ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Packagist
GHSA-cvmr-6428-87w9
Cross-Site Scripting in Grav
### Impact Privileged users (with the ability to edit pages) have a mechanism to perform remote code execution via XSS. At a minimum, the vulnerability represents a bypass of security controls put in place to mitigate this form of attack. The remote code execution can be performed because XSS would allow an attacker to execute functionality on behalf of a stolen administrative account - the facility to install custom plugins would then allow said attacker to install a plugin containing a web shell and thus garner access to the underlying system. ### References https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS) https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html https://cwe.mitre.org/data/definitions/79.html ### For more information Please contact contact@pentest.co.uk
null
2020-12-10T23:12:52Z
2020-12-10T23:13:08Z
MODERATE
null
{'CWE-79'}
{'https://github.com/getgrav/grav/security/advisories/GHSA-cvmr-6428-87w9'}
null
Packagist
GHSA-wfm4-pq59-wg6r
Reset Password / Login vulnerability in Sulu
### Impact _What kind of vulnerability is it? Who is impacted?_ This vulnerability consists of a few related issues: #### Forget password leaks information if the user exists When the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist: ```json { "code": 0, "message": "Entity with the type \u0022Sulu\\Bundle\\SecurityBundle\\Entity\\User\u0022 and the id \u0022asdf\u0022 not found." } ``` This enables attackers to retrieve valid usernames. #### Forgot password leaks user email if user exists The response of the "Forgot Password" request returns the email address to which the email was sent, if the operation was successful: ```json {"email":"admin@localhost.local"} ``` This information should not be exposed, as it can be used to gather email addresses. #### Response time of login gives hint if the username exists If the username the user enters in the login screen does not exists, the request responds much faster than if the username exists. This again allows attackers to retrieve valid usernames. #### Reset Token for Forgot Password feature is not hashed The reset token in the user database table is not hashed. That means that somebody could try to request a new password using the Forgot Password feature, and look that up in the database, if the attacker somehow got access to the database. Hashing the reset token would fix that problem. ### Patches This problem was fixed in Release 1.6.34, 2.0.10 and 2.1.1. ### Workarounds Override the files manually in your project and change them accordingly.
{'CVE-2020-15132'}
2021-01-07T23:41:55Z
2020-08-05T21:27:44Z
MODERATE
null
{'CWE-209'}
{'https://github.com/sulu/sulu/commit/0fbb6009eb6a8efe63b7e3f3b4b886dc54bb2326', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15132', 'https://github.com/sulu/sulu/security/advisories/GHSA-wfm4-pq59-wg6r'}
null
Packagist
GHSA-7x22-pmw5-66mq
Cross-site Scripting in showdoc
Stored XSS via upload attachment with format .svg in File Library.
{'CVE-2021-4172'}
2022-01-28T22:22:26Z
2022-02-01T00:44:14Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/c041b693-877b-4456-b463-19e4c9456eee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4172', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/409c8a1208bbb847046a9496303192980f2e6219'}
null
Packagist
GHSA-3fvf-2gp4-89wq
Possibility for Denial of Service by overwriting PHP files with language exports
### Impact Laravel Translation Manager didn't check the locale name, which allowed directory traversal when exporting files. The content would be a PHP file returning an array of translations, but this could lead to unexpected results, like denial of service. Access to the Laravel Translation Manager is required, because a new locale would have to be added and published. ### Patches Version 0.6.2 fixes this issue. ### Workarounds Only allow trusted admins to publish/edit translations. ### References https://github.com/barryvdh/laravel-translation-manager/pull/417 ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/barryvdh/laravel-translation-manager * Email me (see Github profile) ### Credits Found and reported by [Natalia Trojanowska](https://www.linkedin.com/in/trojanowskanatalia/)
null
2022-03-18T23:17:15Z
2022-03-18T23:17:15Z
MODERATE
null
null
{'https://github.com/barryvdh/laravel-translation-manager/security/advisories/GHSA-3fvf-2gp4-89wq', 'https://github.com/barryvdh/laravel-translation-manager'}
null
Packagist
GHSA-pgwj-prpq-jpc2
Check service IDs are valid
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, when service ids allow user input, this could allow for SQL Injection and remote code execution. This is related to symfony/dependency-injection.
{'CVE-2019-10910'}
2021-09-30T18:38:59Z
2019-11-18T17:27:31Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10910.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10910', 'https://github.com/symfony/symfony/commit/d2fb5893923292a1da7985f0b56960b5bb10737b', 'https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/proxy-manager-bridge/CVE-2019-10910.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/dependency-injection/CVE-2019-10910.yaml', 'https://github.com/symfony/symfony', 'https://symfony.com/cve-2019-10910'}
null
Packagist
GHSA-w5r2-gvgf-mpm8
Improper Encoding or Escaping of Output and Injection in LibreNMS
An issue was discovered in LibreNMS 1.50.1. The scripts that handle graphing options (includes/html/graphs/common.inc.php and includes/html/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via the html/graph.php and html/graph-realtime.php scripts. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, disclosing file content, denial of service, or writing arbitrary files. NOTE, relative to CVE-2019-10665, this requires authentication and the pathnames differ.
{'CVE-2019-12463'}
2021-05-11T14:41:55Z
2019-10-11T18:43:13Z
HIGH
null
{'CWE-74', 'CWE-116'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12463', 'https://www.darkmatter.ae/xen1thlabs/librenms-rrdtool-injection-vulnerability-xl-19-022/'}
null
Packagist
GHSA-gxcm-36qw-j29v
SQL Injection in tribalsystems/zenario
SQL Injection in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to obtain sesnitive database information by injecting SQL commands into the "cID" parameter when creating a new HTML component.
{'CVE-2021-27672'}
2021-05-07T16:03:29Z
2021-06-08T20:12:02Z
MODERATE
null
{'CWE-89'}
{'https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38', 'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27672', 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370'}
null
Packagist
GHSA-24p5-x9f9-vvpx
Cross-site Scripting in baserCMS
Improper neutralization of JavaScript input in the page editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.
{'CVE-2021-20681'}
2021-03-29T22:39:01Z
2021-06-08T20:10:27Z
MODERATE
null
{'CWE-79'}
{'https://packagist.org/packages/baserproject/basercms', 'https://jvn.jp/en/jp/JVN64869876/index.html', 'https://basercms.net/security/JVN64869876', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20681', 'https://github.com/baserproject/basercms'}
null
Packagist
GHSA-mrwr-2945-fr22
Cross-site scripting in PageKit
In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack.
{'CVE-2021-32245'}
2021-06-23T18:44:29Z
2021-06-22T15:17:28Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32245', 'https://github.com/pagekit/pagekit/issues/963'}
null
Packagist
GHSA-g795-4hxx-qqwm
Cross-site Scripting in Pimcore
Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting.
{'CVE-2022-0893'}
2022-03-28T20:39:40Z
2022-03-16T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0893', 'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://huntr.dev/bounties/2859a1c1-941c-4efc-a3ad-a0657c7a77e9'}
null
Packagist
GHSA-4jwx-78vx-gm6g
Cross-Site Request Forgery in kimai2
CSRF in saving invoices / modifying status of invoices (pending and cancel only)
{'CVE-2021-4033'}
2021-12-14T15:29:58Z
2021-12-10T20:34:01Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4033', 'https://github.com/kevinpapst/kimai2/commit/1da26e041df62c10bd8075d78f2db7854d3eee07', 'https://huntr.dev/bounties/e05be1f7-d00c-4cfd-9390-ccd9d1c737b7', 'https://github.com/kevinpapst/kimai2'}
null
Packagist
GHSA-3x94-fv5h-5q2c
Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 CMS
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5) > * CWE-20, CWE-200 ### Problem In case an attacker manages to generate a valid cryptographic message authentication code (HMAC-SHA1) - either by using a different existing vulnerability or in case the internal _encryptionKey_ was exposed - it is possible to retrieve arbitrary files of a TYPO3 installation. This includes the possibility to fetch _typo3conf/LocalConfiguration.php_ which again contains the _encryptionKey_ as well as credentials of the database management system being used. In case a database server is directly accessible either via internet or in a shared hosting network, this allows to completely retrieve, manipulate or delete database contents. This includes creating an administration user account - which can be used to trigger remote code execution by injecting custom extensions. ### Solution Update to TYPO3 versions 9.5.20 or 10.4.6 that fix the problem described. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue. ### References * [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007)
{'CVE-2020-15099'}
2021-10-08T20:36:13Z
2020-07-29T16:15:32Z
HIGH
null
{'CWE-20', 'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15099', 'https://typo3.org/security/advisory/typo3-core-sa-2020-007', 'https://github.com/TYPO3/TYPO3.CMS', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3x94-fv5h-5q2c'}
null
Packagist
GHSA-34jq-548x-m2x9
Improper Resource Shutdown or Release in TYPO3 extension
Wrong usage of the TYPO3 FAL API results in copies of processed files being saved to the /var/transient/ folder of a TYPO3 website on every frontend request. This can result in Denial of Service, since the webspace may be filled up with image files simply by crafting a large amount of requests to the website.
{'CVE-2021-38623'}
2021-08-30T17:19:44Z
2021-08-30T17:22:57Z
HIGH
null
{'CWE-404'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-009', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38623', 'https://github.com/webcoast-dk/deferred-image-processing'}
null
Packagist
GHSA-vpw5-grxx-v396
CSRF token exposure in TYPO3 extension
When using the CsrfTokenViewHelper the extension discloses the user's session identifier to HTML output without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance Cross Site Scripting in the frontend output.
{'CVE-2021-36793'}
2021-08-30T17:23:15Z
2021-09-02T17:16:56Z
HIGH
null
{'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36793', 'https://github.com/Lacr1ma/routes', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-008'}
null
Packagist
GHSA-fmfv-x8mp-5767
Improper input validation in Drupal core
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
{'CVE-2022-25271'}
2022-03-01T21:17:52Z
2022-02-18T00:00:37Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25271', 'https://www.drupal.org/sa-core-2022-003'}
null
Packagist
GHSA-f8x6-m9f5-ffp8
Unrestricted Upload of File with Dangerous Type in unisharp/laravel-filemanager
This affects the package unisharp/laravel-filemanager from 0.0.0. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: - Install a package with a web Laravel application. - Navigate to the Upload window - Upload an image file, then capture the request - Edit the request contents with a malicious file (webshell) - Enter the path of file uploaded on URL - Remote Code Execution **Note: Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in the [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).
{'CVE-2021-23814'}
2022-01-06T19:58:35Z
2022-01-06T21:08:34Z
MODERATE
null
{'CWE-434'}
{'https://github.com/UniSharp/laravel-filemanager', 'https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23814', 'https://snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199'}
null
Packagist
GHSA-vxhc-c4qm-647p
Improper Access Control in Dolibarr
In “Dolibarr” application, 2.8.1 to 13.0.4 don’t restrict or incorrectly restricts access to a resource from an unauthorized actor. A low privileged attacker can modify the Private Note which only an administrator has rights to do, the affected field is at “/adherents/note.php?id=1” endpoint.
{'CVE-2021-25954'}
2021-10-21T13:35:03Z
2021-08-11T15:18:11Z
MODERATE
null
{'CWE-863', 'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25954', 'https://github.com/Dolibarr/dolibarr', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25954', 'https://github.com/Dolibarr/dolibarr/commit/8cc100012d46282799fb19f735a53b7101569377'}
null
Packagist
GHSA-mh9j-v6mq-pfch
Path manipulation in matyhtf/framework
matyhtf framework v3.0.5 is affected by a path manipulation vulnerability in Smarty.class.php. The issue was fixed in version 3.0.6.
{'CVE-2021-43676'}
2022-03-18T15:08:03Z
2021-12-04T00:00:53Z
CRITICAL
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43676', 'https://github.com/matyhtf/framework', 'https://github.com/matyhtf/framework/commit/25084603b7ea771eebe263d39744fe6abf1f8d61', 'https://github.com/matyhtf/framework/issues/206'}
null
Packagist
GHSA-j8jp-9x42-4pj5
Unrestricted Upload of File with Dangerous Type in MODX Revolution
MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.
{'CVE-2022-26149'}
2022-03-11T19:40:15Z
2022-02-27T00:00:14Z
HIGH
null
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26149', 'https://github.com/modxcms/revolution', 'https://github.com/sartlabs/0days/blob/main/Modx/Exploit.txt'}
null
Packagist
GHSA-66hf-2p6w-jqfw
XSS in laravel/framework
A security researcher has disclosed a possible XSS vulnerability in the Blade templating engine. Given the following two Blade templates: resources/views/parent.blade.php: ```html @section('content') <input value="{{ $value }}"> @show ``` resources/views/child.blade.php: ```html @extends('parent') @section('content') <input value="{{ $value }}"> @endsection ``` And a route like the following: ```php Route::get('/example', function() { $value = '//localhost/###parent-placeholder-040f06fd774092478d450774f5ba30c5da78acc8## onclick=location.assign(this.value);//'; return view('child', ['value' => $value]); }); ``` The broken HTML element may be clicked and the user is taken to another location in their browser due to XSS. This is due to the user being able to guess the parent placeholder SHA-1 hash by trying common names of sections. If the parent template contains an exploitable HTML structure an XSS vulnerability can be exposed. This vulnerability has been patched by determining the parent placeholder at runtime and using a random hash that is unique to each request.
{'CVE-2021-43808'}
2021-12-07T21:33:14Z
2021-12-08T19:57:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/laravel/framework', 'https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw', 'https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b'}
null
Packagist
GHSA-x2jp-hh65-4xvf
Cross-site scripting (XSS) and Server side request forgery (SSRF) in moodle
Text-based feedback answers required additional sanitizing to prevent stored XSS and blind SSRF risks in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
{'CVE-2021-20280'}
2021-11-18T15:25:56Z
2021-03-29T20:42:15Z
MODERATE
null
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'https://github.com/moodle/moodle', 'https://bugzilla.redhat.com/show_bug.cgi?id=1939037', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGOMHMYM3WICJ6D6U22Z6LPJGT5A6MZM/', 'https://moodle.org/mod/forum/discuss.php?d=419651', 'https://github.com/moodle/moodle/commit/a303eb9e9e387f95ea2a80cb1ce6c0b132ec1cc4', 'http://packetstormsecurity.com/files/164817/Moodle-Cross-Site-Scripting-Server-Side-Request-Forgery.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20280'}
null
Packagist
GHSA-7ggw-h8pp-r95r
Session ID not invalidated after logout
### Impact When logging out, the session ID was not invalidated. This is not a problem while the user is logged out, but as soon as the user logs back in the old session ID would be valid again; which means that anyone that gained access to the old session cookie would be able to act as the logged in user. This is not a major concern for the majority of cases, since it requires a malicious party gaining access to the session cookie in the first place, but nevertheless has been fixed. ### Patches Issue has been patched in Build 472 (v1.0.472) and v1.1.2. ### Workarounds Apply https://github.com/octobercms/library/commit/642f597489e6f644d4bd9a0c267e864cabead024 to your installation manually if unable to upgrade to Build 472 or v1.1.2. ### References - Reported by Anisio (Brazilian Information Security Analyst) - http://cve.circl.lu/cve/CVE-2021-3311 ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="699" alt="Screen Shot 2021-02-07 at 11 50 35 PM" src="https://user-images.githubusercontent.com/7253840/107180881-51eaf000-699f-11eb-8828-333128faf2a6.png">
{'CVE-2021-3311'}
2021-03-05T21:40:38Z
2021-02-10T02:32:35Z
LOW
null
{'CWE-613'}
{'https://github.com/octobercms/october/security/advisories/GHSA-7ggw-h8pp-r95r', 'https://octobercms.com/forum/chan/announcements', 'http://cve.circl.lu/cve/CVE-2021-3311', 'https://github.com/octobercms/library/commit/642f597489e6f644d4bd9a0c267e864cabead024', 'https://anisiosantos.me/october-cms-token-reactivation', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3311', 'https://packagist.org/packages/october/rain'}
null
Packagist
GHSA-2rh5-jvgx-pgw3
Any storage file can be downloaded from p.sh if full server path is known
The default configuration for platform.sh (.platform.app.yaml) allows access to uploaded files if you know or can guess their location, regardless of whether roles grant content read access to the content containing those files. If you're using Legacy Bridge, the default configuration also allows access to certain legacy files that should not be readable, including the legacy var directory and extension directories.
null
2021-09-14T18:35:38Z
2021-09-14T20:25:13Z
HIGH
null
{'CWE-200'}
{'https://github.com/ezsystems/ezplatform', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-006-storage-and-legacy-files-accessible-if-path-is-known', 'https://github.com/ezsystems/ezplatform/security/advisories/GHSA-2rh5-jvgx-pgw3'}
null
Packagist
GHSA-vrf2-xghr-j52v
Private files publicly accessible with Cloud Storage providers
### Impact Private files publicly accessible with Cloud Storage providers when the hashed URL is known ### Patches We recommend first changing your configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities
null
2021-10-05T17:26:41Z
2021-06-28T18:20:42Z
HIGH
null
{'CWE-200'}
{'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v'}
null
Packagist
GHSA-f99g-pg48-wrfc
twill is vulnerable to Cross-Site Request Forgery (CSRF)
twill is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3932'}
2021-11-17T21:13:01Z
2021-11-15T23:19:26Z
MODERATE
null
{'CWE-268', 'CWE-352'}
{'https://github.com/area17/twill/commits/bab94c1e', 'https://github.com/area17/twill/releases/tag/1.2.5', 'https://huntr.dev/bounties/6ef21e34-f6d9-445a-b657-375c53dc2b43', 'https://github.com/area17/twill/releases/tag/2.5.3', 'https://github.com/area17/twill/commit/5cded9fc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3932', 'https://github.com/area17/twill/commit/81d80d1fbbdd8bb73c020f03c623fd4487bd9b78', 'https://github.com/area17/twill'}
null
Packagist
GHSA-9g3v-j3cr-6fc6
Cross-site Scripting in snipe-it
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3879'}
2021-10-25T20:08:05Z
2021-10-21T17:48:26Z
MODERATE
null
{'CWE-79'}
{'https://github.com/snipe/snipe-it/commit/bda23bb1e66fd7ce42c75c69cf5eea4e80865c1c', 'https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3879', 'https://github.com/snipe/snipe-it'}
null
Packagist
GHSA-v9w8-hq92-v39m
Cross-site Scripting (XSS) in baserCMS
Improper neutralization of JavaScript input in the blog article editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.
{'CVE-2021-20683'}
2021-03-29T22:34:30Z
2021-06-08T20:10:45Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20683', 'https://jvn.jp/en/jp/JVN64869876/index.html', 'https://packagist.org/packages/baserproject/basercms', 'https://github.com/baserproject/basercms/commit/88ccc61e5656b05dd13204d61de706efaa2cd0b1', 'https://basercms.net/security/JVN64869876', 'https://github.com/baserproject/basercms'}
null
Packagist
GHSA-9vxv-wpv4-f52p
Information leakage in Error Handler
### Impact Information leakage in Error Handler ### Patches We recommend updating to the current version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021
null
2021-05-18T16:06:57Z
2021-05-21T14:29:33Z
MODERATE
null
{'CWE-209'}
{'https://github.com/shopware/shopware/security/advisories/GHSA-9vxv-wpv4-f52p'}
null
Packagist
GHSA-44m4-9cjp-j587
IBX-1392: Image filenames sanitization
ezsystems/ezpublish-kernel versions 7.5.* before 7.5.26 are vulnerable to certain injection attacks and unauthorized access to some image files.
null
2022-01-19T16:14:58Z
2022-01-21T23:24:14Z
HIGH
null
null
{'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-44m4-9cjp-j587', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization ', 'https://github.com/ezsystems/ezpublish-kernel/releases/tag/v7.5.26', 'https://github.com/ezsystems/ezpublish-kernel/'}
null
Packagist
GHSA-c7vg-w8q8-c3wf
Session Fixation
Shopware is an open source eCommerce platform. Potential session hijacking of store customers in versions below 6.3.5.2. We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
{'CVE-2021-32710'}
2021-06-25T15:35:07Z
2021-09-08T18:00:20Z
MODERATE
null
{'CWE-384'}
{'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e', 'https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32710'}
null
Packagist
GHSA-5w74-jx7m-x6hv
XSS vulnerability in theme config file in Mautic
### Impact Mautic before v2.13.0 has stored XSS via a theme config file. ### Patches Update to 2.13.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2018-8071'}
2021-01-19T21:15:02Z
2021-01-19T21:16:17Z
LOW
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-8071', 'https://github.com/mautic/mautic/commit/3add236e9cc00ea9b211b52cccc4660379b2ee8b', 'https://github.com/mautic/mautic/releases/tag/2.13.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-5w74-jx7m-x6hv'}
null
Packagist
GHSA-rggc-4g3r-j7ff
Remote Code Execution in Contao Managed Edition
Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter.
{'CVE-2022-26265'}
2022-03-30T16:47:02Z
2022-03-20T00:00:30Z
CRITICAL
null
{'CWE-77'}
{'https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26265', 'https://github.com/contao/managed-edition'}
null
Packagist
GHSA-484f-743f-6jx2
Object injection in cookie driver in phpfastcache
## Object injection in cookie driver ### Impact An possible object injection has been discovered in cookie driver prior 5.0.13 versions (of 5.x releases). ### Patches The issue has been addressed by enforcing JSON conversion when deserializing ### Workarounds If you can't fix it, use another driver such as "Files" (Filesystem) ### References Fixing release: https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the issue tracker](https://github.com/PHPSocialNetwork/phpfastcache/issues) * Email us at [security@geolim4.com](mailto:security@geolim4.com)
{'CVE-2019-16774'}
2021-01-08T21:28:16Z
2019-12-12T22:50:20Z
HIGH
null
{'CWE-94'}
{'https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13', 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2', 'https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4', 'https://github.com/advisories/GHSA-484f-743f-6jx2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16774'}
null
Packagist
GHSA-jfvf-rfmq-qwf8
Croos-site scripting in Croogo
Croogo before 3.0.7 allows XSS via the title to admin/menus/menus or admin/taxonomy/vocabularies.
{'CVE-2019-20789'}
2021-05-25T20:19:02Z
2021-06-22T15:23:21Z
LOW
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-20789', 'https://github.com/croogo/croogo/compare/3.0.6...3.0.7', 'https://github.com/croogo/croogo/issues/940'}
null
Packagist
GHSA-cg3h-rc9q-g8v9
Cross-site Scripting in pimcore
pimcore version 10.3.0 and prior is vulnerable to cross-site scripting.
{'CVE-2022-0509'}
2022-02-14T22:35:24Z
2022-02-09T00:00:30Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore/commit/6ccb5c12fc1be065ebce9c89c4677ee939b88597', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0509', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/26cdf86c-8edc-4af6-8411-d569699ecd1b'}
null
Packagist
GHSA-5fh3-25xr-g85h
snipe-it is vulnerable to Cross-site Scripting
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-4018'}
2021-12-03T15:19:38Z
2021-12-03T20:40:50Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/c14395f6-bf0d-4b06-b4d1-b509d8a99b54', 'https://github.com/snipe/snipe-it/releases/tag/v5.3.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4018', 'https://github.com/snipe/snipe-it/', 'https://github.com/snipe/snipe-it/commit/ff81e6d5366c2cfb15618793ad919ae4cbb3ac57'}
null
Packagist
GHSA-6346-5r4h-ff5x
Microweber vulnerable to cross-site scripting (XSS)
Microweber is a drag and drop website builder and a powerful next generation CMS. Microweber versions 1.2.15 and prior are vulnerable to cross-site scripting. This could lead to injection of arbitrary JaveScript code, defacement of a page, or stealing cookies. A patch is available on the `master` branch of Microweber's GitHub repository.
{'CVE-2022-1555'}
2022-05-05T21:08:06Z
2022-05-05T00:00:26Z
HIGH
null
{'CWE-79'}
{'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1555', 'https://github.com/microweber/microweber/commit/724e2d186a33c0c27273107dc4f160a09384877f', 'https://huntr.dev/bounties/d9f9b5bd-16f3-4eaa-9e36-d4958b557687'}
null
Packagist
GHSA-vp4x-94ff-2cmv
Cross-site scripting in forkcms
Persistent Cross-site scripting vulnerability on Fork CMS version 5.8.2 allows remote attackers to inject arbitrary Javascript code via the "navigation_title" parameter and the "title" parameter in /private/en/pages/add.
{'CVE-2020-23263'}
2021-05-19T20:44:31Z
2022-02-10T22:29:03Z
MODERATE
null
{'CWE-79'}
{'https://github.com/forkcms/forkcms/pull/3093', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23263'}
null
Packagist
GHSA-pqcf-v8v5-jmcg
Zip slip in Microweber
A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.
{'CVE-2020-28337'}
2021-05-07T21:58:37Z
2022-02-10T22:23:18Z
HIGH
null
{'CWE-22'}
{'https://github.com/microweber/microweber/commit/777ee9c3e7519eb3672c79ac41066175b2001b50', 'http://packetstormsecurity.com/files/162514/Microweber-CMS-1.1.20-Remote-Code-Execution.html', 'https://sl1nki.page/advisories/CVE-2020-28337', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28337', 'https://sl1nki.page/blog/2021/02/01/microweber-zip-slip'}
null
Packagist
GHSA-hpjm-3ww5-6cpf
Cross-Site Scripting through Fluid view helper arguments
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7) > * CWE-79 ### Problem Three XSS vulnerabilities have been detected in Fluid: 1. TagBasedViewHelper allowed XSS throug maliciously crafted `additionalAttributes` arrays by creating keys with attribute-closing quotes followed by HTML. When rendering such attributes, TagBuilder would not escape the keys. 2. ViewHelpers which used the `CompileWithContentArgumentAndRenderStatic` trait, and which declared `escapeOutput = false`, would receive the content argument in unescaped format. 3. Subclasses of AbstractConditionViewHelper would receive the `then` and `else` arguments in unescaped format. ### Solution Update to versions 2.0.8, 2.1.7, 2.2.4, 2.3.7, 2.4.4, 2.5.11 or 2.6.10 of this `typo3fluid/fluid` package that fix the problem described. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases: * TYPO3 v9.5.23 (using typo3fluid/fluid v2.6.10) * TYPO3 v10.4.10 (using typo3fluid/fluid v2.6.10) The specific vulnerabilities are prevented by: 1. Explicitly escaping keys found in the `additionalAttributes` array passed to a TagBasedViewHelper before using them as attribute names. 2. Detecting "content argument" on ViewHelpers using the trait CompileWithContentArgumentAndRenderStatic and escaping it based on the state of `escapeChildren` when `escapeOutput` is toggled off. Escaping still will not occur if explicitly disabled by an enclosing ViewHelper. This homogenises escaping behavior of "content arguments" so the same strategy is used whether the "content" argument is passed as argument or child content. 3. Explicitly defining the `then` and `else` arguments on AbstractConditionViewHelper subclasses as escaped and applying escaping in all cases where escaping is not explicitly disabled by an enclosing ViewHelper. ### Affected cases 1. The fix for TagBasedViewHelper does not affect any valid use cases; it only prevents use of maliciously crafted attribute/value arrays passed as `additionalAttributes`. 2. Any case where a ViewHelper with a "content argument" and which defines `escapeOutput = false` is used with the content argument instead of passing variables as child node - e.g. `<v:h content="{variable}" />` instead of `<v:h>{variable}</v:h>` to intentionally circumvent escaping of any HTML in `{variable}`. 3. Any case where a condition ViewHelper is used with `then` or `else` arguments to render a variable containing HTML, excluding cases where the variable is intentionally unescaped - e.g. `<f:if condition="1" then="{variable -> f:format.raw()}" />`, and excluding any cases where a ViewHelper is used as argument value and the ViewHelper intentionally disables escaping - e.g. `<f:if condition="1" then="{f:render(section: 'MySection')}" />` does not escape the `then` argument because `f:render` disables output escaping. Cases 2 and 3 can be mitigated to allow variables with HTML to not be escaped, by intentionally disabling escaping by chaining the variable used in the argument with `f:format.raw` as described in case 3. Note that this constitutes a potential security issue, for which the template author is solely responsible. Example: `<f:if condition="1" then="{intentionalHtmlVariable}" />` can allow HTML in `{intentionalHtmlVariable}` by adding `-> f:format.raw()` - to become `<f:if condition="1" then="{intentionalHtmlVariable -> f:format.raw()}" />`. Custom ViewHelpers which use `CompileWithContentArgumentAndRenderStatic` can alternatively pass a 6th argument with value `false` to the call to `registerArgument` which registers the "content argument", which explicitly disables escaping of the argument value: `$this->registerArgument('arg', 'string', 'My argument', false, null, false);`. Note that this constitutes a potential security issue for which the ViewHelper author is solely responsible. **Variables containing HTML should only be allowed after taking great care to prevent XSS through other means, e.g. sanitising the variable before it is assigned to Fluid or only allowing such variables to come from trusted sources.** ### Credits Thanks to Jonas Eberle and Sinan Sekerci (Dreamlab Technologies) who reported this issue and to TYPO3 core merger Claus Due who fixed the issue. ### References * [TYPO3-CORE-SA-2020-009](https://typo3.org/security/advisory/typo3-core-sa-2020-009)
{'CVE-2020-26216'}
2021-01-07T22:41:42Z
2020-11-18T21:06:07Z
MODERATE
null
{'CWE-79'}
{'https://github.com/TYPO3/Fluid/security/advisories/GHSA-hpjm-3ww5-6cpf', 'https://typo3.org/security/advisory/typo3-core-sa-2020-009', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26216', 'https://github.com/TYPO3/Fluid/commit/f20db4e74cf9803c6cffca2ed2f03e1b0b89d0dc'}
null
Packagist
GHSA-vcwc-6mr9-8m7c
Cross-site Scripting in phpmyadmin
An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.
{'CVE-2022-23808'}
2022-01-28T22:29:33Z
2022-01-28T22:36:28Z
MODERATE
null
{'CWE-79'}
{'https://github.com/phpmyadmin/phpmyadmin/commit/5118acce1dfcdb09cbc0f73927bf51c46feeaf38', 'https://www.phpmyadmin.net/security/PMASA-2022-2/', 'https://github.com/phpmyadmin/phpmyadmin/commit/44eb12f15a562718bbe54c9a16af91ceea335d59', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23808', 'https://github.com/phpmyadmin/phpmyadmin'}
null
Packagist
GHSA-g6vq-wc8w-4g69
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4015'}
2021-12-03T15:19:23Z
2021-12-06T17:19:18Z
MODERATE
null
{'CWE-352'}
{'https://github.com/firefly-iii/firefly-iii/commit/518b4ba5a7a56760902758ae0a2c6a392c2f4d37', 'https://github.com/firefly-iii/firefly-iii/releases/tag/5.6.5', 'https://huntr.dev/bounties/b698d445-602d-4701-961c-dffe6d3009b1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4015', 'https://github.com/firefly-iii/firefly-iii'}
null
Packagist
GHSA-62fx-3v4f-mwxm
Bypass of sitemp access restrictions
A security bypass vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. A user with privileges to generate sitemaps can bypass configuration that restricts directory access. The bypass allows overwrite of a subset of configuration files which can lead to denial of service.
{'CVE-2019-8133'}
2021-08-18T22:23:23Z
2019-11-12T22:59:40Z
MODERATE
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-8133', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8133.yaml', 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}
null
Packagist
GHSA-hqm2-gwqf-r5g5
SQL injection in TYPO3 extension
It has been discovered that the extension is susceptible to SQL Injection when processing bounced emails.
{'CVE-2021-38302'}
2021-08-30T17:26:36Z
2021-09-02T17:17:06Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-38302', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-014', 'https://github.com/Ecodev/newsletter'}
null
Packagist
GHSA-77mr-wc79-m8j3
A validation function with the same name as a built-in validator can be called
If a function is defined that has the same name as the default built-in email address validation scheme (`php`), it will be called in default configuration as when no validation scheme is provided, the default scheme's callable `php` was being called. If an attacker is able to inject such a function into the application (a much bigger issue), it will be called whenever an email address is validated, such as when calling `validateAddress()`. ### Impact Low impact – exploitation requires that an attacker can already inject code into an application, but it provides a trigger pathway. ### Patches This is patched in PHPMailer 6.5.0 by denying the use of simple strings as validator function names, which is a very minor BC break. ### Workarounds Inject your own email validator function. ### References Reported by [Vikrant Singh Chauhan](mailto:vi@hackberry.xyz) via [huntr.dev](https://www.huntr.dev/). [CVE-2021-3603](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) * [Email us](mailto:phpmailer@synchromedia.co.uk).
{'CVE-2021-3603'}
2021-10-21T13:23:23Z
2021-06-22T15:18:02Z
LOW
null
{'CWE-74'}
{'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603', 'https://github.com/PHPMailer/PHPMailer', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3603', 'https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/', 'https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf49b9b249a9ee36a5f7f3', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-77mr-wc79-m8j3'}
null
Packagist
GHSA-q4qv-fmwc-qxpx
SQL Injection in NukeViet
modules/banners/funcs/click.php in NukeViet before 4.3.04 has a SQL INSERT statement with raw header data from an HTTP request (e.g., Referer and User-Agent).
{'CVE-2019-7726'}
2021-04-07T22:06:28Z
2021-06-22T15:24:55Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt', 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04', 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7726', 'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt'}
null
Packagist
GHSA-9cc3-5w85-pxvx
Cross Site Request Forgery in intelliants/subrion
Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CMS v4.2.1 via the Members administrator function, which could let a remote unauthenticated malicious user send an authorised request to victim and successfully create an arbitrary administrator user.
{'CVE-2020-18326'}
2022-03-14T23:03:31Z
2022-03-05T00:00:45Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-18326', 'https://github.com/hamm0nz/CVE-2020-18326', 'https://github.com/intelliants/subrion'}
null
Packagist
GHSA-jvx5-rm6q-gx7p
Lack of access control on upoaded files
SilverStripe through 4.3.3 has incorrect access control for protected files uploaded via Upload::loadIntoFile(). An attacker may be able to guess a filename in silverstripe/assets via the AssetControlExtension.
{'CVE-2019-12245'}
2021-08-18T22:29:09Z
2019-11-12T23:01:50Z
MODERATE
null
{'CWE-732'}
{'https://www.silverstripe.org/download/security-releases/', 'https://forum.silverstripe.org/c/releases', 'https://www.silverstripe.org/download/security-releases/CVE-2019-12245', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12245'}
null
Packagist
GHSA-89ch-hqf9-rgp3
Using JS libraries with known security vulnerabilities
An insecure component vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. Magento 2 codebase leveraged outdated versions of JS libraries (Bootstrap, jquery, Knockout) with known security vulnerabilities.
{'CVE-2019-8121'}
2019-11-15T20:11:29Z
2019-11-12T22:59:28Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-8121', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8121.yaml', 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}
null
Packagist
GHSA-r5hc-wm3g-hjw6
Server-Side Request Forgery (SSRF) in rudloff/alltube
### Impact Releases prior to 3.0.2 are vulnerable to a Server-Side Request Forgery vulnerability that allows an attacker to send a request to an internal hostname. ### Patches 3.0.2 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.) Part of the fix requires applying [a patch](https://github.com/Rudloff/alltube/blob/148a171b240e7ceb076b9e198bef412de14ac55d/patches/youtube-dl-redirect.diff) to youtube-dl to prevent it from following HTTP redirects. If you are using the version of youtube-dl bundled with 3.0.2, it is already patched. However, if you are using your own unpatched version of youtube-dl **you might still be vulnerable**. ### References * https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d * https://github.com/Rudloff/alltube/commit/1b099bb9836a3ce7c427a41722a7ab5a3d1c1b2d * https://huntr.dev/bounties/9b14cc46-ec08-4940-83cc-9f986b2a5903/ * https://nvd.nist.gov/vuln/detail/CVE-2022-0768 * https://github.com/ytdl-org/youtube-dl/issues/30691
{'CVE-2022-0768'}
2022-03-18T20:42:54Z
2022-03-01T22:01:30Z
CRITICAL
null
{'CWE-918'}
{'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0768', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-r5hc-wm3g-hjw6', 'https://github.com/rudloff/alltube/commit/148a171b240e7ceb076b9e198bef412de14ac55d', 'https://github.com/Rudloff/alltube/', 'https://huntr.dev/bounties/9b14cc46-ec08-4940-83cc-9f986b2a5903'}
null
Packagist
GHSA-45hc-r4fj-qj89
SQL injection in pagekit/pagekit
Pagekit is a modular and lightweight CMS built with Symfony components and Vue.js. The configAction in SettingsController allow user to set the order of comments listing. The allowed options are ASC and DESC. That config then get concatenated directly to the SQL query. Due to the fact that there wasnt any sanitizion before saving that config, it can lead to the SQL Injection vulnerability.
{'CVE-2021-44135'}
2022-04-18T21:49:17Z
2022-04-02T00:00:15Z
CRITICAL
null
{'CWE-89'}
{'https://huntr.dev/bounties/82f09b08-ceeb-4249-8855-b8bc718c4868/', 'https://github.com/pagekit/pagekit', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44135'}
null
Packagist
GHSA-254q-rqmw-vx45
Exposure of Sensitive Information to an Unauthorized Actor in librenms
Exposure of Sensitive Information to an Unauthorized Actor in Packagist librenms/librenms prior to 22.2.0.
{'CVE-2022-0588'}
2022-02-24T13:05:38Z
2022-02-16T00:01:52Z
MODERATE
null
{'CWE-200'}
{'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://github.com/librenms/librenms', 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0588', 'https://huntr.dev/bounties/caab3310-0d70-4c8a-8768-956f8dd3326d'}
null
Packagist
GHSA-j85f-xw9x-ffwp
yetiforcecrm is vulnerable to Cross-site Scripting
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-4121'}
2022-01-04T18:52:13Z
2021-12-17T20:00:12Z
MODERATE
null
{'CWE-79'}
{'https://github.com/yetiforcecompany/yetiforcecrm', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/6b5967198e43b6fbb3b2715b49c6cd5b12ce08c3', 'https://huntr.dev/bounties/6da878de-acdb-4b97-b9ff-9674c3f0881d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4121'}
null
Packagist
GHSA-29v9-2fpx-j5g9
CSV Injection vulnerability with exported contact lists in Mautic
### Impact Mautic versions before 2.13.0 had a vulnerability that allowed a CSV injection with exported contact lists - https://www.owasp.org/index.php/CSV_Injection. ### Patches Update to 2.13.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2018-8092'}
2021-01-19T21:13:01Z
2021-01-19T21:16:29Z
MODERATE
null
{'CWE-1236'}
{'https://github.com/mautic/mautic/commit/cbc49f0ac4cc7e3acc07f2a85c079b2f85225a6b', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8092', 'https://github.com/mautic/mautic/releases/tag/2.13.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-29v9-2fpx-j5g9'}
null
Packagist
GHSA-3v56-q6r6-4gcw
Insecure Inherited Permissions in neoan3-apps/template
### Impact Versions prior 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously. In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible. ### Patches Version 1.1.1 has addressed this vulnerability. ```php $params = [ 'reverse' => fn($input) => strrev($input), // <-- no longer possible with version ~1.1.1 'value' => 'My website' ] TemplateFunctions::registerClosure('reverse', fn($input) => strrev($input)); // <-- still possible (and nicely isolated) Template::embrace('<h1>{{reverse(value)}}</h1>', $params); ``` ### Workarounds Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade. ### References As a possible exploit is relatively easy to achieve, I will not share steps to reproduce the issue for now. ### For more information If you have any questions or comments about this advisory: * Open an issue in [our repo](https://github.com/sroehrl/neoan3-template)
{'CVE-2021-41170'}
2021-11-08T21:04:44Z
2021-11-10T16:41:08Z
HIGH
null
{'CWE-732', 'CWE-277', 'CWE-74'}
{'https://github.com/sroehrl/neoan3-template', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41170', 'https://github.com/sroehrl/neoan3-template/commit/4a2c9570f071d3c8f4ac790007599cba20e16934', 'https://github.com/sroehrl/neoan3-template/security/advisories/GHSA-3v56-q6r6-4gcw', 'https://github.com/sroehrl/neoan3-template/issues/8'}
null
Packagist
GHSA-3j58-p785-f27x
Cross-site Scripting in microweber
There is a reflected cross sitem scripting attack in microweber via url parameters.
{'CVE-2022-0378'}
2022-02-03T20:34:27Z
2022-01-28T22:15:24Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/fc7e1a026735b93f0e0047700d08c44954fce9ce', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0378', 'https://huntr.dev/bounties/529b65c0-5be7-49d4-9419-f905b8153d31', 'https://github.com/microweber/microweber'}
null
Packagist
GHSA-xm3x-787m-p66r
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webmv` file upload.
{'CVE-2022-0964'}
2022-03-29T17:35:55Z
2022-03-16T00:00:46Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0964', 'https://huntr.dev/bounties/dbe39998-8eb7-46ea-997f-7b27f6f16ea0', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
null
Packagist
GHSA-6v6p-g8cg-2hgg
Improper Certificate Validation in node-sass affects eZ Platform
Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path. This affects eZ Platform v2.5 only. The maintainers resolved it by replacing node-sass 4.11 with sass 1.32.13. This issue also affects ezsystems/ezplatform and ezsystems/ezplatform-page-builder.
null
2022-04-01T12:56:28Z
2022-04-01T12:56:28Z
MODERATE
null
{'CWE-295'}
{'https://github.com/ezsystems/ezplatform-admin-ui', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-002-vulnerability-in-node-sass', 'https://github.com/ezsystems/ezplatform-admin-ui/releases/tag/v1.5.27', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025', 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-6v6p-g8cg-2hgg', 'https://github.com/advisories/GHSA-r8f7-9pfq-mjmv'}
null
Packagist
GHSA-vxh4-x6gv-mphf
Cross-Site Request Forgery (CSRF) in livehelperchat/livehelperchat
Cross-Site Request Forgery (CSRF) in GitHub repository livehelperchat/livehelperchat.
{'CVE-2022-0245'}
2022-01-25T20:48:52Z
2022-01-21T23:25:45Z
MODERATE
null
{'CWE-352'}
{'https://github.com/livehelperchat/livehelperchat/commit/c2fa19afeb8b1ea927fea3fd452515c95f289fb9', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/6a6aca72-32b7-45b3-a8ba-9b400b2d669c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0245'}
null
Packagist
GHSA-3988-h75v-hwf6
Arbitrary shell execution
A properly crafted filename would allow for arbitrary code execution when using the --filter=gitmodified command line option
null
2022-03-26T00:06:45Z
2022-03-26T00:06:45Z
HIGH
null
null
{'https://github.com/squizlabs/PHP_CodeSniffer', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-05-18.yaml', 'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/3.0.1'}
null
Packagist
GHSA-wmj9-xh24-j4gx
Cross-site Scripting in microweber
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
{'CVE-2022-0558'}
2022-02-23T21:58:38Z
2022-02-11T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0558', 'https://huntr.dev/bounties/8fffc95f-14ae-457b-aecc-be4716a8b91c', 'https://github.com/microweber/microweber/commit/14a1bb971bcb8b5456c2bf0020c3018907a2704d', 'https://github.com/microweber/microweber/'}
null
Packagist
GHSA-j57w-3c39-gpp5
Improper Privilege Management in Snipe-IT
An unprivileged user of Snipe-IT prior to version 5.3.11 can create maintenance for an asset. Version 5.3.11 contains a patch for this issue.
{'CVE-2022-0611'}
2022-02-25T15:23:16Z
2022-02-17T00:00:35Z
HIGH
null
{'CWE-269'}
{'https://huntr.dev/bounties/7b7447fc-f1b0-446c-b016-ee3f6511010b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0611', 'https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439', 'https://github.com/snipe/snipe-it'}
null
Packagist
GHSA-fxwm-rx68-p5vx
XSS in richtext custom tag attributes in ezsystems/ezplatform-richtext
The rich text editor does not escape attribute data when previewing custom tags. This means XSS is possible if custom tags are used, for users who have access to editing rich text content. Frontend content view is not affected, but the vulnerability could be used by editors to attack other editors. The fix ensures custom tag attribute data is escaped in the editor.
null
2021-11-29T20:55:04Z
2021-12-01T18:28:29Z
MODERATE
null
{'CWE-79'}
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-010-xss-in-richtext-custom-tag-attributes', 'https://github.com/ezsystems/ezplatform-richtext/security/advisories/GHSA-fxwm-rx68-p5vx', 'https://github.com/ezsystems/ezplatform-richtext'}
null
Packagist
GHSA-mj2c-5mjv-gmmj
SQL Injection in Pimcore
Pimcore prior to version 10.3.5 is vulnerable to SQL injection in ElementController.php. This vulnerability causes loss of data confidentiality.
{'CVE-2022-1339'}
2022-04-22T21:06:22Z
2022-04-14T00:00:19Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1339', 'https://github.com/pimcore/pimcore/commit/adae3be64427466bf0df15ceaea2ac30da93752c', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/ae8dc737-844e-40da-a9f7-e72d8e50f6f9'}
null
Packagist
GHSA-j33j-fg2g-mcv2
Cross-Site Request Forgery in CakePHP
CakePHP before 4.0.6 mishandles CSRF token generation. This might be remotely exploitable in conjunction with XSS.
{'CVE-2020-15400'}
2022-02-10T22:27:58Z
2022-02-10T22:27:58Z
MODERATE
null
{'CWE-79', 'CWE-352'}
{'https://bakery.cakephp.org/2020/04/18/cakephp_406_released.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15400'}
null
Packagist
GHSA-6pqm-xvfc-w7p4
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3993'}
2021-12-03T15:18:52Z
2021-12-03T20:42:35Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3993', 'https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871', 'https://github.com/star7th/showdoc'}
null
Packagist
GHSA-9pm8-xcj6-2m33
Missing Authorization in TYPO3 extension
The direct_mail extension through 5.2.3 for TYPO3 has Broken Access Control for newsletter subscriber tables.
{'CVE-2020-12698'}
2021-07-28T19:18:32Z
2021-07-26T21:34:52Z
MODERATE
null
{'CWE-862'}
{'https://typo3.org/help/security-advisories', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12698', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005'}
null
Packagist
GHSA-mg2g-8pwj-r2j2
Authentication bypass in SilverStripe GraphQL
The GraphQL module accepts basic-auth as an authentication method by default. This can be used to bypass MFA authentication if the silverstripe/mfa module is installed, which is now a commonly installed module. A users password is still required though. Basic-auth has been removed as a default authentication method. If desired, it can be re-enabled by adding it to the authenticators key of a schema, or on SilverStripe\Graphql\Auth\Handler
{'CVE-2020-26136'}
2022-03-15T16:38:13Z
2021-06-10T17:21:33Z
MODERATE
null
{'CWE-287', 'CWE-288'}
{'https://www.silverstripe.org/blog/tag/release', 'https://www.silverstripe.org/download/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26136', 'https://forum.silverstripe.org/c/releases', 'https://www.silverstripe.org/download/security-releases/cve-2020-26136'}
null
Packagist
GHSA-44gv-fgcj-w546
Missing Authorization in DayByDay CRM
In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the appointments of all users in the system including administrators. However, this type of user is not authorized to view the calendar at all.
{'CVE-2022-22107'}
2022-01-07T20:37:12Z
2022-01-08T00:31:55Z
MODERATE
null
{'CWE-862'}
{'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22107', 'https://github.com/Bottelet/DaybydayCRM', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22107'}
null
Packagist
GHSA-c5c9-8c6m-727v
Cross-Site Scripting via Rich-Text Content
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC` (5.7) ### Problem Failing to properly parse, sanitize and encode malicious rich-text content, the content rendering process in the website frontend is vulnerable to cross-site scripting. Corresponding rendering instructions via TypoScript functionality _[HTMLparser](https://docs.typo3.org/m/typo3/reference-typoscript/10.4/en-us/Functions/Htmlparser.html)_ do not consider all potentially malicious HTML tag & attribute combinations per default. In addition, the lack of comprehensive default node configuration for rich-text fields in the backend user interface fosters this malfunction. In default scenarios, a valid backend user account is needed to exploit this vulnerability. In case custom plugins used in the website frontend accept and reflect rich-text content submitted by users, no authentication is required. ### Solution Update to TYPO3 versions 7.6.53 ELTS, 8.7.42 ELTS, 9.5.29, 10.4.19, 11.3.2 that fix the problem described above. Custom package _[typo3/html-sanitizer](https://github.com/TYPO3/html-sanitizer)_ - based on allow-lists only - takes care of sanitizing potentially malicious markup. The default behavior is based on safe and commonly used markup - however, this can be extended or restricted further in case it is necessary for individual scenarios. During the frontend rendering process, sanitization is applied to the default TypoScript path `lib.parseFunc`, which is implicitly used by the Fluid view-helper instruction `f:format.html`. Rich-text data persisted using the backend user interface is sanitized as well. Implementation details are explained in corresponding [ChangeLog documentation](https://docs.typo3.org/c/typo3/cms-core/master/en-us/Changelog/9.5.x/Important-94484-IntroduceHTMLSanitizer.html). ### Credits Thanks to Benjamin Stiber, Gert-Jan Jansma, Gábor Ács-Kurucz, Alexander Kellner, Richie Lee, Nina Rösch who reported this issue, and to TYPO3 security team member Oliver Hader, as well as TYPO3 contributor Susanne Moog who fixed the issue. ### References * [TYPO3-CORE-SA-2021-013](https://typo3.org/security/advisory/typo3-core-sa-2021-013)
{'CVE-2021-32768'}
2021-10-21T13:56:39Z
2021-08-19T15:53:12Z
MODERATE
null
{'CWE-79'}
{'https://github.com/TYPO3/typo3/security/advisories/GHSA-c5c9-8c6m-727v', 'https://typo3.org/security/advisory/typo3-core-sa-2021-013', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32768', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-c5c9-8c6m-727v'}
null
Packagist
GHSA-rfh8-25h9-mhgf
Cross-site Scripting in YII2-CMS
YII2-CMS v1.0 has XSS in protected\core\modules\home\models\Contact.php via a name field to /contact.html.
{'CVE-2019-16130'}
2021-08-17T22:40:45Z
2019-10-14T21:12:08Z
MODERATE
null
{'CWE-79'}
{'https://github.com/weison-tech/yii2-cms/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16130', 'http://www.iwantacve.cn/index.php/archives/277/'}
null
Packagist
GHSA-rr6v-h7m8-wc9f
Cross-site Scripting in Froala WYSIWYG Editor
Froala WYSIWYG Editor 3.2.6-1 is affected by XSS due to a namespace confusion during parsing.
{'CVE-2021-28114'}
2021-07-29T15:14:44Z
2021-07-19T21:21:33Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28114', 'https://labs.bishopfox.com/advisories/froala-editor-v3.2.6', 'https://froala.com/wysiwyg-editor/', 'https://labs.bishopfox.com/advisories'}
null
Packagist
GHSA-q9qc-pp5x-mc8c
Improper Neutralization of Special Elements Used in a Template Engine in microweber
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.
{'CVE-2022-0896'}
2022-03-14T21:01:04Z
2022-03-10T00:00:40Z
HIGH
null
{'CWE-94', 'CWE-1336'}
{'https://github.com/microweber/microweber/commit/e0224462b3dd6b1f7c6ec1197413afc6019bc3b5', 'https://huntr.dev/bounties/113056f1-7a78-4205-9f42-940ad41d8df0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0896', 'https://github.com/microweber/microweber'}
null
Packagist
GHSA-fm68-89m8-4gjj
JavaScript injection possible via html comments
In Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1, an unauthenticated user can inject arbitrary JavaScript code as a result of the sanitization engine ignoring HTML comments.
{'CVE-2019-8233'}
2021-08-18T22:15:48Z
2019-11-12T22:59:47Z
MODERATE
null
{'CWE-79'}
{'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8233'}
null
Packagist
GHSA-prff-6j8q-vrv7
Cross-site Scripting in microweber
There is a persistent XSS Vulnerability exsists in the checkout page where we can able to execute any javascription in the last name field
{'CVE-2022-0379'}
2022-02-03T21:01:48Z
2022-01-28T22:15:33Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/f017cbfbd5c4f097d2c78c5e15b6c8a9da479d7b', 'https://huntr.dev/bounties/933f94b8-c5e7-4c3a-92e0-4d1577d5fee6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0379', 'https://github.com/microweber/microweber'}
null
Packagist
GHSA-rhf5-f553-xg82
Password exposure in concrete5/core
Unauthorized individuals could view password protected files using view_inline in Concrete CMS (previously concrete 5) prior to version 8.5.7. Concrete CMS now checks to see if a file has a password in view_inline and, if it does, the file is not rendered.For version 8.5.6, the following mitigations were put in place a. restricting file types for view_inline to images only b. putting a warning in the file manager to advise users.
{'CVE-2021-22951'}
2021-11-22T18:22:30Z
2021-11-23T18:18:16Z
MODERATE
null
{'CWE-639', 'CWE-200'}
{'https://hackerone.com/reports/1102014', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22951', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}
null
Packagist
GHSA-6vc5-v7hw-h5h2
Cross-site Scripting in RosarioSIS
RosarioSIS through 6.8-beta allows modules/Custom/NotifyParents.php XSS because of the href attributes for AddStudents.php and User.php.
{'CVE-2020-15721'}
2021-05-10T22:34:11Z
2022-02-10T22:26:10Z
MODERATE
null
{'CWE-79'}
{'https://gitlab.com/francoisjacquet/rosariosis/-/issues/291', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15721', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/c4a694860b50c4aa5c67d6568f7d0613fef1a30d', 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md'}
null
Packagist
GHSA-pf38-v6qj-j23h
Malfunction of CSRF token validation in Shopware
### Impact The CSRF tokens were not renewed after login and logout. An attacker could impersonate the victim if the attacker is able to use the same device as the victim used beforehand. ### Patches We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-9 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
{'CVE-2022-24879'}
2022-04-28T21:01:53Z
2022-04-28T21:01:53Z
HIGH
null
{'CWE-352'}
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-pf38-v6qj-j23h', 'https://github.com/shopware/shopware', 'https://www.shopware.com/en/changelog-sw5/#5-7-9'}
null
Packagist
GHSA-7mq6-cp5m-f4j5
Cross-site Scripting in Anchor CMS
Cross Site Scripting (XSS) vulnerability exits in Anchor CMS <=0.12.7 in posts.php. Attackers can use the posts column to upload the title and content containing malicious code to achieve the purpose of obtaining the administrator cookie, thereby achieving other malicious operations.
{'CVE-2021-44116'}
2022-01-04T20:59:44Z
2022-01-05T14:54:36Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44116', 'https://www.cnblogs.com/unrealnumb/p/15573449.html', 'https://github.com/anchorcms/anchor-cms'}
null
Packagist
GHSA-r23f-c2j5-rx2f
Local File read vulnerability in OctoberCMS
### Impact An attacker can exploit this vulnerability to read local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. ### Patches Issue has been patched in Build 466 (v1.0.466). ### Workarounds Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466. ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1108" alt="Screen Shot 2020-03-31 at 2 37 53 PM" src="https://user-images.githubusercontent.com/7253840/78072989-44b3ac80-735d-11ea-8676-09c69f0409c4.png">
{'CVE-2020-5295'}
2021-03-04T18:20:28Z
2020-06-03T21:58:16Z
MODERATE
null
{'CWE-98'}
{'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc', 'https://github.com/octobercms/october/security/advisories/GHSA-r23f-c2j5-rx2f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5295', 'http://seclists.org/fulldisclosure/2020/Aug/2', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html'}
null
Packagist
GHSA-phrq-v4q2-hmq6
Code injection vulnerability in allSelectors()
Sabberworm PHP CSS Parser before 8.3.1 calls eval on uncontrolled data, possibly leading to remote code execution if the function allSelectors() or getSelectorsBySpecificity() is called with input from an attacker.
{'CVE-2020-13756'}
2022-03-26T00:15:22Z
2022-03-26T00:15:22Z
CRITICAL
null
{'CWE-20'}
{'http://packetstormsecurity.com/files/157923/Sabberworm-PHP-CSS-Code-Injection.html', 'https://github.com/sabberworm/PHP-CSS-Parser/commit/2ebf59e8bfbf6cfc1653a5f0ed743b95062c62a4', 'https://packetstormsecurity.com/files/cve/CVE-2020-13756', 'http://seclists.org/fulldisclosure/2020/Jun/7', 'https://github.com/sabberworm/PHP-CSS-Parser/releases/tag/8.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13756', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sabberworm/php-css-parser/CVE-2020-13756.yaml'}
null
Packagist
GHSA-c8wh-6jw4-2h79
Potential unauthorized access to stored request & session data when plugin is misconfigured in October CMS Debugbar
### Impact The debugbar contains a perhaps little known feature where it will log all requests (and all information pertaining to each request including session data) whenever it is enabled. This presents a problem if the plugin is ever enabled on a system that is open to untrusted users as the potential exists for them to use this feature to view all requests being made to the application and obtain sensitive information from those requests. There even exists the potential for account takeovers of authenticated users by non-authenticated public users, which would then lead to a number of other potential issues as an attacker could theoretically get full access to the system if the required conditions existed. ### Patches Issue has been patched in v3.1.0 by locking down access to the debugbar to all users; it now requires an authenticated backend user with a specifically enabled permission before it is even usable, and the feature that allows access to stored request information is restricted behind a different permission that's more restrictive. ### Workarounds Apply https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18 to your installation manually if unable to upgrade to v3.1.0. ### For more information If you have any questions or comments about this advisory: * Email us at [octobercms@luketowers.ca](mailto:octobercms@luketowers.ca) & [hello@octobercms.com](mailto:hello@octobercms.com) ### Acknowledgements Thanks to [Freddie Poser](https://twitter.com/vogonjeltz101) for reporting the issue to the RainLab team.
{'CVE-2020-11094'}
2021-01-08T20:14:28Z
2020-06-03T23:19:12Z
MODERATE
null
{'CWE-532'}
{'https://github.com/rainlab/debugbar-plugin/security/advisories/GHSA-c8wh-6jw4-2h79', 'https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11094'}
null
Packagist
GHSA-36mj-6r7r-mqhf
User can obtain JWT token even if account is disabled
Users can authenticate this way even if their user account is disabled. This is a high risk vulnerability when account disabling is used to block users' access to the system. (Someone who never had an account cannot exploit this vulnerability.) The fix ensures tokens are generated only for enabled user accounts, and is distributed via Composer as ezsystems/ezplatform-rest v1.3.8
null
2021-09-28T21:21:08Z
2021-09-29T17:09:23Z
HIGH
null
{'CWE-284'}
{'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-36mj-6r7r-mqhf', 'https://github.com/ezsystems/ezplatform-rest', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-007-jwt-auth-possible-for-disabled-users.-username-login-handler-can-t-be-disabled'}
null
Packagist
GHSA-h2fw-93qx-vrcq
SQL Injection in Moodle
An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default.
{'CVE-2022-0983'}
2022-04-01T18:03:23Z
2022-03-26T00:00:29Z
HIGH
null
{'CWE-89'}
{'https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74074', 'https://github.com/moodle/moodle', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G4GRMWBGHOJMFXMTORECQNULJK7ZJJ6Y/', 'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1', 'https://bugzilla.redhat.com/show_bug.cgi?id=2064119', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0983'}
null
Packagist
GHSA-8cw5-rv98-5c46
Arbitrary PHP code execution in Drupal
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6, and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.
{'CVE-2019-6339'}
2022-01-06T19:00:47Z
2022-01-06T22:30:06Z
CRITICAL
null
{'CWE-20'}
{'https://lists.debian.org/debian-lts-announce/2019/02/msg00004.html', 'https://www.drupal.org/sa-core-2019-002', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6339.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6339', 'https://www.debian.org/security/2019/dsa-4370'}
null
Packagist
GHSA-3jxh-789f-p7m6
Cross-site Scripting
An issue was discovered in Craft CMS before 3.6.0. In some circumstances, a potential XSS vulnerability existed in connection with front-end forms that accepted user uploads.
{'CVE-2021-27902'}
2021-07-07T17:11:18Z
2021-07-02T18:36:31Z
MODERATE
null
{'CWE-79'}
{'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security-1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27902', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#360---2021-01-26', 'https://github.com/craftcms/cms/commit/8ee85a8f03c143fa2420e7d6f311d95cae3b19ce'}
null
Packagist
GHSA-82j4-vr25-x394
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0940'}
2022-03-23T15:41:25Z
2022-03-15T00:01:01Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0940', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/856bd2e2-db4f-4b7d-9927-222261ae3782', 'https://github.com/star7th/showdoc/commit/78522520892d4e29cc94148c6ec84a204a607b73'}
null
Packagist
GHSA-p523-jrph-qjc6
Insufficient Session Expiration in shopware
### Impact Automatically invalidate sessions upon password change ### Patches We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
{'CVE-2022-21652'}
2022-01-06T20:17:22Z
2022-01-06T23:49:17Z
LOW
null
{'CWE-613'}
{'https://github.com/shopware/shopware/security/advisories/GHSA-p523-jrph-qjc6', 'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21652', 'https://github.com/shopware/shopware', 'https://github.com/shopware/shopware/commit/47ebd126a94f4b019b6fde64c0df3d18d74ef7d0'}
null
Packagist
GHSA-58w4-w77w-qv3w
Reflected XSS with parameters in PostComment
### Impact An attacker could inject malicious web code into the users' web browsers by creating a malicious link. ### Patches The problem is fixed in 4.2.0 ### References [Cross-site Scripting (XSS) - Reflected (CWE-79) ](https://cwe.mitre.org/data/definitions/79.html)
{'CVE-2020-26225'}
2021-01-07T22:42:05Z
2020-11-16T21:23:29Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26225', 'https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf', 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-58w4-w77w-qv3w'}
null
Packagist
GHSA-2cv6-6437-39p2
Cross-site Scripting in microweber
File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0930'}
2022-03-22T20:03:39Z
2022-03-13T00:00:53Z
HIGH
null
{'CWE-79'}
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/33eb4cc0f80c1f86388c1862a8aee1061fa5d72e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0930', 'https://huntr.dev/bounties/d184ce19-9608-42f1-bc3d-06ece2d9a993'}
null
Packagist
GHSA-6m93-343m-3jrc
Cross-site Scripting in HTML2PDF
An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document.
{'CVE-2021-45394'}
2022-01-25T20:48:30Z
2022-01-21T23:29:48Z
HIGH
null
{'CWE-918', 'CWE-79'}
{'https://www.synacktiv.com/sites/default/files/2022-01/html2pdf_ssrf_deserialization.pdf', 'https://github.com/spipu/html2pdf/releases/tag/v5.2.4', 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f', 'https://github.com/spipu/html2pdf/blob/master/CHANGELOG.md', 'https://github.com/spipu/html2pdf', 'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45394'}
null
Packagist
GHSA-5v5h-4w2g-gxxc
SQL Injection in t3/dce
The dce (aka Dynamic Content Element) extension 2.2.0 through 2.6.x before 2.6.2, and 2.7.x before 2.7.1, for TYPO3 allows SQL Injection via a backend user account.
{'CVE-2021-31777'}
2021-05-03T16:51:32Z
2021-06-08T20:12:23Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31777', 'https://bitbucket.org/ArminVieweg/dce/commits/998a2392f69f2153797c5ace6e8914ca309e70c7', 'https://excellium-services.com/cert-xlm-advisory/', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-005', 'http://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html', 'https://packagist.org/packages/t3/dce'}
null
Packagist
GHSA-fw5q-j9p4-3vxg
Blog comment posting, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS). Impact: XSS via Arbitrary script execution. Components are: Blog comment posting Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by yama
{'CVE-2020-15276'}
2021-01-07T22:49:33Z
2020-10-30T19:10:20Z
LOW
null
{'CWE-79'}
{'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/security/advisories/GHSA-fw5q-j9p4-3vxg', 'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15276'}
null
Packagist
GHSA-c7fm-jx59-wjf6
Authorization Bypass Through User-Controlled Key in LiveHelperChat
Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v.
{'CVE-2022-0266'}
2022-01-20T16:14:41Z
2022-01-21T18:50:58Z
MODERATE
null
{'CWE-639'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0266', 'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/1ac267be-3af8-4774-89f2-77234d144d6b'}
null
Packagist
GHSA-r7cj-8hjg-x622
DBAL 3 SQL Injection Security Vulnerability
We have released a new version Doctrine DBAL 3.1.4 that fixes a critical SQL injection vulnerability in the LIMIT clause generation API provided by the Platform abstraction. We advise everyone using Doctrine DBAL 3.0.0 up to 3.1.3 to upgrade to 3.1.4 immediately. The vulnerability can happen when unsanitized input is passed to many APIs in Doctrine DBAL and ORM that ultimately end up calling `AbstractPlatform::modifyLimitQuery`. As a workaround you can cast all limit and offset parameters to integers before passing them to Doctrine APIs. This vulnerability has been assigned [CVE-2021-43608](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43608).
{'CVE-2021-43608'}
2021-12-16T14:11:44Z
2021-11-16T17:25:57Z
CRITICAL
null
{'CWE-89'}
{'https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html', 'https://github.com/doctrine/dbal/', 'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43608', 'https://github.com/doctrine/dbal/releases', 'https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622'}
null
Packagist
GHSA-3p85-p4qg-hcrp
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4081'}
2021-12-14T15:06:00Z
2021-12-16T14:27:58Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4081', 'https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3'}
null
Packagist
GHSA-754h-5r27-7x3r
RCE in Symfony
Description ----------- The `CachingHttpClient` class from the HttpClient Symfony component relies on the `HttpCache` class to handle requests. `HttpCache` uses internal headers like `X-Body-Eval` and `X-Body-File` to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by `CachingHttpClient` and if an attacker can control the response for a request being made by the `CachingHttpClient`, remote code execution is possible. Resolution ---------- HTTP headers designed for internal use in `HttpCache` are now stripped from remote responses before being passed to `HttpCache`. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78) for the 4.4 branch. Credits ------- I would like to thank Matthias Pigulla (webfactory GmbH) for reporting and fixing the issue.
{'CVE-2020-15094'}
2022-03-18T18:31:48Z
2020-09-02T17:29:56Z
HIGH
null
{'CWE-212'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15094', 'https://github.com/symfony/symfony/security/advisories/GHSA-754h-5r27-7x3r', 'https://packagist.org/packages/symfony/http-kernel', 'https://packagist.org/packages/symfony/symfony', 'https://github.com/symfony/symfony', 'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGUWOEETOFVH4PN3I3YO4QZHQ4AUKF3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VAQJXAKWPMWB7OL6QPG2ZSEQZYYPU5RC/'}
null
Packagist
GHSA-x7j7-qp7j-hw3q
Cross-site scripting (XSS) from writer field content in the site frontend
### Impact Kirby's [writer field](https://getkirby.com/docs/reference/panel/fields/writer) stores its formatted content as HTML code. Unlike with other field types, it is not possible to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks, otherwise the formatting would be lost. Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the site frontend or Panel session of other users. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. Because the writer field did not securely sanitize its contents on save, it was possible to inject malicious HTML code into the content file by sending it to Kirby's API directly without using the Panel. This malicious HTML code would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. You are *not* affected if you don't use the writer field in any of your blueprints. The attack can only be performed by logged-in users and only surfaces in the site frontend (i.e. in your templates). The Panel itself is unaffected and will not execute JavaScript that was injected into writer field content. ### Patches We have patched the vulnerability in [Kirby 3.5.8](https://github.com/getkirby/kirby/releases/tag/3.5.8) by sanitizing all writer field contents on the backend whenever the content is modified via Kirby's API. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. ### Credits Thanks to Azrul Ikhwan Zulkifli (@azrultech) from BAE Systems AI Vulnerability Research Team for responsibly reporting the identified issue.
{'CVE-2021-41252'}
2021-11-16T15:46:57Z
2021-11-16T17:04:19Z
MODERATE
null
{'CWE-79'}
{'https://github.com/getkirby/kirby/security/advisories/GHSA-x7j7-qp7j-hw3q', 'https://github.com/getkirby/kirby/releases/tag/3.5.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41252', 'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc', 'https://github.com/getkirby/kirby'}
null
Packagist
GHSA-h3gg-7wx2-cq3h
XSS in Flarum Sticky extension
### Impact A change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit. Any HTML would be injected through Mithril's `m.trust()` helper. This resulted in an HTML injection where `<script>` tags would not be executed. However it was possible to run javascript from other HTML attributes, enabling a cross-site scripting (XSS) attack to be performed. Since the exploit only happens with the first post of a pinned discussion, an attacker would need the ability to pin their own discussion, or be able to edit a discussion that was previously pinned. On forums where all pinned posts are authored by your staff, you can be relatively certain the vulnerability has not been exploited. Forums where some user-created discussions were pinned can look at the first post edit date to find whether the vulnerability might have been exploited. Because Flarum doesn't store the post content history, you cannot be certain if a malicious edit was reverted. ### Patches The fix will be available in version v0.1.0-beta.16 with Flarum beta 16. The fix has already been back-ported to Flarum beta 15 as version v0.1.0-beta.15.1 of the Sticky extension. ### Workarounds Forum administrators can disable the Sticky extension until they are able to apply the update. The vulnerability cannot be exploited while the extension is disabled. ### References - [Release announcement](https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151) - [Pull Request](https://github.com/flarum/sticky/pull/24) ### For more information If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support). If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy).
{'CVE-2021-21283'}
2021-01-26T20:41:58Z
2021-01-29T18:13:41Z
MODERATE
null
{'CWE-79'}
{'https://github.com/flarum/sticky/pull/24', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21283', 'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19', 'https://github.com/flarum/sticky/security/advisories/GHSA-h3gg-7wx2-cq3h', 'https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)'}
null
Packagist
GHSA-5r9v-8w62-r26j
livehelperchat is vulnerable to Cross-site Scripting
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0253'}
2022-01-25T19:13:21Z
2022-01-21T23:48:25Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0253', 'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437', 'https://huntr.dev/bounties/ac7f7eba-ee0b-4a50-bd89-29fd9b3e8303', 'https://github.com/livehelperchat/livehelperchat'}
null