ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Packagist
GHSA-gq77-3r6x-383w
Cross-site Scripting in ShowDoc
ShowDoc version 2.10.3 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0880'}
2022-03-23T14:22:08Z
2022-03-13T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0880', 'https://huntr.dev/bounties/df347aa9-ed9b-4f75-af99-c83b8aad3bcf', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'}
null
Packagist
GHSA-2q66-6cc3-6xm8
CSRF issue on preview pages in Bolt CMS
### Impact Bolt CMS lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview. ### Patches This has been fixed in Bolt 3.7.1 ### References Related issue: https://github.com/bolt/bolt/pull/7853
{'CVE-2020-4040'}
2021-01-08T20:13:19Z
2020-06-09T00:25:41Z
HIGH
null
{'CWE-352'}
{'https://github.com/bolt/bolt/pull/7853', 'http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html', 'https://github.com/bolt/bolt/security/advisories/GHSA-2q66-6cc3-6xm8', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4040', 'http://seclists.org/fulldisclosure/2020/Jul/4'}
null
Packagist
GHSA-5q5w-mqp6-g2gh
Unrestricted Upload of File with Dangerous Type in jsdecena/laracom
jsdecena/laracom prior to version 2.0.9 is vulnerable to Unrestricted Upload of File with Dangerous Type.
{'CVE-2022-0472'}
2022-02-11T20:51:14Z
2022-02-06T00:01:07Z
MODERATE
null
{'CWE-79', 'CWE-434'}
{'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0472', 'https://huntr.dev/bounties/cb5b8563-15cf-408c-9f79-4871ea0a8713', 'https://github.com/jsdecena/laracom'}
null
Packagist
GHSA-hhrj-wp42-32v3
Generation of Error Message Containing Sensitive Information in microweber
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0660'}
2022-02-28T22:18:00Z
2022-02-19T00:01:36Z
HIGH
null
{'CWE-209'}
{'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0660', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/01fd2e0d-b8cf-487f-a16c-7b088ef3a291'}
null
Packagist
GHSA-6x3j-x9rp-whxp
Unrestricted Upload of File with Dangerous Type in showdoc
showdoc prior to 2.10.2 is vulnerable to Unrestricted Upload of File with Dangerous Type.
{'CVE-2022-0409'}
2022-03-02T20:59:35Z
2022-02-20T00:00:32Z
HIGH
null
{'CWE-434'}
{'https://huntr.dev/bounties/c25bfad1-2611-4226-954f-009e50f966f7', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0409', 'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'}
null
Packagist
GHSA-9hx7-rg7w-xm79
XSS vulnerability in company name field in Mautic
### Impact Mautic version 2.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Company's name that can result in denial of service and execution of javascript code. ### Patches Update to 2.14.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2018-11200'}
2021-01-19T21:13:14Z
2021-01-19T21:16:26Z
MODERATE
null
{'CWE-79'}
{'https://github.com/mautic/mautic/releases/tag/2.14.0', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11200', 'https://github.com/mautic/mautic/security/advisories/GHSA-9hx7-rg7w-xm79'}
null
Packagist
GHSA-22hc-47cc-7x6f
Cross-site Scripting in Pimcore
Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting.
{'CVE-2022-0894'}
2022-03-28T21:38:55Z
2022-03-16T00:00:48Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95', 'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0894'}
null
Packagist
GHSA-43g8-79x3-j898
Unrestricted access to predictable file paths in hov/jobfair
An issue was discovered in the jobfair (aka Job Fair) extension before 1.0.13 and 2.x before 2.0.2 for TYPO3. The extension fails to protect or obfuscate filenames of uploaded files. This allows unauthenticated users to download files with sensitive data by simply guessing the filename of uploaded files (e.g., uploads/tx_jobfair/cv.pdf).
{'CVE-2021-43564'}
2021-11-17T21:24:11Z
2021-11-15T17:36:22Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43564', 'https://github.com/nhovratov/jobfair', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-018'}
null
Packagist
GHSA-54hw-mhgh-x4vc
Business Logic Errors in pimcore
In pimcore versions prior to 10.2.9 discounts could be negative resulting in unintended behavior.
{'CVE-2021-4146'}
2022-01-26T22:09:18Z
2022-01-26T22:09:49Z
MODERATE
null
null
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6', 'https://github.com/pimcore/pimcore/issues/11024', 'https://github.com/pimcore/pimcore/pull/11206', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4146', 'https://huntr.dev/bounties/47b37054-cafe-4f48-8b40-c86efc7fb760'}
null
Packagist
GHSA-vx8v-g3p3-88vg
Weak password hash in LiveHelperChat
The secrethash, which the application relies for multiple security measures, can be brute-forced. The hash is quite small, with only 10 characters of only hexadecimal, making 16^10 possilibities ( 1.099.511.627.776 ). The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with an GPU.
{'CVE-2022-1235'}
2022-04-19T18:01:53Z
2022-04-06T00:01:31Z
HIGH
null
{'CWE-916'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1235', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc', 'https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705'}
null
Packagist
GHSA-mg5h-9rhq-4cqx
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0937'}
2022-03-23T15:40:15Z
2022-03-15T00:01:02Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0937', 'https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'}
null
Packagist
GHSA-4qrp-27r3-66fj
Improper sanitize of SVG files during content upload ('Cross-site Scripting') in sylius/sylius
### Impact There is a possibility to upload an SVG file containing XSS code in the admin panel. In order to perform an XSS attack, the file itself has to be opened in a new card (or loaded outside of the IMG tag). The problem applies both to the files opened on the admin panel and shop pages. ### Patches The issue is fixed in versions: 1.9.10, 1.10.11, 1.11.2, and above. ### Workarounds If there is a need to upload an SVG image type, on-upload sanitization has to be added. The way to achieve this is to require a library that will do the trick: ``` composer require enshrined/svg-sanitize ``` The second step is all about performing a file content sanitization before writing it to the filesystem. It can be done by overwriting the service: ```php <?php declare(strict_types=1); namespace App\Uploader; use enshrined\svgSanitize\Sanitizer; use Gaufrette\Filesystem; use Sylius\Component\Core\Generator\ImagePathGeneratorInterface; use Sylius\Component\Core\Generator\UploadedImagePathGenerator; use Sylius\Component\Core\Model\ImageInterface; use Sylius\Component\Core\Uploader\ImageUploaderInterface; use Symfony\Component\HttpFoundation\File\File; use Webmozart\Assert\Assert; final class ImageUploader implements ImageUploaderInterface { private const MIME_SVG_XML = 'image/svg+xml'; private const MIME_SVG = 'image/svg'; /** @var Filesystem */ protected $filesystem; /** @var ImagePathGeneratorInterface */ protected $imagePathGenerator; /** @var Sanitizer */ protected $sanitizer; public function __construct( Filesystem $filesystem, ?ImagePathGeneratorInterface $imagePathGenerator = null ) { $this->filesystem = $filesystem; if ($imagePathGenerator === null) { @trigger_error(sprintf( 'Not passing an $imagePathGenerator to %s constructor is deprecated since Sylius 1.6 and will be not possible in Sylius 2.0.', self::class ), \E_USER_DEPRECATED); } $this->imagePathGenerator = $imagePathGenerator ?? new UploadedImagePathGenerator(); $this->sanitizer = new Sanitizer(); } public function upload(ImageInterface $image): void { if (!$image->hasFile()) { return; } /** @var File $file */ $file = $image->getFile(); Assert::isInstanceOf($file, File::class); $fileContent = $this->sanitizeContent(file_get_contents($file->getPathname()), $file->getMimeType()); if (null !== $image->getPath() && $this->has($image->getPath())) { $this->remove($image->getPath()); } do { $path = $this->imagePathGenerator->generate($image); } while ($this->isAdBlockingProne($path) || $this->filesystem->has($path)); $image->setPath($path); $this->filesystem->write($image->getPath(), $fileContent); } public function remove(string $path): bool { if ($this->filesystem->has($path)) { return $this->filesystem->delete($path); } return false; } protected function sanitizeContent(string $fileContent, string $mimeType): string { if (self::MIME_SVG_XML === $mimeType || self::MIME_SVG === $mimeType) { $fileContent = $this->sanitizer->sanitize($fileContent); } return $fileContent; } private function has(string $path): bool { return $this->filesystem->has($path); } /** * Will return true if the path is prone to be blocked by ad blockers */ private function isAdBlockingProne(string $path): bool { return strpos($path, 'ad') !== false; } } ``` After that, register service in the container: ```yaml services: sylius.image_uploader: class: App\Uploader\ImageUploader arguments: - '@gaufrette.sylius_image_filesystem' - '@Sylius\Component\Core\Generator\ImagePathGeneratorInterface' ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues) * Email us at security@sylius.com
{'CVE-2022-24749'}
2022-03-18T15:22:18Z
2022-03-14T22:38:14Z
MODERATE
null
{'CWE-79', 'CWE-80', 'CWE-434'}
{'https://github.com/Sylius/Sylius', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj', 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2', 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11', 'https://github.com/Sylius/Sylius/releases/tag/v1.9.10', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24749'}
null
Packagist
GHSA-m2v2-8227-59f5
Exposure of sensitive information in concrete5/core
In Concrete CMS (formerly concrete 5) below 8.5.7, IDOR Allows Unauthenticated User to Access Restricted Files If Allowed to Add Message to a Conversation.To remediate this, a check was added to verify a user has permissions to view files before attaching the files to a message in "add / edit message”.
{'CVE-2021-22967'}
2021-11-24T19:00:59Z
2021-11-23T17:54:39Z
MODERATE
null
{'CWE-639', 'CWE-200'}
{'https://hackerone.com/reports/869612', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22967', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}
null
Packagist
GHSA-7rpc-9m88-cf9w
OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS
There is an OS Command Injection Vulnerability on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. Target baserCMS 4.5.3 and earlier versions Vulnerability OS Command Injection Vulnerability. Countermeasures Update to the latest version of baserCMS Credits Akagi Yusuke @NTT-ME
{'CVE-2021-41243'}
2021-12-01T14:32:13Z
2021-12-01T18:29:42Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41243', 'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff', 'https://github.com/baserproject/basercms/security/advisories/GHSA-7rpc-9m88-cf9w', 'https://github.com/baserproject/basercms'}
null
Packagist
GHSA-g4gm-pxh3-29fq
Unrestricted Uploads in Concrete5
Concrete5 before 8.5.3 does not constrain the sort direction to a valid asc or desc value.
{'CVE-2020-14961'}
2021-11-02T18:42:15Z
2022-02-10T22:28:41Z
MODERATE
null
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-14961', 'https://github.com/concrete5/concrete5', 'https://github.com/concrete5/concrete5/releases/tag/8.5.3', 'https://github.com/concrete5/concrete5/pull/8651'}
null
Packagist
GHSA-9w8f-7wgr-2h7g
kimai2 is vulnerable to Improper Access Control
kimai2 is vulnerable to Improper Access Control
{'CVE-2021-3992'}
2021-12-03T15:37:45Z
2021-12-03T20:42:59Z
MODERATE
null
{'CWE-863', 'CWE-284'}
{'https://github.com/kevinpapst/kimai2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3992', 'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5', 'https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93'}
null
Packagist
GHSA-vfxj-qg93-7wwc
Sessions could be hijacked due to tracking contacts by an auto-incremented ID in Mautic
### Impact An issue was discovered in Mautic 1.x and 2.x before 2.13.0. It is possible to systematically emulate tracking cookies per contact due to tracking the contact by their auto-incremented ID. Thus, a third party can manipulate the cookie value with +1 to systematically assume being tracked as each contact in Mautic. It is then possible to retrieve information about the contact through forms that have progressive profiling enabled. ### Patches Update to 2.13.0 or later ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2018-10189'}
2021-01-19T21:13:34Z
2021-01-19T21:16:21Z
MODERATE
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-10189', 'https://github.com/mautic/mautic/security/advisories/GHSA-vfxj-qg93-7wwc', 'https://github.com/mautic/mautic/releases/tag/2.13.0'}
null
Packagist
GHSA-4xc7-x2jr-cr74
Improper Authorization in dolibarr/dolibarr
Dolibarr allows improper access control issues in the userphoto modulepart. The impact could lead to data exposure as the attached files and documents may contain sensitive information of relevant parties such as contacts, suppliers, invoices, orders, stocks, agenda, accounting and more.
{'CVE-2022-0731'}
2022-03-03T22:06:43Z
2022-02-24T00:00:52Z
MODERATE
null
{'CWE-863'}
{'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0731', 'https://huntr.dev/bounties/e242ab4e-fc70-4b2c-a42d-5b3ee4895de8', 'https://github.com/dolibarr/dolibarr'}
null
Packagist
GHSA-6675-wwqr-jhmf
Cross-site Scripting in GilaCMS
A stored cross-site scripting (XSS) vulnerability in GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.
{'CVE-2020-20695'}
2021-10-04T13:52:08Z
2021-09-30T17:12:56Z
MODERATE
null
{'CWE-79'}
{'https://github.com/GilaCMS/gila', 'https://nvd.nist.gov/vuln/detail/CVE-2020-20695', 'https://github.com/GilaCMS/gila/issues/52'}
null
Packagist
GHSA-w5hr-jm4j-9jvq
Sandbox escape through template_object in smarty
Sandbox protection could be bypassed through access to an internal Smarty object that should have been blocked. Sites that rely on [Smarty Security features](https://www.smarty.net/docs/en/advanced.features.tpl) should upgrade as soon as possible. Please upgrade to 3.1.39 or higher.
{'CVE-2021-26119'}
2022-05-03T03:42:06Z
2021-03-02T02:57:23Z
HIGH
null
null
{'https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html', 'https://security.gentoo.org/glsa/202105-06', 'https://github.com/smarty-php/smarty/security/advisories/GHSA-w5hr-jm4j-9jvq', 'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html', 'https://github.com/smarty-php/smarty/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26119', 'https://srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-escape-vulnerabilities.html'}
null
Packagist
GHSA-v8mp-hhjq-h4cj
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.ofd` file upload.
{'CVE-2022-0965'}
2022-03-29T17:36:00Z
2022-03-16T00:00:46Z
MODERATE
null
{'CWE-79'}
{'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0965', 'https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
null
Packagist
GHSA-5gm6-r79q-hfgw
Denial of service in direct_mail
The direct_mail extension through 5.2.3 for TYPO3 allows Denial of Service via log entries.
{'CVE-2020-12697'}
2021-05-21T23:08:20Z
2021-05-24T16:58:32Z
MODERATE
null
{'CWE-770'}
{'https://typo3.org/help/security-advisories', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12697', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005'}
null
Packagist
GHSA-wpww-4jf4-4hx8
Edit feed settings and others, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS). Impact: XSS via Arbitrary script execution. Attack vector is: Administrator must be logged in. Components are: Edit feed settings, Edit widget area, Sub site new registration, New category registration Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by Aquilao Null
{'CVE-2020-15273'}
2021-01-07T22:49:25Z
2020-11-04T21:08:38Z
LOW
null
{'CWE-79'}
{'https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8', 'https://packagist.org/packages/baserproject/basercms', 'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15273'}
null
Packagist
GHSA-7gm7-8q8v-9gf2
Server-Side Request Forgery (SSRF) in Shopware
### Impact The attacker can abuse the Admin SDK functionality on the server to read or update internal resources. ### Patches We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
{'CVE-2022-24871'}
2022-04-22T21:04:07Z
2022-04-22T21:04:07Z
HIGH
null
{'CWE-918'}
{'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24871', 'https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022', 'https://github.com/shopware/platform'}
null
Packagist
GHSA-73q4-j324-2qcc
Incorrect authorization in Drupal core
The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
{'CVE-2022-25270'}
2022-03-01T22:04:09Z
2022-02-18T00:00:36Z
MODERATE
null
{'CWE-863'}
{'https://www.drupal.org/sa-core-2022-004', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25270'}
null
Packagist
GHSA-f6p5-76fp-m248
URL Rewrite vulnerability in multiple zendframework components
zend-diactoros (and, by extension, Expressive), zend-http (and, by extension, Zend Framework MVC projects), and zend-feed (specifically, its PubSubHubbub sub-component) each contain a potential URL rewrite exploit. In each case, marshaling a request URI includes logic that introspects HTTP request headers that are specific to a given server-side URL rewrite mechanism. When these headers are present on systems not running the specific URL rewriting mechanism, the logic would still trigger, allowing a malicious client or proxy to emulate the headers to request arbitrary content.
null
2022-04-28T21:09:54Z
2022-04-28T21:09:54Z
HIGH
null
null
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-http/ZF2018-01.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-diactoros/ZF2018-01.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-feed/ZF2018-01.yaml'}
null
Packagist
GHSA-r6hh-5g3q-wwgc
Stored Cross-site Scripting in grav
Grav prior to 1.7.31 is vulnerable to stored cross-site scripting.
{'CVE-2022-0970'}
2022-03-28T22:27:36Z
2022-03-16T00:00:45Z
HIGH
null
{'CWE-79'}
{'https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0970', 'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8', 'https://github.com/getgrav/grav'}
null
Packagist
GHSA-qg7c-q3vq-rgxr
Leak of information via Store-API aggregations in shopware/platform and shopware/core
### Impact Leak of information via Store-API ### Patches We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021
null
2021-04-12T22:32:54Z
2021-04-13T15:13:26Z
CRITICAL
null
{'CWE-668'}
{'https://github.com/shopware/platform/security/advisories/GHSA-qg7c-q3vq-rgxr'}
null
Packagist
GHSA-qgpv-86r3-87fh
Cross-site Scripting in Parsedown
Parsedown version prior to 1.7.0 contains a Cross Site Scripting (XSS) vulnerability in `setMarkupEscaped` for escaping HTML that can result in JavaScript code execution. This attack appears to be exploitable via specially crafted markdown that allows it to side step HTML escaping by breaking AST boundaries. This vulnerability appears to have been fixed in 1.7.0 and later.
{'CVE-2018-1000162'}
2022-03-30T18:26:22Z
2022-03-30T18:26:22Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000162', 'https://github.com/erusev/parsedown/pull/495', 'https://github.com/Roave/SecurityAdvisories/issues/44#issuecomment-368594409', 'https://github.com/erusev/parsedown'}
null
Packagist
GHSA-mvrg-5c4w-7qv4
Cross-site Scripting in yii2cmf
yidashi yii2cmf 2.0 has XSS via the /search q parameter.
{'CVE-2018-10704'}
2021-05-03T17:59:02Z
2021-06-22T15:25:22Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-10704', 'https://github.com/yidashi/yii2cmf', 'http://testh5shanglv.minshengec.com:1024/phpmyadmin/doc/yii2cmf_xss.htm'}
null
Packagist
GHSA-fpqv-x9hm-35j9
Potential XSS vulnerability in Kitodo.Presentation
### Impact Kitodo.Presentation fails to properly encode URL parameters for output in HTML making it vulnerable to Cross Site Scripting (XSS). Only sites using the `ListView`, `Navigation` or `PageView` plugins are affected. It also includes jQuery 3.4.1 which is known to be vulnerable against Cross Site Scripting, although there is currently no known way to exploit this in Kitodo.Presentation. ### Patches An updated version of Kitodo.Presentation is available on [GitHub](https://github.com/kitodo/kitodo-presentation/releases/tag/v3.1.2), [Packagist](https://packagist.org/packages/kitodo/presentation#v3.1.2) and in the [TYPO3 Extension Repository](https://extensions.typo3.org/extension/dlf/). Users are advised to update as soon as possible. The issue was also fixed in release 2.3.1 of the 2.x branch, although it is generally not recommended to run this branch since it depends on an outdated TYPO3 version. ### References TYPO3 Security Advisory [TYPO3-EXT-SA-2020-015](https://typo3.org/security/advisory/typo3-ext-sa-2020-015) jQuery Security Advisory [GHSA-gxr4-xjj5-5px2](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2) Open Bug Bounty Report [OBB-1219978](https://www.openbugbounty.org/reports/1219978/) ### Contact If you have any questions or comments about this advisory: * [Open an issue](https://github.com/kitodo/kitodo-presentation/issues/new/choose) * Email us at [security@kitodo.org](mailto:security@kitodo.org)
{'CVE-2020-16095'}
2021-09-23T18:13:50Z
2020-07-31T17:39:22Z
MODERATE
null
{'CWE-79'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2020-015', 'https://github.com/kitodo/kitodo-presentation/security/advisories/GHSA-fpqv-x9hm-35j9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16095', 'https://typo3.org/help/security-advisories', 'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c', 'https://github.com/kitodo/kitodo-presentation'}
null
Packagist
GHSA-rxfq-3vpc-vv72
Files or Directories Accessible to External Parties in Adminer
Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database.
{'CVE-2021-43008'}
2022-04-22T20:33:36Z
2022-04-06T00:01:33Z
HIGH
null
{'CWE-552'}
{'https://sansec.io/research/adminer-4.6.2-file-disclosure-vulnerability', 'https://www.adminer.org/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43008', 'https://github.com/vrana/adminer/releases/tag/v4.6.3', 'https://podalirius.net/en/cves/2021-43008/', 'https://github.com/vrana/adminer'}
null
Packagist
GHSA-46c5-pfj8-fv65
Improperly checked metadata on tools/armour itemstacks received from the client
### Impact Due to a workaround applied in 1.13, an attacker may send a negative damage/meta value in a tool or armour item's NBT, which `TypeConverter` then blindly uses as if it was valid without being checked. When this invalid metadata value reaches `Durable->setDamage()`, an exception is thrown because the metadata is not within the expected range for damage values. This can be reproduced with either a too-large damage value, or a negative one. ### Patches c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1 ### Workarounds In theory this can be checked by plugins using a custom `TypeConverter`, but this is likely to be very cumbersome. ### For more information * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-03-18T22:36:03Z
2022-03-18T22:36:03Z
HIGH
null
{'CWE-704'}
{'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-46c5-pfj8-fv65', 'https://github.com/pmmp/PocketMine-MP'}
null
Packagist
GHSA-f2rp-j8hv-g5gx
Cross-site scripting in imgURL
imgURL 2.31 allows XSS via an X-Forwarded-For HTTP header.
{'CVE-2021-38713'}
2021-08-26T16:24:16Z
2021-08-30T16:25:26Z
MODERATE
null
{'CWE-79'}
{'https://github.com/helloxz/imgurl/issues/72', 'https://github.com/helloxz/imgurl', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38713'}
null
Packagist
GHSA-3p32-j457-pg5x
Query Binding Exploitation
### Description Laravel versions <6.20.12, <7.30.3 & <8.22.1 contain a query binding exploitation. If a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results. This vulnerability was discovered by Tim Groenevelt (tim.g@foodbyus.com). ### References - https://github.com/laravel/framework/pull/35865
{'CVE-2021-21263'}
2021-03-29T17:41:17Z
2021-01-19T19:36:51Z
HIGH
null
{'CWE-74'}
{'https://github.com/laravel/framework/pull/35865', 'https://packagist.org/packages/illuminate/database', 'https://packagist.org/packages/laravel/framework', 'https://blog.laravel.com/security-laravel-62011-7302-8221-released', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21263', 'https://github.com/laravel/framework/security/advisories/GHSA-3p32-j457-pg5x'}
null
Packagist
GHSA-q863-cchm-c6c6
SQL Injection in Fork CMS
Fork CMS contains a SQL injection vulnerability in versions prior to version 5.11.1. When deleting submissions which belong to a formular (made with module `FormBuilder`), the parameter `id[]` is vulnerable to SQL injection.
{'CVE-2022-0153'}
2022-03-30T20:34:44Z
2022-03-25T00:00:33Z
HIGH
null
{'CWE-89'}
{'https://huntr.dev/bounties/841503dd-311c-470a-a8ec-d4579b3274eb', 'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608', 'https://github.com/forkcms/forkcms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0153'}
null
Packagist
GHSA-7q44-gfvq-6g93
SQL Injection in Subrion CMS
SQL Injection vulnerability in Subrion CMS v4.2.1 in the search page if a website uses a PDO connection.
{'CVE-2020-18155'}
2021-08-02T22:55:27Z
2021-09-08T17:27:45Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-18155', 'https://github.com/intelliants/subrion/issues/817'}
null
Packagist
GHSA-2wj9-434x-9hvp
Insecure Deserialization in Backend User Settings in TYPO3 CMS
It has been discovered that backend user settings (in $BE_USER->uc) are vulnerable to insecure deserialization. In combination with vulnerabilities of 3rd party components this can lead to remote code execution. A valid backend user account is needed to exploit this vulnerability. Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described. ### References * https://typo3.org/security/advisory/typo3-core-sa-2020-005
{'CVE-2020-11067'}
2021-01-08T20:16:42Z
2020-05-13T23:29:04Z
HIGH
null
{'CWE-502'}
{'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2wj9-434x-9hvp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11067'}
null
Packagist
GHSA-qpgw-2c72-4c89
Mautic users able to download any files from server using filemanager
### Impact Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to. ### Patches Update to 2.12.0 or later. ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2017-1000490'}
2021-01-19T20:50:28Z
2021-01-19T20:50:38Z
HIGH
null
{'CWE-22'}
{'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000490', 'https://github.com/mautic/mautic/security/advisories/GHSA-qpgw-2c72-4c89'}
null
Packagist
GHSA-px8v-hxxx-2rgh
Potential Code Injection in Sprout Forms
### Impact A potential Server-Side Template Injection vulnerability exists in Sprout Forms which could lead to the execution of Twig code. ### Patches The problem is fixed in`barrelstrength/sprout-forms:v3.9.0` which upgrades to `barrelstrength/sprout-base-email:v1.2.7` ### Workarounds Users unable to upgrade should update any Notification Emails to use the "Basic Notification (Sprout Email)" template and avoid using the "Basic Notification (Sprout Forms)" template or any custom templates that display Form Fields. ### References - See the release notes in the [CHANGELOG](https://github.com/barrelstrength/craft-sprout-forms/blob/v3/CHANGELOG.md#390---2020-04-09-critical) - Credits to Paweł Hałdrzyński, Daniel Kalinowski from [ISEC.PL](https://isec.pl/) for discovery and responsible disclosure ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Sprout Forms repo](https://github.com/barrelstrength/craft-sprout-forms/issues) * Email us at [sprout@barrelstrengthdesign.com](mailto:sprout@barrelstrengthdesign.com)
{'CVE-2020-11056'}
2021-10-27T17:00:42Z
2020-05-08T21:00:02Z
CRITICAL
null
{'CWE-94', 'CWE-74'}
{'https://github.com/barrelstrength/craft-sprout-forms/security/advisories/GHSA-px8v-hxxx-2rgh', 'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11056', 'https://github.com/barrelstrength/craft-sprout-forms/blob/v3/CHANGELOG.md#390---2020-04-09-critical'}
null
Packagist
GHSA-h7mq-27r7-w972
Cross-site Scripting in GilaCMS
A cross-site scripting (XSS) vulnerability in /admin/content/post of GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Tags field.
{'CVE-2020-20696'}
2021-10-04T13:56:47Z
2021-09-30T17:13:02Z
MODERATE
null
{'CWE-79'}
{'https://github.com/GilaCMS/gila', 'https://github.com/GilaCMS/gila/issues/53', 'https://nvd.nist.gov/vuln/detail/CVE-2020-20696'}
null
Packagist
GHSA-j878-43hm-8gr5
Unrestricted Upload of File with Dangerous Type in Microweber
In Microweber prior to 1.2.12, a malicious actor may abuse the Backup/Restore feature to achieve Remote Code Execution.
{'CVE-2022-0921'}
2022-03-23T15:35:11Z
2022-03-12T00:00:30Z
MODERATE
null
{'CWE-434'}
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318', 'https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0921'}
null
Packagist
GHSA-4mqv-gcr3-pff9
"Cross-site scripting in phpoffice/phpspreadsheet"
"This affects the package phpoffice/phpspreadsheet. The library is vulnerable to XSS when creating an html output from an excel file by adding a comment on any cell. The root cause of this issue is within the HTML writer where user comments are concatenated as part of link and this is returned as HTML."
{'CVE-2020-7776'}
2021-04-09T21:12:55Z
2021-05-06T18:53:37Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-PHP-PHPOFFICEPHPSPREADSHEET-1048856', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7776', 'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845', 'https://github.com/PHPOffice/PhpSpreadsheet/blob/master/src/PhpSpreadsheet/Writer/Html.php%23L1792'}
null
Packagist
GHSA-jjvm-3mfq-7gc7
Cross-site Scripting in microweber
microweber version 1.2.10 and prior is vulnerable to cross-site scripting.
{'CVE-2022-0506'}
2022-02-14T22:33:59Z
2022-02-09T00:00:31Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70', 'https://huntr.dev/bounties/0a5ec24c-343e-4cc4-b27b-2beb19a1c35f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0506', 'https://github.com/microweber/microweber'}
null
Packagist
GHSA-qx3w-4864-94ch
Cleartext storage of session identifier
### Problem User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. ### Solution Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported this issue and to TYPO3 core & security team members Benni Mack & Oliver Hader who fixed the issue. ### References * [TYPO3-CORE-SA-2021-006](https://typo3.org/security/advisory/typo3-core-sa-2021-006)
{'CVE-2021-21339'}
2021-03-29T17:59:09Z
2021-03-23T01:53:42Z
MODERATE
null
{'CWE-312'}
{'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-qx3w-4864-94ch', 'https://packagist.org/packages/typo3/cms-core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21339', 'https://typo3.org/security/advisory/typo3-core-sa-2021-006'}
null
Packagist
GHSA-vpwq-6cp4-ffqc
Stored Cross-site Scripting in ShowDoc
ShowDoc prior to version 2.10.4 is vulnerable to stored cross-site scripting viva `axd` and `cshtml` file upload.
{'CVE-2022-0945'}
2022-03-28T18:40:15Z
2022-03-16T00:00:49Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0945', 'https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e', 'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891', 'https://github.com/star7th/showdoc'}
null
Packagist
GHSA-w3v3-cxq5-9vr4
Incorrect Default Permissions and Improper Access Control in snipe-it
snipe-it is vulnerable to Improper Access Control/Incorrect Default Permissions.
{'CVE-2022-0179'}
2022-01-18T22:17:42Z
2022-01-21T23:58:07Z
MODERATE
null
{'CWE-276', 'CWE-284'}
{'https://github.com/snipe/snipe-it/pull/10498', 'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e', 'https://huntr.dev/bounties/efdf2ead-f9d1-4767-9f02-d11f762d15e7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0179', 'https://github.com/snipe/snipe-it'}
null
Packagist
GHSA-852q-xxj4-x2rx
SQL Injection in SimpleSAMLphp
The proxystatistics module before 3.1.0 for SimpleSAMLphp allows SQL Injection in lib/Auth/Process/DatabaseCommand.php.
{'CVE-2019-15537'}
2021-08-17T22:41:38Z
2019-11-08T20:05:45Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15537', 'https://github.com/CESNET/proxystatistics-simplesamlphp-module/releases/tag/v3.1.0', 'https://github.com/CESNET/proxystatistics-simplesamlphp-module/pull/18'}
null
Packagist
GHSA-gg6x-xx78-448c
Reflected XSS when importing CSV in OctoberCMS
### Impact A user with the ability to use the import functionality of the `ImportExportController` behavior could be socially engineered by an attacker to upload a maliciously crafted CSV file which could result in a reflected XSS attack on the user in question ### Patches Issue has been patched in Build 466 (v1.0.466). ### Workarounds Apply https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c to your installation manually if unable to upgrade to Build 466. ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1100" alt="Screen Shot 2020-03-31 at 2 01 52 PM" src="https://user-images.githubusercontent.com/7253840/78070158-8f7ef580-7358-11ea-950c-226533f6a0a3.png">
{'CVE-2020-5298'}
2021-03-04T18:26:46Z
2020-06-03T21:58:32Z
MODERATE
null
{'CWE-87'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5298', 'https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c', 'http://seclists.org/fulldisclosure/2020/Aug/2', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/octobercms/october/security/advisories/GHSA-gg6x-xx78-448c'}
null
Packagist
GHSA-878x-85hc-gc4g
SQL Injection in LibreNMS
An issue was discovered in LibreNMS 1.50.1. A SQL injection flaw was identified in the ajax_rulesuggest.php file where the term parameter is used insecurely in a database query for showing columns of a table, as demonstrated by an ajax_rulesuggest.php?debug=1&term= request.
{'CVE-2019-12465'}
2021-08-18T18:58:35Z
2019-10-11T18:43:29Z
HIGH
null
{'CWE-89'}
{'https://www.darkmatter.ae/xen1thlabs/librenms-sql-injection-vulnerability-xl-19-024/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12465'}
null
Packagist
GHSA-f7wm-x4gw-6m23
Insert tag injection in forms
### Impact It is possible to inject insert tags in front end forms which will be replaced when the page is rendered. ### Patches Update to Contao 4.4.52, 4.9.6 or 4.10.1. ### Workarounds Disable the front end login form and do not use form fields with array keys such as `fieldname[]`. ### References https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
{'CVE-2020-25768'}
2021-08-02T15:23:30Z
2020-09-24T16:23:54Z
MODERATE
null
{'CWE-74', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25768', 'https://community.contao.org/en/forumdisplay.php?4-Announcements', 'https://github.com/contao/contao/security/advisories/GHSA-f7wm-x4gw-6m23', 'https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html'}
null
Packagist
GHSA-5fxf-x22x-5q38
Cross-site Scripting in microweber
XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0929'}
2022-03-22T20:02:30Z
2022-03-13T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256', 'https://huntr.dev/bounties/66abf7ec-2dd7-4cb7-87f5-e91375883f03', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0929'}
null
Packagist
GHSA-mj6m-246h-9w56
Improper regex in htaccess file
### Impact the default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application. This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path. ### Patches Please upgrade to 3.3.5 or 4.2.0 ### Workarounds No ### References - Release post: https://www.mautic.org/blog/community/mautic-4-2-one-small-step-mautic - Internally tracked under MST-32 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2022-25769'}
2022-03-01T22:05:34Z
2022-03-01T22:05:34Z
MODERATE
null
null
{'https://github.com/mautic/mautic/security/advisories/GHSA-mj6m-246h-9w56'}
null
Packagist
GHSA-vxrc-68xx-x48g
Sandbox Information Disclosure
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.
{'CVE-2019-9942'}
2022-04-06T20:28:16Z
2022-03-26T00:25:25Z
LOW
null
null
{'https://symfony.com/blog/twig-sandbox-information-disclosure', 'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077', 'https://github.com/twigphp/Twig', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2019-9942.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9942', 'https://www.debian.org/security/2019/dsa-4419', 'https://seclists.org/bugtraq/2019/Mar/60'}
null
Packagist
GHSA-v73w-r9xg-7cr9
Use of insecure jQuery version in OctoberCMS
### Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. ### Patches Issue has been patched in Build 466 (v1.0.466) by applying the recommended patch from @jquery. ### Workarounds Apply https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892 to your installation manually if unable to upgrade to Build 466. ### References - https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022 - https://jquery.com/upgrade-guide/3.5/ ### For more information If you have any questions or comments about this advisory: * Email us at [octobercms@luketowers.ca](mailto:octobercms@luketowers.ca) & [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat Assessment Assessed as Moderate by the @jquery team. ### Acknowledgements Thanks to @mrgswift for reporting the issue to the October CMS team.
null
2021-10-08T21:26:19Z
2020-06-05T19:37:49Z
MODERATE
null
null
{'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892', 'https://github.com/octobercms/october/security/advisories/GHSA-v73w-r9xg-7cr9', 'https://github.com/octobercms/october/issues/5097', 'https://github.com/octobercms/october'}
null
Packagist
GHSA-m2wv-m5pf-284r
Cross-site Scripting in teampass
Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO. Someone must open a link for the Teampass Password Manager index page containing malicious payload.
{'CVE-2022-26980'}
2022-04-05T18:37:01Z
2022-03-29T00:01:09Z
MODERATE
null
{'CWE-79'}
{'https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca', 'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26980'}
null
Packagist
GHSA-gx7g-wjxg-jwwj
Cross-Site Request Forgery in YOURLS
YOURLS versions 1.8.2 and prior are vulnerable to Cross-Site Request Forgery.
{'CVE-2022-0088'}
2022-04-18T22:17:42Z
2022-04-04T00:00:55Z
LOW
null
{'CWE-352'}
{'https://github.com/YOURLS/YOURLS/issues/3170', 'https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0088', 'https://github.com/YOURLS/YOURLS/pull/3264', 'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59', 'https://github.com/yourls/yourls'}
null
Packagist
GHSA-9hgc-wpc5-v8p9
An attacker can execute malicious javascript in Live Helper Chat
Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious javascript on application.
{'CVE-2022-1530'}
2022-05-03T20:49:15Z
2022-04-30T00:00:37Z
LOW
null
{'CWE-79'}
{'https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1530', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc'}
null
Packagist
GHSA-2p89-5f22-8qvf
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021
{'CVE-2021-32711'}
2021-06-25T15:29:10Z
2021-09-08T18:00:32Z
CRITICAL
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32711', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021', 'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr', 'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'}
null
Packagist
GHSA-ph98-v78f-jqrm
SQL injection in jackalope/jackalope-doctrine-dbal
### Impact Users can provoke SQL injections if they can specify a node name or query. ### Patches Upgrade to version 1.7.4 If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`. ### Workarounds Node names and xpaths can contain `"` or `;` according to the JCR specification. The jackalope component that translates the query object model into doctrine dbal queries does not properly escape the names and paths, so that a accordingly crafted node name can lead to an SQL injection. If queries are never done from user input, or if you validate the user input to not contain `;`, you are not affected. ### References No further references. ### For more information If you have any questions or comments about this advisory: * Open an issue in [jackalope/jackalope-doctrine-dbal repo](https://github.com/jackalope/jackalope-doctrine-dbal/issues)
{'CVE-2021-43822'}
2021-12-14T15:25:41Z
2021-12-14T21:08:13Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43822', 'https://github.com/jackalope/jackalope-doctrine-dbal', 'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db', 'https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm'}
null
Packagist
GHSA-qvc5-cfrr-384v
RCE in Third Party Library in Shopware
### Impact RCE in Third Party Library ### Patches We recommend to update to the current version 6.3.1.1. You can get the update to 6.3.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### References https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020
null
2020-09-23T15:01:47Z
2020-09-23T17:20:28Z
LOW
null
null
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020', 'https://github.com/shopware/platform/security/advisories/GHSA-qvc5-cfrr-384v'}
null
Packagist
GHSA-fjh3-g8gq-9q92
Cross-Site Scripting in Content Preview
> ### Meta > * CVSS: `AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.0) > * CWE-79 > * Status: **DRAFT** ### Problem It has been discovered that database fields used as _descriptionColumn_ are vulnerable to cross-site scripting when their content gets previewed in the page module. A valid backend user account is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue. ### References * [TYPO3-CORE-SA-2021-007](https://typo3.org/security/advisory/typo3-core-sa-2021-007)
{'CVE-2021-21340'}
2021-03-23T01:41:27Z
2021-03-23T01:53:47Z
LOW
null
{'CWE-79'}
{'https://typo3.org/security/advisory/typo3-core-sa-2021-007', 'https://packagist.org/packages/typo3/cms-backend', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-fjh3-g8gq-9q92', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21340'}
null
Packagist
GHSA-wf5p-f5xr-c4jj
SQL Injection in rosariosis
An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.
{'CVE-2021-44427'}
2021-12-01T21:03:52Z
2021-12-02T17:48:53Z
CRITICAL
null
{'CWE-89'}
{'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://github.com/francoisjacquet/rosariosis', 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/328', 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://gitlab.com/francoisjacquet/rosariosis/blob/mobile/CHANGES.md#changes-in-811', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44427'}
null
Packagist
GHSA-fjqg-w8g6-hhq8
Improper Authentication and Improper Access Control in Dolibarr
In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name.
{'CVE-2021-25956'}
2021-10-21T14:19:44Z
2021-09-02T17:16:28Z
HIGH
null
{'CWE-287', 'CWE-284'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956', 'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25956', 'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee'}
null
Packagist
GHSA-w4hp-pcp8-qhf3
Cross-site Scripting in livehelperchat
Stored XSS is found in Settings>Live help configuration>Departments->Departments groups->edit When a user creates a new webhook under the NAME field and puts a payload {{constructor.constructor('alert(1)')()}}, the input gets stored, at user edit groupname , the payload gets executed.
{'CVE-2022-0387'}
2022-02-03T20:16:38Z
2022-01-28T23:06:32Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/2e09035b-8f98-4930-b7e8-7abe5f722b98', 'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0387'}
null
Packagist
GHSA-rgg3-3wh7-w935
Unrestricted Upload of File with Dangerous Type in Zenario CMS
Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
{'CVE-2021-42171'}
2022-03-28T22:21:50Z
2022-03-15T00:00:58Z
CRITICAL
null
{'CWE-434'}
{'https://github.com/TribalSystems/Zenario', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42171', 'https://github.com/TribalSystems/Zenario/releases/tag/9.0.55141', 'https://minhnq22.medium.com/file-upload-to-rce-on-zenario-9-0-54156-cms-fa05fcc6cf74', 'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007', 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/2'}
null
Packagist
GHSA-8j72-p2wm-6738
Persistent XSS vulnerability in filename of attached file in PrivateBin
On 24th of December 2019 one of the [property based unit tests](https://github.com/PrivateBin/PrivateBin/blob/master/tst/README.md#property-based-unit-testing) reported a [failure](https://travis-ci.org/PrivateBin/PrivateBin/jobs/629180605#L782). Upon investigation, [@elrido](https://github.com/elrido) discovered that the failure was due to unescaped HTML, which allowed the user provided attachment file name to inject HTML under certain conditions leading to a persistent [Cross-site scripting (XSS)](https://en.wikipedia.org/wiki/Cross-site_scripting) vulnerability. After committing an [initial fix](https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6) to the master branch, the [issue was reported](https://github.com/PrivateBin/PrivateBin/issues/554) on 25th of December. Vulnerability write-up done by [@rugk](https://github.com/rugk) and [@elrido](https://github.com/elrido). The vulnerability has been fixed in [PrivateBin v1.3.2 & v1.2.2](https://privatebin.info/news/v1.3.2-v1.2.2-release.html). Admins are urged to upgrade to these versions to protect the affected users. ## Affected versions Any PrivateBin version since 1.2. ## Conditions * The configuration setting `fileupload` has to be enabled, as 1.3 displays an error when trying to open a paste with attachment. * The CSP header rules don't get applied. For example: * They are unsupported or disabled in the visitors browser. * They are filtered out by a some proxy server at the server or client side. * The header is disabled/commented in the PHP-logic. * The rules have been relaxed in the `cspheader` configuration setting. * A paste with a malicious filename is created. * A visitor of that paste clicks on the "Clone" button. ## Proof of concept The following method is just one possibility to exploit this issue and is provided as a proof of concept with steps to reproduce the issue. To avoid having to create an actual file with a rogue filename, one could use the [Python CLI client for PrivateBin](https://github.com/r4sas/PBinCLI/) and [edit line 56 in `format.py`](https://github.com/r4sas/PBinCLI/blob/682b47fbd3e24a8a53c3b484ba896a5dbc85cda2/pbincli/format.py#L56) as follows: ```diff - self._attachment_name = path_leaf(path) + self._attachment_name = '<script>alert("☹️");//<a' ``` The paste then can be created on a vulnerable instance: ```shell $ python pbincli/cli.py send -t " " -f /dev/null -s https://privatebin.net/ ``` Visiting the created paste on a vulnerable instance, with `fileupload` enabled and the CSP header weakened or disabled, and clicking the clone button will insert the HTML unescaped. In the above example, a pop-up would appear, when the script is executed. ## Impact On a vulnerable site pastes with malicious filenames can be created and users visiting these could inadvertently trigger the code execution when they click the "Clone" button. They could be instigated to do so via social engineering, like a paste text suggesting to "clone and share" the paste in question. The attached file itself doesn't have to be empty and could be an image or document that would still be displayed inline as usual. The execution of the script triggered by clicking on the "Clone" button may occur silently in the background without showing any noticeable signs in browser. It may for instance be used to track visitors, start drive-by-downloads or similar. While we focus on script injection here, as it is the easiest exploit vector, it has to be said that anything else can be injected like CSS, images, videos, although the default CSP will block inline CSS and images, e.g. On first visit, the filename isn't visible and is properly escaped when inserted into the download attribute. Only when clicking the "Download attachment" link would open a file save dialog with an odd name pre-filled, although browsers will convert illegal characters into valid ones, so it may not be identical to the one provided. Only when the "Clone" button has been clicked and after the exploit has already been triggered, the filename gets displayed. Note that an attacker can of course prevent this indicator of compromise to be shown and e.g. change the displayed text or obfuscate the filename by starting it with something harmless, like `image.png`, before opening the HTML tag. ### Impact restrictions The impact is mitigated by the fact that the vulnerability is, as far as our investigation concluded, paste-specific, i.e. opening a vulnerable paste can only compromise this one paste and no other pastes. Furthermore, as stated before, the impact is mitigated by the fact that we deploy a strong [CSP](https://content-security-policy.com/) that, by default, does not allow inline JS or other potentially easy methods that would allow an easy exploitation of the vulnerability. That said, we have to make users aware, that there may always be tricks to bypass such a CSP and the simple injection of HTML tags, e.g. destroying, faking or somehow phishing an HTML page does always remain a possibility. As such, we treat this as a security vulnerability with medium severity. It is critical on it's own, but we believe that the deployed security mechanisms should prevent an exploit in practice in most cases. ## Real-life impact We checked all instances listed in the [PrivateBin directory in the Wiki](https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-Directory) and didn't find any 1.1, 1.2 or 1.3 instances that had the CSP headers disabled or in a state we know to be vulnerable. We used the following script, that may be adapted to check the CSP headers of any single instance: ```shell for URL in $( curl -s https://raw.githubusercontent.com/wiki/PrivateBin/PrivateBin/PrivateBin-Directory.md | grep -Po '^http.*?(?= )' ) do echo -n "$URL: " curl -sLI $URL | grep -Poi 'content-security-policy.*script-src.?\K.*?(?=;)' || echo 'No CSP detected!' done ``` Some of the above sites do offer file uploads. On these instances, it is still possible that a visitor could have CSP support disabled in their browser, i.e. via a transparent proxy at their internet uplink or due to a browser plugin or some other locally installed, misguided security solution. **Important:** This scan is only a cursory check and _must not_ be taken as a security analysis of any means! You are always responsible for the security of your own instance. Please do check it manually! ## Mitigation As server administrators can't detect if a paste contains file attachments at all (apart from their size) in version 1.3 and due to the encrypted filename in older versions, as well as the risk for clients that don't apply the CSP settings, we urge them to upgrade to versions 1.3.2 or 1.2.2. If you use v1.3, you could disable the `fileupload` setting to prevent pastes from getting displayed that may contain this vulnerability. Note that this will break all existing pastes with uploads, however, so we do _not_ recommend this, but advise you to upgrade to a fixed version instead. ## Further information We want to make potential third-party client authors aware of this vulnerability and urge them to double-check their implementations. If they develop a client that displays untrusted foreign data from a paste in a HTML site, please make sure to escape it to prevent XSS attacks. Such attacks can only be prevented when the paste is displayed, a mitigation when a paste is created is pointless, as a different client can be used during creation. We do also acknowledge and want to highlight the benefit of the CSP, which has first been [introduced in PrivateBin v1.0](https://github.com/PrivateBin/PrivateBin/issues/10). However, we want to make you again aware that a whitelist-based CSP as we use, may [sometimes still be bypassed](https://csp.withgoogle.com/docs/faq.html#problems-with-whitelists), e.g. if you host a copy of the Angular library on the same domain as your PrivateBin instance. We are aware of that and [do consider](https://github.com/PrivateBin/PrivateBin/issues/108) upgrading to a stronger CSP in the future. ### Issue discovery While it is satisfying that our hard work on introducing unit tests has payed off in the discovery and mitigation of this vulnerability, it does also show a limitation of unit testing. A third party doing a code review would have certainly focused on how the project handles user provided input and may have discovered this much quicker. The discovery wasn't due to the unit test checking for HTML input to get properly escaped, on the contrary, the test assumed input would not be changed. So other instances of HTML tags generated would have happily passed the test. Only when the test generated a fragment of a link (`<a`) it failed, because the DOM silently removed it when it inserted the string, as links within links aren't allowed. While the test was written to throw arbitrary strings at the `AttachmentViewer.moveAttachmentTo()` method, the test would only check that these got inserted into the DOM unchanged, oblivious of their potential significance when interpreted as HTML. The [test had been introduced](https://github.com/PrivateBin/PrivateBin/commit/39860dfdc434c00d18342b4fb3bc6f5d0960030d) on December 3rd, 2017, 570 commits ago. Every commit on master and in PRs since introduction in that commit triggers these tests to run for every supported PHP version. Additional test cycles get run on developers local environments during working on commits. Hence the test suite must have run a few thousand times, testing 100 random strings each time. And only after more then 2 years a string containing `<a` got generated, triggered the error condition and 22 shrinks later the smallest failing test case was presented as: ``` Failed after 65 tests and 22 shrinks. rngState: 8b8f0d4ec2a67139b5; Counterexample: "image/png"; ""; "\u0000"; "<a"; ""; ``` Discussion about a potential problem with that code, [did spark last September](https://github.com/PrivateBin/PrivateBin/pull/508#commitcomment-34943221), when the vulnerable code part was changed to the one before before the current fix, but was [incorrectly judged](https://github.com/PrivateBin/PrivateBin/pull/508#commitcomment-34944396) as not being a problem, because all of our translation strings are hardcoded. The fact that we do actually add some untrusted user-provided content, wasn't considered at that point. It should also be mentioned, that the coverage report released for version 1.3.1 did highlight the line that caused this vulnerability as not being covered during testing: ![Coverage report for version 1.3.1 showing missing test coverage for line causing vulnerability]({static}/img/vulnerability-2020-01-11/coverage.png) So, in conclusion, it is great to have all of these tools at our disposal, but the code quality would benefit a lot more from having more eyeballs and brains on it. ## Timeline * 2019-12-24 – Property based unit test fails in a commit pushed to a PR. * 2019-12-25 – Issue investigated, preliminary patch and issue description published. * 2019-12-30 – Further investigations, proof-of-concept exploit demonstrated on a vulnerable test instance. * 2020-01-03 – Discussed broader mitigation of user provided content injections, reviewed other possible cases. * 2020-01-04 – Published a second patch based on review, escapes HTML in translation. * 2020-01-05 – Started writing vulnerability report. * 2020-01-07 – Backported fix for 1.2.1. * 2020-01-11 – [Release published](https://github.com/PrivateBin/PrivateBin/releases/tag/1.3.2). * 2020-01-11 – Vulnerability details published.
{'CVE-2020-5223'}
2021-01-14T17:43:40Z
2020-01-14T20:19:33Z
MODERATE
null
{'CWE-79'}
{'https://privatebin.info/news/v1.3.2-v1.2.2-release.html', 'https://github.com/PrivateBin/PrivateBin/issues/554', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5223', 'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6', 'https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738'}
null
Packagist
GHSA-xm9f-vxmx-4m58
Data Flow Sanitation Issue Fix
### Impact Due to missing sanitation in data flow it was possible for admin users to upload arbitrary executable files to the server.
{'CVE-2021-32759'}
2021-08-30T16:42:38Z
2021-08-30T17:20:41Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32759', 'https://github.com/OpenMage/magento-lts/commit/34709ac642d554aa1824892059186dd329db744b', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58', 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15', 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13'}
null
Packagist
GHSA-vwfx-hh3w-fj99
Potential XSS injection in the newsletter conditions field
### Impact An employee can inject javascript in the newsletter condition field that will then be executed on the front office ### Patches The issue has been fixed in 2.6.1
{'CVE-2021-21418'}
2021-03-31T17:35:42Z
2021-04-06T17:24:14Z
MODERATE
null
{'CWE-79'}
{'https://packagist.org/packages/prestashop/ps_emailsubscription', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21418', 'https://github.com/PrestaShop/ps_emailsubscription/releases/tag/v2.6.1', 'https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99', 'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70'}
null
Packagist
GHSA-5vr6-hm68-5j9p
Cross-site Scripting in LibreNMS
LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php.
{'CVE-2021-44279'}
2021-12-06T21:36:37Z
2021-12-03T20:49:16Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44279', 'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630', 'https://github.com/librenms/librenms/', 'https://github.com/librenms/librenms/pull/13554'}
null
Packagist
GHSA-4f26-v6fr-9hmp
Improper Input Validation in Centreon Web
Centreon Web 19.04.4 allows Remote Code Execution by an administrator who can modify Macro Expression location settings.
{'CVE-2019-16405'}
2022-04-01T20:24:30Z
2021-07-28T17:52:45Z
HIGH
null
{'CWE-20'}
{'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.04.html', 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10.html', 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html', 'https://github.com/TheCyberGeek/CVE-2019-16405.rb', 'https://github.com/centreon/centreon', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16405', 'http://packetstormsecurity.com/files/155999/Centreon-19.04-Remote-Code-Execution.html', 'https://github.com/centreon/centreon/pull/7884', 'https://github.com/centreon/centreon/releases/tag/19.04.5', 'https://thecybergeek.co.uk/cves/2019/09/19/CVEs.html', 'https://github.com/centreon/centreon/pull/7864', 'https://thecybergeek.co.uk/cves/2019/09/17/CVE-2019-16405-06.html', 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8.html'}
null
Packagist
GHSA-jv6v-fvvx-4932
Arbitrary File Deletion vulnerability in OctoberCMS
### Impact An attacker can exploit this vulnerability to delete arbitrary local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. ### Patches Issue has been patched in Build 466 (v1.0.466). ### Workarounds Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466. ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1241" alt="Screen Shot 2020-03-31 at 12 16 53 PM" src="https://user-images.githubusercontent.com/7253840/78060872-89354d00-7349-11ea-8c2b-5881b0a50736.png">
{'CVE-2020-5296'}
2021-03-04T18:28:29Z
2020-06-03T21:58:21Z
MODERATE
null
{'CWE-73'}
{'https://github.com/octobercms/october/security/advisories/GHSA-jv6v-fvvx-4932', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5296', 'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc', 'http://seclists.org/fulldisclosure/2020/Aug/2', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html'}
null
Packagist
GHSA-v3mr-gp7j-pw5w
Possible SQL injection in tablelookupwizard Contao Extension
### Impact The currently selected widget values were not correctly sanitized before passing it to the database, leading to an SQL injection possibility. ### Patches The issue has been patched in `tablelookupwizard` version 3.3.5 and version 4.0.0. ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/terminal42/contao-tablelookupwizard * Email us at [info@terminal42.ch](mailto:info@terminal42.ch)
null
2022-02-04T17:26:40Z
2022-02-10T22:33:46Z
HIGH
null
{'CWE-89'}
{'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717', 'https://github.com/terminal42/contao-tablelookupwizard', 'https://github.com/terminal42/contao-tablelookupwizard/security/advisories/GHSA-v3mr-gp7j-pw5w'}
null
Packagist
GHSA-h77r-rp97-7rv4
Privilage Escalation in moodle
In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
{'CVE-2020-25699'}
2021-10-20T17:37:39Z
2021-03-29T20:43:01Z
HIGH
null
{'CWE-863', 'CWE-269'}
{'https://moodle.org/mod/forum/discuss.php?d=413936', 'https://github.com/moodle/moodle', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25699', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895425', 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}
null
Packagist
GHSA-hxj6-v58r-cqv3
Cross Site Scripting in Subrion CMS
Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.2 when adding a blog and then editing an image file.
{'CVE-2020-22392'}
2021-08-30T21:28:33Z
2021-09-01T18:31:45Z
MODERATE
null
{'CWE-79'}
{'https://github.com/intelliants/subrion/issues/868', 'https://github.com/intelliants/subrion', 'https://nvd.nist.gov/vuln/detail/CVE-2020-22392'}
null
Packagist
GHSA-5x4f-7xgq-r42x
Object state limitation has no effect
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
null
2022-04-29T15:39:18Z
2022-04-29T15:39:18Z
CRITICAL
null
{'CWE-281'}
{'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-5x4f-7xgq-r42x', 'https://github.com/ezsystems/ezpublish-kernel', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}
null
Packagist
GHSA-4x5h-cr29-fhp6
Local file disclosure in PHPMailer
An issue was discovered in PHPMailer before 5.2.22. PHPMailer&#39;s `msgHTML` method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to `/`, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory. ### Impact Arbitrary local files can be attached to email messages. ### Patches Fixed in 5.2.22 ### Workarounds Validate input before using user-supplied file paths. ### References https://nvd.nist.gov/vuln/detail/CVE-2017-5223 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
{'CVE-2017-5223'}
2021-08-19T19:50:50Z
2020-03-05T22:09:10Z
MODERATE
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-5223', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.22', 'https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2017-5223.yaml', 'http://www.securityfocus.com/bid/95328', 'http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-4x5h-cr29-fhp6', 'https://www.exploit-db.com/exploits/43056/'}
null
Packagist
GHSA-hhr9-7xvh-8xgc
Server side request forgery in LiveHelperChat
SSRF filter bypass port 80, 433 in LiveHelperChat prior to v3.67. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191
{'CVE-2022-1213'}
2022-04-19T17:55:45Z
2022-04-06T00:01:32Z
HIGH
null
{'CWE-918'}
{'https://github.com/LiveHelperChat/livehelperchat/issues/1752', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1213', 'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'}
null
Packagist
GHSA-9652-78hp-w58c
Stored cross-site scripting in PressBooks
PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS.
{'CVE-2021-3271'}
2021-03-19T22:19:46Z
2021-03-29T20:07:39Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3271', 'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8', 'https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/', 'https://github.com/pressbooks/pressbooks/pull/2072', 'https://github.com/pressbooks/pressbooks'}
null
Packagist
GHSA-6qcc-whgp-pjj2
Cross-site Scripting in Pimcore
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
{'CVE-2022-0832'}
2022-03-11T20:37:01Z
2022-03-05T00:00:45Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0832', 'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/be450b60-bc8f-4585-96a5-3c4069f1186a'}
null
Packagist
GHSA-8wp2-vxpg-xcvp
Cross site scripting in facturascripts
facturasripts is an open source ERP software. Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.
{'CVE-2022-1457'}
2022-05-05T13:47:28Z
2022-04-26T00:00:43Z
CRITICAL
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1457', 'https://github.com/neorazorx/facturascripts', 'https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046', 'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'}
null
Packagist
GHSA-8qvx-f5gf-g43v
Logic error in dolibarr
The application does not check the input of price number lead to Business Logic error through negative price amount.
{'CVE-2022-0174'}
2022-01-20T15:34:33Z
2022-01-12T22:54:50Z
MODERATE
null
{'CWE-20'}
{'https://huntr.dev/bounties/ed3ed4ce-3968-433c-a350-351c8f8b60db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0174', 'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32', 'https://github.com/dolibarr/dolibarr'}
null
Packagist
GHSA-4h9c-v5vg-5m6m
Access to restricted PHP code by dynamic static class access in smarty
### Impact Template authors could run restricted static php methods. ### Patches Please upgrade to 3.1.40 or higher. ### References See the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter. ### For more information If you have any questions or comments about this advisory please open an issue in [the Smarty repo](https://github.com/smarty-php/smarty)
{'CVE-2021-21408'}
2022-01-20T15:33:55Z
2022-01-12T22:43:42Z
HIGH
null
{'CWE-20'}
{'https://github.com/smarty-php/smarty/releases/tag/v4.0.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21408', 'https://github.com/smarty-php/smarty/releases/tag/v3.1.43', 'https://github.com/smarty-php/smarty', 'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664', 'https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m'}
null
Packagist
GHSA-c7v4-m269-4995
Exposure of Sensitive Information to an Unauthorized Actor in Moodle
The participants table download in Moodle always included user emails, but should have only done so when users' emails are not hidden. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5 and 3.7 to 3.7.8. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, and 3.10.
{'CVE-2020-25703'}
2021-10-20T16:46:12Z
2021-10-21T17:49:08Z
MODERATE
null
{'CWE-200'}
{'https://github.com/moodle/moodle', 'https://moodle.org/mod/forum/discuss.php?d=413941', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895439', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25703'}
null
Packagist
GHSA-5h9g-x5rv-25wg
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in the schema validation logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or editor APIs. This malicious content could then end up in content published outside the editor, if no server-side sanitization was performed. This impacts all users who are using TinyMCE 5.8.2 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.9.0 by ensuring schema validation was still performed after unwrapping invalid elements. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.9.0 or higher - Manually sanitize the content using the `BeforeSetContent` event (see below) #### Example: Manually sanitize content ```js editor.on('BeforeSetContent', function(e) { var sanitizedContent = ...; // Manually sanitize content here e.content = sanitizedContent; }); ``` ### Acknowledgements Tiny Technologies would like to thank William Bowling for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes ### For more information If you have any questions or comments about this advisory: * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
null
2022-03-03T05:13:16.708960Z
2021-10-22T16:24:02Z
MODERATE
null
{'CWE-79'}
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-5h9g-x5rv-25wg', 'https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes', 'https://github.com/tinymce/tinymce'}
null
Packagist
GHSA-ghww-cv4v-hmxx
Cross-Site Request Forgery microweber
microweber prior to version 1.2.11 is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2022-0638'}
2022-02-22T17:24:42Z
2022-02-18T00:00:34Z
MODERATE
null
{'CWE-352'}
{'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/9d3d883c-d74c-4fe2-9978-a8e3d1ccf9f3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0638', 'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'}
null
Packagist
GHSA-f3rf-v9qm-9c89
Cross-site Scripting in the femanager TYPO3 extension
The extension allows by default to upload SVG files when a logged in frontend user uploads a new profile image. This may lead to Cross-Site Scripting, when the uploaded SVG image is used as is on the website. Note: If SVG uploads are required, it is recommended to use the TYPO3 extension svg_sanitizer (added to TYPO3 core since versions 9.5.28, 10.4.18 and 11.3.0) to prevent upload of malicious SVG files or to set up a strict Content Security Policy for the destination folder of uploaded images.
{'CVE-2021-36787'}
2021-08-30T18:35:42Z
2021-09-01T18:36:51Z
MODERATE
null
{'CWE-79'}
{'https://github.com/in2code-de/femanager', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36787', 'https://extensions.typo3.org/extension/femanager/', 'http://packetstormsecurity.com/files/165675/TYPO3-femanager-6.3.0-Cross-Site-Scripting.html', 'https://github.com/in2code-de/femanager/releases/tag/6.3.1', 'https://typo3.org/help/security-advisories/security', 'http://seclists.org/fulldisclosure/2022/Jan/53', 'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-010'}
null
Packagist
GHSA-h2fj-77wh-fh5w
Cross-site Scripting in livehelperchat
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
{'CVE-2022-0612'}
2022-02-24T13:52:12Z
2022-02-17T00:00:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0612', 'https://huntr.dev/bounties/eadcf7d2-a479-4901-abcc-1505d3f1b32f'}
null
Packagist
GHSA-vf23-f26f-mjj9
Moderate severity vulnerability that affects yourls/yourls
## Type juggling vulnerability in the API ### Impact YOURLS through 1.7.3 is affected by a type juggling vulnerability in the API component that can result in login bypass. ### Patches https://github.com/YOURLS/YOURLS/releases/tag/1.7.4 https://github.com/YOURLS/YOURLS/pull/2542 ### References * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14537 * https://github.com/Wocanilo/CVE-2019-14537 ### For more information If you have any questions or comments about this advisory: * Open an issue in [YOURLS repository](https://github.com/YOURLS/YOURLS)
{'CVE-2019-14537'}
2021-09-20T21:42:51Z
2019-09-23T18:32:02Z
CRITICAL
null
{'CWE-843'}
{'https://github.com/advisories/GHSA-vf23-f26f-mjj9', 'https://github.com/Wocanilo/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS/commits/master', 'https://github.com/YOURLS/YOURLS/security/advisories/GHSA-vf23-f26f-mjj9', 'https://security-garage.com/index.php/cves/cve-2019-14537-api-authentication-bypass-via-type-juggling', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS', 'https://github.com/YOURLS/YOURLS/releases', 'https://github.com/YOURLS/YOURLS/pull/2542'}
null
Packagist
GHSA-4pww-fqgh-36hj
Unrestricted Upload of File with Dangerous Type in Croogo
A Remote Code Execution (RCE) vulnerability exists in Croogo 3.0.2 via admin/file-manager/attachments, which lets a malicious user upload a web shell script.
{'CVE-2021-44673'}
2022-03-28T15:00:56Z
2022-03-11T00:02:02Z
HIGH
null
{'CWE-434'}
{'https://github.com/3erk1n/Vulnerabilities', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44673', 'https://github.com/croogo/croogo'}
null
Packagist
GHSA-c5gj-w4hx-gvmx
Business Logic Errors in microweber
Microweber prior to 1.2.11 can suffer from insecure direct object reference(s). A malicious actor can remove items from a victim's cart.
{'CVE-2022-0688'}
2022-02-25T19:18:15Z
2022-02-21T00:00:21Z
LOW
null
null
{'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605', 'https://huntr.dev/bounties/051ec6d4-0b0a-41bf-9ded-27813037c9c9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0688', 'https://github.com/microweber/microweber'}
null
Packagist
GHSA-3qr6-qrqm-8v86
Integer Overflow or Wraparound in Microweber
In Microweber prior to 1.2.12, a user can create an account with a password thousands of characters in length, leading to memory corruption/integer overflow. Version 1.2.2 sets maximum password length at 500 characters.
{'CVE-2022-1036'}
2022-03-30T20:02:35Z
2022-03-23T00:00:23Z
HIGH
null
{'CWE-190'}
{'https://huntr.dev/bounties/db615581-d5a9-4ca5-a3e9-7a39eceaa424', 'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1036', 'https://github.com/microweber/microweber'}
null
Packagist
GHSA-wqq8-mqj9-697f
PrestaShop autoupgrade module ZIP archives were vulnerable from CVE-2017-9841
### Impact We have identified that some autoupgrade module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE. This vulnerability impacts - phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841) - phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers) You can read PrestaShop official statement about this vulnerability [here](https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/). ### Patches In the [security patch](https://github.com/PrestaShop/autoupgrade/releases/tag/v4.10.1), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading. ### Workarounds Users can also simply remove the unwanted vendor/phpunit folder. ### References https://nvd.nist.gov/vuln/detail/CVE-2017-9841 ### For more information If you have any questions or comments about this advisory, email us at security@prestashop.com
null
2020-01-08T03:06:57Z
2020-01-08T03:10:30Z
HIGH
null
null
{'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32', 'https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f'}
null
Packagist
GHSA-28w5-j8xj-2xwc
Cross-site Scripting in the yoast_seo TYPO3 extension
The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.
{'CVE-2021-36788'}
2021-08-30T18:43:25Z
2021-09-01T18:36:44Z
MODERATE
null
{'CWE-79'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-012', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36788', 'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590', 'https://github.com/Yoast/Yoast-SEO-for-TYPO3'}
null
Packagist
GHSA-f2vv-h5x4-57gr
Leak of information via Store-API
### Impact Leak of information via Store-API ### Patches We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021
null
2021-10-05T16:12:44Z
2021-02-10T02:32:21Z
CRITICAL
null
{'CWE-202'}
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021', 'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351', 'https://packagist.org/packages/shopware/platform'}
null
Packagist
GHSA-jr37-66pj-36v7
Cross-site Scripting in DayByDay CRM
In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.
{'CVE-2022-22109'}
2022-01-10T21:46:18Z
2022-01-08T00:32:00Z
MODERATE
null
{'CWE-79'}
{'https://github.com/Bottelet/DaybydayCRM', 'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22109'}
null
Packagist
GHSA-fc38-mxwr-pfhx
Cross-Site Scripting via SVG media files
### Impact Cross-Site Scripting via SVG media files ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
{'CVE-2021-37710'}
2021-08-23T17:24:12Z
2021-08-23T19:43:00Z
HIGH
null
{'CWE-79'}
{'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37710', 'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423'}
null
Packagist
GHSA-r89v-cgv7-3jhx
Bypass of fix for CVE-2020-15247, Twig sandbox escape
### Impact A bypass of CVE-2020-15247 (fixed in 1.0.469 and 1.1.0) was discovered that has the same impact as CVE-2020-15247: An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP. ### Patches Issue has been patched in Build 470 (v1.0.470) and v1.1.1. ### Workarounds Apply https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7 to your installation manually if unable to upgrade to Build 470 or v1.1.1. ### References Reported by [ka1n4t](https://github.com/ka1n4t) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1108" alt="Screen Shot 2020-10-10 at 1 21 13 PM" src="https://user-images.githubusercontent.com/7253840/95663316-7de28b80-0afb-11eb-999d-a6526cf78709.png">
{'CVE-2020-26231'}
2021-03-04T18:24:40Z
2020-11-23T20:54:18Z
LOW
null
{'CWE-862'}
{'https://github.com/advisories/GHSA-94vp-rmqv-5875', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26231', 'https://github.com/octobercms/october/security/advisories/GHSA-r89v-cgv7-3jhx', 'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7'}
null
Packagist
GHSA-2xmm-g482-4439
DQL injection through sorting parameters blocked
### Impact Values added at the end of query sorting were passed directly to the DB. We don't know, if it could lead to direct SQL injections, however, we should not allow for easy injection of values there anyway. ### Patches The issue is fixed in version 1.10.1 and in 1.11-rc.1 ### Workarounds You have to overwrite your `Sylius\Component\Grid\Sorting\Sorter.php` class: ```php <?php // src/App/Sorting/Sorter.php declare(strict_types=1); namespace App\Sorting; use Symfony\Component\HttpKernel\Exception\BadRequestHttpException; use Sylius\Component\Grid\Data\DataSourceInterface; use Sylius\Component\Grid\Definition\Grid; use Sylius\Component\Grid\Parameters; use Sylius\Component\Grid\Sorting\SorterInterface; final class Sorter implements SorterInterface { public function sort(DataSourceInterface $dataSource, Grid $grid, Parameters $parameters): void { $enabledFields = $grid->getFields(); $expressionBuilder = $dataSource->getExpressionBuilder(); $sorting = $parameters->get('sorting', $grid->getSorting()); $this->validateSortingParams($sorting, $enabledFields); foreach ($sorting as $field => $order) { $this->validateFieldNames($field, $enabledFields); $gridField = $grid->getField($field); $property = $gridField->getSortable(); if (null !== $property) { $expressionBuilder->addOrderBy($property, $order); } } } private function validateSortingParams(array $sorting, array $enabledFields): void { foreach (array_keys($enabledFields) as $key) { if (array_key_exists($key, $sorting) && !in_array($sorting[$key], ['asc', 'desc'])) { throw new BadRequestHttpException(sprintf('%s is not valid, use asc or desc instead.', $sorting[$key])); } } } private function validateFieldNames(string $fieldName, array $enabledFields): void { $enabledFieldsNames = array_keys($enabledFields); if (!in_array($fieldName, $enabledFieldsNames, true)) { throw new BadRequestHttpException(sprintf('%s is not valid field, did you mean one of these: %s?', $fieldName, implode(', ', $enabledFieldsNames))); } } } ``` and register it in your container: ```yaml # config/services.yaml services: # ... sylius.grid.sorter: class: App\Sorting\Sorter ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues) * Email us at [security@sylius.com](mailto:security@sylius.com)
{'CVE-2022-24752'}
2022-03-15T19:09:16Z
2022-03-15T19:09:16Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.10.1', 'https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24752', 'https://github.com/Sylius/SyliusGridBundle/pull/222', 'https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.11.0-RC.2', 'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784', 'https://github.com/Sylius/SyliusGridBundle'}
null
Packagist
GHSA-rxch-gp62-574w
snipe-it is vulnerable to Cross-site Scripting
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-4108'}
2022-01-04T19:01:10Z
2021-12-16T14:13:27Z
MODERATE
null
{'CWE-79'}
{'https://github.com/snipe/snipe-it/', 'https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4', 'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4108'}
null