ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-8qvx-f5gf-g43v
Logic error in dolibarr
The application does not check the input of price number lead to Business Logic error through negative price amount.
{'CVE-2022-0174'}
2022-01-20T15:34:34Z
2022-01-12T22:54:50Z
MODERATE
4.3
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0174', 'https://huntr.dev/bounties/ed3ed4ce-3968-433c-a350-351c8f8b60db', 'https://github.com/advisories/GHSA-8qvx-f5gf-g43v', 'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'}
null
GHSA
GHSA-g4xj-wcq6-qwx5
Code injection in mock2easy
This affects all versions up to and including version 0.0.24 of package mock2easy. a malicious user could inject commands through the _data variable: Affected Area require('../server/getJsonByCurl')(mock2easy, function (error, stdout) { if (error) { return res.json(500, error); } res.json(JSON.parse(stdout)); }, '', _data.interfaceUrl, query, _data.cookie,_data.interfaceType);
{'CVE-2020-7697'}
2021-07-29T21:52:44Z
2021-05-06T18:25:58Z
CRITICAL
9.8
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-MOCK2EASY-572312', 'https://github.com/advisories/GHSA-g4xj-wcq6-qwx5', 'https://www.npmjs.com/package/mock2easy', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7697'}
null
GHSA
GHSA-mpp5-2x55-49xw
XSS in svg2png (NPM package)
svg2png 4.1.1 allows XSS with resultant SSRF via JavaScript inside an SVG document.
{'CVE-2020-11887'}
2022-01-06T19:45:13Z
2022-01-06T19:45:13Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-mpp5-2x55-49xw', 'https://github.com/domenic/svg2png/issues/117', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11887'}
null
GHSA
GHSA-jmqm-f2gx-4fjv
Sensitive information exposure through logs in npm-registry-fetch
Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
null
2021-09-22T19:00:08Z
2020-07-07T18:59:10Z
MODERATE
5.3
{'CWE-352'}
{'https://github.com/npm/npm-registry-fetch/pull/29', 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88', 'https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432', 'https://github.com/advisories/GHSA-jmqm-f2gx-4fjv', 'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv'}
null
GHSA
GHSA-w3w8-37jv-2c58
Cross-Site Scripting in mustache
Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted. ### Example Template: ```<a href={{foo}}/>``` Input: ```{ 'foo' : 'test.com onload=alert(1)'}``` Rendered result: ```<a href=test.com onload=alert(1)/>``` ## Recommendation Update to version 2.2.1 or later. Alternatively, ensure that all attributes in hmustache templates are encapsulated with quotes.
{'CVE-2015-8862'}
2021-09-20T22:34:09Z
2017-10-24T18:33:36Z
HIGH
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-w3w8-37jv-2c58', 'https://nodesecurity.io/advisories/62', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862', 'http://www.securityfocus.com/bid/96436', 'https://www.npmjs.com/advisories/62', 'https://www.tenable.com/security/tns-2016-18', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'}
null
GHSA
GHSA-pqpp-2363-649v
Cross-Site Scripting in buttle
All versions of `buttle` are vulnerable to Cross-Site Scripting. Due to misconfiguration of its rendering engine, `buttle` does not sanitize the HTML output allowing attackers to run arbitrary JavaScript when processing malicious markdown files. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-27T16:17:10Z
2020-09-02T18:22:30Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-pqpp-2363-649v', 'https://www.npmjs.com/advisories/810', 'https://hackerone.com/reports/404126'}
null
GHSA
GHSA-8p9r-f949-699g
Path Traversal in browserless-chrome
This affects all versions of browserless-chrome before 1.43.0. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.
{'CVE-2020-7758'}
2021-05-10T18:46:48Z
2021-05-10T18:46:48Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-8p9r-f949-699g', 'https://www.npmjs.com/package/browserless-chrome', 'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6', 'https://github.com/browserless/chrome/releases/tag/1.40.2-chrome-stable', 'https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7758', 'https://github.com/browserless/chrome/blob/master/src/routes.ts%23L175'}
null
GHSA
GHSA-4h9c-v5vg-5m6m
Access to restricted PHP code by dynamic static class access in smarty
### Impact Template authors could run restricted static php methods. ### Patches Please upgrade to 3.1.40 or higher. ### References See the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter. ### For more information If you have any questions or comments about this advisory please open an issue in [the Smarty repo](https://github.com/smarty-php/smarty)
{'CVE-2021-21408'}
2022-01-20T15:33:56Z
2022-01-12T22:43:42Z
HIGH
8.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-4h9c-v5vg-5m6m', 'https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m', 'https://github.com/smarty-php/smarty/releases/tag/v4.0.3', 'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21408', 'https://github.com/smarty-php/smarty/releases/tag/v3.1.43'}
null
GHSA
GHSA-p737-p57g-4cpr
Insertion of Sensitive Information into Log File in Jupyter notebook
### Impact _What kind of vulnerability is it?_ Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Upgrade to Jupyter Server version 1.15.4 ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org). Credit: @3coins for reporting. Thank you!
{'CVE-2022-24757'}
2022-03-29T21:55:39Z
2022-03-25T19:20:39Z
HIGH
7.5
{'CWE-532'}
{'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24757', 'https://github.com/advisories/GHSA-p737-p57g-4cpr', 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-p737-p57g-4cpr'}
null
GHSA
GHSA-jwcc-j78w-j73w
High severity vulnerability that affects ansible
Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible.
{'CVE-2018-10855'}
2021-08-31T21:15:45Z
2018-10-10T17:23:20Z
HIGH
5.9
{'CWE-532'}
{'https://access.redhat.com/errata/RHSA-2018:2585', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10855', 'https://access.redhat.com/errata/RHBA-2018:3788', 'https://access.redhat.com/errata/RHSA-2018:2184', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10855', 'https://access.redhat.com/errata/RHSA-2018:2079', 'https://usn.ubuntu.com/4072-1/', 'https://access.redhat.com/errata/RHSA-2018:1949', 'https://www.debian.org/security/2019/dsa-4396', 'https://access.redhat.com/errata/RHSA-2019:0054', 'https://access.redhat.com/errata/RHSA-2018:1948', 'https://access.redhat.com/errata/RHSA-2018:2022', 'https://github.com/advisories/GHSA-jwcc-j78w-j73w'}
null
GHSA
GHSA-xqqr-p362-6rmc
Directory Traversal in hostr
Affected versions of `hostr` are vulnerable to directory traversal which allows attackers to read files outside the current directory by sending `../` in the url path for GET requests. ## Recommendation Upgrade to version 2.3.6 or later.
{'CVE-2017-16029'}
2021-01-07T23:59:22Z
2018-11-09T17:44:20Z
MODERATE
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/303', 'https://github.com/advisories/GHSA-xqqr-p362-6rmc', 'https://www.npmjs.com/advisories/303', 'https://github.com/henrytseng/hostr/issues/8)', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16029', 'https://github.com/henrytseng/hostr/issues/8'}
null
GHSA
GHSA-4gq5-ch57-c2mg
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.
{'CVE-2018-14719'}
2021-06-11T15:38:44Z
2019-01-04T19:09:49Z
CRITICAL
9.8
{'CWE-502'}
{'https://www.debian.org/security/2019/dsa-4452', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14719', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/68', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://github.com/advisories/GHSA-4gq5-ch57-c2mg', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1782'}
null
GHSA
GHSA-fxph-q3j8-mv87
Deserialization of Untrusted Data in Log4j
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
{'CVE-2017-5645'}
2022-04-01T20:26:52Z
2020-01-06T18:43:38Z
CRITICAL
9.8
{'CWE-502'}
{'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://lists.apache.org/thread.html/r0831e2e52a390758ce39a6193f82c11c295175adce6e6307de28c287@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3399', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://lists.apache.org/thread.html/0dcca05274d20ef2d72584edcf8c917bbb13dbbd7eb35cae909d02e9@%3Cdev.logging.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3244', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2423', 'https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E', 'http://www.securitytracker.com/id/1040200', 'https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3Cdev.tika.apache.org%3E', 'https://github.com/advisories/GHSA-fxph-q3j8-mv87', 'https://access.redhat.com/errata/RHSA-2017:2810', 'https://access.redhat.com/errata/RHSA-2017:3400', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1545', 'https://security.netapp.com/advisory/ntap-20180726-0002/', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/r94b5aae09c4bcff5d06cf641be17b00bd83ba7e10cad737bf16a1b8f@%3Cgithub.beam.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rbfa7a0742be4981a3f9356a23d0e1a5f2e1eabde32a1a3d8e41420f8@%3Cgithub.beam.apache.org%3E', 'http://www.securityfocus.com/bid/97702', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.apache.org/thread.html/r9d5c1b558a15d374bd5abd2d3ae3ca7e50e796a0efdcf91e9c5b4cdd@%3Cgithub.beam.apache.org%3E', 'https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125@%3Cdev.logging.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2809', 'https://lists.apache.org/thread.html/r23369fd603eb6d62d3b883a0a28d12052dcbd1d6d531137124cd7f83@%3Cgithub.beam.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2889', 'https://access.redhat.com/errata/RHSA-2017:2635', 'https://access.redhat.com/errata/RHSA-2017:2633', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5645', 'https://lists.apache.org/thread.html/e8fb7d76a244ee997ba4b217d6171227f7c2521af8c7c5b16cba27bc@%3Cdev.logging.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3Cissues.activemq.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/12/19/2', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1802', 'https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/84cc4266238e057b95eb95dfd8b29d46a2592e7672c12c92f68b2917@%3Cannounce.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2637', 'https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/rdbd579dc223f06af826d7de340218ee2f80d8b43fa7e4decb2a63f44@%3Cgithub.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rcbb79023a7c8494cb389cd3d95420fa9e0d531ece0b780b8c1f99422@%3Ccommits.doris.apache.org%3E', 'https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2638', 'https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2808', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2017:1417', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://access.redhat.com/errata/RHSA-2017:1801', 'https://access.redhat.com/errata/RHSA-2017:2888', 'https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2811', 'https://access.redhat.com/errata/RHSA-2017:2636', 'http://www.securitytracker.com/id/1041294', 'https://security.netapp.com/advisory/ntap-20181107-0002/', 'https://issues.apache.org/jira/browse/LOG4J2-1863', 'https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/ra9a682bc0a8dff1c5cefdef31c7c25f096d9121207cf2d74e2fc563d@%3Ccommits.logging.apache.org%3E'}
null
GHSA
GHSA-j4mm-7pj3-jf7v
HTTP Method Spoofing
Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site request forgery (CSRF) attacks, which would otherwise not be possible. ### Impact The vulnerability allows attackers to craft links or forms which may change the server state. For example, the following GET request would create a new user: ```sh % curl -i -u admin:opencast \ 'https://legacy.opencast.org/admin-ng/users/test.json?_method=PUT&username=test&password=attack' HTTP/2 200 … ``` If an admin is logged in to legacy.opencast.org and accidentally clicks this link, a user will silently be created. ### Patches This issue is fixed in Opencast 9.10 and 10.0. ### Workarounds You can mitigate the problem by setting the `SameSite=Strict` attribute for your cookies. If this is a viable option for you depends on your integrations. We strongly recommend updating in any case. ### References - [Fix for 10.0](https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8) - [Fix for 9.10](https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444) ### For more information If you have any questions or comments about this advisory: * Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) * Email us at [security@opencast.org](mailto:security@opencast.org)
{'CVE-2021-43807'}
2022-04-19T19:03:13Z
2021-12-14T21:43:00Z
HIGH
7.5
{'CWE-290'}
{'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444', 'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43807', 'https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v', 'https://github.com/advisories/GHSA-j4mm-7pj3-jf7v'}
null
GHSA
GHSA-h5f5-rj4r-42f6
Incorrect access control in Neo4j Enterprise Database Server via LDAP authentication
Due to incorrect access control in Neo4j Enterprise Database Server 3.4.x before 3.4.9, the setting of LDAP for authentication with STARTTLS, and System Account for authorization, allows an attacker to log into the server by sending any valid username with an arbitrary password.
{'CVE-2018-18389'}
2022-04-27T14:23:04Z
2018-10-17T17:31:26Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/neo4j/neo4j/issues/12047', 'https://github.com/advisories/GHSA-h5f5-rj4r-42f6', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18389'}
null
GHSA
GHSA-6c8f-qphg-qjgp
Validation Bypass in kind-of
Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation. ## Recommendation Upgrade to versions 6.0.3 or later.
{'CVE-2019-20149'}
2021-08-23T15:03:56Z
2020-03-31T15:59:54Z
HIGH
7.5
{'CWE-668'}
{'https://github.com/advisories/GHSA-6c8f-qphg-qjgp', 'https://github.com/jonschlinkert/kind-of/pull/31', 'https://www.npmjs.com/advisories/1490', 'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20149', 'https://snyk.io/vuln/SNYK-JS-KINDOF-537849', 'https://github.com/jonschlinkert/kind-of/issues/30'}
null
GHSA
GHSA-c7v4-m269-4995
Exposure of Sensitive Information to an Unauthorized Actor in Moodle
The participants table download in Moodle always included user emails, but should have only done so when users' emails are not hidden. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5 and 3.7 to 3.7.8. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, and 3.10.
{'CVE-2020-25703'}
2021-10-21T17:49:08Z
2021-10-21T17:49:08Z
MODERATE
5.3
{'CWE-200'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://github.com/advisories/GHSA-c7v4-m269-4995', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895439', 'https://moodle.org/mod/forum/discuss.php?d=413941', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25703', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}
null
GHSA
GHSA-3mvg-rrrw-m7ph
Ability to change order address without triggering address validations in solidus
### Impact This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipment costs associated with the new shipment. All stores with at least two shipping zones and different costs of shipment per zone are impacted. E.g. 1. Store admin configured the store so that there are two zones in US: - East Cost Zone - Shipping Method cost: $1 - West Cost Zone - Shipping Method cost: $10 The attacker user can know that shipping to NY is less expensive than to LA just by testing different addresses in checkout. 2. The attacker user enters any NY shipping address in the address step 3. The attacker user chooses the $1 delivery option 4. The attacker user crafts a request with their real LA address, similar to: ``` // POST #checkout/update: { state: 'payment', order: { ship_address_attributes: { city: 'Los Angeles', ... } } } ``` 5. The attacker user proceeds with checking out with a new address and the $1 shipment costs. Another scenario where this could be dangerous is: > You cannot ship products in some zones and you are relying on Solidus Shipping Method building only to filter out unwanted zones. Malicious users can enter an allowed zone's address and change back to an unwanted one in the payment step by crafting a request with some proper ship_address_attributes. This problem comes from how checkout permitted attributes are structured. We have a single list of attributes that are permitted across the whole checkout, no matter the step that is being submitted. ### Patches A PR has been attached to fix the security concern for each of all the Solidus supported versions following the rules of the [Solidus Security Policy](https://solidus.io/security). ### Workarounds When it's not possible to upgrade to a supported patched version, please use this gist to patch the store: https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d
{'CVE-2020-15109'}
2022-04-19T19:02:30Z
2020-08-04T22:17:57Z
MODERATE
5.3
{'CWE-862', 'CWE-20'}
{'https://solidus.io/blog/2020/07/16/new-releases.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15109', 'https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d', 'https://github.com/advisories/GHSA-3mvg-rrrw-m7ph', 'https://github.com/solidusio/solidus/security/advisories/GHSA-3mvg-rrrw-m7ph'}
null
GHSA
GHSA-92v7-pq4h-58j5
Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.
{'CVE-2014-3248'}
2021-09-07T20:37:20Z
2017-10-24T18:33:36Z
MODERATE
0
null
{'http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet/', 'https://github.com/advisories/GHSA-92v7-pq4h-58j5', 'http://secunia.com/advisories/59200', 'http://www.securityfocus.com/bid/68035', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3248', 'http://secunia.com/advisories/59197', 'http://puppetlabs.com/security/cve/cve-2014-3248'}
null
GHSA
GHSA-rqjw-p5vr-c695
Basic-auth app bundle credential exposure in gatsby-source-wordpress
### Impact The gatsby-source-wordpress plugin prior to versions 4.0.8 and 5.9.2 leaks .htaccess HTTP Basic Authentication variables into the app.js bundle during build-time. Users who are not initializing basic authentication credentials in the gatsby-config.js are not affected. Example affected gatsby-config.js: ``` resolve: 'gatsby-source-wordpress', auth: { htaccess: { username: leaked_username password: leaked_password, }, }, ``` ### Patches A patch has been introduced in gatsby-source-wordpress@4.0.8 and gatsby-source-wordpress@5.9.2 which mitigates the issue by filtering all variables specified in the `auth: { }` section. Users that depend on this functionality are advised to upgrade to the latest release of gatsby-source-wordpress, run `gatsby clean` followed by a `gatsby build`. ### Workarounds There is no known workaround at this time, other than manually editing the app.js file post-build. ### For more information Email us at [security@gatsbyjs.com](mailto:security@gatsbyjs.com)
{'CVE-2021-32770'}
2021-07-28T15:18:02Z
2021-07-19T15:21:41Z
HIGH
7.5
{'CWE-200', 'CWE-522'}
{'https://github.com/advisories/GHSA-rqjw-p5vr-c695', 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-rqjw-p5vr-c695', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32770'}
null
GHSA
GHSA-6f93-xj8r-jp82
Malicious Package in bunfer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:36:57Z
2020-09-03T22:28:21Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1267', 'https://github.com/advisories/GHSA-6f93-xj8r-jp82'}
null
GHSA
GHSA-3hq4-f2v6-q338
Kotti has demonstrated permission change via document view
Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a /admin-document/@@share request.
{'CVE-2018-9856'}
2022-04-26T18:08:09Z
2018-07-12T20:30:30Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-9856', 'https://github.com/Kotti/Kotti/issues/551', 'https://github.com/advisories/GHSA-3hq4-f2v6-q338'}
null
GHSA
GHSA-q2qr-3c2p-9235
Denial of Service (DoS) in HashiCorp Consul
HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4.
{'CVE-2020-12758'}
2022-04-12T22:55:15Z
2022-02-15T01:57:18Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/7783', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12758', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'https://github.com/advisories/GHSA-q2qr-3c2p-9235', 'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'}
null
GHSA
GHSA-7rrm-v45f-jp64
Update packaged dependency libxml2 from 2.9.10 to 2.9.12
### Summary Nokogiri v1.11.4 updates the vendored libxml2 from v2.9.10 to v2.9.12 which addresses: - [CVE-2019-20388](https://security.archlinux.org/CVE-2019-20388) (Medium severity) - [CVE-2020-24977](https://security.archlinux.org/CVE-2020-24977) (Medium severity) - [CVE-2021-3517](https://security.archlinux.org/CVE-2021-3517) (Medium severity) - [CVE-2021-3518](https://security.archlinux.org/CVE-2021-3518) (Medium severity) - [CVE-2021-3537](https://security.archlinux.org/CVE-2021-3537) (Low severity) - [CVE-2021-3541](https://security.archlinux.org/CVE-2021-3541) (Low severity) Note that two additional CVEs were addressed upstream but are not relevant to this release. [CVE-2021-3516](https://security.archlinux.org/CVE-2021-3516) via `xmllint` is not present in Nokogiri, and [CVE-2020-7595](https://security.archlinux.org/CVE-2020-7595) has been patched in Nokogiri since v1.10.8 (see #1992). Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.11.4`, and only if the packaged version of libxml2 is being used. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` release announcements. ### Mitigation Upgrade to Nokogiri `>= 1.11.4`. ### Impact I've done a brief analysis of the published CVEs that are addressed in this upstream release. The libxml2 maintainers have not released a canonical set of CVEs, and so this list is pieced together from secondary sources and may be incomplete. All information below is sourced from [security.archlinux.org](https://security.archlinux.org), which appears to have the most up-to-date information as of this analysis. #### [CVE-2019-20388](https://security.archlinux.org/CVE-2019-20388) - **Severity**: Medium - **Type**: Denial of service - **Description**: A memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service. - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/7ffcd44d7e6c46704f8af0321d9314cd26e0e18a Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. #### [CVE-2020-7595](https://security.archlinux.org/CVE-2020-7595) - **Severity**: Medium - **Type**: Denial of service - **Description**: xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation. - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c8907645d2e155f0d89d4d9895ac5112b5 This has been patched in Nokogiri since v1.10.8 (see #1992). #### [CVE-2020-24977](https://security.archlinux.org/CVE-2020-24977) - **Severity**: Medium - **Type**: Information disclosure - **Description**: GNOME project libxml2 <= 2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2 Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. #### [CVE-2021-3516](https://security.archlinux.org/CVE-2021-3516) - **Severity**: Medium - **Type**: Arbitrary code execution (no remote vector) - **Description**: A use-after-free security issue was found libxml2 before version 2.9.11 when "xmllint --html --push" is used to process crafted files. - **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/230 - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539 Verified that the fix commit first appears in v2.9.11. This vector does not exist within Nokogiri, which does not ship `xmllint`. #### [CVE-2021-3517](https://security.archlinux.org/CVE-2021-3517) - **Severity**: Medium - **Type**: Arbitrary code execution - **Description**: A heap-based buffer overflow was found in libxml2 before version 2.9.11 when processing truncated UTF-8 input. - **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/235 - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2 Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. #### [CVE-2021-3518](https://security.archlinux.org/CVE-2021-3518) - **Severity**: Medium - **Type**: Arbitrary code execution - **Description**: A use-after-free security issue was found in libxml2 before version 2.9.11 in xmlXIncludeDoProcess() in xinclude.c when processing crafted files. - **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/237 - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7 Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. #### [CVE-2021-3537](https://security.archlinux.org/CVE-2021-3537) - **Severity**: Low - **Type**: Denial of service - **Description**: It was found that libxml2 before version 2.9.11 did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. - **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/243 - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61 Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. #### [CVE-2021-3541](https://security.archlinux.org/CVE-2021-3541) - **Severity**: Low - **Type**: Denial of service - **Description**: A security issue was found in libxml2 before version 2.9.11. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service. - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4, however Nokogiri's default parse options prevent the attack from succeeding (it is necessary to opt into `DTDLOAD` which is off by default). For more details supporting this analysis of this CVE, please visit #2233.
null
2021-05-17T20:52:05Z
2021-05-17T20:52:05Z
MODERATE
0
null
{'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-7rrm-v45f-jp64', 'https://github.com/advisories/GHSA-7rrm-v45f-jp64'}
null
GHSA
GHSA-5h9g-x5rv-25wg
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in the schema validation logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or editor APIs. This malicious content could then end up in content published outside the editor, if no server-side sanitization was performed. This impacts all users who are using TinyMCE 5.8.2 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.9.0 by ensuring schema validation was still performed after unwrapping invalid elements. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.9.0 or higher - Manually sanitize the content using the `BeforeSetContent` event (see below) #### Example: Manually sanitize content ```js editor.on('BeforeSetContent', function(e) { var sanitizedContent = ...; // Manually sanitize content here e.content = sanitizedContent; }); ``` ### Acknowledgements Tiny Technologies would like to thank William Bowling for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes ### For more information If you have any questions or comments about this advisory: * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
null
2021-10-22T16:24:02Z
2021-10-22T16:24:02Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-5h9g-x5rv-25wg', 'https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes', 'https://github.com/advisories/GHSA-5h9g-x5rv-25wg'}
null
GHSA
GHSA-v3xw-c963-f5hc
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
{'CVE-2020-11111'}
2021-10-21T21:11:25Z
2020-05-15T18:58:50Z
HIGH
8.8
{'CWE-502'}
{'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/advisories/GHSA-v3xw-c963-f5hc', 'https://github.com/FasterXML/jackson-databind/issues/2664', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11111'}
null
GHSA
GHSA-r86j-2gc6-2cq9
High severity vulnerability that affects org.apache.hbase:hbase-thrift
An issue in Apache HBase affects the optional "Thrift 1" API server when running over HTTP. There is a race-condition which could lead to authenticated sessions being incorrectly applied to users, e.g. one authenticated user would be considered a different user or an unauthenticated user would be treated as an authenticated user. https://issues.apache.org/jira/browse/HBASE-20664 implements a fix for this issue. It has been fixed in versions: 1.2.6.1, 1.3.2.1, 1.4.5, 2.0.1.
{'CVE-2018-8025'}
2021-06-10T20:41:10Z
2018-10-18T18:05:02Z
HIGH
8.1
{'CWE-362'}
{'http://www.securityfocus.com/bid/104554', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8025', 'https://lists.apache.org/thread.html/a919e38f587c714c386a01d40fc8f45bd4219a65aaf2dc0bb4eccc96@%3Cdev.hbase.apache.org%3E', 'https://github.com/advisories/GHSA-r86j-2gc6-2cq9'}
null
GHSA
GHSA-7wfc-x4f7-gg2x
Code injection in Apache Dubbo
Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.
{'CVE-2021-30180'}
2022-03-21T22:00:20Z
2022-03-18T17:58:01Z
CRITICAL
9.8
{'CWE-94', 'CWE-444'}
{'https://github.com/advisories/GHSA-7wfc-x4f7-gg2x', 'https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30180'}
null
GHSA
GHSA-whq6-mj2r-mjqc
OS Command Injection in lsof
All versions including 0.0.4 of lsof npm module are vulnerable to Command Injection. Every exported method used by the package uses the exec function to parse user input.
{'CVE-2019-10783'}
2021-04-13T15:17:53Z
2021-04-13T15:17:53Z
HIGH
9.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-LSOF-543632', 'https://github.com/advisories/GHSA-whq6-mj2r-mjqc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10783'}
null
GHSA
GHSA-g9hh-vvx3-v37v
Denial of service in HtmlUnit-Neko
Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24939.
{'CVE-2022-28366'}
2022-05-05T13:38:37Z
2022-04-23T00:03:04Z
HIGH
7.5
null
{'https://github.com/advisories/GHSA-g9hh-vvx3-v37v', 'https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/', 'https://github.com/nahsra/antisamy/releases/tag/v1.6.6', 'https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28366'}
null
GHSA
GHSA-4m8h-h59m-m34j
Prototype Pollution in bmoor
The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664)
{'CVE-2021-23558'}
2022-02-07T21:21:00Z
2022-02-01T00:50:09Z
HIGH
7.3
{'CWE-1321'}
{'https://github.com/advisories/GHSA-4m8h-h59m-m34j', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://snyk.io/vuln/SNYK-JS-BMOOR-2342622', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23558', 'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b', 'https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664'}
null
GHSA
GHSA-5xc6-fpc7-4qvg
High severity vulnerability that affects CoAPthon
The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.
{'CVE-2018-12680'}
2021-09-01T22:21:58Z
2019-04-08T15:19:01Z
HIGH
7.5
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-12680', 'https://github.com/Tanganelli/CoAPthon/issues/135', 'https://github.com/advisories/GHSA-5xc6-fpc7-4qvg'}
null
GHSA
GHSA-9829-jj5p-j6hf
Prototype Pollution in worksmith
All versions up to and including 1.0.0 of the package worksmith are vulnerable to Prototype Pollution via the setValue function.
{'CVE-2020-7725'}
2021-07-29T21:16:29Z
2021-05-06T18:26:30Z
CRITICAL
9.8
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-WORKSMITH-598798', 'https://github.com/advisories/GHSA-9829-jj5p-j6hf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7725'}
null
GHSA
GHSA-428f-mh7w-6w2x
Infecting Module in pandora-doomsday
The `pandora-doomsday` package is a malicious package that adds itself to the package.json of other packages discovered on the victim host and attempts to publish the package. It has been removed from the npm registry. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
{'CVE-2017-16127'}
2021-01-14T15:33:22Z
2020-09-01T18:56:40Z
MODERATE
0
{'CWE-509'}
{'https://github.com/advisories/GHSA-428f-mh7w-6w2x', 'https://nodesecurity.io/advisories/482', 'https://www.npmjs.com/advisories/482', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16127'}
null
GHSA
GHSA-4q98-wr72-h35w
Improper input validation in Apache Santuario XML Security for Java
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
{'CVE-2019-12400'}
2021-10-21T21:18:21Z
2019-08-27T17:41:33Z
MODERATE
5.5
{'CWE-20'}
{'https://lists.apache.org/thread.html/r107bffb06a5e27457fe9af7dfe3a233d0d36c6c2f5122f117eb7f626@%3Ccommits.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'http://santuario.apache.org/secadv.data/CVE-2019-12400.asc?version=1&modificationDate=1566573083000&api=v2', 'https://lists.apache.org/thread.html/rf82be0a7c98cd3545e20817bb96ed05551ea0020acbaf9a469fef402@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rf958cea96236de8829940109ae07e870aa3d59235345421e4924ff03@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/8e814b925bf580bc527d96ff51e72ffe5bdeaa4b8bf5b89498cab24c@%3Cdev.santuario.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/rcdc0da94fe21b26493eae47ca987a290bdf90c721a7a42491fdd41d4@%3Ccommits.tomee.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190910-0003/', 'https://github.com/advisories/GHSA-4q98-wr72-h35w', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12400', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://lists.apache.org/thread.html/edaa7edb9c58e5f5bd0c950f2b6232b62b15f5c44ad803e8728308ce@%3Cdev.santuario.apache.org%3E'}
null
GHSA
GHSA-wmx6-vxcf-c3gr
Validation Bypass in slp-validate
Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus. ## Recommendation Upgrade to version 1.0.1 or later.
{'CVE-2019-16761'}
2021-01-08T20:11:32Z
2019-11-15T23:10:19Z
CRITICAL
5.7
{'CWE-20'}
{'https://github.com/advisories/GHSA-wmx6-vxcf-c3gr', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr', 'https://www.npmjs.com/advisories/1422', 'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16761'}
null
GHSA
GHSA-ghww-cv4v-hmxx
Cross-Site Request Forgery microweber
microweber prior to version 1.2.11 is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2022-0638'}
2022-02-26T01:13:33Z
2022-02-18T00:00:34Z
MODERATE
4.3
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0638', 'https://github.com/advisories/GHSA-ghww-cv4v-hmxx', 'https://huntr.dev/bounties/9d3d883c-d74c-4fe2-9978-a8e3d1ccf9f3', 'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'}
null
GHSA
GHSA-6cj2-92m5-7mvp
Improperly Controlled Modification of Object Prototype Attributes
### Impact The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. ### Patches `think-config@1.1.3` patched it, anyone used `think-config` should upgrade to `>=1.1.3` version. ### References https://cwe.mitre.org/data/definitions/1321.html ### For more information If you have any questions or comments about this advisory: * Open an issue in [thinkjs/thinkjs](https://github.com/thinkjs/thinkjs) * Email us at [i@imnerd.org](mailto:i@imnerd.org)
null
2022-04-19T19:03:04Z
2021-08-03T16:48:46Z
HIGH
7.5
{'CWE-1321'}
{'https://github.com/advisories/GHSA-6cj2-92m5-7mvp', 'https://github.com/thinkjs/think-config/security/advisories/GHSA-6cj2-92m5-7mvp'}
null
GHSA
GHSA-h4hv-m4h4-mhwg
Moderate severity vulnerability that affects django
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.
{'CVE-2017-7234'}
2021-09-13T15:06:07Z
2019-01-04T17:50:17Z
MODERATE
6.1
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-7234', 'https://github.com/advisories/GHSA-h4hv-m4h4-mhwg', 'http://www.debian.org/security/2017/dsa-3835', 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/', 'http://www.securityfocus.com/bid/97401', 'http://www.securitytracker.com/id/1038177'}
null
GHSA
GHSA-58pp-9c76-5625
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
{'CVE-2020-11112'}
2021-10-21T21:11:43Z
2020-06-10T21:12:41Z
HIGH
8.8
{'CWE-502'}
{'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11112', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/FasterXML/jackson-databind/issues/2666', 'https://github.com/advisories/GHSA-58pp-9c76-5625'}
null
GHSA
GHSA-fvxv-9xxr-h7wj
Moderate severity vulnerability that affects pyspark
When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.
{'CVE-2018-11760'}
2021-09-10T20:04:31Z
2019-02-07T18:02:21Z
MODERATE
5.5
null
{'https://lists.apache.org/thread.html/a86ee93d07b6f61b82b61a28049aed311f5cc9420d26cc95f1a9de7b@%3Cuser.spark.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11760', 'https://github.com/advisories/GHSA-fvxv-9xxr-h7wj', 'https://lists.apache.org/thread.html/6d015e56b3a3da968f86e0b6acc69f17ecc16b499389e12d8255bf6e@%3Ccommits.spark.apache.org%3E', 'http://www.securityfocus.com/bid/106786'}
null
GHSA
GHSA-7fhm-mqm4-2wp7
Withdrawn: ESLint dependencies are vulnerable (ReDoS and Prototype Pollution)
**Withdrawn** GitHub has withdrawn this advisory in place of GHSA-vh95-rmgr-6w4m and GHSA-6chw-6frg-f759. The reason for withdrawing is that some mistakes were made during the ingestion of CVE-2020-7598 which caused this advisory to be published with incorrect information. In order to provide accurate advisory information, new advisories were created: - minimist: https://github.com/advisories/GHSA-vh95-rmgr-6w4m - acorn: https://github.com/advisories/GHSA-6chw-6frg-f759
null
2021-06-07T23:37:11Z
2020-03-13T20:36:16Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-6chw-6frg-f759', 'https://github.com/advisories/GHSA-vh95-rmgr-6w4m', 'https://github.com/advisories/GHSA-7fhm-mqm4-2wp7'}
null
GHSA
GHSA-79wf-qcqv-r22r
Remote code execution in better-macro
An issue was discovered in the better-macro crate through 2021-07-22 for Rust. It intentionally demonstrates that remote attackers can execute arbitrary code via proc-macros, and otherwise has no legitimate purpose.
{'CVE-2021-38196'}
2021-08-25T20:56:00Z
2021-08-25T20:56:00Z
HIGH
9.8
{'CWE-94', 'CWE-78'}
{'https://github.com/raycar5/better-macro/blob/24ff1702397b9c19bbfa4c660e2316cd77d3b900/src/lib.rs#L36-L38', 'https://rustsec.org/advisories/RUSTSEC-2021-0077.html', 'https://github.com/advisories/GHSA-79wf-qcqv-r22r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38196'}
null
GHSA
GHSA-9pr3-7449-977r
Cross-Site Scripting in express-cart
All versions of `harp` are vulnerable to Cross-Site Scripting. In the admin page it is possible to inject arbitrary JavaScript as a new product option, allowing attackers to execute arbitrary code. This is limited to the admin page and does not affect other pages. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-27T16:16:55Z
2020-09-02T18:21:26Z
LOW
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/808', 'https://github.com/advisories/GHSA-9pr3-7449-977r', 'https://hackerone.com/reports/395944'}
null
GHSA
GHSA-77jf-fjjf-xcww
Invalid Curve Attack in openpgp
Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may exfiltrate the victim's private key by choosing the altered curve. An attack requires the attacker being able to initiate message decryption and record the result. Furthermore the victim's key must offer an ECDH public key. ## Recommendation Upgrade to version 4.3.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
{'CVE-2019-9155'}
2021-07-27T21:15:19Z
2019-08-23T21:42:22Z
MODERATE
5.9
{'CWE-327'}
{'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0', 'https://github.com/advisories/GHSA-77jf-fjjf-xcww', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1', 'https://www.npmjs.com/advisories/1159', 'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9155', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460225', 'https://github.com/openpgpjs/openpgpjs/pull/853', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}
null
GHSA
GHSA-f3rf-v9qm-9c89
Cross-site Scripting in the femanager TYPO3 extension
The extension allows by default to upload SVG files when a logged in frontend user uploads a new profile image. This may lead to Cross-Site Scripting, when the uploaded SVG image is used as is on the website. Note: If SVG uploads are required, it is recommended to use the TYPO3 extension svg_sanitizer (added to TYPO3 core since versions 9.5.28, 10.4.18 and 11.3.0) to prevent upload of malicious SVG files or to set up a strict Content Security Policy for the destination folder of uploaded images.
{'CVE-2021-36787'}
2022-01-26T22:27:17Z
2021-09-01T18:36:51Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36787', 'https://typo3.org/help/security-advisories/security', 'https://github.com/advisories/GHSA-f3rf-v9qm-9c89', 'https://extensions.typo3.org/extension/femanager/', 'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2', 'http://seclists.org/fulldisclosure/2022/Jan/53', 'http://packetstormsecurity.com/files/165675/TYPO3-femanager-6.3.0-Cross-Site-Scripting.html', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-010', 'https://github.com/in2code-de/femanager/releases/tag/6.3.1'}
null
GHSA
GHSA-v8v8-6859-qxm4
Arbitrary shell command execution in logkitty
Lack of output sanitization allowed an attack to execute arbitrary shell commands via the logkitty npm package before version 0.7.1.
{'CVE-2020-8149'}
2021-01-08T20:12:59Z
2020-06-05T14:47:02Z
HIGH
0
{'CWE-94'}
{'https://github.com/advisories/GHSA-v8v8-6859-qxm4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8149', 'https://github.com/zamotany/logkitty/pull/18', 'https://hackerone.com/reports/825729', 'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'}
null
GHSA
GHSA-26hm-r6mg-963c
SQL Injection in JeecgBoot
In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. A patch has been released on the repository's `master` branch.
{'CVE-2021-46089'}
2022-02-10T22:58:39Z
2022-01-26T00:01:25Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0', 'https://github.com/advisories/GHSA-26hm-r6mg-963c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46089', 'https://github.com/jeecgboot/jeecg-boot/issues/3331'}
null
GHSA
GHSA-jjhg-qw5v-r8xx
Malicious Package in anarchy
All versions of `anarchy` contain malicious code. The package ran `rm - rf /` as an install script. ## Recommendation Remove the package from your environment.
null
2021-09-30T20:06:05Z
2020-09-03T19:01:20Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-jjhg-qw5v-r8xx', 'https://www.npmjs.com/advisories/1089'}
null
GHSA
GHSA-74cr-77xc-8g6r
Prototype Pollution in @apollo/gateway
Versions of `@apollo/gateway` prior to 0.6.2 are vulnerable to Prototype Pollution. The package uses deepMerge() to merge objects, which may allow attackers to alter the Object prototype through queries with GraphQL aliases. Carefully constructed payloads can override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution. ## Recommendation Upgrade to version 0.6.2 or later.
null
2021-08-16T15:28:22Z
2019-06-13T20:37:39Z
HIGH
7.3
{'CWE-400', 'CWE-1321'}
{'https://www.npmjs.com/advisories/917', 'https://github.com/apollographql/apollo-server/pull/2779', 'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1', 'https://github.com/advisories/GHSA-74cr-77xc-8g6r', 'https://snyk.io/vuln/SNYK-JS-APOLLOGATEWAY-174915'}
null
GHSA
GHSA-9c8w-jrw3-q2c3
Cross-site Scripting in OWASP AntiSamy
OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with &#00058 as the replacement for the : character.
{'CVE-2021-35043'}
2022-04-22T15:44:45Z
2021-08-02T16:58:43Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/nahsra/antisamy/releases/tag/v1.6.4', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/nahsra/antisamy/pull/87', 'https://github.com/advisories/GHSA-9c8w-jrw3-q2c3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35043', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-h2fj-77wh-fh5w
Cross-site Scripting in livehelperchat
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
{'CVE-2022-0612'}
2022-02-24T13:52:13Z
2022-02-17T00:00:36Z
MODERATE
6.7
{'CWE-79'}
{'https://huntr.dev/bounties/eadcf7d2-a479-4901-abcc-1505d3f1b32f', 'https://github.com/advisories/GHSA-h2fj-77wh-fh5w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0612', 'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'}
null
GHSA
GHSA-5q75-cxcq-wr26
Low severity vulnerability that affects org.apache.jspwiki:jspwiki-war
A carefully crafted URL could trigger an XSS vulnerability on Apache JSPWiki, from versions up to 2.10.5, which could lead to session hijacking.
{'CVE-2018-20242'}
2021-09-01T22:19:14Z
2019-02-12T17:26:07Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/8ee4644432c0a433c5c514a57d940cf6dcb0a0094acd97b36290f0b4@%3Cuser.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20242', 'http://www.securityfocus.com/bid/106804', 'https://github.com/advisories/GHSA-5q75-cxcq-wr26'}
null
GHSA
GHSA-h4m4-pgp4-whgm
The reset password form reveal users email address
### Impact The reset password form reveals the email address of users just by giving their username. ### Patches The problem has been patched on XWiki 13.2RC1. ### Workarounds It's possible to manually modify the `resetpasswordinline.vm` to perform the changes made in https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2 ### References https://jira.xwiki.org/browse/XWIKI-18400 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xiwki.org) * Email us at [Security ML](mailto:security@xwiki.org)
{'CVE-2021-32731'}
2021-07-13T14:00:59Z
2021-07-02T19:19:04Z
MODERATE
5.3
{'CWE-200', 'CWE-668'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4m4-pgp4-whgm', 'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32731', 'https://github.com/advisories/GHSA-h4m4-pgp4-whgm', 'https://jira.xwiki.org/browse/XWIKI-18400'}
null
GHSA
GHSA-4rcq-jv2f-898j
Incorrect Provision of Specified Functionality in qutebrowser
# Description After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (`colors.statusbar.url.warn.fg`). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (`colors.statusbar.url.success_https`). While the user already has seen a certificate error prompt at this point (or set `content.ssl_strict` to `false` which is not recommended), this could still provide a false sense of security. # Affected versions and patches All versions of qutebrowser are believed to be affected, though versions before v0.11.x couldn't be tested. The issue is fixed in qutebrowser v1.11.1 (pending release) and v1.12.0 (unreleased). Backported patches for older versions are available, but no further releases are planned. # Mitigation If you are unable to upgrade: - Treat any host with a certificate exception as insecure, ignoring the URL color - Or set `content.ssl_strict` to `True` (instead of `'ask'`), preventing certificate exceptions # References - qutebrowser issue: https://github.com/qutebrowser/qutebrowser/issues/5403 - Fix (master branch): https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975 - Related issue for KDE Falkon: https://bugs.kde.org/show_bug.cgi?id=420902 - Related issue for eric6 Web Browser: https://tracker.die-offenbachs.homelinux.org/eric/issue328 (fixed in eric6 20.6)
{'CVE-2020-11054'}
2022-04-19T19:02:25Z
2020-05-08T19:05:05Z
LOW
3.5
{'CWE-684'}
{'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j', 'https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975', 'https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKAZOOTJ2MBHTYVYQQ52NL53F5CB2XAP/', 'https://bugs.kde.org/show_bug.cgi?id=420902', 'https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478', 'https://github.com/qutebrowser/qutebrowser/issues/5403', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11054', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7YWJ5QNHXKTGG5NLV7EGEOKPBVZBA5GS/', 'https://tracker.die-offenbachs.homelinux.org/eric/issue328', 'https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467', 'https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864', 'https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327', 'https://github.com/qutebrowser/qutebrowser/commit/1b7946ed14b386a24db050f2d6dba81ba6518755', 'https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8', 'https://github.com/qutebrowser/qutebrowser/commit/a45ca9c788f648d10cccce2af41405bf25ee2948', 'https://github.com/advisories/GHSA-4rcq-jv2f-898j', 'https://github.com/qutebrowser/qutebrowser/commit/9bd1cf585fccdfe8318fff7af793730e74a04db3'}
null
GHSA
GHSA-vf23-f26f-mjj9
Moderate severity vulnerability that affects yourls/yourls
## Type juggling vulnerability in the API ### Impact YOURLS through 1.7.3 is affected by a type juggling vulnerability in the API component that can result in login bypass. ### Patches https://github.com/YOURLS/YOURLS/releases/tag/1.7.4 https://github.com/YOURLS/YOURLS/pull/2542 ### References * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14537 * https://github.com/Wocanilo/CVE-2019-14537 ### For more information If you have any questions or comments about this advisory: * Open an issue in [YOURLS repository](https://github.com/YOURLS/YOURLS)
{'CVE-2019-14537'}
2021-09-20T21:42:52Z
2019-09-23T18:32:02Z
CRITICAL
9.8
{'CWE-843'}
{'https://github.com/YOURLS/YOURLS/commits/master', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS/releases', 'https://github.com/YOURLS/YOURLS/pull/2542', 'https://github.com/Wocanilo/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS/security/advisories/GHSA-vf23-f26f-mjj9', 'https://security-garage.com/index.php/cves/cve-2019-14537-api-authentication-bypass-via-type-juggling', 'https://github.com/advisories/GHSA-vf23-f26f-mjj9'}
null
GHSA
GHSA-4pww-fqgh-36hj
Unrestricted Upload of File with Dangerous Type in Croogo
A Remote Code Execution (RCE) vulnerability exists in Croogo 3.0.2 via admin/file-manager/attachments, which lets a malicious user upload a web shell script.
{'CVE-2021-44673'}
2022-03-29T21:06:52Z
2022-03-11T00:02:02Z
HIGH
8.8
{'CWE-434'}
{'https://github.com/advisories/GHSA-4pww-fqgh-36hj', 'https://github.com/3erk1n/Vulnerabilities', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44673'}
null
GHSA
GHSA-wpfc-3w63-g4hm
Malicious Package in axois
All versions of `axois` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
null
2021-10-01T13:28:36Z
2020-09-01T21:09:48Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/683', 'https://github.com/advisories/GHSA-wpfc-3w63-g4hm'}
null
GHSA
GHSA-xr7r-88qv-q7hm
Out of bounds write in serde_cbor
An issue was discovered in the serde_cbor crate before 0.10.2 for Rust. The CBOR deserializer can cause stack consumption via nested semantic tags.
{'CVE-2019-25001'}
2021-08-25T20:45:51Z
2021-08-25T20:45:51Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/pyfisch/cbor/releases/tag/v0.10.2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25001', 'https://github.com/advisories/GHSA-xr7r-88qv-q7hm', 'https://rustsec.org/advisories/RUSTSEC-2019-0025.html'}
null
GHSA
GHSA-3pqx-4fqf-j49f
Deserialization of Untrusted Data in PyYAML
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
{'CVE-2019-20477'}
2022-01-04T19:50:38Z
2021-04-20T16:40:42Z
HIGH
9.8
{'CWE-502'}
{'https://www.exploit-db.com/download/47655', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20477', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/', 'https://github.com/yaml/pyyaml/blob/master/CHANGES', 'https://github.com/advisories/GHSA-3pqx-4fqf-j49f'}
null
GHSA
GHSA-c5gj-w4hx-gvmx
Business Logic Errors in microweber
Microweber prior to 1.2.11 can suffer from insecure direct object reference(s). A malicious actor can remove items from a victim's cart.
{'CVE-2022-0688'}
2022-02-26T01:15:47Z
2022-02-21T00:00:21Z
LOW
2.7
null
{'https://github.com/advisories/GHSA-c5gj-w4hx-gvmx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0688', 'https://huntr.dev/bounties/051ec6d4-0b0a-41bf-9ded-27813037c9c9', 'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'}
null
GHSA
GHSA-3qr6-qrqm-8v86
Integer Overflow or Wraparound in Microweber
In Microweber prior to 1.2.12, a user can create an account with a password thousands of characters in length, leading to memory corruption/integer overflow. Version 1.2.2 sets maximum password length at 500 characters.
{'CVE-2022-1036'}
2022-03-30T20:49:26Z
2022-03-23T00:00:23Z
HIGH
7.5
{'CWE-190'}
{'https://github.com/advisories/GHSA-3qr6-qrqm-8v86', 'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a', 'https://huntr.dev/bounties/db615581-d5a9-4ca5-a3e9-7a39eceaa424', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1036'}
null
GHSA
GHSA-g5mm-vmx4-3rg7
Improper handling of case sensitivity in Spring Framework
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. Versions 5.3.19 and 5.2.21 contain a patch for this issue.
{'CVE-2022-22968'}
2022-04-22T20:46:00Z
2022-04-15T00:00:32Z
LOW
0
{'CWE-178'}
{'https://github.com/advisories/GHSA-g5mm-vmx4-3rg7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22968', 'https://tanzu.vmware.com/security/cve-2022-22968'}
null
GHSA
GHSA-wqq8-mqj9-697f
PrestaShop autoupgrade module ZIP archives were vulnerable from CVE-2017-9841
### Impact We have identified that some autoupgrade module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE. This vulnerability impacts - phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841) - phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers) You can read PrestaShop official statement about this vulnerability [here](https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/). ### Patches In the [security patch](https://github.com/PrestaShop/autoupgrade/releases/tag/v4.10.1), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading. ### Workarounds Users can also simply remove the unwanted vendor/phpunit folder. ### References https://nvd.nist.gov/vuln/detail/CVE-2017-9841 ### For more information If you have any questions or comments about this advisory, email us at security@prestashop.com
null
2020-01-08T03:10:30Z
2020-01-08T03:10:30Z
HIGH
0
null
{'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32', 'https://github.com/advisories/GHSA-wqq8-mqj9-697f', 'https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f'}
null
GHSA
GHSA-gf7h-vg5v-cch6
Directory Traversal in ritp
Affected versions of `ritp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16198'}
2021-09-10T20:50:57Z
2018-08-06T20:03:21Z
HIGH
7.5
{'CWE-22'}
{'https://www.npmjs.com/advisories/432', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ritp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16198', 'https://nodesecurity.io/advisories/432', 'https://github.com/advisories/GHSA-gf7h-vg5v-cch6'}
null
GHSA
GHSA-337x-4q8g-prc5
Low severity vulnerability that affects django
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.
{'CVE-2019-3498'}
2021-07-22T22:30:17Z
2019-01-14T16:20:05Z
MODERATE
6.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3498', 'https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://github.com/advisories/GHSA-337x-4q8g-prc5', 'https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ', 'http://www.securityfocus.com/bid/106453', 'https://www.djangoproject.com/weblog/2019/jan/04/security-releases/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/', 'https://usn.ubuntu.com/3851-1/', 'https://www.debian.org/security/2019/dsa-4363'}
null
GHSA
GHSA-3vjm-36rr-7qrq
NULL Pointer Dereference in cbox
An issue was discovered in the cbox crate through 2020-03-19 for Rust. The CBox API allows dereferencing raw pointers without a requirement for unsafe code.
{'CVE-2020-35860'}
2021-08-25T20:47:16Z
2021-08-25T20:47:16Z
CRITICAL
9.8
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35860', 'https://github.com/TomBebbington/cbox-rs/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2020-0005.html', 'https://github.com/advisories/GHSA-3vjm-36rr-7qrq'}
null
GHSA
GHSA-qhh5-9738-g9mx
Incorrect Default Permissions in Apache DolphinScheduler
Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any tenant to override another users password through the API interface.
{'CVE-2020-13922'}
2022-02-09T22:26:32Z
2022-02-09T22:26:32Z
MODERATE
6.5
{'CWE-276'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13922', 'https://github.com/advisories/GHSA-qhh5-9738-g9mx', 'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1', 'https://www.mail-archive.com/announce@apache.org/msg06076.html'}
null
GHSA
GHSA-x2mc-8fgj-3wmr
Improper Input Validation in tar-fs
A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content.
{'CVE-2018-20835'}
2021-08-03T21:27:51Z
2019-05-01T18:37:18Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/mafintosh/tar-fs/compare/d590fc7...a35ce2f', 'https://hackerone.com/reports/344595', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835', 'https://github.com/advisories/GHSA-x2mc-8fgj-3wmr', 'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'}
null
GHSA
GHSA-gwrp-pvrq-jmwv
Path Traversal and Improper Input Validation in Apache Commons IO
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
{'CVE-2021-29425'}
2022-04-22T18:28:57Z
2021-04-26T16:04:00Z
MODERATE
5.3
{'CWE-20', 'CWE-22'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E', 'https://issues.apache.org/jira/browse/IO-556', 'https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29425', 'https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-gwrp-pvrq-jmwv', 'https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html', 'https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0004/', 'https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E'}
null
GHSA
GHSA-w46j-8hm6-h8mm
XSS in apexcharts
The package apexcharts before 3.24.0 are vulnerable to Cross-site Scripting (XSS) via lack of sanitization of graph legend fields.
{'CVE-2021-23327'}
2021-02-11T20:47:34Z
2021-02-11T20:47:34Z
MODERATE
0
{'CWE-79'}
{'https://github.com/apexcharts/apexcharts.js/pull/2158', 'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19', 'https://github.com/advisories/GHSA-w46j-8hm6-h8mm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23327', 'https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708', 'https://www.npmjs.com/package/apexcharts', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616'}
null
GHSA
GHSA-mp9m-g7qj-6vqr
Unauthorized privilege escalation in Mod module
### Impact An unauthorized privilege escalation exploit has been discovered in the Mod module: this exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it's possible to perform destructive actions within the guild the user has high privileges in. ### Patches This exploit has been fixed on version & ``3.4.1``. ### Workarounds Unloading the Mod module with ``unload mod`` __or__, disabling the ``massban`` command with ``command disable global massban`` can render this exploit not accessible. We still highly recommend updating to ``3.4.1`` to completely patch this issue. ### References * https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b ### For more information If you have any questions or comments about this advisory: * Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot) * Over on our [Discord server](https://discord.gg/red)
null
2022-04-19T19:02:39Z
2020-10-27T20:30:48Z
MODERATE
0
{'CWE-285'}
{'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-mp9m-g7qj-6vqr', 'https://pypi.org/project/Red-DiscordBot/', 'https://github.com/Cog-Creators/Red-DiscordBot/releases/tag/3.4.1', 'https://github.com/advisories/GHSA-mp9m-g7qj-6vqr', 'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'}
null
GHSA
GHSA-x2fr-v8wf-8wwv
High severity vulnerability that affects ruby-saml
OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
{'CVE-2017-11428'}
2021-01-14T21:18:59Z
2019-07-05T21:11:35Z
HIGH
7.7
{'CWE-287'}
{'https://github.com/advisories/GHSA-x2fr-v8wf-8wwv', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11428', 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations', 'https://www.kb.cert.org/vuls/id/475445'}
null
GHSA
GHSA-7774-7vr3-cc8j
Authorization Policy Bypass Due to Case Insensitive Host Comparison
### Impact According to [RFC 4343](https://datatracker.ietf.org/doc/html/rfc4343), Istio authorization policy should compare the hostname in the HTTP Host header in a case insensitive way, but currently the comparison is case sensitive. The Envoy proxy will route the request hostname in a case-insensitive way which means the authorization policy could be bypassed. As an example, the user may have an authorization policy that rejects request with hostname "httpbin.foo" for some source IPs, but the attacker can bypass this by sending the request with hostname "Httpbin.Foo". ### Patches * Istio 1.11.1 and above * Istio 1.10.4 and above * Istio 1.9.8 and above ### Workarounds A Lua filter may be written to normalize Host header before the authorization check. This is similar to the Path normalization presented in the [Security Best Practices](https://istio.io/latest/docs/ops/best-practices/security/#case-normalization) guide. ### References More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2021-008). ### For more information If you have any questions or comments about this advisory, please email us at istio-security-vulnerability-reports@googlegroups.com
{'CVE-2021-39155'}
2022-04-19T19:03:05Z
2021-08-30T16:15:56Z
HIGH
8.3
{'CWE-178'}
{'https://github.com/istio/istio/security/advisories/GHSA-7774-7vr3-cc8j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39155', 'https://github.com/advisories/GHSA-7774-7vr3-cc8j', 'https://datatracker.ietf.org/doc/html/rfc4343'}
null
GHSA
GHSA-4q96-6xhq-ff43
malicious SVG attachment causing stored XSS vulnerability
### Impact An attacker with `write` permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki. ### Patches Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes. ### Workarounds It is not advised to work around this, but to upgrade MoinMoin to a patched version. That said, a work around via a Content Security Policy in the web server might be possible. Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users. ### For more information If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de). ### Credits This vulnerability was discovered by: Catarina Leite from the Checkmarx SCA AppSec team
{'CVE-2020-15275'}
2021-04-05T20:33:18Z
2020-11-11T15:54:41Z
LOW
8.7
{'CWE-79'}
{'https://advisory.checkmarx.net/advisory/CX-2020-4285', 'https://pypi.org/project/moin/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15275', 'https://github.com/advisories/GHSA-4q96-6xhq-ff43', 'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2', 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-4q96-6xhq-ff43', 'https://github.com/moinwiki/moin-1.9/releases/tag/1.9.11'}
null
GHSA
GHSA-9c2j-593q-3g82
Moderate severity vulnerability that affects activesupport
The ActiveSupport::XmlMini_JDOM backend in lib/active_support/xml_mini/jdom.rb in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference.
{'CVE-2013-1856'}
2021-09-07T21:16:06Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-20'}
{'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1856', 'https://github.com/advisories/GHSA-9c2j-593q-3g82', 'http://support.apple.com/kb/HT5784', 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/', 'https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source&output=gplain'}
null
GHSA
GHSA-hjcp-j389-59ff
Regular Expression Denial of Service in marked
Versions 0.3.3 and earlier of `marked` are affected by a regular expression denial of service ( ReDoS ) vulnerability when passed inputs that reach the `em` inline rule. ## Recommendation Update to version 0.3.4 or later.
{'CVE-2015-8854'}
2021-09-14T17:23:55Z
2017-10-24T18:33:36Z
HIGH
7.5
null
{'https://github.com/chjj/marked/issues/497', 'https://www.npmjs.com/advisories/23', 'https://nodesecurity.io/advisories/23', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8854', 'https://support.f5.com/csp/article/K05052081?utm_source=f5support&amp;utm_medium=RSS', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/', 'https://github.com/advisories/GHSA-hjcp-j389-59ff', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS'}
null
GHSA
GHSA-38fc-wpqx-33j7
Uncontrolled Resource Consumption in trim-off-newlines
All versions of package trim-off-newlines are vulnerable to Regular Expression Denial of Service (ReDoS) via string processing.
{'CVE-2021-23425'}
2022-01-19T15:04:43Z
2021-09-02T17:15:42Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/stevemao/trim-off-newlines/pull/3', 'https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23425', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197', 'https://github.com/advisories/GHSA-38fc-wpqx-33j7', 'https://github.com/stevemao/trim-off-newlines/blob/master/index.js%23L6'}
null
GHSA
GHSA-ghpq-vjxw-ch5w
Use after free in libpulse-binding
### Overview Version 1.2.1 of the `libpulse-binding` Rust crate, released on the 15th of June 2018, fixed a pair of use-after-free issues with the objects returned by the `get_format_info` and `get_context` methods of `Stream` objects. These objects were mistakenly being constructed without setting an important flag to prevent destruction of the underlying C objects they reference upon their own destruction. This advisory is being written retrospectively, having previously only been noted in the changelog. No CVE assignment was sought. ### Patches Users are required to update to version 1.2.1 or newer. Versions older than 1.2.1 have been yanked from crates.io. This was believed to have already been done at the time of the 1.2.1 release, but upon double checking now they were found to still be available, so has been done now (22nd October 2020).
null
2021-08-25T20:56:52Z
2021-08-25T20:56:52Z
HIGH
0
{'CWE-416'}
{'https://github.com/jnqnfe/pulse-binding-rust/security/advisories/GHSA-ghpq-vjxw-ch5w', 'https://github.com/advisories/GHSA-ghpq-vjxw-ch5w', 'https://rustsec.org/advisories/RUSTSEC-2018-0021.html'}
null
GHSA
GHSA-28w5-j8xj-2xwc
Cross-site Scripting in the yoast_seo TYPO3 extension
The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.
{'CVE-2021-36788'}
2021-09-01T18:36:44Z
2021-09-01T18:36:44Z
MODERATE
5.4
{'CWE-79'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-012', 'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590', 'https://github.com/advisories/GHSA-28w5-j8xj-2xwc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36788'}
null
GHSA
GHSA-f2vv-h5x4-57gr
Leak of information via Store-API
### Impact Leak of information via Store-API ### Patches We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021
null
2021-10-05T16:12:45Z
2021-02-10T02:32:21Z
CRITICAL
0
{'CWE-202'}
{'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr', 'https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351', 'https://github.com/advisories/GHSA-f2vv-h5x4-57gr', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021', 'https://packagist.org/packages/shopware/platform'}
null
GHSA
GHSA-jqwc-jm56-wcwj
Cross-site scripting in Jupyter Notebook
Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.
{'CVE-2018-21030'}
2021-05-11T16:19:12Z
2019-11-08T17:07:42Z
MODERATE
5.3
{'CWE-79'}
{'https://github.com/jupyter/notebook/releases/tag/5.5.0', 'https://github.com/jupyter/notebook/pull/3341', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21030', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'https://github.com/advisories/GHSA-jqwc-jm56-wcwj'}
null
GHSA
GHSA-rwr3-c2q8-gm56
Moderate severity vulnerability that affects Pillow
Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the Image.core.map_buffer in map.c component.
{'CVE-2016-9189'}
2021-09-20T14:45:13Z
2018-07-24T20:08:27Z
MODERATE
5.5
{'CWE-190'}
{'https://github.com/python-pillow/Pillow/issues/2105', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9189', 'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html', 'http://www.securityfocus.com/bid/94234', 'http://www.debian.org/security/2016/dsa-3710', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/advisories/GHSA-rwr3-c2q8-gm56', 'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'}
null
GHSA
GHSA-wrvc-72w7-xpmj
Incorrect Comparison in sodiumoxide
An issue was discovered in the sodiumoxide crate before 0.2.5 for Rust. generichash::Digest::eq compares itself to itself and thus has degenerate security properties.
{'CVE-2019-25002'}
2021-08-25T20:45:54Z
2021-08-25T20:45:54Z
CRITICAL
9.8
{'CWE-697'}
{'https://github.com/sodiumoxide/sodiumoxide/pull/381/commits/fae052b834b097ced9a89a8fff8466e18f383070', 'https://github.com/advisories/GHSA-wrvc-72w7-xpmj', 'https://github.com/sodiumoxide/sodiumoxide/pull/381', 'https://rustsec.org/advisories/RUSTSEC-2019-0026.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25002'}
null
GHSA
GHSA-jr37-66pj-36v7
Cross-site Scripting in DayByDay CRM
In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.
{'CVE-2022-22109'}
2022-01-10T21:46:19Z
2022-01-08T00:32:00Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-jr37-66pj-36v7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22109', 'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109'}
null
GHSA
GHSA-gqgv-6jq5-jjj9
Prototype Pollution Protection Bypass in qs
Affected version of `qs` are vulnerable to Prototype Pollution because it is possible to bypass the protection. The `qs.parse` function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing `[` or `]` may bypass the prototype pollution protection and alter the Object prototype. This allows attackers to override properties that will exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances. ## Recommendation Upgrade to 6.0.4, 6.1.2, 6.2.3, 6.3.2 or later.
{'CVE-2017-1000048'}
2021-08-25T21:03:57Z
2020-04-30T17:16:47Z
HIGH
7.5
{'CWE-20'}
{'https://access.redhat.com/errata/RHSA-2017:2672', 'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d', 'https://github.com/advisories/GHSA-gqgv-6jq5-jjj9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000048', 'https://snyk.io/vuln/npm:qs:20170213', 'https://www.npmjs.com/advisories/1469', 'https://github.com/ljharb/qs/issues/200'}
null
GHSA
GHSA-4jm3-pfpf-h54p
espeak-ruby allows arbitrary command execution
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
{'CVE-2016-10193'}
2022-04-25T20:39:16Z
2017-10-24T18:33:35Z
CRITICAL
9.8
{'CWE-284'}
{'http://www.openwall.com/lists/oss-security/2017/01/31/14', 'https://github.com/dejan/espeak-ruby/issues/7', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193', 'https://github.com/advisories/GHSA-4jm3-pfpf-h54p', 'http://www.openwall.com/lists/oss-security/2017/02/02/5'}
null
GHSA
GHSA-7wgh-5q4q-6wx5
Malicious Package in 1337qq-js
All versions of `1337qq-js` contain malicious code. The package exfiltrates sensitive information through install scripts. It targets UNIX systems. The information exfiltrated includes: - Environment variables - Running processes - /etc/hosts - uname -a - npmrc file ## Recommendation Remove the package from your system and rotate any compromised credentials.
null
2021-10-04T20:47:21Z
2020-09-04T17:30:39Z
CRITICAL
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-7wgh-5q4q-6wx5', 'https://www.npmjs.com/advisories/1455'}
null
GHSA
GHSA-66ww-999q-mffq
Arbitrary code execution in post-loader
post-loader is webpack loader for blog posts written in Markdown. The package post-loader from 0.0.0 is vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed. At this time, there is no known workaround or patch available.
{'CVE-2022-0748'}
2022-03-25T14:29:34Z
2022-03-18T00:01:11Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0748', 'https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737', 'https://github.com/advisories/GHSA-66ww-999q-mffq'}
null
GHSA
GHSA-5chj-xprr-7qqx
Cross-site Scripting in GwtUpload
The file-upload feature in GwtUpload 1.0.3 allows XSS via a crafted filename.
{'CVE-2020-9447'}
2022-01-04T19:33:29Z
2021-04-22T16:15:33Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-5chj-xprr-7qqx', 'https://github.com/manolo/gwtupload/issues/32', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9447', 'https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality'}
null
GHSA
GHSA-fc38-mxwr-pfhx
Cross-Site Scripting via SVG media files
### Impact Cross-Site Scripting via SVG media files ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
{'CVE-2021-37710'}
2021-08-23T19:43:00Z
2021-08-23T19:43:00Z
HIGH
8
{'CWE-79'}
{'https://github.com/advisories/GHSA-fc38-mxwr-pfhx', 'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37710', 'https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx'}
null
GHSA
GHSA-hf55-c445-2w97
Cross-site Scripting in @rocket.chat/livechat
A blind self XSS vulnerability exists in RocketChat LiveChat versions lower than 1.9 that could allow an attacker to trick a victim pasting malicious code in their chat instance.
{'CVE-2022-21830'}
2022-04-15T16:57:08Z
2022-04-03T00:01:00Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21830', 'https://github.com/advisories/GHSA-hf55-c445-2w97', 'https://hackerone.com/reports/1091118', 'https://github.com/RocketChat/Rocket.Chat.Livechat/releases/tag/v1.9.0', 'https://github.com/RocketChat/Rocket.Chat.Livechat/pull/558'}
null
GHSA
GHSA-pf46-gqg9-j3v3
Insufficient Entropy in DotNetNuke
DNN (aka DotNetNuke) 9.2 through 9.2.1 incorrectly converts encryption key source values, resulting in lower than expected entropy.
{'CVE-2018-15812'}
2021-08-17T16:06:34Z
2019-07-05T21:08:24Z
HIGH
7.5
{'CWE-331'}
{'https://www.dnnsoftware.com/community/security/security-center', 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://github.com/dnnsoftware/Dnn.Platform/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15812', 'https://github.com/advisories/GHSA-pf46-gqg9-j3v3'}
null
GHSA
GHSA-v39p-96qg-c8rf
Prototype Pollution in object-path
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.
{'CVE-2021-23434'}
2021-10-05T16:03:38Z
2021-09-01T18:37:11Z
MODERATE
5.6
{'CWE-843', 'CWE-1321'}
{'https://github.com/advisories/GHSA-v39p-96qg-c8rf', 'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423', 'https://github.com/mariocasciaro/object-path#0116', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453', 'https://github.com/mariocasciaro/object-path%230116', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23434'}
null
GHSA
GHSA-gg6m-fhqv-hg56
Denial of Service in yar
Versions of `yar` prior to 2.2.0 are affected by a denial of service vulnerability related to an invalid encrypted session cookie value. When an invalid encryped session cookie value is provided, the process will crash. ## Recommendation Update to version 2.2.0 or later.
{'CVE-2014-4179'}
2021-09-23T21:04:52Z
2020-09-01T15:15:36Z
HIGH
7.5
{'CWE-400'}
{'https://www.npmjs.com/advisories/44', 'https://github.com/advisories/GHSA-gg6m-fhqv-hg56', 'https://nvd.nist.gov/vuln/detail/CVE-2014-4179', 'https://github.com/spumko/yar/issues/34'}
null
GHSA
GHSA-r89v-cgv7-3jhx
Bypass of fix for CVE-2020-15247, Twig sandbox escape
### Impact A bypass of CVE-2020-15247 (fixed in 1.0.469 and 1.1.0) was discovered that has the same impact as CVE-2020-15247: An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP. ### Patches Issue has been patched in Build 470 (v1.0.470) and v1.1.1. ### Workarounds Apply https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7 to your installation manually if unable to upgrade to Build 470 or v1.1.1. ### References Reported by [ka1n4t](https://github.com/ka1n4t) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1108" alt="Screen Shot 2020-10-10 at 1 21 13 PM" src="https://user-images.githubusercontent.com/7253840/95663316-7de28b80-0afb-11eb-999d-a6526cf78709.png">
{'CVE-2020-26231'}
2022-04-19T19:02:40Z
2020-11-23T20:54:18Z
LOW
5.2
{'CWE-862'}
{'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7', 'https://github.com/advisories/GHSA-94vp-rmqv-5875', 'https://github.com/octobercms/october/security/advisories/GHSA-r89v-cgv7-3jhx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26231', 'https://github.com/advisories/GHSA-r89v-cgv7-3jhx'}
null
GHSA
GHSA-jm5c-rv3w-w83m
Denial of service in geth
### Impact Denial-of-service (crash) during block processing ### Details Affected versions suffer from a vulnerability which can be exploited through the `MULMOD` operation, by specifying a modulo of `0`: `mulmod(a,b,0)`, causing a `panic` in the underlying library. The crash was in the `uint256` library, where a buffer [underflowed](https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L442). if `d == 0`, `dLen` remains `0` and https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L451 will try to access index `[-1]`. The `uint256` library was first merged in this [commit](https://github.com/ethereum/go-ethereum/commit/cf6674539c589f80031f3371a71c6a80addbe454), on 2020-06-08. Exploiting this vulnerabilty would cause all vulnerable nodes to drop off the network. The issue was brought to our attention through a [bug report](https://github.com/ethereum/go-ethereum/issues/21367), showing a `panic` occurring on sync from genesis on the Ropsten network. It was estimated that the least obvious way to fix this would be to merge the fix into `uint256`, make a new release of that library and then update the geth-dependency. - https://github.com/holiman/uint256/releases/tag/v1.1.1 was made the same day, - PR to address the issue: https://github.com/holiman/uint256/pull/80 - PR to update geth deps: https://github.com/ethereum/go-ethereum/pull/21368 ### Patches Upgrade to v1.9.18 or higher ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
{'CVE-2020-26242'}
2021-06-29T21:13:20Z
2021-06-29T21:13:20Z
MODERATE
6.5
{'CWE-400', 'CWE-191', 'CWE-125'}
{'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m', 'https://github.com/advisories/GHSA-jm5c-rv3w-w83m', 'https://blog.ethereum.org/2020/11/12/geth_security_release/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26242'}
null
GHSA
GHSA-8h8v-6qqm-fwpq
Path Traversal in express-cart
Versions of `express-cart` before 1.1.7 are vulnerable to Path Traversal. ## Recommendation Update to version 1.1.7 or later.
null
2021-09-24T20:41:18Z
2020-09-01T21:06:38Z
HIGH
0
{'CWE-22'}
{'https://hackerone.com/reports/343726', 'https://github.com/advisories/GHSA-8h8v-6qqm-fwpq', 'https://www.npmjs.com/advisories/676'}
null
GHSA
GHSA-jp46-fw6c-3pm9
Directory Traversal in scott-blanch-weather-app
Affected versions of `scott-blanch-weather-app` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16184'}
2021-01-14T15:39:21Z
2020-09-01T18:46:58Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/scott-blanch-weather-app', 'https://www.npmjs.com/advisories/453', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16184', 'https://github.com/advisories/GHSA-jp46-fw6c-3pm9', 'https://nodesecurity.io/advisories/453'}
null
GHSA
GHSA-76wf-2xcf-6wmx
Malicious Package in ngx-pica
Version 1.1.5 of `ngx-pica` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T00:31:28Z
2020-09-03T00:31:28Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/948', 'https://github.com/advisories/GHSA-76wf-2xcf-6wmx'}
null