xv69-f7x5-r4qw
|
Cross-Site Scripting via Attribute Set Name
|
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code into the attribute set name when listing the products.
|
{'CVE-2019-8145'}
|
2021-08-18T22:18:29Z
|
2019-11-12T22:59:43Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-8145', 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8145.yaml'}
| null |
Packagist
|
GHSA-8rc5-hx3v-2jg7
|
Sanitizer bypass in svg-sanitizer
|
It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the "xlink:href" attribute due to mishandling of the xlink namespace by the sanitizer.
|
{'CVE-2019-10772'}
|
2021-08-19T19:25:06Z
|
2020-02-27T20:36:29Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10772', 'https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969'}
| null |
Packagist
|
GHSA-hrfh-fp4x-crrq
|
Persistent XSS in newsletter module in Shopware
|
### Impact
Persistent XSS in newsletter module
### Patches
We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020
| null |
2020-11-13T18:00:57Z
|
2020-11-13T18:26:06Z
|
LOW
| null |
{'CWE-79'}
|
{'https://github.com/shopware/shopware/security/advisories/GHSA-hrfh-fp4x-crrq', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020'}
| null |
Packagist
|
GHSA-v8wr-r69p-mmwx
|
Unrestricted Upload of File with Dangerous Type in Drupal core
|
Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
|
{'CVE-2020-13675'}
|
2022-02-23T19:14:17Z
|
2022-02-12T00:00:47Z
|
CRITICAL
| null |
{'CWE-434', 'CWE-284'}
|
{'https://www.drupal.org/sa-core-2021-008', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13675', 'https://github.com/drupal/core'}
| null |
Packagist
|
GHSA-2gc7-w4hw-rr2m
|
class.upload.php in verot.net omits .pht from the set of dangerous file extensions
|
class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4, as used in the K2 extension for Joomla! and other products, omits .pht from the set of dangerous file extensions, a similar issue to CVE-2019-19576.
|
{'CVE-2019-19634'}
|
2021-08-19T19:29:17Z
|
2020-02-28T01:10:17Z
|
CRITICAL
| null |
{'CWE-434'}
|
{'https://medium.com/@jra8908/cve-2019-19634-arbitrary-file-upload-in-class-upload-php-ccaf9e13875e', 'https://github.com/verot/class.upload.php/blob/2.0.4/src/class.upload.php#L3068', 'https://github.com/jra89/CVE-2019-19634', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19634'}
| null |
Packagist
|
GHSA-8pfh-mm2g-hmc3
|
Authenticated Server Side Request Forgery
|
### Impact
Authenticated Server Side Request Forgery
### Patches
We recommend to update to the current version 6.3.4.1. You can get the update to 6.3.4.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin:
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-12-2020
### Credits
We would like to thank <a rel="noopener" href="https://reqon.nl">REQON B.V.</a> for reporting this issue.
| null |
2020-12-21T17:46:22Z
|
2020-12-21T18:01:24Z
|
LOW
| null |
{'CWE-918'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-8pfh-mm2g-hmc3'}
| null |
Packagist
|
GHSA-r336-jxfr-4c3c
|
Path Traversal in LibreNMS
|
An issue was discovered in LibreNMS 1.50.1. An authenticated user can perform a directory traversal attack against the /pdf.php file with a partial filename in the report parameter, to cause local file inclusion resulting in code execution.
|
{'CVE-2019-12464'}
|
2021-08-17T22:42:30Z
|
2019-10-11T18:43:25Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.darkmatter.ae/xen1thlabs/librenms-limited-local-file-inclusion-via-directory-traversal-vulnerability-xl-19-019/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12464'}
| null |
Packagist
|
GHSA-vhfp-9wvj-gwvg
|
XML External Entity vulnerability in MODX CMS
|
A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).
|
{'CVE-2020-25911'}
|
2021-11-03T14:51:31Z
|
2021-11-01T19:19:43Z
|
CRITICAL
| null |
{'CWE-611'}
|
{'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a', 'https://github.com/modxcms/revolution', 'https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25911', 'https://github.com/modxcms/revolution/issues/15237', 'https://github.com/modxcms/revolution/pull/15238'}
| null |
Packagist
|
GHSA-cxg7-84wp-8pcq
|
yetiforcecrm is vulnerable to Business Logic Errors
|
yetiforcecrm is vulnerable to Business Logic Errors.
|
{'CVE-2021-4117'}
|
2022-01-03T15:47:42Z
|
2021-12-16T21:01:07Z
|
HIGH
| null | null |
{'https://github.com/yetiforcecompany/yetiforcecrm', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4117', 'https://huntr.dev/bounties/0b81e572-bdc9-4caf-aa02-81f3c7ad7c0a'}
| null |
Packagist
|
GHSA-5rg2-6qr5-2xp8
|
Cross-site Scripting in snipe-it
|
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-3863'}
|
2021-10-25T20:08:18Z
|
2021-10-21T17:49:18Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3863', 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0', 'https://github.com/snipe/snipe-it'}
| null |
Packagist
|
GHSA-fm35-jgg3-3grx
|
NaN/INF in serverbound movement packets can crash clients and servers
|
### Impact
A malicious client may send a `MovePlayerPacket` to the server whose position or rotation contains NaN or INF. Since neither the server nor vanilla client handles this properly, a number of interesting side effects come into play.
- The server may crash in various ways if this exploit is used, because some mathematical operations on NaN/INF generate PHP warnings, which are converted into exceptions.
- Clients may not be able to see other clients who have a NaN/INF rotation.
- Clients may also crash in such cases.
### Patches
A patch for this was included in the 3.18.1 release: https://github.com/pmmp/PocketMine-MP/commit/fb20bb38327b4c08ee3976640cd0dd547388a638
### Workarounds
Workarounds could be implemented as plugins using `DataPacketReceiveEvent` to block any inbound movement packets containing bogus values.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [pmmp/PocketMine-MP](https://github.com/pmmp/PocketMine-MP)
- Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null |
2022-03-18T17:54:38Z
|
2022-03-18T17:54:38Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-fm35-jgg3-3grx'}
| null |
Packagist
|
GHSA-9vh6-qfv6-vcqp
|
snipe-IT vulnerable to host header injection
|
Snipe-IT is a free, open-source IT asset/license management systemIn Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This can lead to account take over.
|
{'CVE-2022-23064'}
|
2022-05-03T06:29:50Z
|
2022-05-03T00:00:43Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23064', 'https://github.com/snipe/snipe-it'}
| null |
Packagist
|
GHSA-8vh3-29mr-m9xg
|
Inadequate Encryption Strength in showdoc
|
showdoc makes use of a hardcoded salt in its user password hash function
|
{'CVE-2021-3680'}
|
2021-08-30T21:53:31Z
|
2021-09-01T18:31:23Z
|
MODERATE
| null |
{'CWE-326'}
|
{'https://huntr.dev/bounties/76b49607-fba9-4100-9be7-cb459fe6cfe2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3680', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/blob/fd1740234a12804b45af9cac3563567d83ba414d/server/Application/Home/Model/UserModel.class.php#L20'}
| null |
Packagist
|
GHSA-p3w3-4ppm-c3f6
|
Cross site scripting in FacturaScripts
|
FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format.
|
{'CVE-2022-1514'}
|
2022-04-29T21:02:47Z
|
2022-04-29T00:00:23Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1514', 'https://github.com/NeoRazorX/facturascripts', 'https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c', 'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'}
| null |
Packagist
|
GHSA-2v7p-f4qm-r5pc
|
SQL Injection found in Pimcore
|
Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6.
|
{'CVE-2022-1429'}
|
2022-05-03T21:01:41Z
|
2022-04-23T00:03:03Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82', 'https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1429'}
| null |
Packagist
|
GHSA-6gm7-j668-w6h9
|
SQL Injection in Pimcore
|
Pimcore prior to version 10.3.5 is vulnerable SQL injection in RecyclebinController.php. This vulnerability affects data confidentiality.
|
{'CVE-2022-1219'}
|
2022-04-22T20:42:11Z
|
2022-04-09T00:00:30Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1219', 'https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6', 'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'}
| null |
Packagist
|
GHSA-m4hj-wg2r-qpcr
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-3776'}
|
2021-11-17T21:10:57Z
|
2021-11-15T23:13:34Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3776', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304'}
| null |
Packagist
|
GHSA-4q96-9f63-p7jj
|
Path Traversal in ImpressCMS
|
ImpressCMS before 1.4.3 allows libraries/image-editor/image-edit.php image_temp Directory Traversal.
|
{'CVE-2021-26601'}
|
2022-03-30T19:53:50Z
|
2022-03-29T00:01:16Z
|
HIGH
| null |
{'CWE-22'}
|
{'http://packetstormsecurity.com/files/166402/ImpressCMS-1.4.2-Path-Traversal.html', 'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26601', 'http://seclists.org/fulldisclosure/2022/Mar/44', 'https://github.com/ImpressCMS/impresscms', 'https://hackerone.com/reports/1081878', 'https://github.com/ImpressCMS/impresscms/pull/915', 'https://github.com/ImpressCMS/impresscms/issues/914', 'http://karmainsecurity.com/KIS-2022-02'}
| null |
Packagist
|
GHSA-gf8j-v8x5-h9qp
|
XSS in enshrined/svg-sanitize due to mishandled script and data values in attributes
|
enshrined/svg-sanitize before 0.12.0 mishandles script and data values in attributes, as demonstrated by unexpected whitespace such as in the javascript	:alert substring.
|
{'CVE-2019-18857'}
|
2022-02-16T22:20:26Z
|
2020-01-08T17:15:37Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/darylldoyle/svg-sanitizer/compare/0.11.0...0.12.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18857', 'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0', 'https://github.com/darylldoyle/svg-sanitizer'}
| null |
Packagist
|
GHSA-g9xh-3w5g-229r
|
SQL Injection in LibreNMS
|
An issue was discovered in LibreNMS through 1.47. It does not parameterize all user supplied input within database queries, resulting in SQL injection. An authenticated attacker can subvert these database queries to extract or manipulate data, as demonstrated by the graph.php sort parameter.
|
{'CVE-2019-10671'}
|
2021-08-18T17:22:23Z
|
2019-10-11T18:43:33Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://www.darkmatter.ae/xen1thlabs/librenms-multiple-sql-injection-vulnerability-xl-19-025/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10671'}
| null |
Packagist
|
GHSA-mf79-f657-47ww
|
Insufficient Session Expiration in Admidio
|
Admidio prior to version 4.1.9 is vulnerable to insufficient session expiration. In vulnerable versions, changing the password in one session does not terminate sessions logged in with the old password, which could lead to unauthorized actors maintaining access to an account.
|
{'CVE-2022-0991'}
|
2022-03-28T15:39:13Z
|
2022-03-20T00:00:29Z
|
HIGH
| null |
{'CWE-613'}
|
{'https://github.com/Admidio/admidio/issues/1238', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0991', 'https://github.com/Admidio/admidio/releases/tag/v4.1.9', 'https://github.com/Admidio/admidio', 'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a', 'https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4'}
| null |
Packagist
|
GHSA-vrgh-5w3c-ggf8
|
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
|
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG).
|
{'CVE-2021-3990'}
|
2021-12-03T15:18:33Z
|
2021-12-03T20:38:50Z
|
MODERATE
| null |
{'CWE-338'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3990', 'https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'}
| null |
Packagist
|
GHSA-vhm6-gw82-6f8j
|
Cross site scripting in LibreNMS
|
LibreNMS prior to version 22.2.2 is vulnerable to cross-site scripting.
|
{'CVE-2022-0772'}
|
2022-03-08T18:06:06Z
|
2022-02-28T00:00:34Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/librenms/librenms', 'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0772', 'https://huntr.dev/bounties/faae29bd-c43a-468d-8af6-2b6aa4d40f09'}
| null |
Packagist
|
GHSA-xh55-2fqp-p775
|
Command injection in mail agent settings
|
### Impact
Command injection in mail agent settings
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
|
{'CVE-2021-37708'}
|
2021-08-26T19:40:02Z
|
2021-08-30T16:14:09Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37708', 'https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775', 'https://github.com/shopware/platform'}
| null |
Packagist
|
GHSA-w2pm-r78h-4m7v
|
OS Command Injection in Laravel Framework
|
OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17.
|
{'CVE-2020-19316'}
|
2022-01-05T17:39:12Z
|
2022-01-06T23:13:42Z
|
HIGH
| null |
{'CWE-78'}
|
{'http://www.netbytesec.com/advisories/OSCommandInjectionInLaravelFramework/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19316', 'https://github.com/laravel/framework', 'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'}
| null |
Packagist
|
GHSA-8x44-pwr2-rgc6
|
Cross-site Scripting in pimcore
|
Pimcore settings module is vulnerable to stored cross site scripting
|
{'CVE-2022-0348'}
|
2022-02-03T19:56:45Z
|
2022-01-28T23:05:03Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0348', 'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a', 'https://huntr.dev/bounties/250e79be-7e5d-4ba3-9c34-655e39ade2f4'}
| null |
Packagist
|
GHSA-7h8v-2v8x-h264
|
SQL Injection in moodle
|
In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.
|
{'CVE-2020-25700'}
|
2021-03-24T23:17:53Z
|
2021-03-29T20:42:19Z
|
MODERATE
| null |
{'CWE-89'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=1895427', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25700', 'https://moodle.org/mod/forum/discuss.php?d=413938', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}
| null |
Packagist
|
GHSA-6xxj-gcjq-wgf4
|
SQL injection in prestashop/prestashop
|
### Impact
Blind SQLi using Search filters with `orderBy` and `sortOrder` parameters
### Patches
The problem is fixed in 1.7.8.2
|
{'CVE-2021-43789'}
|
2021-12-08T19:28:53Z
|
2021-12-07T21:23:17Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4', 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2', 'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43789', 'https://github.com/PrestaShop/PrestaShop', 'https://cwe.mitre.org/data/definitions/89.html', 'https://github.com/PrestaShop/PrestaShop/issues/26623'}
| null |
Packagist
|
GHSA-w8cj-mvf9-mpc9
|
OS Command injection in Bolt
|
Bolt before 3.7.2 does not restrict filter options in a Request in the Twig context, and is therefore inconsistent with the "How to Harden Your PHP for Better Security" guidance.
|
{'CVE-2020-28925'}
|
2021-04-07T18:29:19Z
|
2021-05-06T18:53:29Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28925', 'https://github.com/bolt/bolt/compare/3.7.1...3.7.2'}
| null |
Packagist
|
GHSA-gm2x-6475-g9r8
|
XSS Injection in Media Collection Title was possible
|
### Impact
A logged in admin user was possible to add a script injection (XSS) in the collection title which was executed.
### Workarounds
Manual patching the js files.
### For more information
If you have any questions or comments about this advisory:'
- Email us at [security@sulu.io](mailto:security@sulu.io)
|
{'CVE-2021-32737'}
|
2021-07-13T14:57:56Z
|
2021-07-02T18:32:18Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32737', 'https://github.com/sulu/sulu/releases/tag/1.6.41', 'https://github.com/sulu/sulu/security/advisories/GHSA-gm2x-6475-g9r8'}
| null |
Packagist
|
GHSA-32wx-4gxx-h48f
|
Users can edit the tags of any discussion
|
This advisory concerns a vulnerability which was patched and publicly released on October 5, 2020.
### Impact
This vulnerability allowed any registered user to edit the tags of any discussion for which they have READ access using the REST API.
Users were able to remove any existing tag, and add any tag in which they are allowed to create discussions. The chosen tags still had to match the configured Tags minimums and maximums.
By moving the discussion to new tags, users were able to go around permissions applied to restricted tags. Depending on the setup, this can include publicly exposing content that was only visible to certain groups, or gain the ability to interact with content where such interaction was limited.
The full impact varies depending on the configuration of permissions and restricted tags, and which community extensions are being used. All tag-scoped permissions offered by extensions are impacted by this ability to go around them.
Forums that don't use restricted tags and don't use any extension that relies on tags for access control should not see any security impact. An update is still required to stop users from being able to change any discussion's tags.
Forums that don't use the Tags extension are unaffected.
### Patches
The fix will be available in version v0.1.0-beta.14 with Flarum beta 14. The fix has already been back-ported to Flarum beta 13 as version v0.1.0-beta.13.2 of the Tags extension.
### Workarounds
Version v0.1.0-beta.13.2 of the Tags extension allows existing Flarum beta 13 forums to fix the issue without the need to update to beta 14.
Forums that have not yet updated to Flarum beta 13 are encouraged to update as soon as possible.
### References
- [Release announcement](https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132)
- [GitHub issue](https://github.com/flarum/core/issues/2355)
### For more information
If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support).
If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy).
| null |
2021-01-26T03:45:41Z
|
2021-01-29T18:13:32Z
|
MODERATE
| null |
{'CWE-639'}
|
{'https://github.com/flarum/core/issues/2355', 'https://github.com/flarum/tags/security/advisories/GHSA-32wx-4gxx-h48f', 'https://packagist.org/packages/flarum/tags', 'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d', 'https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132'}
| null |
Packagist
|
GHSA-f545-vpwp-r9j7
|
showdoc is vulnerable to URL Redirection to Untrusted Site
|
showdoc is vulnerable to URL Redirection to Untrusted Site.
|
{'CVE-2021-3989'}
|
2021-12-03T15:18:14Z
|
2021-12-03T20:41:35Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614', 'https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3989'}
| null |
Packagist
|
GHSA-5fvx-5p2r-4mvp
|
Open Redirect in firefly-iii
|
firefly-iii is vulnerable to URL Redirection to Untrusted Site
|
{'CVE-2021-3851'}
|
2021-10-25T20:08:26Z
|
2021-10-21T17:48:41Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/firefly-iii/firefly-iii/', 'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d', 'https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3851'}
| null |
Packagist
|
GHSA-j586-cj67-vg4p
|
Cross-Site Request Forgery in Drupal core
|
The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing" permission from untrusted users will not fully mitigate the vulnerability.
|
{'CVE-2020-13674'}
|
2022-02-23T19:23:39Z
|
2022-02-12T00:00:47Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://www.drupal.org/sa-core-2021-007', 'https://github.com/drupal/core', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13674'}
| null |
Packagist
|
GHSA-34hv-f45p-4qfq
|
Open redirect in wwbn/avideo
|
Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page. A patch is available on the `master` branch of the repository.
|
{'CVE-2022-27463'}
|
2022-04-19T14:13:44Z
|
2022-04-06T00:01:29Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://avideo.tube/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27463', 'https://github.com/WWBN/AVideo', 'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'}
| null |
Packagist
|
GHSA-pqm6-cgwr-x6pf
|
Signature validation bypass in XmlSecLibs
|
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
|
{'CVE-2019-3465'}
|
2021-08-18T22:14:37Z
|
2019-11-08T20:06:46Z
|
HIGH
| null |
{'CWE-347'}
|
{'https://www.debian.org/security/2019/dsa-4560', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCSR3V6LNWJAD37VQB6M2K7P4RQSCVFG/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AB34ILMJ67CUROBOR6YPKB46VHXLOAJ4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBE2SJSXG7J4XYLJ2H6HC2VPPOG2OMUN/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBKVDUZ7G5ZOUO4BFJWLNJ6VOKBQJX5U/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ESKJTWLE7QZBQ3EKMYXKMBQG3JDEJWM6/', 'https://simplesamlphp.org/security/201911-01', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNFMY5RRLU63P25HEBVDO5KAVI7TX7JV/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBSSRV5Q7JFCYO46A3EN624UZ4KXFQ2M/', 'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5', 'https://lists.debian.org/debian-lts-announce/2019/11/msg00003.html', 'https://www.tenable.com/security/tns-2019-09', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KID7C4AZPYYIZQIPSLANP4R2RQR6YK3/', 'https://seclists.org/bugtraq/2019/Nov/8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAWOVYLZKYDCQBLQEJCFAAD3KQTBPHXE/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3465'}
| null |
Packagist
|
GHSA-68v9-3jjq-rvp4
|
Exposure of Sensitive Information to an Unauthorized Actor
|
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
|
{'CVE-2021-32716'}
|
2021-06-25T15:30:08Z
|
2021-09-08T18:00:40Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32716', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021', 'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb'}
| null |
Packagist
|
GHSA-6wrh-279j-6hvw
|
HTTP caching is marking private HTTP headers as public in Shopware
|
### Impact
HTTP caching is marking private HTTP headers as public
## Patches
Fixed in recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
{'CVE-2022-24747'}
|
2022-03-18T20:15:05Z
|
2022-03-10T17:55:21Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24747', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022', 'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw'}
| null |
Packagist
|
GHSA-fv48-hjhp-94c7
|
Incorrect Authorization in TeamPass
|
The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function.
|
{'CVE-2020-12477'}
|
2021-07-26T21:12:18Z
|
2021-07-26T21:20:38Z
|
HIGH
| null |
{'CWE-863'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-12477', 'https://github.com/nilsteampassnet/TeamPass/issues/2761'}
| null |
Packagist
|
GHSA-v47f-vp3p-5j6h
|
"Cross-site scripting in ThinkAdmin"
|
"ThinkAdmin version v6 has a stored XSS vulnerability which allows remote attackers to inject an arbitrary web script or HTML."
|
{'CVE-2020-29315'}
|
2021-04-09T22:17:56Z
|
2021-05-06T18:53:46Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/zoujingli/ThinkAdmin/issues/255', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29315'}
| null |
Packagist
|
GHSA-5822-pw57-vv37
|
XSS vulnerability when listing users on add & modify server pages.
|
### Impact
An XSS vulnerability exists in versions of Pterodactyl Panel before 0.7.19. Affected versions do not properly sanitize account names before rendering them to the dropdown selector in the admin area when creating or modifying a server.
### Patches
This XSS has been addressed in 0.7.19 and will be rolled forwards into the 1.0-rc.7 release.
### Workarounds
No workaround exists without manual patching. See https://github.com/pterodactyl/panel/pull/2441/files for the files changed.
### For more information
If you have any questions or comments about this advisory please reach out on Discord, or by emailing `dane` at `pterodactyl` dot `io`.
_Thank you to Sergej for the responsible disclosure of this issue._
| null |
2021-10-04T21:25:08Z
|
2020-10-08T20:13:19Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pterodactyl/panel/security/advisories/GHSA-5822-pw57-vv37', 'https://github.com/pterodactyl/panel'}
| null |
Packagist
|
GHSA-rfcf-m67m-jcrq
|
Authentication granted to all firewalls instead of just one
|
Description
-----------
When an application defines multiple firewalls, the authenticated token delivered by one of the firewalls is available to all other firewalls. This can be abused when the application defines different providers for different parts of an application. In such a situation, a user authenticated on one part of the application is considered authenticated on the whole application.
Resolution
----------
We now ensure that the authenticated token is only available for the firewall that generates it.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728) for branch 5.3.
Credits
-------
I would like to thank Bogdan, gndk, Paweł Warchoł, Warxcell, and Adrien Lamotte for reporting the issue and Wouter J for fixing the issue.
|
{'CVE-2021-32693'}
|
2021-10-21T13:55:20Z
|
2021-06-21T17:03:44Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://symfony.com/blog/cve-2021-32693-authentication-granted-to-all-firewalls-instead-of-just-one', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32693', 'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728', 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129', 'https://github.com/symfony/symfony/security/advisories/GHSA-rfcf-m67m-jcrq', 'https://github.com/symfony/security-http'}
| null |
Packagist
|
GHSA-r64m-qchj-hrjp
|
Webcache Poisoning in shopware/platform and shopware/core
|
### Impact
Webcache Poisoning via X-Forwarded-Prefix and sub-request
### Patches
We recommend updating to the current version 6.4.6.1. You can get the update to 6.4.6.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
| null |
2021-11-24T19:58:48Z
|
2021-11-24T20:05:19Z
|
CRITICAL
| null |
{'CWE-444'}
|
{'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-r64m-qchj-hrjp'}
| null |
Packagist
|
GHSA-43gj-mj2w-wh46
|
Cross-Site Scripting in TYPO3 CMS Form Engine
|
In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.17 and greater than or equal to 10.0.0 and less than 10.4.2, it has been discovered that HTML `placeholder` attributes containing data of other database records are vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described.
### References
* https://typo3.org/security/advisory/typo3-core-sa-2020-002
|
{'CVE-2020-11064'}
|
2021-01-08T20:16:50Z
|
2020-05-13T23:17:48Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-43gj-mj2w-wh46', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11064'}
| null |
Packagist
|
GHSA-4rhm-m2fp-hx7q
|
Potential CSV Injection vector in OctoberCMS
|
### Impact
Any users with the ability to modify any data that could eventually be exported as a CSV file from the `ImportExportController` could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successful attack can be completed:
1. Have found a vulnerability in the victim's spreadsheet software of choice.
2. Control data that would potentially be exported through the `ImportExportController` by a theoretical victim.
3. Convince the victim to export above data as a CSV and run it in vulnerable spreadsheet software while also bypassing any sanity checks by said software.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a & https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484 to your installation manually if unable to upgrade to Build 466.
### References
Reported by @chrisvidal initially & [Sivanesh Ashok](https://stazot.com/) later.
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
Given the number of hoops that a potential attacker would have to jump through, this vulnerability really boils down to the possibility of abusing the trust that a user may have in the export functionality of the project. Thus, this has been rated low severity as it requires vulnerabilities to also exist in other software used by any potential victims as well as successful social engineering attacks.
|
{'CVE-2020-5299'}
|
2021-03-04T18:26:33Z
|
2020-06-03T21:58:35Z
|
MODERATE
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5299', 'https://github.com/octobercms/october/security/advisories/GHSA-4rhm-m2fp-hx7q', 'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a', 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484', 'http://seclists.org/fulldisclosure/2020/Aug/2', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html'}
| null |
Packagist
|
GHSA-h5h8-pc6h-jvvx
|
Missing argument delimiter can lead to code execution via VCS repository URLs or source download URLs on systems with Mercurial in composer
|
URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow commands to be executed in the HgDriver if hg/Mercurial is installed on the system.
### Impact
- The impact to Composer users directly is limited as the composer.json file is typically under their own control and source download URLs can only be supplied by third party Composer repositories they explicitly trust to download and execute source code from, e.g. Composer plugins.
- The main impact is to services passing user input to Composer, including Packagist.org and Private Packagist. This allowed users to trigger remote command injection. The vulnerability has been patched on Packagist.org and Private Packagist within 12h of receiving the initial vulnerability report and based on a review of logs, to the best of our knowledge, was not abused by anyone.
- Other services/tools using VcsRepository/VcsDriver or derivatives may also be vulnerable and should upgrade their composer/composer dependency immediately
### Patches
1.10.22 and 2.0.13 include patches for this issue.
|
{'CVE-2021-29472'}
|
2021-04-27T20:33:49Z
|
2021-04-29T21:52:04Z
|
HIGH
| null |
{'CWE-94', 'CWE-88'}
|
{'https://lists.debian.org/debian-lts-announce/2021/05/msg00009.html', 'https://www.debian.org/security/2021/dsa-4907', 'https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAQUAMGO4Q4BLNZ2OH4CXQD7UK4IO2GE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN3DMFH42BJW45VT6FYF2RXKC26D6VC2/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29472', 'https://getcomposer.org/'}
| null |
Packagist
|
GHSA-42qm-c3cf-9wv2
|
Code injection in dolibarr/dolibarr
|
Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s parameter
|
{'CVE-2022-0819'}
|
2022-03-10T15:55:03Z
|
2022-03-03T00:00:49Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0819', 'https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5', 'https://github.com/dolibarr/dolibarr'}
| null |
Packagist
|
GHSA-j66h-cc96-c32q
|
Cross-site Scripting in SilverStripe Framework
|
SilverStripe Framework through 4.8.1 allows XSS.
|
{'CVE-2021-36150'}
|
2021-10-18T14:54:10Z
|
2021-10-12T18:42:30Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36150', 'https://github.com/silverstripe/silverstripe-framework', 'https://github.com/silverstripe/silverstripe-framework/releases', 'https://www.silverstripe.org/download/security-releases/CVE-2021-36150'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.