ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Packagist
GHSA-m884-279h-32v2
Exceptions displayed in non-debug configurations in Symfony
Description ----------- When `ErrorHandler` renders an exception HTML page, it uses un-escaped properties from the related Exception class to render the stacktrace. The security issue comes from the fact that the stacktraces were also displayed in non-`debug` environments. Resolution ---------- The `ErrorHandler` class now escapes all properties coming from the related Exception, and the stacktrace is not displayed anymore in non-`debug` environments. The patches for this issue are available [here](https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad) and [here](https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db) for branch 4.4. Credits ------- I would like to thank Luka Sikic for reporting & Yonel Ceruto and Jérémy Derussé for fixing the issue.
{'CVE-2020-5274'}
2021-05-12T23:54:24Z
2020-03-30T20:09:31Z
MODERATE
null
{'CWE-209'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5274', 'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad', 'https://github.com/symfony/symfony/security/advisories/GHSA-m884-279h-32v2', 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db'}
null
Packagist
GHSA-x5r2-hj5c-8jx6
SSRF in adminer
### Impact Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. ### Patches Patched by ccd2374b, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9). ### Workarounds * Use a single driver version (e.g. `adminer-mysql.php`). * Protect access to Adminer also by other means, e.g. by HTTP password, IP address limiting or by OTP [plugin](https://www.adminer.org/plugins/). ### References https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf ### For more information If you have any questions or comments about this advisory: * Comment at ccd2374b.
{'CVE-2021-21311'}
2021-06-24T19:56:17Z
2021-02-11T20:42:59Z
HIGH
null
{'CWE-918'}
{'https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6', 'https://packagist.org/packages/vrana/adminer', 'https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21311', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html', 'https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf'}
null
Packagist
GHSA-533p-cp2g-99wp
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3931'}
2021-11-17T21:12:46Z
2021-11-15T23:19:09Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3931', 'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e', 'https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f', 'https://github.com/snipe/snipe-it'}
null
Packagist
GHSA-6rmq-x2hv-vxpp
Vulnerable third party libraries in certain configurations of Symfony
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details
{'CVE-2019-6338'}
2021-08-19T15:23:18Z
2019-12-02T18:11:25Z
HIGH
null
{'CWE-502'}
{'https://www.drupal.org/sa-core-2019-001', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6338', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6338.yaml', 'https://lists.debian.org/debian-lts-announce/2019/02/msg00032.html', 'https://www.debian.org/security/2019/dsa-4370', 'http://www.securityfocus.com/bid/106706'}
null
Packagist
GHSA-xg6r-5gx4-qxjm
invoiceninja is vulnerable to Cross-site Scripting
invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3977'}
2022-01-05T20:32:32Z
2022-01-06T21:58:34Z
MODERATE
null
{'CWE-79'}
{'https://github.com/invoiceninja/invoiceninja', 'https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3977', 'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f', 'https://github.com/invoiceninja/invoiceninja/releases/tag/v5.3.35'}
null
Packagist
GHSA-7xj5-fwqr-5378
Cross-site Scripting in craftcms/cms
Craft CMS before 3.7.29 allows cross-site scripting.
{'CVE-2022-28378'}
2022-04-18T22:20:39Z
2022-04-04T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://github.com/craftcms/cms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28378', 'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18'}
null
Packagist
GHSA-mw75-qvfr-hpmr
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0938'}
2022-03-23T15:38:52Z
2022-03-15T00:01:01Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0938'}
null
Packagist
GHSA-3p9j-442x-hjp7
Business Logic Errors in microweber
microweber prior to 1.2.11 allows multiple uses of a single-use coupon.
{'CVE-2022-0689'}
2022-02-23T19:27:39Z
2022-02-20T00:00:31Z
MODERATE
null
null
{'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/fa5dbbd3-97fe-41a9-8797-2e54d9a9c649', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0689', 'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'}
null
Packagist
GHSA-pp2h-95hm-hv9r
Improper Neutralization of Formula Elements in a CSV File in pimcore/pimcore
### Impact Data Object CSV import allows formular injection. ### Patches Problem is patched in 10.1.1 ### Workarounds Apply https://github.com/pimcore/pimcore/pull/9992.patch ### References https://cwe.mitre.org/data/definitions/1236.html
{'CVE-2021-37702'}
2021-08-27T12:49:12Z
2021-08-30T16:13:13Z
MODERATE
null
{'CWE-1236'}
{'https://github.com/pimcore/pimcore/security/advisories/GHSA-pp2h-95hm-hv9r', 'https://github.com/pimcore/pimcore/pull/9992', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37702', 'https://github.com/pimcore/pimcore'}
null
Packagist
GHSA-3q5x-7mxp-rp6j
Remote code execution via vulnerable Symphony dependecy injection
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Dependency injection through Symphony framework allows service identifiers to be derived from user controlled data, which can lead to remote code execution.
{'CVE-2019-8135'}
2021-08-18T22:23:57Z
2019-11-12T22:59:32Z
CRITICAL
null
{'CWE-74'}
{'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8135', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8135.yaml'}
null
Packagist
GHSA-gj26-g5qf-jrh7
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.
{'CVE-2022-0589'}
2022-02-24T13:06:10Z
2022-02-16T00:01:51Z
MODERATE
null
{'CWE-79'}
{'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0589', 'https://github.com/librenms/librenms', 'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa', 'https://huntr.dev/bounties/d943d95c-076f-441a-ab21-cbf6b15f6768'}
null
Packagist
GHSA-82xf-8h9p-c6qj
Cross-Site Request Forgery in forkcms
Cross-site request forgery (CSRF) in Fork-CMS before 5.8.2 allow remote attackers to hijack the authentication of logged administrators.
{'CVE-2020-23264'}
2021-05-19T20:53:27Z
2021-06-22T15:23:45Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23264', 'https://github.com/forkcms/forkcms/pull/3123'}
null
Packagist
GHSA-4vpc-5jx4-cfqg
User enumeration leak using switch user functionality in Symfony
An issue was discovered in Symfony 4.2.0 to 4.2.11 and 4.3.0 to 4.3.7. The ability to enumerate users was possible due to different handling depending on whether the user existed when making unauthorized attempts to use the switch users functionality. This is related to symfony/security.
{'CVE-2019-18886'}
2021-07-28T15:49:16Z
2019-12-02T18:09:21Z
MODERATE
null
{'CWE-203', 'CWE-200'}
{'https://symfony.com/cve-2019-18886', 'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-18886.yaml', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18886', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18886.yaml', 'https://symfony.com/blog/cve-2019-18886-prevent-user-enumeration-using-switch-user-functionality'}
null
Packagist
GHSA-vf4w-fg7r-5v94
Improper Certificate Validation in phpseclib
phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification.
{'CVE-2021-30130'}
2021-04-23T00:22:49Z
2021-04-07T20:56:55Z
HIGH
null
{'CWE-295', 'CWE-347'}
{'https://github.com/phpseclib/phpseclib/releases/tag/2.0.31', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30130', 'https://github.com/phpseclib/phpseclib/pull/1635', 'https://github.com/phpseclib/phpseclib/releases/tag/3.0.7'}
null
Packagist
GHSA-5fxv-xx5p-g2fv
Integer Overflow in microweber
Microweber is a new generation CMS with drag and drop. The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters
{'CVE-2022-0968'}
2022-03-25T17:13:37Z
2022-03-16T00:00:46Z
HIGH
null
{'CWE-190'}
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e', 'https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0968'}
null
Packagist
GHSA-96v6-hrwg-p378
Weak Password Requirements in Daybyday CRM
In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort.
{'CVE-2022-22110'}
2022-01-24T22:07:06Z
2022-01-08T00:31:51Z
HIGH
null
{'CWE-521'}
{'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b', 'https://github.com/Bottelet/DaybydayCRM/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22110', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110'}
null
Packagist
GHSA-gprh-7767-cw39
Code Injection in Bolt CMS
Bolt CMS <= 4.2 is vulnerable to Remote Code Execution. Unsafe theme rendering allows an authenticated attacker to edit theme to inject server-side template injection that leads to remote code execution.
{'CVE-2021-40219'}
2022-04-22T20:18:24Z
2022-04-12T00:00:34Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40219', 'https://github.com/bolt/core/blob/3b21a73ebf519b76756d3ad2841312d10ef11461/src/Controller/Frontend/TemplateController.php', 'https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-40219', 'https://github.com/bolt/core', 'http://boltcms.com'}
null
Packagist
GHSA-8hcm-jj4x-4gmr
Cross-site scripting in tribalsystems/zenario
Cross Site Scripting (XSS) in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to execute arbitrary code by injecting arbitrary HTML into the "cID" parameter when creating a new HTML component.
{'CVE-2021-27673'}
2021-04-23T00:23:34Z
2021-06-08T20:11:40Z
MODERATE
null
{'CWE-79'}
{'https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38', 'http://packetstormsecurity.com/files/163083/Zenario-CMS-8.8.52729-SQL-Injection.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27673', 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370'}
null
Packagist
GHSA-2cqg-q7jm-j35c
snipe-it is vulnerable to Cross-site Scripting
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3938'}
2021-11-17T21:13:25Z
2021-11-15T23:19:42Z
LOW
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3938', 'https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063', 'https://github.com/snipe/snipe-it', 'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'}
null
Packagist
GHSA-m2jh-fxw4-gphm
HTTP Host Header Injection
### Meta * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C` (3.5) ### Problem It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP _Host_ header. TYPO3 uses the HTTP _Host_ header, for example, to generate absolute URLs during the frontend rendering process. Since the host header itself is provided by the client, it can be forged to any value, even in a name-based virtual hosts environment. This vulnerability is the same as described in [TYPO3-CORE-SA-2014-001 (CVE-2014-3941)](https://typo3.org/security/advisory/typo3-core-sa-2014-001/). A regression, introduced during TYPO3 v11 development, led to this situation. The already existing setting _$GLOBALS['TYPO3_CONF_VARS']['SYS']['trustedHostsPattern']_ (used as an effective mitigation strategy in previous TYPO3 versions) was not evaluated anymore, and reintroduced the vulnerability. ### Solution Update your instance to TYPO3 version 11.5.0 which addresses the problem described. ### Credits Thanks to TYPO3 framework merger Benjamin Franzke who reported and fixed the issue. ### References * [TYPO3-CORE-SA-2021-015](https://typo3.org/security/advisory/typo3-core-sa-2021-015) * [CVE-2014-3941](https://nvd.nist.gov/vuln/detail/CVE-2014-3941) reintroduced in TYPO3 v11.0.0
{'CVE-2021-41114'}
2021-10-05T18:47:01Z
2021-10-05T20:23:35Z
MODERATE
null
{'CWE-20', 'CWE-644'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-3941', 'https://github.com/TYPO3/typo3', 'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41114', 'https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm', 'https://typo3.org/security/advisory/typo3-core-sa-2021-015'}
null
Packagist
GHSA-3374-7h99-xr85
Cross-site scripting in forkcms
Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML.
{'CVE-2020-23049'}
2021-10-29T13:52:23Z
2021-10-25T19:43:05Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23049', 'https://www.vulnerability-lab.com/get_content.php?id=2208', 'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6', 'https://github.com/forkcms/forkcms'}
null
Packagist
GHSA-x68c-4gmm-5g43
kimai2 is vulnerable to Cross-site Scripting
kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3985'}
2021-12-03T15:19:53Z
2021-12-03T20:40:38Z
HIGH
null
{'CWE-79'}
{'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3', 'https://github.com/kevinpapst/kimai2', 'https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3985'}
null
Packagist
GHSA-88f9-7xxh-c688
Configuration leak
### Impact Authenticated users, regardless of their privileges (_User_ or _Admin_), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). ### Patches This issue was addressed by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. ### Workarounds Only allow trusted source IP addresses to access to the administration dashboard. ### References Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time. ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; - The maintainers, by opening an issue on this repository.
{'CVE-2021-39174'}
2021-08-30T22:12:01Z
2021-08-30T16:11:43Z
HIGH
null
{'CWE-75'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39174', 'https://github.com/fiveai/Cachet/releases/tag/v2.5.1', 'https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688'}
null
Packagist
GHSA-h7vq-5qgw-jwwq
CSV Injection Vulnerability
### Impact In some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel. If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update. ### Patches This has been patched in Craft 3.7.14. ### References * https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28 * https://twitter.com/craftcmsupdates/status/1442928690145366018 ### For more information If you have any questions or comments about this advisory, email us at support@craftcms.com ---------- Credits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli
{'CVE-2021-41824'}
2021-10-18T19:11:00Z
2021-10-18T19:04:16Z
HIGH
null
{'CWE-1236'}
{'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28', 'https://twitter.com/craftcmsupdates/status/1442928690145366018', 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824', 'https://github.com/craftcms/cms'}
null
Packagist
GHSA-cpq8-x35g-m439
Cross-site Scripting in yourls
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in arbitrary path handling.
{'CVE-2021-3783'}
2021-09-16T18:19:29Z
2021-09-20T20:43:15Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/b688e553-d0d9-4ddf-95a3-ff4b78004984', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3783', 'https://github.com/yourls/yourls', 'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'}
null
Packagist
GHSA-rrgw-3hg3-9x8c
XSS vulnerability in translations
### Summary An attacker with admin privileges and access to Translations management functionality may add JS payload to translation values via: - Translation management UI. - Translations downloaded via the Crowdin service may also contain JS strings used for XSS attacks, for a successful attack poisoned translation should be enabled, downloaded, and installed. - Translations uploaded via Upload translation file on the All Languages grid ### Workarounds There are no workarounds that address this vulnerability.
null
2022-01-10T21:39:18Z
2022-01-12T21:49:49Z
MODERATE
null
null
{'https://github.com/oroinc/platform-er/security/advisories/GHSA-rrgw-3hg3-9x8c'}
null
Packagist
GHSA-x2xg-6wcj-6xf9
SafeCurl before 0.9.2 has a DNS rebinding vulnerability.
SafeCurl before 0.9.2 has a DNS rebinding vulnerability.
{'CVE-2020-36474'}
2021-08-24T20:08:25Z
2021-08-25T14:49:48Z
CRITICAL
null
null
{'https://github.com/vanilla/safecurl/pull/2', 'https://github.com/vanilla/safecurl/', 'https://github.com/vanilla/safecurl/releases/tag/v0.9.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36474'}
null
Packagist
GHSA-w4pj-7p68-3vgv
Stored XSS in October
### Impact A user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field. ### Patches Issue has been patched in Build 466 (v1.0.466) & RainLab.Blog v1.4.1 by restricting the ability to store JS in markdown to only users that have been explicitly granted the `backend.allow_unsafe_markdown` permission. ### Workarounds Apply https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746 & https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94 to your installation manually if unable to upgrade to Build 466 or v1.4.1 of RainLab.Blog (if using that plugin). ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1100" alt="Screen Shot 2020-03-31 at 2 01 52 PM" src="https://user-images.githubusercontent.com/7253840/78070158-8f7ef580-7358-11ea-950c-226533f6a0a3.png">
{'CVE-2020-11083'}
2021-03-04T18:26:22Z
2020-08-05T14:52:44Z
LOW
null
{'CWE-79'}
{'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94', 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746', 'https://github.com/octobercms/october/security/advisories/GHSA-w4pj-7p68-3vgv', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11083'}
null
Packagist
GHSA-7vmw-7x57-q6jw
Cross-site scripting
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 suffer from an authenticated stored XSS in administration vulnerability. Users are recommend to update to the version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
{'CVE-2021-32713'}
2021-06-25T15:33:55Z
2021-09-08T18:00:00Z
MODERATE
null
{'CWE-79'}
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32713', 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq', 'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'}
null
Packagist
GHSA-m553-9wmx-533h
Cross-site scripting in Dolibarr
In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS.
{'CVE-2019-16197'}
2021-08-18T19:24:26Z
2019-11-08T20:05:31Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16197', 'http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html', 'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'}
null
Packagist
GHSA-2v2v-fx7r-f2fh
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4082'}
2021-12-14T14:45:36Z
2021-12-16T14:28:10Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092', 'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4082'}
null
Packagist
GHSA-xgx2-332h-9x6q
SQL Injection in Yeswiki
An SQL Injection vlnerability exits in Yeswiki doryphore 20211012 via the email parameter in the registration form. The issue was fixed in Yeswiki version 4.1.0.
{'CVE-2021-43091'}
2022-03-30T15:24:00Z
2022-03-26T00:00:32Z
HIGH
null
{'CWE-89'}
{'https://github.com/yeswiki/yeswiki', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43091', 'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094', 'https://huntr.dev/bounties/07f245a7-ee9f-4b55-a0cc-13d5cb1be6e0/'}
null
Packagist
GHSA-7w4p-72j7-v7c2
Phar object injection in PHPMailer
PHPMailer versions prior to 6.0.6 and 5.2.27 are vulnerable to an object injection attack by passing phar:// paths into `addAttachment()` and other functions that may receive unfiltered local paths, possibly leading to RCE. See [this article](https://knasmueller.net/5-answers-about-php-phar-exploitation) for more info on this type of vulnerability. Mitigated by blocking the use of paths containing URL-protocol style prefixes such as `phar://`. Reported by Sehun Oh of cyberone.kr. ### Impact Object injection, possible remote code execution ### Patches Fixed in 6.0.6 and 5.2.27 ### Workarounds Validate and sanitise user input before using. ### References https://nvd.nist.gov/vuln/detail/CVE-2018-19296 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
{'CVE-2018-19296'}
2021-08-19T19:57:58Z
2020-03-05T22:08:55Z
HIGH
null
{'CWE-502', 'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-19296', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7w4p-72j7-v7c2', 'https://lists.debian.org/debian-lts-announce/2018/12/msg00020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPU66INRFY5BQ3ESVPRUXJR4DXQAFJVT/', 'https://www.debian.org/security/2018/dsa-4351', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2018-19296.yaml'}
null
Packagist
GHSA-h59f-p56g-g75v
SQL Injection in librenms
A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /ajax/form/widget-settings endpoint.
{'CVE-2020-35700'}
2021-04-05T20:39:08Z
2021-05-06T18:53:02Z
HIGH
null
{'CWE-89'}
{'https://github.com/librenms/librenms/issues/12405', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35700', 'https://github.com/librenms/librenms/blob/master/app/Http/Controllers/Widgets/TopDevicesController.php', 'https://github.com/librenms/librenms/pull/12422', 'https://www.horizon3.ai/disclosures/librenms-second-order-sqli', 'https://github.com/librenms/librenms/releases/tag/21.1.0'}
null
Packagist
GHSA-m8xh-cqc2-5q6f
Type Confusion in ImpressCMS
ImpressCMS before 1.4.3 has plugins/preloads/autologin.php type confusion with resultant Authentication Bypass (!= instead of !==).
{'CVE-2021-26600'}
2022-04-01T17:14:56Z
2022-03-29T00:01:16Z
CRITICAL
null
{'CWE-843'}
{'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3', 'http://karmainsecurity.com/KIS-2022-01', 'https://github.com/ImpressCMS/impresscms', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26600', 'http://packetstormsecurity.com/files/166393/ImpressCMS-1.4.2-Authentication-Bypass.html', 'http://seclists.org/fulldisclosure/2022/Mar/43', 'https://hackerone.com/reports/1081986'}
null
Packagist
GHSA-5mwx-f6w6-7w5r
Cross-site Scripting in GeniXCMS
In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters.
{'CVE-2022-24563'}
2022-03-10T22:00:31Z
2022-03-04T00:00:19Z
MODERATE
null
{'CWE-79'}
{'https://github.com/truonghuuphuc/CVE/blob/main/CVE-2022-24563.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24563', 'https://github.com/semplon/GeniXCMS', 'https://github.com/truonghuuphuc/CVE', 'https://genix.me/'}
null
Packagist
GHSA-g8r4-p96j-xfxc
Twig allowing dangerous PHP functions by default in getgrav/grav
### Impact Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. ### Patches The issue was addressed by preventing dangerous functions from being called in Twig templates. A configuration option has been added to manually allow arbitrary PHP functions (`system.twig.safe_functions`) and filters (`system.twig.safe_filters`). Futures major versions of Grav may disable this functionality by default. ### Workarounds Blocking access to the `/admin` path from untrusted sources will reduce the probability of exploitation. ### References - https://portswigger.net/research/server-side-template-injection - https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; - The maintainers, by opening an issue on this repository.
{'CVE-2021-29440'}
2021-07-13T15:49:43Z
2021-04-16T19:53:12Z
HIGH
null
{'CWE-94'}
{'http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html', 'https://github.com/getgrav/grav/security/advisories/GHSA-g8r4-p96j-xfxc', 'https://packagist.org/packages/getgrav/grav', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29440'}
null
Packagist
GHSA-67c7-5v9j-227r
Cross-site Scripting in kimai2
kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3983'}
2021-12-03T15:16:39Z
2021-12-03T20:43:06Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3983', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3', 'https://github.com/kevinpapst/kimai2', 'https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413', 'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0'}
null
Packagist
GHSA-j29g-g982-pwpv
Cross-site scripting (XSS)
ImpressCMS 1.4.0 is affected by XSS in modules/system/admin.php which may result in arbitrary remote code execution.
{'CVE-2020-17551'}
2021-03-12T20:09:58Z
2021-03-12T21:34:11Z
MODERATE
null
{'CWE-79'}
{'https://www.impresscms.org/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17551', 'https://github.com/ImpressCMS/impresscms/issues/659'}
null
Packagist
GHSA-vx6j-pjrh-vgjh
PHP file inclusion in the Sulu admin panel
### Impact _What kind of vulnerability is it? Who is impacted?_ An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution. * Compromised components: Arbitrary file read on the server, (Potential) Remote code execution * Exploitation pre-requisite: User account on the backend ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Overwrite the service `sulu_route.generator.expression_token_provider` and wrap the translator before passing it to the expression language. ### References _Are there any links users can visit to find out more?_ Currently not. ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)
{'CVE-2021-43836'}
2021-12-15T22:27:31Z
2021-12-15T22:54:20Z
HIGH
null
{'CWE-22'}
{'https://github.com/sulu/sulu/security/advisories/GHSA-vx6j-pjrh-vgjh', 'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43836', 'https://github.com/sulu/sulu'}
null
Packagist
GHSA-rqgp-ccph-5w65
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3901'}
2021-11-02T18:42:29Z
2021-10-28T23:14:14Z
LOW
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3901', 'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2', 'https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464', 'https://github.com/firefly-iii/firefly-iii'}
null
Packagist
GHSA-93pj-4p65-qmr9
Insufficient user authorization in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability.
{'CVE-2022-0334'}
2022-02-02T16:13:31Z
2022-01-28T22:07:40Z
MODERATE
null
{'CWE-668', 'CWE-863'}
{'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0334', 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68', 'https://bugzilla.redhat.com/show_bug.cgi?id=2043664', 'https://moodle.org/mod/forum/discuss.php?d=431102'}
null
Packagist
GHSA-55mm-5399-7r63
Reliance on Cookies without validation in OctoberCMS
### Impact Previously encrypted cookie values were not tied to the name of the cookie the value belonged to. This meant that certain classes of attacks that took advantage of other theoretical vulnerabilities in user facing code (nothing exploitable in the core project itself) had a higher chance of succeeding. Specifically, if your usage exposed a way for users to provide unfiltered user input and have it returned to them as an encrypted cookie (ex. storing a user provided search query in a cookie) they could then use the generated cookie in place of other more tightly controlled cookies; or if your usage exposed the plaintext version of an encrypted cookie at any point to the user they could theoretically provide encrypted content from your application back to it as an encrypted cookie and force the framework to decrypt it for them. ### Patches Issue has been patched in Build 468 (v1.0.468). >**NOTE**: If you are using the cookie session driver, all of your session data will be invalidated. All other session drivers should smoothly upgrade to the changes (although the backend authentication persist cookie will also be invalidated requiring users to login again once their current session expires). ### Workarounds Apply https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c to your installation manually if unable to upgrade to Build 468. ### References - https://blog.laravel.com/laravel-cookie-security-releases - https://github.com/laravel/framework/compare/4c7d118181d6c7f1f883643702df807ced016c5e...a731824421f9ebc586728ea9c7cff231a249aaa9 ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat Assessment Assessed as Low given that it is not directly exploitable within the core but requires other security vulnerabilities within the application to have an effect and the severity of its effect depends entirely on the severity of those other holes in the application's defences. ### Acknowledgements Thanks to [Takashi Terada of Mitsui Bussan Secure Directions, Inc.](https://www.linkedin.com/in/takeshi-terada-b570a6100/) for finding the original issue in Laravel and @taylorotwell for sharing the report with the October CMS team.
{'CVE-2020-15128'}
2021-03-04T18:25:42Z
2020-08-05T14:52:54Z
MODERATE
null
{'CWE-565', 'CWE-327'}
{'https://github.com/octobercms/october/security/advisories/GHSA-55mm-5399-7r63', 'https://github.com/octobercms/library/pull/508', 'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15128'}
null
Packagist
GHSA-6x98-fx9j-7c78
Disabled users able to log in with third party SSO plugin
### Impact Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address ### Patches Upgrade to 2.12.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2017-1000489'}
2021-01-19T21:13:44Z
2021-01-19T21:16:19Z
MODERATE
null
{'CWE-287'}
{'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000489', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-6x98-fx9j-7c78'}
null
Packagist
GHSA-wg8p-w946-c482
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
{'CVE-2022-0956'}
2022-03-29T16:42:37Z
2022-03-16T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0956', 'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2'}
null
Packagist
GHSA-hj8g-cw8x-2c6m
Cross-site Scripting in Microweber
Microweber prior to version 1.3 is vulnerable to reflected cross-site scripting.
{'CVE-2022-0719'}
2022-02-24T21:51:08Z
2022-02-24T00:00:53Z
HIGH
null
{'CWE-79'}
{'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312', 'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0719'}
null
Packagist
GHSA-xhh6-956q-4q69
Argument injection in a MimeTypeGuesser in Symfony
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. This is related to symfony/http-foundation (and symfony/mime in 4.3.x).
{'CVE-2019-18888'}
2021-07-28T16:28:00Z
2019-12-02T18:08:19Z
HIGH
null
{'CWE-20', 'CWE-88'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/mime/CVE-2019-18888.yaml', 'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/', 'https://symfony.com/cve-2019-18888', 'https://symfony.com/blog/cve-2019-18888-prevent-argument-injection-in-a-mimetypeguesser', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18888', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18888.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-18888.yaml'}
null
Packagist
GHSA-m5v7-pr32-mjx2
Critical severity vulnerability in Ignition
The Ignition page before version 2.0.5 for Laravel mishandles globals, _get, _post, _cookie, and _env. NOTE: in the 1.x series, versions 1.16.15 and later are unaffected as a consequence of the CVE-2021-43996 fix.
{'CVE-2020-13909'}
2021-11-18T20:37:40Z
2021-10-12T16:29:13Z
CRITICAL
null
null
{'https://github.com/facade/ignition/releases/tag/2.0.5', 'https://github.com/github/advisory-database/issues/2316', 'https://github.com/facade/ignition/compare/2.0.4...2.0.5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13909', 'https://github.com/facade/ignition', 'https://www.cve.org/CVERecord?id=CVE-2020-13909'}
null
Packagist
GHSA-cv7m-wc7g-7gfp
Cross-Site Request Forgery in MAGMI
All versions of MAGMI up to and including version 0.7.24 are vulnerable to CSRF due to the lack of CSRF tokens. RCE (via phpcli command) is possible in the event that a CSRF is leveraged against an existing admin session for MAGMI.
{'CVE-2020-5776'}
2021-05-05T19:10:44Z
2021-05-06T18:54:41Z
MODERATE
null
{'CWE-352'}
{'https://www.tenable.com/security/research/tra-2020-51', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5776'}
null
Packagist
GHSA-c9hq-g4q8-w893
Privilage Escalation in moodle
If the upload course tool in Moodle was used to delete an enrollment method which did not exist or was not already enabled, the tool would erroneously enable that enrollment method. This could lead to unintended users gaining access to the course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
{'CVE-2020-25701'}
2021-03-24T23:17:02Z
2021-03-29T20:42:55Z
MODERATE
null
{'CWE-863'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1895432', 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=413939', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25701'}
null
Packagist
GHSA-x2gw-85w6-fjjw
Cross-site scripting in demos/demo.mysqli.php in getID3
Cross-site scripting (XSS) vulnerability in demos/demo.mysqli.php in getID3 1.X and v2.0.0-beta allows remote attackers to inject arbitrary web script or HTML via the showtagfiles parameter.
{'CVE-2021-40926'}
2021-10-05T16:02:41Z
2021-10-04T20:13:55Z
MODERATE
null
{'CWE-79'}
{'https://github.com/JamesHeinrich/getID3/issues/341', 'https://github.com/JamesHeinrich/getID3/releases/tag/v1.9.21', 'https://github.com/JamesHeinrich/getID3/pull/342', 'https://github.com/JamesHeinrich/getID3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40926'}
null
Packagist
GHSA-mjvc-j6rv-9xj8
Insertion of Sensitive Information Into Debugging Code in Microweber
Microweber prior to 1.3 may expose sensitive information about a server and a user when running the server in debug mode.
{'CVE-2022-0721'}
2022-02-24T21:47:33Z
2022-02-24T00:00:54Z
HIGH
null
{'CWE-215'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0721', 'https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb', 'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec', 'https://github.com/microweber/microweber'}
null
Packagist
GHSA-32m2-9f76-4gv8
Business Logic Errors in SilverStripe Framework
SilverStripe Framework prior to version 4.10.1 is vulnerable to business logic errors.
{'CVE-2022-0227'}
2022-02-11T20:51:39Z
2022-02-06T00:01:01Z
MODERATE
null
null
{'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0227', 'https://huntr.dev/bounties/35631e3a-f4b9-41ad-857c-7e3021932a72', 'https://github.com/silverstripe/silverstripe-framework'}
null
Packagist
GHSA-jvg4-9rc2-wvcr
Generation of fake documents via public GET-call
### Impact Generation of fake documents via public GET-call ### Patches We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021
null
2021-02-10T02:17:07Z
2021-02-10T02:32:07Z
LOW
null
{'CWE-862'}
{'https://github.com/shopware/platform/security/advisories/GHSA-jvg4-9rc2-wvcr', 'https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351', 'https://packagist.org/packages/shopware/platform', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021'}
null
Packagist
GHSA-8wf2-3ggj-78q9
Improper Authentication in phpmyadmin
An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.
{'CVE-2022-23807'}
2022-01-28T22:31:16Z
2022-01-28T22:44:40Z
MODERATE
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23807', 'https://github.com/phpmyadmin/phpmyadmin', 'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32', 'https://www.phpmyadmin.net/security/PMASA-2022-1/'}
null
Packagist
GHSA-4xww-6h7v-29jg
User enumeration in livehelperchat
livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information. There is an observable discrepancy between errors generated for users that exist and those that do not.
{'CVE-2022-0083'}
2022-01-12T19:34:13Z
2022-01-21T23:37:07Z
MODERATE
null
{'CWE-209'}
{'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0083'}
null
Packagist
GHSA-xgpf-p52j-pf7m
XSS in CreateQueuedJobTask
A vulnerability has been identified in the Silverstripe CMS 3 and 4 version of the symbiote/silverstripe-queuedjobs module. A Cross Site Scripting vulnerability allows an attacker to inject an arbitrary payload in the CreateQueuedJobTask dev task via a specially crafted URL.
{'CVE-2021-27938'}
2021-03-24T17:41:15Z
2021-03-24T17:42:02Z
MODERATE
null
{'CWE-79'}
{'https://github.com/symbiote/silverstripe-queuedjobs/releases', 'https://www.silverstripe.org/download/security-releases/cve-2021-27938', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27938', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symbiote/silverstripe-queuedjobs/CVE-2021-27938.yaml'}
null
Packagist
GHSA-h79x-98r2-g6qc
Impersonation of other users (passing XBOX Live authentication) by theft of logins in PocketMine-MP
# Impact Minecraft Bedrock authentication and its protocol encryption are inseparably linked. One is not complete without the other. This vulnerability affects servers which are able to be directly connected to via the internet (i.e. not behind a proxy). If you are using a proxy, please check that it supports protocol encryption and that it is enabled. # Technical details <details> <summary>click to expand</summary> ## Basics 1. The client generates a private ECC key `clientPriv` which it uses to complete ECDH for encryption. 2. A JWT containing the public key `clientPub` corresponding to this key is signed by Microsoft servers with the [Mojang root public key](https://github.com/pmmp/PocketMine-MP/blob/stable/src/network/mcpe/auth/ProcessLoginTask.php#L42) `mojangPub`. 3. The server verifies that the token was issued by Microsoft servers by verifying the JWT signature with `mojangPub`. ## Why this is a problem However, this only ensures that the token was issued by Microsoft. It does _not_ ensure that the client actually possesses the private key corresponding to the public key in the token. In a login replay attack, the attacker sends a login captured from another session. This login is valid because it is verifiable by `mojangPub`; however, without encryption, the server doesn't know that the client actually possesses `clientPriv`, and the authenticity of the client cannot be verified. ## How encryption prevents the attack 1. The server calculates a shared secret for encryption using ECDH of `serverPriv` and `clientPub`. 2. It then signs a return token using `serverPriv` and sends this to the client, along with `serverPub`. 3. The client then verifies the JWT using `serverPub`, and calculates the same shared secret as the server using `clientPriv` and `serverPub`. If the client does not possess `clientPriv` (i.e. because it replayed a stolen login), then the session cannot proceed once encryption is enabled, since the client cannot calculate the shared secret needed to decrypt the server packets and encrypt its own packets. **Since PM3 does not implement protocol encryption, this means that ALL versions of PM3 are affected by this login stealing attack.** ## How does the attacker capture a login in the first place? The typical way to do this would be to trick a player into joining a server controlled by the attacker. This would allow the attacker to grab the login from the connection and store it for future use. ## Are the logins valid forever? No. All the JWTs have expiry dates after which they cannot be used. These expiry dates are typically 2-3 days after the token was issued by XBOX servers. PocketMine-MP 3.x does verify these expiry dates, so the use-by dates of these attacks are limited. </details> # Patches This problem has been fixed in all 4.x versions by implementing Minecraft protocol encryption. ~This has not yet been addressed on 3.x, but since this vulnerability is already public knowledge, the advisory has been released early to make sure people are aware of it and the mitigation steps they can take.~ Update 2022-01-22: This has been fixed on 3.x by d28be4eaf24a890f7ef110a51181a3d806a6acca. # Workarounds - Use a proxy that supports encryption such as [gophertunnel](https://github.com/Sandertv/gophertunnel) between your server and players. Make sure that the server only accepts connections from the proxy. If the proxy is on the same machine as the server, you can use `server-ip=127.0.0.1` to ensure that only the proxy can create connections for you. The following things may help mitigate the problem: - Verify that the `LoginPacket` `serverAddress` field is the same as the server's exposed domain name. For example: https://github.com/JustTalDevelops/AntiLoginForger **WARNING: THIS DOES NOT SOLVE THE ROOT ISSUE. YOU WILL REMAIN VULNERABLE UNLESS YOU UPGRADE.** # For more information If you have any questions or comments about this advisory: * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-01-24T22:08:04Z
2022-01-21T23:02:15Z
MODERATE
null
null
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-h79x-98r2-g6qc', 'https://github.com/pmmp/PocketMine-MP/issues/4580'}
null
Packagist
GHSA-69wp-xwm7-69wm
Exposure of Resource to Wrong Sphere in ThinkPHP Framework
ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php.
{'CVE-2022-25481'}
2022-04-01T13:50:10Z
2022-03-22T00:00:43Z
HIGH
null
{'CWE-668'}
{'https://github.com/top-think/framework', 'https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25481'}
null
Packagist
GHSA-728c-42pc-fwxg
Unrestricted Upload of File with Dangerous Type in Crater
Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.
{'CVE-2022-0242'}
2022-01-19T14:08:43Z
2022-01-21T23:54:50Z
HIGH
null
{'CWE-434'}
{'https://huntr.dev/bounties/19f3e5f7-b419-44b1-9c37-7e4404cbec94', 'https://github.com/crater-invoice/crater', 'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0242'}
null
Packagist
GHSA-57gr-jvqr-3hwm
Incorrect access control in typo3_forum
The typo3_forum extension before 1.2.1 for TYPO3 has Incorrect Access Control.
{'CVE-2020-15513'}
2021-09-23T17:35:16Z
2020-07-29T18:07:38Z
MODERATE
null
{'CWE-863'}
{'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-010', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15513'}
null
Packagist
GHSA-gf2c-93hm-r9j5
Cross-site Scripting in kimai2
kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) in deleting invoice templates. This vulnerability is capable of tricking admin user to delete invoice templates.
{'CVE-2021-3963'}
2021-11-22T18:42:37Z
2021-11-23T18:16:43Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3963', 'https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8', 'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'}
null
Packagist
GHSA-6gc6-m364-85ww
Log injection in SimpleSAMLphp
### Background SimpleSAMLphp has a logging functionality that allows system administrators to keep track of the activity, errors, and statistics. Additionally, it allows users to report errors, shall they happen. An error report contains a report identifier, which is logged once submitted. ### Description The `www/erroreport.php` script, which receives error reports and sends them via email to the system administrator, didn't properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID. When configured to use the `file` logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the `reportID` parameter received in a request sent to `www/errorreport.php` was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content. ### Affected versions SimpleSAMLphp versions up to **1.18.3**. ### Impact An attacker may use this issue to inject logs messages into a SimpleSAMLphp log file, trying to trick or confuse system administrators. However, the attack surface is considered small, as the attack will only work with the `file` logging handler, which opens the log file in _append-only_ mode. This means an attacker cannot edit or remove existing log messages, and even if non-ascii characters are written to the log, the file will always be readable with a simple text editor. ### Resolution Upgrade the SimpleSAMLphp installation to version **1.18.4**. ### Credit This vulnerability was discovered and reported by Frederic Vleminckx on January 23, 2020.
{'CVE-2020-5225'}
2021-01-08T20:33:05Z
2020-01-24T21:26:13Z
LOW
null
{'CWE-532'}
{'https://simplesamlphp.org/security/202001-02', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-6gc6-m364-85ww', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5225'}
null
Packagist
GHSA-h76r-vgf3-j6w5
Auth bypass and account takeover in October CMS
### Impact An attacker can exploit this vulnerability to bypass authentication using a specially crafted persist cookie. - To exploit this vulnerability, an attacker must obtain a Laravel’s secret key for cookie encryption and signing. - Due to the logic of how this mechanism works, a targeted user account must be logged in while the attacker is exploiting the vulnerability. - Authorization via persist cookie not shown in access logs. ### Patches - Issue has been patched in Build 472 and v1.1.5 - [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) ### Workarounds Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade. [**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here. ### Recommendations We recommend the following steps to make sure your server stays secure: - Keep server OS and system software up to date. - Keep October CMS software up to date. - Use a multi-factor authentication plugin. - Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area. - Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities. ### References Bugs found as part of Solar Security CMS Research. Credits to: • Andrey Basarygin • Andrey Guzei • Mikhail Khramenkov • Alexander Sidukov • Maxim Teplykh ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
{'CVE-2021-29487'}
2022-01-20T15:39:14Z
2021-08-30T16:13:50Z
HIGH
null
{'CWE-287'}
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29487', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://github.com/octobercms/october', 'https://github.com/octobercms/october/security/advisories/GHSA-h76r-vgf3-j6w5'}
null
Packagist
GHSA-xcrg-29h7-h4cj
XXE in PHPSpreadsheet due to encoding issue
securityScan() in PHPOffice PhpSpreadsheet through 1.5.0 allows a bypass of protection mechanisms for XXE via UTF-7 encoding in a .xlsx file
{'CVE-2018-19277'}
2022-04-19T20:14:24Z
2019-11-20T01:38:52Z
HIGH
null
{'CWE-91'}
{'https://www.drupal.org/sa-contrib-2021-043', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19277', 'https://github.com/PHPOffice/PhpSpreadsheet', 'https://github.com/PHPOffice/PhpSpreadsheet/issues/771', 'https://github.com/MewesK/TwigSpreadsheetBundle/issues/18', 'https://www.bishopfox.com/news/2018/11/phpoffice-versions/'}
null
Packagist
GHSA-x7cr-6qr6-2hh6
Missing input validation can lead to command execution in composer
The Composer method `VcsDriver::getFileContent()` with user-controlled `$file` or `$identifier` arguments is susceptible to an argument injection vulnerability. It can be leveraged to gain arbitrary command execution if the Mercurial or the Git driver are used. This led to a vulnerability on Packagist.org and Private Packagist, i.e., using the composer.json `readme` field as a vector for injecting parameters into the `$file` argument for the Mercurial driver or via the `$identifier` argument for the Git and Mercurial drivers. Composer itself can be attacked through branch names by anyone controlling a Git or Mercurial repository, which is explicitly listed by URL in a project's composer.json. To the best of our knowledge, this was not actively exploited. The vulnerability has been patched on Packagist.org and Private Packagist within a day of the vulnerability report.
{'CVE-2022-24828'}
2022-04-22T20:15:38Z
2022-04-22T20:15:38Z
HIGH
null
{'CWE-94', 'CWE-20'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6', 'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709', 'https://github.com/composer/composer', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24828', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWT6LDSRY7SFMTDZWJ4MS2ZBXHL7VQEF/'}
null
Packagist
GHSA-xp82-jmw8-mjxp
Unrestricted Upload of File with Dangerous Type in ShowDoc
There is a Unrestricted Upload of File vulnerability in ShowDoc prior to version 2.10.4.
{'CVE-2022-1034'}
2022-03-30T19:58:48Z
2022-03-23T00:00:23Z
HIGH
null
{'CWE-434'}
{'https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1034', 'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'}
null
Packagist
GHSA-cq6h-w3mc-57f4
Information exposure via query strings in URL
### Impact Information exposure via query strings in URL ### Patches We recommend to update to the current version 6.3.4.1. You can get the update to 6.3.4.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-12-2020 ### Credits We would like to thank <a rel="noopener" href="https://www.vater-it.de/">Oliver Herrmann</a> for reporting this issue.
null
2020-12-21T17:46:14Z
2020-12-21T18:01:16Z
LOW
null
{'CWE-200'}
{'https://github.com/shopware/platform/security/advisories/GHSA-cq6h-w3mc-57f4'}
null
Packagist
GHSA-8vp7-j5cj-vvm2
Ability to expose data in Sylius by using an unintended serialisation group
### Impact ResourceBundle accepts and uses any serialisation groups to be passed via a HTTP header. This might lead to data exposure by using an unintended serialisation group - for example it could make Shop API use a more permissive group from Admin API. Anyone exposing an API with ResourceBundle's controller is affected. The vulnerable versions are: `<1.3 || >=1.3.0 <=1.3.12 || >=1.4.0 <=1.4.5 || >=1.5.0 <=1.5.0 || >=1.6.0 <=1.6.2`. ### Patches The patch is provided for ResourceBundle 1.3.13, 1.4.6, 1.5.1 and 1.6.3, but not for any versions below 1.3. After it is applied, It allows to choose only the groups that are defined in `serialization_groups` or `allowed_serialization_groups` route definition. Any group not defined in those will not be used. This behaviour might be a BC break for those using custom groups via the HTTP header, please adjust `allowed_serialization_groups` accordingly. ### Workarounds Service `sylius.resource_controller.request_configuration_factory` can be overridden with an implementation copied from `\Sylius\Bundle\ResourceBundle\Controller\RequestConfigurationFactory` where the part that handles custom serialisation groups is deleted.
{'CVE-2020-5220'}
2021-01-08T20:32:44Z
2020-01-31T18:00:43Z
MODERATE
null
{'CWE-444'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/sylius/CVE-2020-5220.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/resource-bundle/CVE-2020-5220.yaml', 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-8vp7-j5cj-vvm2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5220'}
null
Packagist
GHSA-24m3-w8g9-jwpq
Information disclosure of source code in SimpleSAMLphp
### Background The module controller in `SimpleSAML\Module` that processes requests for pages hosted by modules, has code to identify paths ending with `.php` and process those as PHP code. If no other suitable way of handling the given path exists it presents the file to the browser. ### Description The check to identify paths ending with `.php` does not account for uppercase letters. If someone requests a path ending with e.g. `.PHP` and the server is serving the code from a case-insensitive file system, such as on Windows, the processing of the PHP code does not occur, and the source code is instead presented to the browser. ### Affected versions SimpleSAMLphp versions **1.18.5 and older**. ### Impact An attacker may use this issue to gain access to the source code in third-party modules that is meant to be private, or even sensitive. However, the attack surface is considered small, as the attack will only work when SimpleSAMLphp serves such content from a file system that is not case-sensitive, such as on Windows. ### Resolution Upgrade the SimpleSAMLphp installation to version **1.18.6**. ### Credit This vulnerability was discovered and reported by Sławek Naczyński.
{'CVE-2020-5301'}
2021-10-20T22:23:05Z
2020-04-22T20:59:44Z
LOW
null
{'CWE-178', 'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5301', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-24m3-w8g9-jwpq', 'https://github.com/simplesamlphp/simplesamlphp/', 'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
null
Packagist
GHSA-xc47-3rch-cv57
Improper Access Control in snipe-it
Users with no system permissions are able to see and create personal access tokens
{'CVE-2022-0178'}
2022-01-26T20:23:15Z
2022-01-26T20:24:23Z
MODERATE
null
{'CWE-284'}
{'https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368', 'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0178', 'https://github.com/snipe/snipe-it'}
null
Packagist
GHSA-7733-hjv6-4h47
Cross-Site Scripting in ternary conditional operator
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0) > * CWE-79 --- :information_source: &nbsp;This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020 --- ### Problem It has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following. ``` {showFullName ? fullName : defaultValue} ``` ### Solution Update to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases: * TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5) * TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1) ### Credits Thanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue. ### References * [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013)
{'CVE-2020-15241'}
2021-11-19T15:11:11Z
2020-10-08T19:55:53Z
MODERATE
null
{'CWE-79', 'CWE-601'}
{'https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47', 'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d', 'https://github.com/TYPO3/Fluid', 'https://typo3.org/security/advisory/typo3-core-sa-2019-013', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15241'}
null
Packagist
GHSA-q2cv-94xm-qvg4
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3921'}
2021-11-17T21:12:31Z
2021-11-15T23:18:00Z
MODERATE
null
{'CWE-352'}
{'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3921', 'https://github.com/firefly-iii/firefly-iii', 'https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5'}
null
Packagist
GHSA-m9fq-c9hp-59g7
Cross-site Scripting in yourls
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edit dialog.
{'CVE-2021-3785'}
2021-09-24T13:08:49Z
2021-09-20T20:42:52Z
MODERATE
null
{'CWE-79'}
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff', 'https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3785', 'https://github.com/yourls/yourls'}
null
Packagist
GHSA-3qrq-r688-vvh4
Multiple valid tokens for password reset in Shopware
### Impact Multiple tokens for password reset could be requested. All tokens could be used to change the password. This makes it possible for an attacker to take over the victims account if s/he gains access to the victims email account and finds unused password reset token in the emails within the time frame of two hours. ### Patches We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-9 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
{'CVE-2022-24892'}
2022-04-28T21:02:17Z
2022-04-28T21:02:17Z
MODERATE
null
{'CWE-640'}
{'https://github.com/shopware/shopware/security/advisories/GHSA-3qrq-r688-vvh4', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022', 'https://github.com/shopware/shopware', 'https://www.shopware.com/en/changelog-sw5/#5-7-9'}
null
Packagist
GHSA-xw7v-qrhc-jjg2
Access Control vulnerability in Dolibarr
An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.
{'CVE-2021-37517'}
2022-04-18T22:21:50Z
2022-04-01T00:00:41Z
HIGH
null
{'CWE-863'}
{'https://github.com/Dolibarr/dolibarr/releases/tag/14.0.1', 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c', 'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517'}
null
Packagist
GHSA-m6ch-gg5f-wxx3
HTTP Proxy header vulnerability
PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.
{'CVE-2016-5385'}
2022-04-07T13:59:22Z
2022-04-07T13:59:22Z
HIGH
null
null
{'http://rhn.redhat.com/errata/RHSA-2016-1610.html', 'https://github.com/guzzle/guzzle/releases/tag/6.2.1', 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us', 'https://httpoxy.org/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/', 'http://rhn.redhat.com/errata/RHSA-2016-1612.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/', 'http://www.debian.org/security/2016/dsa-3631', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'http://rhn.redhat.com/errata/RHSA-2016-1609.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297', 'http://www.securityfocus.com/bid/91821', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5385', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html', 'http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/', 'http://rhn.redhat.com/errata/RHSA-2016-1613.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1353794', 'http://www.kb.cert.org/vuls/id/797896', 'http://www.securitytracker.com/id/1036335', 'https://security.gentoo.org/glsa/201611-22', 'https://www.drupal.org/SA-CORE-2016-003', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149', 'http://rhn.redhat.com/errata/RHSA-2016-1611.html', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html'}
null
Packagist
GHSA-rc5r-697f-28x6
XSS injection in the Grid component of Sylius
Grid component of Sylius omits HTML input sanitisation while rendering object implementing __toString() method through the string field type.
{'CVE-2019-12186'}
2021-08-23T15:13:38Z
2020-04-15T21:07:59Z
MODERATE
null
{'CWE-79'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/grid/CVE-2019-12186.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12186', 'https://sylius.com/blog/cve-2019-12186/'}
null
Packagist
GHSA-6vfw-74wr-3chh
Cross-site Scripting in Crater Invoice
Crater invoice prior to version 6.0.0 has a cross-site scripting vulnerability.
{'CVE-2022-0372'}
2022-02-03T21:01:10Z
2022-01-28T00:03:42Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0372', 'https://github.com/crater-invoice/crater', 'https://github.com/crater-invoice/crater/pull/681', 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}
null
Packagist
GHSA-pr9q-v585-qv2w
Improper Privilege Management in Open Web Analytics
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
{'CVE-2022-24637'}
2022-03-30T20:03:55Z
2022-03-19T00:01:00Z
CRITICAL
null
{'CWE-269'}
{'https://github.com/Open-Web-Analytics/Open-Web-Analytics/releases/tag/1.7.4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24637', 'https://github.com/Open-Web-Analytics/Open-Web-Analytics', 'https://devel0pment.de/?p=2494'}
null
Packagist
GHSA-v94v-pxqp-5qgj
Cross-site Scripting in ShowDoc
The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting.
{'CVE-2022-0950'}
2022-03-28T19:27:08Z
2022-03-16T00:00:48Z
MODERATE
null
{'CWE-79', 'CWE-434'}
{'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3', 'https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950', 'https://github.com/star7th/showdoc'}
null
Packagist
GHSA-jmgg-wx67-7qfv
Command Injection in Centreon
Centreon before 19.04.15 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page.
{'CVE-2020-13252'}
2021-05-20T22:17:17Z
2021-06-22T15:23:33Z
HIGH
null
{'CWE-78'}
{'https://github.com/centreon/centreon/compare/19.04.13...19.04.15', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13252', 'https://github.com/centreon/centreon/pull/8467', 'https://github.com/EnginDemirbilek/EnginDemirbilek.github.io/blob/master/centreon-19.10-rce.html', 'https://engindemirbilek.github.io/centreon-19.10-rce'}
null
Packagist
GHSA-j8cx-j9j2-f29w
Insecure Storage of Sensitive Information in Microweber
Microweber prior to version 1.3 does not strip images of EXIF data, exposing information about users' locations, device hardware, and device software.
{'CVE-2022-0724'}
2022-02-24T22:27:40Z
2022-02-24T00:00:53Z
HIGH
null
{'CWE-922'}
{'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3', 'https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0724', 'https://github.com/microweber/microweber'}
null
Packagist
GHSA-mf3v-f2qq-pf9g
Insufficient Session Expiration in Sylius
### Impact The reset password token was not set to null after the password was changed. This is causing behaviour in which the same token can be used several times, so it can result in a leak of the existing token and an unauthorised password change. ### Patches The issue is fixed in versions: 1.10.11, 1.11.2 and above ### Workarounds You have to overwrite your `Sylius\Bundle\ApiBundle\CommandHandler\ResetPasswordHandler` class using this code: ```php <?php declare(strict_types=1); namespace App\CommandHandler\Account; use Sylius\Bundle\ApiBundle\Command\Account\ResetPassword; use Sylius\Component\Core\Model\ShopUserInterface; use Sylius\Component\Resource\Metadata\MetadataInterface; use Sylius\Component\User\Repository\UserRepositoryInterface; use Sylius\Component\User\Security\PasswordUpdaterInterface; use Symfony\Component\Messenger\Handler\MessageHandlerInterface; use Webmozart\Assert\Assert; final class ResetPasswordHandler implements MessageHandlerInterface { private UserRepositoryInterface $userRepository; private MetadataInterface $metadata; private PasswordUpdaterInterface $passwordUpdater; public function __construct( UserRepositoryInterface $userRepository, MetadataInterface $metadata, PasswordUpdaterInterface $passwordUpdater ) { $this->userRepository = $userRepository; $this->metadata = $metadata; $this->passwordUpdater = $passwordUpdater; } public function __invoke(ResetPassword $command): void { /** @var ShopUserInterface|null $user */ $user = $this->userRepository->findOneBy(['passwordResetToken' => $command->resetPasswordToken]); Assert::notNull($user, 'No user found with reset token: ' . $command->resetPasswordToken); $resetting = $this->metadata->getParameter('resetting'); $lifetime = new \DateInterval($resetting['token']['ttl']); if (!$user->isPasswordRequestNonExpired($lifetime)) { throw new \InvalidArgumentException('Password reset token has expired'); } if ($command->resetPasswordToken !== $user->getPasswordResetToken()) { throw new \InvalidArgumentException('Password reset token does not match.'); } $user->setPlainPassword($command->newPassword); $this->passwordUpdater->updatePassword($user); $user->setPasswordResetToken(null); } } ``` And register it in container: ```yaml App\CommandHandler\Account\ResetPasswordHandler: arguments: - '@sylius.repository.shop_user' - !service class: Sylius\Component\Resource\Metadata\MetadataInterface factory: [ '@sylius.resource_registry', 'get' ] arguments: - 'sylius.shop_user' - '@sylius.security.password_updater' tags: - { name: messenger.message_handler, bus: sylius.command_bus } - { name: messenger.message_handler, bus: sylius_default.bus } ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues) * Email us at [security@sylius.com](mailto:security@sylius.com)
{'CVE-2022-24743'}
2022-03-15T21:48:34Z
2022-03-14T22:30:46Z
HIGH
null
{'CWE-613'}
{'https://github.com/Sylius/Sylius', 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2', 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-mf3v-f2qq-pf9g', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24743'}
null
Packagist
GHSA-q7rv-6hp3-vh96
Improper Input Validation in guzzlehttp/psr7
### Impact In proper header parsing. An attacker could sneak in a new line character and pass untrusted values. ### Patches The issue is patched in 1.8.4 and 2.1.1 ### Workarounds There are no known workarounds.
{'CVE-2022-24775'}
2022-03-25T19:26:33Z
2022-03-25T19:26:33Z
HIGH
null
{'CWE-20'}
{'https://github.com/guzzle/psr7', 'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24775', 'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96', 'https://www.drupal.org/sa-core-2022-006', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'}
null
Packagist
GHSA-pvgf-mrr4-cw7r
Cross-Site Request Forgery in ForkCMS
Multiple cross-site request forgery (CSRF) vulnerabilities in the Admin Console in Fork before 5.8.3 allows remote attackers to perform unauthorized actions as administrator to (1) approve the mass of the user's comments, (2) restoring a deleted user, (3) installing or running modules, (4) resetting the analytics, (5) pinging the mailmotor api, (6) uploading things to the media library, (7) exporting locale.
{'CVE-2020-23960'}
2021-04-06T22:22:33Z
2021-05-06T18:53:09Z
HIGH
null
{'CWE-352'}
{'https://github.com/forkcms/forkcms/pull/3123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23960', 'https://www.fork-cms.com/blog/detail/fork-5.8.3-released'}
null
Packagist
GHSA-hq5m-mqmx-fw6m
Privilege escalation via form generator
### Impact It is possible for untrusted users to gain administrator rights with the form generator. Installations are only affected if there are untrusted back end users with access to the form generator. ### Patches Update to Contao 4.4.56, 4.9.18 or 4.11.7. ### Workarounds Disable the form generator or disable the login for untrusted back end users. ### References https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
{'CVE-2021-37627'}
2021-08-23T16:52:36Z
2021-08-23T19:41:22Z
HIGH
null
{'CWE-269'}
{'https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37627', 'https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html'}
null
Packagist
GHSA-36fm-v9wv-56jf
Cross-site Scripting in OpenCart
OpenCart 3.0.3.2 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section.
{'CVE-2020-10596'}
2021-05-04T21:30:17Z
2021-05-06T18:54:04Z
LOW
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-10596', 'https://github.com/opencart/opencart/issues/7810', 'http://packetstormsecurity.com/files/157908/OpenCart-3.0.3.2-Cross-Site-Scripting.html'}
null
Packagist
GHSA-wjfq-88q2-r34j
Unhandled exception when decoding form response JSON
### Impact When handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`. An `InvalidArgumentException` is thrown by this function when it fails to fix an error found in the JSON, which is not caught by the caller. This leads to a server crash. ### Patches 56fe71d939c38fe14e18a31a673a9331bcc0e4ca ### Workarounds A plugin may handle `DataPacketReceiveEvent`, capture `ModalFormResponsePacket` and run the provided JSON through `stupid_json_decode`. Note that this requires copying the body of the function to a plugin, since the function is currently private. ### For more information If you have any questions or comments about this advisory: * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-01-21T21:16:09Z
2022-01-21T23:02:14Z
HIGH
null
null
{'https://github.com/pmmp/PocketMine-MP/blob/4.0.7/changelogs/4.0.md#407', 'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wjfq-88q2-r34j', 'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}
null
Packagist
GHSA-q3j3-w37x-hq2q
Webcache Poisoning in symfony/http-kernel
Description ----------- When a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the "trusted_headers" allowed list are ignored and protect you from "Cache poisoning" attacks. In Symfony 5.2, we've added support for the `X-Forwarded-Prefix` header, but this header was accessible in sub-requests, even if it was not part of the "trusted_headers" allowed list. An attacker could leverage this opportunity to forge requests containing a `X-Forwarded-Prefix` HTTP header, leading to a web cache poisoning issue. Resolution ---------- Symfony now ensures that the `X-Forwarded-Prefix` HTTP header is not forwarded to sub-requests when it is not trusted. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487) for branch 5.3. Credits ------- We would like to thank Soner Sayakci for reporting the issue and Jérémy Derussé for fixing the issue.
{'CVE-2021-41267'}
2021-11-25T00:18:27Z
2021-11-24T20:04:25Z
MODERATE
null
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41267', 'https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q', 'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12'}
null
Packagist
GHSA-wjx8-cgrm-hh8p
Unrestricted file uploads in Contao
### Impact A back end user with access to the form generator can upload arbitrary files and execute them on the server. ### Patches Update to Contao 4.4.46 or 4.8.6. ### Workarounds Configure your web server so it does not execute PHP files and other scripts in the Contao file upload directory. ### References https://contao.org/en/security-advisories/unrestricted-file-uploads.html ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
{'CVE-2019-19745'}
2021-08-19T16:10:14Z
2019-12-17T22:53:10Z
HIGH
null
{'CWE-434'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19745.yaml', 'https://contao.org/en/security-advisories/unrestricted-file-uploads.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19745', 'https://github.com/contao/contao/security/advisories/GHSA-wjx8-cgrm-hh8p', 'https://contao.org/en/news.html'}
null
Packagist
GHSA-r5mf-q76q-f2xq
Cross-site scripting in Centreon
Centreon version 20.10.2 is affected by a cross-site scripting (XSS) vulnerability. The dep_description (Dependency Description) and dep_name (Dependency Name) parameters are vulnerable to stored XSS. A user has to log in and go to the Configuration > Notifications > Hosts page.
{'CVE-2021-27676'}
2021-05-28T22:24:47Z
2021-06-08T20:13:05Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27676', 'https://github.com/centreon/centreon/pull/9587', 'http://centreon.com', 'https://github.com/centreon/centreon/releases/tag/20.10.7'}
null
Packagist
GHSA-6mh3-j5r5-2379
Cross-Site Scripting in Query Generator & Query View
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.5) ### Problem Failing to properly encode error messages, the components _QueryGenerator_ and _QueryView_ are vulnerable to both reflected and persistent cross-site scripting. A valid backend user account having administrator privileges is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described. ### Credits Thanks to Richie Lee who reported this issue and to TYPO3 security team member Oliver Hader who fixed the issue. ### References * [TYPO3-CORE-SA-2021-010](https://typo3.org/security/advisory/typo3-core-sa-2021-010)
{'CVE-2021-32668'}
2021-08-31T21:22:46Z
2021-07-22T19:36:58Z
MODERATE
null
{'CWE-79'}
{'https://github.com/TYPO3/typo3/security/advisories/GHSA-6mh3-j5r5-2379', 'https://github.com/TYPO3/typo3', 'https://typo3.org/security/advisory/typo3-core-sa-2021-010', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32668', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-6mh3-j5r5-2379'}
null
Packagist
GHSA-cx2r-mf6x-55rx
Stored XSS with custom URLs in PrestaShop module ps_linklist
### Impact Stored XSS when using custom URLs. ### Patches The problem is fixed in 3.1.0 ### References [Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)
{'CVE-2020-5273'}
2021-10-08T22:31:21Z
2021-10-12T16:01:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82', 'https://github.com/PrestaShop/ps_linklist', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5273', 'https://github.com/PrestaShop/ps_linklist/security/advisories/GHSA-cx2r-mf6x-55rx'}
null
Packagist
GHSA-pm3v-qxf6-fgxv
Cross-site Scripting in pimcore
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9.
{'CVE-2022-0285'}
2022-01-27T18:32:20Z
2022-01-21T18:08:43Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0285', 'https://huntr.dev/bounties/321918b2-aa01-410e-9f7c-dca5f286bc9c'}
null
Packagist
GHSA-8vq6-5f66-hp3r
Logic error in dolibarr/dolibarr
In dolibarr/dolibarr prior to 16.0 any low privileged users could update their login name which should only be updated by admin.
{'CVE-2022-0746'}
2022-03-07T13:41:24Z
2022-02-26T00:00:44Z
MODERATE
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0746', 'https://github.com/dolibarr/dolibarr', 'https://huntr.dev/bounties/b812ea22-0c02-46fe-b89f-04519dfb1ebd', 'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'}
null
Packagist
GHSA-wwgf-3xp7-cxj4
Potentially sensitive data exposure in Symfony Web Socket Bundle
### Impact Inside `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()`, messages are arbitrarily broadcasted to the related Topic if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` does not succeed. The `dispatch()` method can be considered to not succeed if (depending on the version of the bundle) the callback defined on a topic route is misconfigured, a `Gos\Bundle\WebSocketBundle\Topic\TopicInterface` implementation is not found for the callback, a topic which also implements `Gos\Bundle\WebSocketBundle\Topic\SecuredTopicInterface` rejects the connection, or an Exception is unhandled. This can result in an unintended broadcast to the websocket server potentially with data that should be considered sensitive. ### Patches In 1.10.4, 2.6.1, and 3.3.0, `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()` has been changed to no longer broadcast an event's data if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` fails. ### Workarounds Upgrade to 1.10.4, 2.6.1, and 3.3.0 Note, the 1.x branch is considered end of support as of July 1, 2020. ### For more information If you have any questions or comments about this advisory: * Open an issue in [this repository](https://github.com/GeniusesOfSymfony/WebSocketBundle)
null
2021-09-22T20:22:02Z
2020-07-07T16:33:45Z
MODERATE
null
{'CWE-200'}
{'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338', 'https://github.com/GeniusesOfSymfony/WebSocketBundle/security/advisories/GHSA-wwgf-3xp7-cxj4', 'https://github.com/GeniusesOfSymfony/WebSocketBundle', 'https://snyk.io/vuln/SNYK-PHP-GOSWEBSOCKETBUNDLE-575401'}
null
Packagist
GHSA-3756-hwhv-qw58
Cross site scripting in francoisjacquet/rosariosis
A Cross Site Scripting vulnerability exists RosarioSIS before 4.3 via the SanitizeMarkDown function in ProgramFunctions/MarkDownHTML.fnc.php.
{'CVE-2021-44566'}
2022-03-04T21:38:43Z
2022-02-25T00:01:08Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44566', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/81886abb45a32e802151660de674f084afaef3aa', 'https://gitlab.com/francoisjacquet/rosariosis', 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/259', 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES_V3_4.md#changes-in-43'}
null
Packagist
GHSA-243q-g9j3-qf6r
non-admin users can create integration role with administrator role
### Impact non-admin users can create integration role with administrator role ### Patches We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
null
2021-06-24T19:31:03Z
2021-06-28T18:21:01Z
MODERATE
null
null
{'https://github.com/shopware/platform/security/advisories/GHSA-243q-g9j3-qf6r'}
null
Packagist
GHSA-xxq4-3742-3h28
Generation of Error Message Containing Sensitive Information in microweber
microweber version 1.2.10 and prior may generate an error message containing sensitive information.
{'CVE-2022-0504'}
2022-02-09T22:23:35Z
2022-02-09T00:00:31Z
MODERATE
null
{'CWE-209'}
{'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250', 'https://huntr.dev/bounties/285ff8a0-a273-4d62-ba01-3e4b4e18467b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0504', 'https://github.com/microweber/microweber'}
null