ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-8qvx-f5gf-g43v
|
Logic error in dolibarr
|
The application does not check the input of price number lead to Business Logic error through negative price amount.
|
{'CVE-2022-0174'}
|
2022-01-20T15:34:34Z
|
2022-01-12T22:54:50Z
|
MODERATE
| 4.3
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0174', 'https://huntr.dev/bounties/ed3ed4ce-3968-433c-a350-351c8f8b60db', 'https://github.com/advisories/GHSA-8qvx-f5gf-g43v', 'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'}
| null |
GHSA
|
GHSA-g4xj-wcq6-qwx5
|
Code injection in mock2easy
|
This affects all versions up to and including version 0.0.24 of package mock2easy. a malicious user could inject commands through the _data variable: Affected Area require('../server/getJsonByCurl')(mock2easy, function (error, stdout) { if (error) { return res.json(500, error); } res.json(JSON.parse(stdout)); }, '', _data.interfaceUrl, query, _data.cookie,_data.interfaceType);
|
{'CVE-2020-7697'}
|
2021-07-29T21:52:44Z
|
2021-05-06T18:25:58Z
|
CRITICAL
| 9.8
|
{'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JS-MOCK2EASY-572312', 'https://github.com/advisories/GHSA-g4xj-wcq6-qwx5', 'https://www.npmjs.com/package/mock2easy', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7697'}
| null |
GHSA
|
GHSA-mpp5-2x55-49xw
|
XSS in svg2png (NPM package)
|
svg2png 4.1.1 allows XSS with resultant SSRF via JavaScript inside an SVG document.
|
{'CVE-2020-11887'}
|
2022-01-06T19:45:13Z
|
2022-01-06T19:45:13Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-mpp5-2x55-49xw', 'https://github.com/domenic/svg2png/issues/117', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11887'}
| null |
GHSA
|
GHSA-jmqm-f2gx-4fjv
|
Sensitive information exposure through logs in npm-registry-fetch
|
Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
| null |
2021-09-22T19:00:08Z
|
2020-07-07T18:59:10Z
|
MODERATE
| 5.3
|
{'CWE-352'}
|
{'https://github.com/npm/npm-registry-fetch/pull/29', 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88', 'https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432', 'https://github.com/advisories/GHSA-jmqm-f2gx-4fjv', 'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv'}
| null |
GHSA
|
GHSA-w3w8-37jv-2c58
|
Cross-Site Scripting in mustache
|
Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted.
### Example
Template:
```<a href={{foo}}/>```
Input:
```{ 'foo' : 'test.com onload=alert(1)'}```
Rendered result:
```<a href=test.com onload=alert(1)/>```
## Recommendation
Update to version 2.2.1 or later.
Alternatively, ensure that all attributes in hmustache templates are encapsulated with quotes.
|
{'CVE-2015-8862'}
|
2021-09-20T22:34:09Z
|
2017-10-24T18:33:36Z
|
HIGH
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-w3w8-37jv-2c58', 'https://nodesecurity.io/advisories/62', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862', 'http://www.securityfocus.com/bid/96436', 'https://www.npmjs.com/advisories/62', 'https://www.tenable.com/security/tns-2016-18', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'}
| null |
GHSA
|
GHSA-pqpp-2363-649v
|
Cross-Site Scripting in buttle
|
All versions of `buttle` are vulnerable to Cross-Site Scripting. Due to misconfiguration of its rendering engine, `buttle` does not sanitize the HTML output allowing attackers to run arbitrary JavaScript when processing malicious markdown files.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-09-27T16:17:10Z
|
2020-09-02T18:22:30Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-pqpp-2363-649v', 'https://www.npmjs.com/advisories/810', 'https://hackerone.com/reports/404126'}
| null |
GHSA
|
GHSA-8p9r-f949-699g
|
Path Traversal in browserless-chrome
|
This affects all versions of browserless-chrome before 1.43.0. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.
|
{'CVE-2020-7758'}
|
2021-05-10T18:46:48Z
|
2021-05-10T18:46:48Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-8p9r-f949-699g', 'https://www.npmjs.com/package/browserless-chrome', 'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6', 'https://github.com/browserless/chrome/releases/tag/1.40.2-chrome-stable', 'https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7758', 'https://github.com/browserless/chrome/blob/master/src/routes.ts%23L175'}
| null |
GHSA
|
GHSA-4h9c-v5vg-5m6m
|
Access to restricted PHP code by dynamic static class access in smarty
|
### Impact
Template authors could run restricted static php methods.
### Patches
Please upgrade to 3.1.40 or higher.
### References
See the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter.
### For more information
If you have any questions or comments about this advisory please open an issue in [the Smarty repo](https://github.com/smarty-php/smarty)
|
{'CVE-2021-21408'}
|
2022-01-20T15:33:56Z
|
2022-01-12T22:43:42Z
|
HIGH
| 8.8
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-4h9c-v5vg-5m6m', 'https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m', 'https://github.com/smarty-php/smarty/releases/tag/v4.0.3', 'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21408', 'https://github.com/smarty-php/smarty/releases/tag/v3.1.43'}
| null |
GHSA
|
GHSA-p737-p57g-4cpr
|
Insertion of Sensitive Information into Log File in Jupyter notebook
|
### Impact
_What kind of vulnerability is it?_
Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Upgrade to Jupyter Server version 1.15.4
### For more information
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org).
Credit: @3coins for reporting. Thank you!
|
{'CVE-2022-24757'}
|
2022-03-29T21:55:39Z
|
2022-03-25T19:20:39Z
|
HIGH
| 7.5
|
{'CWE-532'}
|
{'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24757', 'https://github.com/advisories/GHSA-p737-p57g-4cpr', 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-p737-p57g-4cpr'}
| null |
GHSA
|
GHSA-jwcc-j78w-j73w
|
High severity vulnerability that affects ansible
|
Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible.
|
{'CVE-2018-10855'}
|
2021-08-31T21:15:45Z
|
2018-10-10T17:23:20Z
|
HIGH
| 5.9
|
{'CWE-532'}
|
{'https://access.redhat.com/errata/RHSA-2018:2585', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10855', 'https://access.redhat.com/errata/RHBA-2018:3788', 'https://access.redhat.com/errata/RHSA-2018:2184', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10855', 'https://access.redhat.com/errata/RHSA-2018:2079', 'https://usn.ubuntu.com/4072-1/', 'https://access.redhat.com/errata/RHSA-2018:1949', 'https://www.debian.org/security/2019/dsa-4396', 'https://access.redhat.com/errata/RHSA-2019:0054', 'https://access.redhat.com/errata/RHSA-2018:1948', 'https://access.redhat.com/errata/RHSA-2018:2022', 'https://github.com/advisories/GHSA-jwcc-j78w-j73w'}
| null |
GHSA
|
GHSA-xqqr-p362-6rmc
|
Directory Traversal in hostr
|
Affected versions of `hostr` are vulnerable to directory traversal which allows attackers to read files outside the current directory by sending `../` in the url path for GET requests.
## Recommendation
Upgrade to version 2.3.6 or later.
|
{'CVE-2017-16029'}
|
2021-01-07T23:59:22Z
|
2018-11-09T17:44:20Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/303', 'https://github.com/advisories/GHSA-xqqr-p362-6rmc', 'https://www.npmjs.com/advisories/303', 'https://github.com/henrytseng/hostr/issues/8)', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16029', 'https://github.com/henrytseng/hostr/issues/8'}
| null |
GHSA
|
GHSA-4gq5-ch57-c2mg
|
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
|
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.
|
{'CVE-2018-14719'}
|
2021-06-11T15:38:44Z
|
2019-01-04T19:09:49Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://www.debian.org/security/2019/dsa-4452', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14719', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/68', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://github.com/advisories/GHSA-4gq5-ch57-c2mg', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1782'}
| null |
GHSA
|
GHSA-fxph-q3j8-mv87
|
Deserialization of Untrusted Data in Log4j
|
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
|
{'CVE-2017-5645'}
|
2022-04-01T20:26:52Z
|
2020-01-06T18:43:38Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://lists.apache.org/thread.html/r0831e2e52a390758ce39a6193f82c11c295175adce6e6307de28c287@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3399', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://lists.apache.org/thread.html/0dcca05274d20ef2d72584edcf8c917bbb13dbbd7eb35cae909d02e9@%3Cdev.logging.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3244', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2423', 'https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E', 'http://www.securitytracker.com/id/1040200', 'https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3Cdev.tika.apache.org%3E', 'https://github.com/advisories/GHSA-fxph-q3j8-mv87', 'https://access.redhat.com/errata/RHSA-2017:2810', 'https://access.redhat.com/errata/RHSA-2017:3400', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1545', 'https://security.netapp.com/advisory/ntap-20180726-0002/', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/r94b5aae09c4bcff5d06cf641be17b00bd83ba7e10cad737bf16a1b8f@%3Cgithub.beam.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rbfa7a0742be4981a3f9356a23d0e1a5f2e1eabde32a1a3d8e41420f8@%3Cgithub.beam.apache.org%3E', 'http://www.securityfocus.com/bid/97702', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.apache.org/thread.html/r9d5c1b558a15d374bd5abd2d3ae3ca7e50e796a0efdcf91e9c5b4cdd@%3Cgithub.beam.apache.org%3E', 'https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125@%3Cdev.logging.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2809', 'https://lists.apache.org/thread.html/r23369fd603eb6d62d3b883a0a28d12052dcbd1d6d531137124cd7f83@%3Cgithub.beam.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2889', 'https://access.redhat.com/errata/RHSA-2017:2635', 'https://access.redhat.com/errata/RHSA-2017:2633', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5645', 'https://lists.apache.org/thread.html/e8fb7d76a244ee997ba4b217d6171227f7c2521af8c7c5b16cba27bc@%3Cdev.logging.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3Cissues.activemq.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/12/19/2', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1802', 'https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/84cc4266238e057b95eb95dfd8b29d46a2592e7672c12c92f68b2917@%3Cannounce.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2637', 'https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/rdbd579dc223f06af826d7de340218ee2f80d8b43fa7e4decb2a63f44@%3Cgithub.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rcbb79023a7c8494cb389cd3d95420fa9e0d531ece0b780b8c1f99422@%3Ccommits.doris.apache.org%3E', 'https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2638', 'https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2808', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2017:1417', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://access.redhat.com/errata/RHSA-2017:1801', 'https://access.redhat.com/errata/RHSA-2017:2888', 'https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2811', 'https://access.redhat.com/errata/RHSA-2017:2636', 'http://www.securitytracker.com/id/1041294', 'https://security.netapp.com/advisory/ntap-20181107-0002/', 'https://issues.apache.org/jira/browse/LOG4J2-1863', 'https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/ra9a682bc0a8dff1c5cefdef31c7c25f096d9121207cf2d74e2fc563d@%3Ccommits.logging.apache.org%3E'}
| null |
GHSA
|
GHSA-j4mm-7pj3-jf7v
|
HTTP Method Spoofing
|
Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site request forgery (CSRF) attacks, which would otherwise not be possible.
### Impact
The vulnerability allows attackers to craft links or forms which may change the server state. For example, the following GET request would create a new user:
```sh
% curl -i -u admin:opencast \
'https://legacy.opencast.org/admin-ng/users/test.json?_method=PUT&username=test&password=attack'
HTTP/2 200
…
```
If an admin is logged in to legacy.opencast.org and accidentally clicks this link, a user will silently be created.
### Patches
This issue is fixed in Opencast 9.10 and 10.0.
### Workarounds
You can mitigate the problem by setting the `SameSite=Strict` attribute for your cookies. If this is a viable option for you depends on your integrations. We strongly recommend updating in any case.
### References
- [Fix for 10.0](https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8)
- [Fix for 9.10](https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
* Email us at [security@opencast.org](mailto:security@opencast.org)
|
{'CVE-2021-43807'}
|
2022-04-19T19:03:13Z
|
2021-12-14T21:43:00Z
|
HIGH
| 7.5
|
{'CWE-290'}
|
{'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444', 'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43807', 'https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v', 'https://github.com/advisories/GHSA-j4mm-7pj3-jf7v'}
| null |
GHSA
|
GHSA-h5f5-rj4r-42f6
|
Incorrect access control in Neo4j Enterprise Database Server via LDAP authentication
|
Due to incorrect access control in Neo4j Enterprise Database Server 3.4.x before 3.4.9, the setting of LDAP for authentication with STARTTLS, and System Account for authorization, allows an attacker to log into the server by sending any valid username with an arbitrary password.
|
{'CVE-2018-18389'}
|
2022-04-27T14:23:04Z
|
2018-10-17T17:31:26Z
|
CRITICAL
| 9.8
|
{'CWE-287'}
|
{'https://github.com/neo4j/neo4j/issues/12047', 'https://github.com/advisories/GHSA-h5f5-rj4r-42f6', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18389'}
| null |
GHSA
|
GHSA-6c8f-qphg-qjgp
|
Validation Bypass in kind-of
|
Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation.
## Recommendation
Upgrade to versions 6.0.3 or later.
|
{'CVE-2019-20149'}
|
2021-08-23T15:03:56Z
|
2020-03-31T15:59:54Z
|
HIGH
| 7.5
|
{'CWE-668'}
|
{'https://github.com/advisories/GHSA-6c8f-qphg-qjgp', 'https://github.com/jonschlinkert/kind-of/pull/31', 'https://www.npmjs.com/advisories/1490', 'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20149', 'https://snyk.io/vuln/SNYK-JS-KINDOF-537849', 'https://github.com/jonschlinkert/kind-of/issues/30'}
| null |
GHSA
|
GHSA-c7v4-m269-4995
|
Exposure of Sensitive Information to an Unauthorized Actor in Moodle
|
The participants table download in Moodle always included user emails, but should have only done so when users' emails are not hidden. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5 and 3.7 to 3.7.8. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, and 3.10.
|
{'CVE-2020-25703'}
|
2021-10-21T17:49:08Z
|
2021-10-21T17:49:08Z
|
MODERATE
| 5.3
|
{'CWE-200'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://github.com/advisories/GHSA-c7v4-m269-4995', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895439', 'https://moodle.org/mod/forum/discuss.php?d=413941', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25703', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}
| null |
GHSA
|
GHSA-3mvg-rrrw-m7ph
|
Ability to change order address without triggering address validations in solidus
|
### Impact
This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipment costs associated with the new shipment.
All stores with at least two shipping zones and different costs of shipment per zone are impacted.
E.g.
1. Store admin configured the store so that there are two zones in US:
- East Cost Zone - Shipping Method cost: $1
- West Cost Zone - Shipping Method cost: $10
The attacker user can know that shipping to NY is less expensive than to LA just by testing different addresses in checkout.
2. The attacker user enters any NY shipping address in the address step
3. The attacker user chooses the $1 delivery option
4. The attacker user crafts a request with their real LA address, similar to:
```
// POST #checkout/update:
{
state: 'payment',
order: {
ship_address_attributes: {
city: 'Los Angeles',
...
}
}
}
```
5. The attacker user proceeds with checking out with a new address and the $1 shipment costs.
Another scenario where this could be dangerous is:
> You cannot ship products in some zones and you are relying on Solidus Shipping Method building only to filter out unwanted zones. Malicious users can enter an allowed zone's address and change back to an unwanted one in the payment step by crafting a request with some proper ship_address_attributes.
This problem comes from how checkout permitted attributes are structured. We have a single list of attributes that are permitted across the whole checkout, no matter the step that is being submitted.
### Patches
A PR has been attached to fix the security concern for each of all the Solidus supported versions following the rules of the [Solidus Security Policy](https://solidus.io/security).
### Workarounds
When it's not possible to upgrade to a supported patched version, please use this gist to patch the store:
https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d
|
{'CVE-2020-15109'}
|
2022-04-19T19:02:30Z
|
2020-08-04T22:17:57Z
|
MODERATE
| 5.3
|
{'CWE-862', 'CWE-20'}
|
{'https://solidus.io/blog/2020/07/16/new-releases.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15109', 'https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d', 'https://github.com/advisories/GHSA-3mvg-rrrw-m7ph', 'https://github.com/solidusio/solidus/security/advisories/GHSA-3mvg-rrrw-m7ph'}
| null |
GHSA
|
GHSA-92v7-pq4h-58j5
|
Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet
|
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.
|
{'CVE-2014-3248'}
|
2021-09-07T20:37:20Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 0
| null |
{'http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet/', 'https://github.com/advisories/GHSA-92v7-pq4h-58j5', 'http://secunia.com/advisories/59200', 'http://www.securityfocus.com/bid/68035', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3248', 'http://secunia.com/advisories/59197', 'http://puppetlabs.com/security/cve/cve-2014-3248'}
| null |
GHSA
|
GHSA-rqjw-p5vr-c695
|
Basic-auth app bundle credential exposure in gatsby-source-wordpress
|
### Impact
The gatsby-source-wordpress plugin prior to versions 4.0.8 and 5.9.2 leaks .htaccess HTTP Basic Authentication variables into the app.js bundle during build-time. Users who are not initializing basic authentication credentials in the gatsby-config.js are not affected.
Example affected gatsby-config.js:
```
resolve: 'gatsby-source-wordpress',
auth: {
htaccess: {
username: leaked_username
password: leaked_password,
},
},
```
### Patches
A patch has been introduced in gatsby-source-wordpress@4.0.8 and gatsby-source-wordpress@5.9.2 which mitigates the issue by filtering all variables specified in the `auth: { }` section. Users that depend on this functionality are advised to upgrade to the latest release of gatsby-source-wordpress, run `gatsby clean` followed by a `gatsby build`.
### Workarounds
There is no known workaround at this time, other than manually editing the app.js file post-build.
### For more information
Email us at [security@gatsbyjs.com](mailto:security@gatsbyjs.com)
|
{'CVE-2021-32770'}
|
2021-07-28T15:18:02Z
|
2021-07-19T15:21:41Z
|
HIGH
| 7.5
|
{'CWE-200', 'CWE-522'}
|
{'https://github.com/advisories/GHSA-rqjw-p5vr-c695', 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-rqjw-p5vr-c695', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32770'}
| null |
GHSA
|
GHSA-6f93-xj8r-jp82
|
Malicious Package in bunfer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:36:57Z
|
2020-09-03T22:28:21Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1267', 'https://github.com/advisories/GHSA-6f93-xj8r-jp82'}
| null |
GHSA
|
GHSA-3hq4-f2v6-q338
|
Kotti has demonstrated permission change via document view
|
Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a /admin-document/@@share request.
|
{'CVE-2018-9856'}
|
2022-04-26T18:08:09Z
|
2018-07-12T20:30:30Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-9856', 'https://github.com/Kotti/Kotti/issues/551', 'https://github.com/advisories/GHSA-3hq4-f2v6-q338'}
| null |
GHSA
|
GHSA-q2qr-3c2p-9235
|
Denial of Service (DoS) in HashiCorp Consul
|
HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4.
|
{'CVE-2020-12758'}
|
2022-04-12T22:55:15Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/7783', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12758', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'https://github.com/advisories/GHSA-q2qr-3c2p-9235', 'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'}
| null |
GHSA
|
GHSA-7rrm-v45f-jp64
|
Update packaged dependency libxml2 from 2.9.10 to 2.9.12
|
### Summary
Nokogiri v1.11.4 updates the vendored libxml2 from v2.9.10 to v2.9.12 which addresses:
- [CVE-2019-20388](https://security.archlinux.org/CVE-2019-20388) (Medium severity)
- [CVE-2020-24977](https://security.archlinux.org/CVE-2020-24977) (Medium severity)
- [CVE-2021-3517](https://security.archlinux.org/CVE-2021-3517) (Medium severity)
- [CVE-2021-3518](https://security.archlinux.org/CVE-2021-3518) (Medium severity)
- [CVE-2021-3537](https://security.archlinux.org/CVE-2021-3537) (Low severity)
- [CVE-2021-3541](https://security.archlinux.org/CVE-2021-3541) (Low severity)
Note that two additional CVEs were addressed upstream but are not relevant to this release. [CVE-2021-3516](https://security.archlinux.org/CVE-2021-3516) via `xmllint` is not present in Nokogiri, and [CVE-2020-7595](https://security.archlinux.org/CVE-2020-7595) has been patched in Nokogiri since v1.10.8 (see #1992).
Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.11.4`, and only if the packaged version of libxml2 is being used. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` release announcements.
### Mitigation
Upgrade to Nokogiri `>= 1.11.4`.
### Impact
I've done a brief analysis of the published CVEs that are addressed in this upstream release. The libxml2 maintainers have not released a canonical set of CVEs, and so this list is pieced together from secondary sources and may be incomplete.
All information below is sourced from [security.archlinux.org](https://security.archlinux.org), which appears to have the most up-to-date information as of this analysis.
#### [CVE-2019-20388](https://security.archlinux.org/CVE-2019-20388)
- **Severity**: Medium
- **Type**: Denial of service
- **Description**: A memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service.
- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/7ffcd44d7e6c46704f8af0321d9314cd26e0e18a
Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4.
#### [CVE-2020-7595](https://security.archlinux.org/CVE-2020-7595)
- **Severity**: Medium
- **Type**: Denial of service
- **Description**: xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c8907645d2e155f0d89d4d9895ac5112b5
This has been patched in Nokogiri since v1.10.8 (see #1992).
#### [CVE-2020-24977](https://security.archlinux.org/CVE-2020-24977)
- **Severity**: Medium
- **Type**: Information disclosure
- **Description**: GNOME project libxml2 <= 2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c.
- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4.
#### [CVE-2021-3516](https://security.archlinux.org/CVE-2021-3516)
- **Severity**: Medium
- **Type**: Arbitrary code execution (no remote vector)
- **Description**: A use-after-free security issue was found libxml2 before version 2.9.11 when "xmllint --html --push" is used to process crafted files.
- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
Verified that the fix commit first appears in v2.9.11. This vector does not exist within Nokogiri, which does not ship `xmllint`.
#### [CVE-2021-3517](https://security.archlinux.org/CVE-2021-3517)
- **Severity**: Medium
- **Type**: Arbitrary code execution
- **Description**: A heap-based buffer overflow was found in libxml2 before version 2.9.11 when processing truncated UTF-8 input.
- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/235
- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2
Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4.
#### [CVE-2021-3518](https://security.archlinux.org/CVE-2021-3518)
- **Severity**: Medium
- **Type**: Arbitrary code execution
- **Description**: A use-after-free security issue was found in libxml2 before version 2.9.11 in xmlXIncludeDoProcess() in xinclude.c when processing crafted files.
- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/237
- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7
Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4.
#### [CVE-2021-3537](https://security.archlinux.org/CVE-2021-3537)
- **Severity**: Low
- **Type**: Denial of service
- **Description**: It was found that libxml2 before version 2.9.11 did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application.
- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/243
- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61
Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4.
#### [CVE-2021-3541](https://security.archlinux.org/CVE-2021-3541)
- **Severity**: Low
- **Type**: Denial of service
- **Description**: A security issue was found in libxml2 before version 2.9.11. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.
- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e
Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4, however Nokogiri's default parse options prevent the attack from succeeding (it is necessary to opt into `DTDLOAD` which is off by default).
For more details supporting this analysis of this CVE, please visit #2233.
| null |
2021-05-17T20:52:05Z
|
2021-05-17T20:52:05Z
|
MODERATE
| 0
| null |
{'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-7rrm-v45f-jp64', 'https://github.com/advisories/GHSA-7rrm-v45f-jp64'}
| null |
GHSA
|
GHSA-5h9g-x5rv-25wg
|
Cross-site scripting vulnerability in TinyMCE
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in the schema validation logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or editor APIs. This malicious content could then end up in content published outside the editor, if no server-side sanitization was performed. This impacts all users who are using TinyMCE 5.8.2 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.9.0 by ensuring schema validation was still performed after unwrapping invalid elements.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.9.0 or higher
- Manually sanitize the content using the `BeforeSetContent` event (see below)
#### Example: Manually sanitize content
```js
editor.on('BeforeSetContent', function(e) {
var sanitizedContent = ...; // Manually sanitize content here
e.content = sanitizedContent;
});
```
### Acknowledgements
Tiny Technologies would like to thank William Bowling for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
| null |
2021-10-22T16:24:02Z
|
2021-10-22T16:24:02Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-5h9g-x5rv-25wg', 'https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes', 'https://github.com/advisories/GHSA-5h9g-x5rv-25wg'}
| null |
GHSA
|
GHSA-v3xw-c963-f5hc
|
jackson-databind mishandles the interaction between serialization gadgets and typing
|
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
|
{'CVE-2020-11111'}
|
2021-10-21T21:11:25Z
|
2020-05-15T18:58:50Z
|
HIGH
| 8.8
|
{'CWE-502'}
|
{'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/advisories/GHSA-v3xw-c963-f5hc', 'https://github.com/FasterXML/jackson-databind/issues/2664', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11111'}
| null |
GHSA
|
GHSA-r86j-2gc6-2cq9
|
High severity vulnerability that affects org.apache.hbase:hbase-thrift
|
An issue in Apache HBase affects the optional "Thrift 1" API server when running over HTTP. There is a race-condition which could lead to authenticated sessions being incorrectly applied to users, e.g. one authenticated user would be considered a different user or an unauthenticated user would be treated as an authenticated user. https://issues.apache.org/jira/browse/HBASE-20664 implements a fix for this issue. It has been fixed in versions: 1.2.6.1, 1.3.2.1, 1.4.5, 2.0.1.
|
{'CVE-2018-8025'}
|
2021-06-10T20:41:10Z
|
2018-10-18T18:05:02Z
|
HIGH
| 8.1
|
{'CWE-362'}
|
{'http://www.securityfocus.com/bid/104554', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8025', 'https://lists.apache.org/thread.html/a919e38f587c714c386a01d40fc8f45bd4219a65aaf2dc0bb4eccc96@%3Cdev.hbase.apache.org%3E', 'https://github.com/advisories/GHSA-r86j-2gc6-2cq9'}
| null |
GHSA
|
GHSA-7wfc-x4f7-gg2x
|
Code injection in Apache Dubbo
|
Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.
|
{'CVE-2021-30180'}
|
2022-03-21T22:00:20Z
|
2022-03-18T17:58:01Z
|
CRITICAL
| 9.8
|
{'CWE-94', 'CWE-444'}
|
{'https://github.com/advisories/GHSA-7wfc-x4f7-gg2x', 'https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30180'}
| null |
GHSA
|
GHSA-whq6-mj2r-mjqc
|
OS Command Injection in lsof
|
All versions including 0.0.4 of lsof npm module are vulnerable to Command Injection. Every exported method used by the package uses the exec function to parse user input.
|
{'CVE-2019-10783'}
|
2021-04-13T15:17:53Z
|
2021-04-13T15:17:53Z
|
HIGH
| 9.8
|
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-LSOF-543632', 'https://github.com/advisories/GHSA-whq6-mj2r-mjqc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10783'}
| null |
GHSA
|
GHSA-g9hh-vvx3-v37v
|
Denial of service in HtmlUnit-Neko
|
Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24939.
|
{'CVE-2022-28366'}
|
2022-05-05T13:38:37Z
|
2022-04-23T00:03:04Z
|
HIGH
| 7.5
| null |
{'https://github.com/advisories/GHSA-g9hh-vvx3-v37v', 'https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/', 'https://github.com/nahsra/antisamy/releases/tag/v1.6.6', 'https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28366'}
| null |
GHSA
|
GHSA-4m8h-h59m-m34j
|
Prototype Pollution in bmoor
|
The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664)
|
{'CVE-2021-23558'}
|
2022-02-07T21:21:00Z
|
2022-02-01T00:50:09Z
|
HIGH
| 7.3
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-4m8h-h59m-m34j', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://snyk.io/vuln/SNYK-JS-BMOOR-2342622', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23558', 'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b', 'https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664'}
| null |
GHSA
|
GHSA-5xc6-fpc7-4qvg
|
High severity vulnerability that affects CoAPthon
|
The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.
|
{'CVE-2018-12680'}
|
2021-09-01T22:21:58Z
|
2019-04-08T15:19:01Z
|
HIGH
| 7.5
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-12680', 'https://github.com/Tanganelli/CoAPthon/issues/135', 'https://github.com/advisories/GHSA-5xc6-fpc7-4qvg'}
| null |
GHSA
|
GHSA-9829-jj5p-j6hf
|
Prototype Pollution in worksmith
|
All versions up to and including 1.0.0 of the package worksmith are vulnerable to Prototype Pollution via the setValue function.
|
{'CVE-2020-7725'}
|
2021-07-29T21:16:29Z
|
2021-05-06T18:26:30Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-WORKSMITH-598798', 'https://github.com/advisories/GHSA-9829-jj5p-j6hf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7725'}
| null |
GHSA
|
GHSA-428f-mh7w-6w2x
|
Infecting Module in pandora-doomsday
|
The `pandora-doomsday` package is a malicious package that adds itself to the package.json of other packages discovered on the victim host and attempts to publish the package.
It has been removed from the npm registry.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
|
{'CVE-2017-16127'}
|
2021-01-14T15:33:22Z
|
2020-09-01T18:56:40Z
|
MODERATE
| 0
|
{'CWE-509'}
|
{'https://github.com/advisories/GHSA-428f-mh7w-6w2x', 'https://nodesecurity.io/advisories/482', 'https://www.npmjs.com/advisories/482', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16127'}
| null |
GHSA
|
GHSA-4q98-wr72-h35w
|
Improper input validation in Apache Santuario XML Security for Java
|
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
|
{'CVE-2019-12400'}
|
2021-10-21T21:18:21Z
|
2019-08-27T17:41:33Z
|
MODERATE
| 5.5
|
{'CWE-20'}
|
{'https://lists.apache.org/thread.html/r107bffb06a5e27457fe9af7dfe3a233d0d36c6c2f5122f117eb7f626@%3Ccommits.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'http://santuario.apache.org/secadv.data/CVE-2019-12400.asc?version=1&modificationDate=1566573083000&api=v2', 'https://lists.apache.org/thread.html/rf82be0a7c98cd3545e20817bb96ed05551ea0020acbaf9a469fef402@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rf958cea96236de8829940109ae07e870aa3d59235345421e4924ff03@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/8e814b925bf580bc527d96ff51e72ffe5bdeaa4b8bf5b89498cab24c@%3Cdev.santuario.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/rcdc0da94fe21b26493eae47ca987a290bdf90c721a7a42491fdd41d4@%3Ccommits.tomee.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190910-0003/', 'https://github.com/advisories/GHSA-4q98-wr72-h35w', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12400', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://lists.apache.org/thread.html/edaa7edb9c58e5f5bd0c950f2b6232b62b15f5c44ad803e8728308ce@%3Cdev.santuario.apache.org%3E'}
| null |
GHSA
|
GHSA-wmx6-vxcf-c3gr
|
Validation Bypass in slp-validate
|
Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus.
## Recommendation
Upgrade to version 1.0.1 or later.
|
{'CVE-2019-16761'}
|
2021-01-08T20:11:32Z
|
2019-11-15T23:10:19Z
|
CRITICAL
| 5.7
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-wmx6-vxcf-c3gr', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr', 'https://www.npmjs.com/advisories/1422', 'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16761'}
| null |
GHSA
|
GHSA-ghww-cv4v-hmxx
|
Cross-Site Request Forgery microweber
|
microweber prior to version 1.2.11 is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2022-0638'}
|
2022-02-26T01:13:33Z
|
2022-02-18T00:00:34Z
|
MODERATE
| 4.3
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0638', 'https://github.com/advisories/GHSA-ghww-cv4v-hmxx', 'https://huntr.dev/bounties/9d3d883c-d74c-4fe2-9978-a8e3d1ccf9f3', 'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'}
| null |
GHSA
|
GHSA-6cj2-92m5-7mvp
|
Improperly Controlled Modification of Object Prototype Attributes
|
### Impact
The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
### Patches
`think-config@1.1.3` patched it, anyone used `think-config` should upgrade to `>=1.1.3` version.
### References
https://cwe.mitre.org/data/definitions/1321.html
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [thinkjs/thinkjs](https://github.com/thinkjs/thinkjs)
* Email us at [i@imnerd.org](mailto:i@imnerd.org)
| null |
2022-04-19T19:03:04Z
|
2021-08-03T16:48:46Z
|
HIGH
| 7.5
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-6cj2-92m5-7mvp', 'https://github.com/thinkjs/think-config/security/advisories/GHSA-6cj2-92m5-7mvp'}
| null |
GHSA
|
GHSA-h4hv-m4h4-mhwg
|
Moderate severity vulnerability that affects django
|
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.
|
{'CVE-2017-7234'}
|
2021-09-13T15:06:07Z
|
2019-01-04T17:50:17Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-7234', 'https://github.com/advisories/GHSA-h4hv-m4h4-mhwg', 'http://www.debian.org/security/2017/dsa-3835', 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/', 'http://www.securityfocus.com/bid/97401', 'http://www.securitytracker.com/id/1038177'}
| null |
GHSA
|
GHSA-58pp-9c76-5625
|
jackson-databind mishandles the interaction between serialization gadgets and typing
|
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
|
{'CVE-2020-11112'}
|
2021-10-21T21:11:43Z
|
2020-06-10T21:12:41Z
|
HIGH
| 8.8
|
{'CWE-502'}
|
{'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11112', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/FasterXML/jackson-databind/issues/2666', 'https://github.com/advisories/GHSA-58pp-9c76-5625'}
| null |
GHSA
|
GHSA-fvxv-9xxr-h7wj
|
Moderate severity vulnerability that affects pyspark
|
When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.
|
{'CVE-2018-11760'}
|
2021-09-10T20:04:31Z
|
2019-02-07T18:02:21Z
|
MODERATE
| 5.5
| null |
{'https://lists.apache.org/thread.html/a86ee93d07b6f61b82b61a28049aed311f5cc9420d26cc95f1a9de7b@%3Cuser.spark.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11760', 'https://github.com/advisories/GHSA-fvxv-9xxr-h7wj', 'https://lists.apache.org/thread.html/6d015e56b3a3da968f86e0b6acc69f17ecc16b499389e12d8255bf6e@%3Ccommits.spark.apache.org%3E', 'http://www.securityfocus.com/bid/106786'}
| null |
GHSA
|
GHSA-7fhm-mqm4-2wp7
|
Withdrawn: ESLint dependencies are vulnerable (ReDoS and Prototype Pollution)
|
**Withdrawn**
GitHub has withdrawn this advisory in place of GHSA-vh95-rmgr-6w4m and GHSA-6chw-6frg-f759.
The reason for withdrawing is that some mistakes were made during the ingestion of CVE-2020-7598
which caused this advisory to be published with incorrect information.
In order to provide accurate advisory information, new advisories were created:
- minimist: https://github.com/advisories/GHSA-vh95-rmgr-6w4m
- acorn: https://github.com/advisories/GHSA-6chw-6frg-f759
| null |
2021-06-07T23:37:11Z
|
2020-03-13T20:36:16Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-6chw-6frg-f759', 'https://github.com/advisories/GHSA-vh95-rmgr-6w4m', 'https://github.com/advisories/GHSA-7fhm-mqm4-2wp7'}
| null |
GHSA
|
GHSA-79wf-qcqv-r22r
|
Remote code execution in better-macro
|
An issue was discovered in the better-macro crate through 2021-07-22 for Rust. It intentionally demonstrates that remote attackers can execute arbitrary code via proc-macros, and otherwise has no legitimate purpose.
|
{'CVE-2021-38196'}
|
2021-08-25T20:56:00Z
|
2021-08-25T20:56:00Z
|
HIGH
| 9.8
|
{'CWE-94', 'CWE-78'}
|
{'https://github.com/raycar5/better-macro/blob/24ff1702397b9c19bbfa4c660e2316cd77d3b900/src/lib.rs#L36-L38', 'https://rustsec.org/advisories/RUSTSEC-2021-0077.html', 'https://github.com/advisories/GHSA-79wf-qcqv-r22r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38196'}
| null |
GHSA
|
GHSA-9pr3-7449-977r
|
Cross-Site Scripting in express-cart
|
All versions of `harp` are vulnerable to Cross-Site Scripting. In the admin page it is possible to inject arbitrary JavaScript as a new product option, allowing attackers to execute arbitrary code. This is limited to the admin page and does not affect other pages.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-09-27T16:16:55Z
|
2020-09-02T18:21:26Z
|
LOW
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/808', 'https://github.com/advisories/GHSA-9pr3-7449-977r', 'https://hackerone.com/reports/395944'}
| null |
GHSA
|
GHSA-77jf-fjjf-xcww
|
Invalid Curve Attack in openpgp
|
Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may exfiltrate the victim's private key by choosing the altered curve. An attack requires the attacker being able to initiate message decryption and record the result. Furthermore the victim's key must offer an ECDH public key.
## Recommendation
Upgrade to version 4.3.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
|
{'CVE-2019-9155'}
|
2021-07-27T21:15:19Z
|
2019-08-23T21:42:22Z
|
MODERATE
| 5.9
|
{'CWE-327'}
|
{'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0', 'https://github.com/advisories/GHSA-77jf-fjjf-xcww', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1', 'https://www.npmjs.com/advisories/1159', 'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9155', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460225', 'https://github.com/openpgpjs/openpgpjs/pull/853', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}
| null |
GHSA
|
GHSA-f3rf-v9qm-9c89
|
Cross-site Scripting in the femanager TYPO3 extension
|
The extension allows by default to upload SVG files when a logged in frontend user uploads a new profile image. This may lead to Cross-Site Scripting, when the uploaded SVG image is used as is on the website.
Note: If SVG uploads are required, it is recommended to use the TYPO3 extension svg_sanitizer (added to TYPO3 core since versions 9.5.28, 10.4.18 and 11.3.0) to prevent upload of malicious SVG files or to set up a strict Content Security Policy for the destination folder of uploaded images.
|
{'CVE-2021-36787'}
|
2022-01-26T22:27:17Z
|
2021-09-01T18:36:51Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36787', 'https://typo3.org/help/security-advisories/security', 'https://github.com/advisories/GHSA-f3rf-v9qm-9c89', 'https://extensions.typo3.org/extension/femanager/', 'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2', 'http://seclists.org/fulldisclosure/2022/Jan/53', 'http://packetstormsecurity.com/files/165675/TYPO3-femanager-6.3.0-Cross-Site-Scripting.html', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-010', 'https://github.com/in2code-de/femanager/releases/tag/6.3.1'}
| null |
GHSA
|
GHSA-v8v8-6859-qxm4
|
Arbitrary shell command execution in logkitty
|
Lack of output sanitization allowed an attack to execute arbitrary shell commands via the logkitty npm package before version 0.7.1.
|
{'CVE-2020-8149'}
|
2021-01-08T20:12:59Z
|
2020-06-05T14:47:02Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-v8v8-6859-qxm4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8149', 'https://github.com/zamotany/logkitty/pull/18', 'https://hackerone.com/reports/825729', 'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'}
| null |
GHSA
|
GHSA-26hm-r6mg-963c
|
SQL Injection in JeecgBoot
|
In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. A patch has been released on the repository's `master` branch.
|
{'CVE-2021-46089'}
|
2022-02-10T22:58:39Z
|
2022-01-26T00:01:25Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0', 'https://github.com/advisories/GHSA-26hm-r6mg-963c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46089', 'https://github.com/jeecgboot/jeecg-boot/issues/3331'}
| null |
GHSA
|
GHSA-jjhg-qw5v-r8xx
|
Malicious Package in anarchy
|
All versions of `anarchy` contain malicious code. The package ran `rm - rf /` as an install script.
## Recommendation
Remove the package from your environment.
| null |
2021-09-30T20:06:05Z
|
2020-09-03T19:01:20Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-jjhg-qw5v-r8xx', 'https://www.npmjs.com/advisories/1089'}
| null |
GHSA
|
GHSA-74cr-77xc-8g6r
|
Prototype Pollution in @apollo/gateway
|
Versions of `@apollo/gateway` prior to 0.6.2 are vulnerable to Prototype Pollution. The package uses deepMerge() to merge objects, which may allow attackers to alter the Object prototype through queries with GraphQL aliases. Carefully constructed payloads can override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution.
## Recommendation
Upgrade to version 0.6.2 or later.
| null |
2021-08-16T15:28:22Z
|
2019-06-13T20:37:39Z
|
HIGH
| 7.3
|
{'CWE-400', 'CWE-1321'}
|
{'https://www.npmjs.com/advisories/917', 'https://github.com/apollographql/apollo-server/pull/2779', 'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1', 'https://github.com/advisories/GHSA-74cr-77xc-8g6r', 'https://snyk.io/vuln/SNYK-JS-APOLLOGATEWAY-174915'}
| null |
GHSA
|
GHSA-9c8w-jrw3-q2c3
|
Cross-site Scripting in OWASP AntiSamy
|
OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with : as the replacement for the : character.
|
{'CVE-2021-35043'}
|
2022-04-22T15:44:45Z
|
2021-08-02T16:58:43Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/nahsra/antisamy/releases/tag/v1.6.4', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/nahsra/antisamy/pull/87', 'https://github.com/advisories/GHSA-9c8w-jrw3-q2c3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35043', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-h2fj-77wh-fh5w
|
Cross-site Scripting in livehelperchat
|
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
|
{'CVE-2022-0612'}
|
2022-02-24T13:52:13Z
|
2022-02-17T00:00:36Z
|
MODERATE
| 6.7
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/eadcf7d2-a479-4901-abcc-1505d3f1b32f', 'https://github.com/advisories/GHSA-h2fj-77wh-fh5w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0612', 'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'}
| null |
GHSA
|
GHSA-5q75-cxcq-wr26
|
Low severity vulnerability that affects org.apache.jspwiki:jspwiki-war
|
A carefully crafted URL could trigger an XSS vulnerability on Apache JSPWiki, from versions up to 2.10.5, which could lead to session hijacking.
|
{'CVE-2018-20242'}
|
2021-09-01T22:19:14Z
|
2019-02-12T17:26:07Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/8ee4644432c0a433c5c514a57d940cf6dcb0a0094acd97b36290f0b4@%3Cuser.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20242', 'http://www.securityfocus.com/bid/106804', 'https://github.com/advisories/GHSA-5q75-cxcq-wr26'}
| null |
GHSA
|
GHSA-h4m4-pgp4-whgm
|
The reset password form reveal users email address
|
### Impact
The reset password form reveals the email address of users just by giving their username.
### Patches
The problem has been patched on XWiki 13.2RC1.
### Workarounds
It's possible to manually modify the `resetpasswordinline.vm` to perform the changes made in https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2
### References
https://jira.xwiki.org/browse/XWIKI-18400
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xiwki.org)
* Email us at [Security ML](mailto:security@xwiki.org)
|
{'CVE-2021-32731'}
|
2021-07-13T14:00:59Z
|
2021-07-02T19:19:04Z
|
MODERATE
| 5.3
|
{'CWE-200', 'CWE-668'}
|
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4m4-pgp4-whgm', 'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32731', 'https://github.com/advisories/GHSA-h4m4-pgp4-whgm', 'https://jira.xwiki.org/browse/XWIKI-18400'}
| null |
GHSA
|
GHSA-4rcq-jv2f-898j
|
Incorrect Provision of Specified Functionality in qutebrowser
|
# Description
After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (`colors.statusbar.url.warn.fg`). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (`colors.statusbar.url.success_https`). While the user already has seen a certificate error prompt at this point (or set `content.ssl_strict` to `false` which is not recommended), this could still provide a false sense of security.
# Affected versions and patches
All versions of qutebrowser are believed to be affected, though versions before v0.11.x couldn't be tested.
The issue is fixed in qutebrowser v1.11.1 (pending release) and v1.12.0 (unreleased). Backported patches for older versions are available, but no further releases are planned.
# Mitigation
If you are unable to upgrade:
- Treat any host with a certificate exception as insecure, ignoring the URL color
- Or set `content.ssl_strict` to `True` (instead of `'ask'`), preventing certificate exceptions
# References
- qutebrowser issue: https://github.com/qutebrowser/qutebrowser/issues/5403
- Fix (master branch): https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975
- Related issue for KDE Falkon: https://bugs.kde.org/show_bug.cgi?id=420902
- Related issue for eric6 Web Browser: https://tracker.die-offenbachs.homelinux.org/eric/issue328 (fixed in eric6 20.6)
|
{'CVE-2020-11054'}
|
2022-04-19T19:02:25Z
|
2020-05-08T19:05:05Z
|
LOW
| 3.5
|
{'CWE-684'}
|
{'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j', 'https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975', 'https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKAZOOTJ2MBHTYVYQQ52NL53F5CB2XAP/', 'https://bugs.kde.org/show_bug.cgi?id=420902', 'https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478', 'https://github.com/qutebrowser/qutebrowser/issues/5403', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11054', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7YWJ5QNHXKTGG5NLV7EGEOKPBVZBA5GS/', 'https://tracker.die-offenbachs.homelinux.org/eric/issue328', 'https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467', 'https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864', 'https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327', 'https://github.com/qutebrowser/qutebrowser/commit/1b7946ed14b386a24db050f2d6dba81ba6518755', 'https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8', 'https://github.com/qutebrowser/qutebrowser/commit/a45ca9c788f648d10cccce2af41405bf25ee2948', 'https://github.com/advisories/GHSA-4rcq-jv2f-898j', 'https://github.com/qutebrowser/qutebrowser/commit/9bd1cf585fccdfe8318fff7af793730e74a04db3'}
| null |
GHSA
|
GHSA-vf23-f26f-mjj9
|
Moderate severity vulnerability that affects yourls/yourls
|
## Type juggling vulnerability in the API
### Impact
YOURLS through 1.7.3 is affected by a type juggling vulnerability in the API component that can result in login bypass.
### Patches
https://github.com/YOURLS/YOURLS/releases/tag/1.7.4
https://github.com/YOURLS/YOURLS/pull/2542
### References
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14537
* https://github.com/Wocanilo/CVE-2019-14537
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [YOURLS repository](https://github.com/YOURLS/YOURLS)
|
{'CVE-2019-14537'}
|
2021-09-20T21:42:52Z
|
2019-09-23T18:32:02Z
|
CRITICAL
| 9.8
|
{'CWE-843'}
|
{'https://github.com/YOURLS/YOURLS/commits/master', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS/releases', 'https://github.com/YOURLS/YOURLS/pull/2542', 'https://github.com/Wocanilo/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS/security/advisories/GHSA-vf23-f26f-mjj9', 'https://security-garage.com/index.php/cves/cve-2019-14537-api-authentication-bypass-via-type-juggling', 'https://github.com/advisories/GHSA-vf23-f26f-mjj9'}
| null |
GHSA
|
GHSA-4pww-fqgh-36hj
|
Unrestricted Upload of File with Dangerous Type in Croogo
|
A Remote Code Execution (RCE) vulnerability exists in Croogo 3.0.2 via admin/file-manager/attachments, which lets a malicious user upload a web shell script.
|
{'CVE-2021-44673'}
|
2022-03-29T21:06:52Z
|
2022-03-11T00:02:02Z
|
HIGH
| 8.8
|
{'CWE-434'}
|
{'https://github.com/advisories/GHSA-4pww-fqgh-36hj', 'https://github.com/3erk1n/Vulnerabilities', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44673'}
| null |
GHSA
|
GHSA-wpfc-3w63-g4hm
|
Malicious Package in axois
|
All versions of `axois` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
| null |
2021-10-01T13:28:36Z
|
2020-09-01T21:09:48Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/683', 'https://github.com/advisories/GHSA-wpfc-3w63-g4hm'}
| null |
GHSA
|
GHSA-xr7r-88qv-q7hm
|
Out of bounds write in serde_cbor
|
An issue was discovered in the serde_cbor crate before 0.10.2 for Rust. The CBOR deserializer can cause stack consumption via nested semantic tags.
|
{'CVE-2019-25001'}
|
2021-08-25T20:45:51Z
|
2021-08-25T20:45:51Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/pyfisch/cbor/releases/tag/v0.10.2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25001', 'https://github.com/advisories/GHSA-xr7r-88qv-q7hm', 'https://rustsec.org/advisories/RUSTSEC-2019-0025.html'}
| null |
GHSA
|
GHSA-3pqx-4fqf-j49f
|
Deserialization of Untrusted Data in PyYAML
|
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
|
{'CVE-2019-20477'}
|
2022-01-04T19:50:38Z
|
2021-04-20T16:40:42Z
|
HIGH
| 9.8
|
{'CWE-502'}
|
{'https://www.exploit-db.com/download/47655', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20477', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/', 'https://github.com/yaml/pyyaml/blob/master/CHANGES', 'https://github.com/advisories/GHSA-3pqx-4fqf-j49f'}
| null |
GHSA
|
GHSA-c5gj-w4hx-gvmx
|
Business Logic Errors in microweber
|
Microweber prior to 1.2.11 can suffer from insecure direct object reference(s). A malicious actor can remove items from a victim's cart.
|
{'CVE-2022-0688'}
|
2022-02-26T01:15:47Z
|
2022-02-21T00:00:21Z
|
LOW
| 2.7
| null |
{'https://github.com/advisories/GHSA-c5gj-w4hx-gvmx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0688', 'https://huntr.dev/bounties/051ec6d4-0b0a-41bf-9ded-27813037c9c9', 'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'}
| null |
GHSA
|
GHSA-3qr6-qrqm-8v86
|
Integer Overflow or Wraparound in Microweber
|
In Microweber prior to 1.2.12, a user can create an account with a password thousands of characters in length, leading to memory corruption/integer overflow. Version 1.2.2 sets maximum password length at 500 characters.
|
{'CVE-2022-1036'}
|
2022-03-30T20:49:26Z
|
2022-03-23T00:00:23Z
|
HIGH
| 7.5
|
{'CWE-190'}
|
{'https://github.com/advisories/GHSA-3qr6-qrqm-8v86', 'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a', 'https://huntr.dev/bounties/db615581-d5a9-4ca5-a3e9-7a39eceaa424', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1036'}
| null |
GHSA
|
GHSA-g5mm-vmx4-3rg7
|
Improper handling of case sensitivity in Spring Framework
|
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. Versions 5.3.19 and 5.2.21 contain a patch for this issue.
|
{'CVE-2022-22968'}
|
2022-04-22T20:46:00Z
|
2022-04-15T00:00:32Z
|
LOW
| 0
|
{'CWE-178'}
|
{'https://github.com/advisories/GHSA-g5mm-vmx4-3rg7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22968', 'https://tanzu.vmware.com/security/cve-2022-22968'}
| null |
GHSA
|
GHSA-wqq8-mqj9-697f
|
PrestaShop autoupgrade module ZIP archives were vulnerable from CVE-2017-9841
|
### Impact
We have identified that some autoupgrade module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
This vulnerability impacts
- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841)
- phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers)
You can read PrestaShop official statement about this vulnerability [here](https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/).
### Patches
In the [security patch](https://github.com/PrestaShop/autoupgrade/releases/tag/v4.10.1), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading.
### Workarounds
Users can also simply remove the unwanted vendor/phpunit folder.
### References
https://nvd.nist.gov/vuln/detail/CVE-2017-9841
### For more information
If you have any questions or comments about this advisory, email us at security@prestashop.com
| null |
2020-01-08T03:10:30Z
|
2020-01-08T03:10:30Z
|
HIGH
| 0
| null |
{'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32', 'https://github.com/advisories/GHSA-wqq8-mqj9-697f', 'https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f'}
| null |
GHSA
|
GHSA-gf7h-vg5v-cch6
|
Directory Traversal in ritp
|
Affected versions of `ritp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16198'}
|
2021-09-10T20:50:57Z
|
2018-08-06T20:03:21Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/432', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ritp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16198', 'https://nodesecurity.io/advisories/432', 'https://github.com/advisories/GHSA-gf7h-vg5v-cch6'}
| null |
GHSA
|
GHSA-337x-4q8g-prc5
|
Low severity vulnerability that affects django
|
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.
|
{'CVE-2019-3498'}
|
2021-07-22T22:30:17Z
|
2019-01-14T16:20:05Z
|
MODERATE
| 6.5
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3498', 'https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://github.com/advisories/GHSA-337x-4q8g-prc5', 'https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ', 'http://www.securityfocus.com/bid/106453', 'https://www.djangoproject.com/weblog/2019/jan/04/security-releases/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/', 'https://usn.ubuntu.com/3851-1/', 'https://www.debian.org/security/2019/dsa-4363'}
| null |
GHSA
|
GHSA-3vjm-36rr-7qrq
|
NULL Pointer Dereference in cbox
|
An issue was discovered in the cbox crate through 2020-03-19 for Rust. The CBox API allows dereferencing raw pointers without a requirement for unsafe code.
|
{'CVE-2020-35860'}
|
2021-08-25T20:47:16Z
|
2021-08-25T20:47:16Z
|
CRITICAL
| 9.8
|
{'CWE-476'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35860', 'https://github.com/TomBebbington/cbox-rs/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2020-0005.html', 'https://github.com/advisories/GHSA-3vjm-36rr-7qrq'}
| null |
GHSA
|
GHSA-qhh5-9738-g9mx
|
Incorrect Default Permissions in Apache DolphinScheduler
|
Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any tenant to override another users password through the API interface.
|
{'CVE-2020-13922'}
|
2022-02-09T22:26:32Z
|
2022-02-09T22:26:32Z
|
MODERATE
| 6.5
|
{'CWE-276'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13922', 'https://github.com/advisories/GHSA-qhh5-9738-g9mx', 'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1', 'https://www.mail-archive.com/announce@apache.org/msg06076.html'}
| null |
GHSA
|
GHSA-x2mc-8fgj-3wmr
|
Improper Input Validation in tar-fs
|
A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content.
|
{'CVE-2018-20835'}
|
2021-08-03T21:27:51Z
|
2019-05-01T18:37:18Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://github.com/mafintosh/tar-fs/compare/d590fc7...a35ce2f', 'https://hackerone.com/reports/344595', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835', 'https://github.com/advisories/GHSA-x2mc-8fgj-3wmr', 'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'}
| null |
GHSA
|
GHSA-gwrp-pvrq-jmwv
|
Path Traversal and Improper Input Validation in Apache Commons IO
|
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
|
{'CVE-2021-29425'}
|
2022-04-22T18:28:57Z
|
2021-04-26T16:04:00Z
|
MODERATE
| 5.3
|
{'CWE-20', 'CWE-22'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E', 'https://issues.apache.org/jira/browse/IO-556', 'https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29425', 'https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-gwrp-pvrq-jmwv', 'https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html', 'https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0004/', 'https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E'}
| null |
GHSA
|
GHSA-w46j-8hm6-h8mm
|
XSS in apexcharts
|
The package apexcharts before 3.24.0 are vulnerable to Cross-site Scripting (XSS) via lack of sanitization of graph legend fields.
|
{'CVE-2021-23327'}
|
2021-02-11T20:47:34Z
|
2021-02-11T20:47:34Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/apexcharts/apexcharts.js/pull/2158', 'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19', 'https://github.com/advisories/GHSA-w46j-8hm6-h8mm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23327', 'https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708', 'https://www.npmjs.com/package/apexcharts', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616'}
| null |
GHSA
|
GHSA-mp9m-g7qj-6vqr
|
Unauthorized privilege escalation in Mod module
|
### Impact
An unauthorized privilege escalation exploit has been discovered in the Mod module: this exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it's possible to perform destructive actions within the guild the user has high privileges in.
### Patches
This exploit has been fixed on version & ``3.4.1``.
### Workarounds
Unloading the Mod module with ``unload mod`` __or__, disabling the ``massban`` command with ``command disable global massban`` can render this exploit not accessible. We still highly recommend updating to ``3.4.1`` to completely patch this issue.
### References
* https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot)
* Over on our [Discord server](https://discord.gg/red)
| null |
2022-04-19T19:02:39Z
|
2020-10-27T20:30:48Z
|
MODERATE
| 0
|
{'CWE-285'}
|
{'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-mp9m-g7qj-6vqr', 'https://pypi.org/project/Red-DiscordBot/', 'https://github.com/Cog-Creators/Red-DiscordBot/releases/tag/3.4.1', 'https://github.com/advisories/GHSA-mp9m-g7qj-6vqr', 'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'}
| null |
GHSA
|
GHSA-x2fr-v8wf-8wwv
|
High severity vulnerability that affects ruby-saml
|
OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
|
{'CVE-2017-11428'}
|
2021-01-14T21:18:59Z
|
2019-07-05T21:11:35Z
|
HIGH
| 7.7
|
{'CWE-287'}
|
{'https://github.com/advisories/GHSA-x2fr-v8wf-8wwv', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11428', 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations', 'https://www.kb.cert.org/vuls/id/475445'}
| null |
GHSA
|
GHSA-7774-7vr3-cc8j
|
Authorization Policy Bypass Due to Case Insensitive Host Comparison
|
### Impact
According to [RFC 4343](https://datatracker.ietf.org/doc/html/rfc4343), Istio authorization policy should compare the hostname in the HTTP Host header in a case insensitive way, but currently the comparison is case sensitive. The Envoy proxy will route the request hostname in a case-insensitive way which means the authorization policy could be bypassed.
As an example, the user may have an authorization policy that rejects request with hostname "httpbin.foo" for some source IPs, but the attacker can bypass this by sending the request with hostname "Httpbin.Foo".
### Patches
* Istio 1.11.1 and above
* Istio 1.10.4 and above
* Istio 1.9.8 and above
### Workarounds
A Lua filter may be written to normalize Host header before the authorization check. This is similar to the Path normalization presented in the [Security Best Practices](https://istio.io/latest/docs/ops/best-practices/security/#case-normalization) guide.
### References
More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2021-008).
### For more information
If you have any questions or comments about this advisory, please email us at istio-security-vulnerability-reports@googlegroups.com
|
{'CVE-2021-39155'}
|
2022-04-19T19:03:05Z
|
2021-08-30T16:15:56Z
|
HIGH
| 8.3
|
{'CWE-178'}
|
{'https://github.com/istio/istio/security/advisories/GHSA-7774-7vr3-cc8j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39155', 'https://github.com/advisories/GHSA-7774-7vr3-cc8j', 'https://datatracker.ietf.org/doc/html/rfc4343'}
| null |
GHSA
|
GHSA-4q96-6xhq-ff43
|
malicious SVG attachment causing stored XSS vulnerability
|
### Impact
An attacker with `write` permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki.
### Patches
Users are strongly advised to upgrade to a patched version.
MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.
### Workarounds
It is not advised to work around this, but to upgrade MoinMoin to a patched version.
That said, a work around via a Content Security Policy in the web server might be possible.
Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users.
### For more information
If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de).
### Credits
This vulnerability was discovered by:
Catarina Leite from the Checkmarx SCA AppSec team
|
{'CVE-2020-15275'}
|
2021-04-05T20:33:18Z
|
2020-11-11T15:54:41Z
|
LOW
| 8.7
|
{'CWE-79'}
|
{'https://advisory.checkmarx.net/advisory/CX-2020-4285', 'https://pypi.org/project/moin/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15275', 'https://github.com/advisories/GHSA-4q96-6xhq-ff43', 'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2', 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-4q96-6xhq-ff43', 'https://github.com/moinwiki/moin-1.9/releases/tag/1.9.11'}
| null |
GHSA
|
GHSA-9c2j-593q-3g82
|
Moderate severity vulnerability that affects activesupport
|
The ActiveSupport::XmlMini_JDOM backend in lib/active_support/xml_mini/jdom.rb in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference.
|
{'CVE-2013-1856'}
|
2021-09-07T21:16:06Z
|
2017-10-24T18:33:37Z
|
MODERATE
| 0
|
{'CWE-20'}
|
{'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1856', 'https://github.com/advisories/GHSA-9c2j-593q-3g82', 'http://support.apple.com/kb/HT5784', 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/', 'https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source&output=gplain'}
| null |
GHSA
|
GHSA-hjcp-j389-59ff
|
Regular Expression Denial of Service in marked
|
Versions 0.3.3 and earlier of `marked` are affected by a regular expression denial of service ( ReDoS ) vulnerability when passed inputs that reach the `em` inline rule.
## Recommendation
Update to version 0.3.4 or later.
|
{'CVE-2015-8854'}
|
2021-09-14T17:23:55Z
|
2017-10-24T18:33:36Z
|
HIGH
| 7.5
| null |
{'https://github.com/chjj/marked/issues/497', 'https://www.npmjs.com/advisories/23', 'https://nodesecurity.io/advisories/23', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8854', 'https://support.f5.com/csp/article/K05052081?utm_source=f5support&utm_medium=RSS', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/', 'https://github.com/advisories/GHSA-hjcp-j389-59ff', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS'}
| null |
GHSA
|
GHSA-38fc-wpqx-33j7
|
Uncontrolled Resource Consumption in trim-off-newlines
|
All versions of package trim-off-newlines are vulnerable to Regular Expression Denial of Service (ReDoS) via string processing.
|
{'CVE-2021-23425'}
|
2022-01-19T15:04:43Z
|
2021-09-02T17:15:42Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://github.com/stevemao/trim-off-newlines/pull/3', 'https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23425', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197', 'https://github.com/advisories/GHSA-38fc-wpqx-33j7', 'https://github.com/stevemao/trim-off-newlines/blob/master/index.js%23L6'}
| null |
GHSA
|
GHSA-ghpq-vjxw-ch5w
|
Use after free in libpulse-binding
|
### Overview
Version 1.2.1 of the `libpulse-binding` Rust crate, released on the 15th of June 2018, fixed a pair of use-after-free issues with the objects returned by the `get_format_info` and `get_context` methods of `Stream` objects. These objects were mistakenly being constructed without setting an important flag to prevent destruction of the underlying C objects they reference upon their own destruction.
This advisory is being written retrospectively, having previously only been noted in the changelog. No CVE assignment was sought.
### Patches
Users are required to update to version 1.2.1 or newer.
Versions older than 1.2.1 have been yanked from crates.io. This was believed to have already been done at the time of the 1.2.1 release, but upon double checking now they were found to still be available, so has been done now (22nd October 2020).
| null |
2021-08-25T20:56:52Z
|
2021-08-25T20:56:52Z
|
HIGH
| 0
|
{'CWE-416'}
|
{'https://github.com/jnqnfe/pulse-binding-rust/security/advisories/GHSA-ghpq-vjxw-ch5w', 'https://github.com/advisories/GHSA-ghpq-vjxw-ch5w', 'https://rustsec.org/advisories/RUSTSEC-2018-0021.html'}
| null |
GHSA
|
GHSA-28w5-j8xj-2xwc
|
Cross-site Scripting in the yoast_seo TYPO3 extension
|
The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.
|
{'CVE-2021-36788'}
|
2021-09-01T18:36:44Z
|
2021-09-01T18:36:44Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-012', 'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590', 'https://github.com/advisories/GHSA-28w5-j8xj-2xwc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36788'}
| null |
GHSA
|
GHSA-f2vv-h5x4-57gr
|
Leak of information via Store-API
|
### Impact
Leak of information via Store-API
### Patches
We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information.
https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021
| null |
2021-10-05T16:12:45Z
|
2021-02-10T02:32:21Z
|
CRITICAL
| 0
|
{'CWE-202'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr', 'https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351', 'https://github.com/advisories/GHSA-f2vv-h5x4-57gr', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021', 'https://packagist.org/packages/shopware/platform'}
| null |
GHSA
|
GHSA-jqwc-jm56-wcwj
|
Cross-site scripting in Jupyter Notebook
|
Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.
|
{'CVE-2018-21030'}
|
2021-05-11T16:19:12Z
|
2019-11-08T17:07:42Z
|
MODERATE
| 5.3
|
{'CWE-79'}
|
{'https://github.com/jupyter/notebook/releases/tag/5.5.0', 'https://github.com/jupyter/notebook/pull/3341', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21030', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'https://github.com/advisories/GHSA-jqwc-jm56-wcwj'}
| null |
GHSA
|
GHSA-rwr3-c2q8-gm56
|
Moderate severity vulnerability that affects Pillow
|
Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the Image.core.map_buffer in map.c component.
|
{'CVE-2016-9189'}
|
2021-09-20T14:45:13Z
|
2018-07-24T20:08:27Z
|
MODERATE
| 5.5
|
{'CWE-190'}
|
{'https://github.com/python-pillow/Pillow/issues/2105', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9189', 'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html', 'http://www.securityfocus.com/bid/94234', 'http://www.debian.org/security/2016/dsa-3710', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/advisories/GHSA-rwr3-c2q8-gm56', 'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'}
| null |
GHSA
|
GHSA-wrvc-72w7-xpmj
|
Incorrect Comparison in sodiumoxide
|
An issue was discovered in the sodiumoxide crate before 0.2.5 for Rust. generichash::Digest::eq compares itself to itself and thus has degenerate security properties.
|
{'CVE-2019-25002'}
|
2021-08-25T20:45:54Z
|
2021-08-25T20:45:54Z
|
CRITICAL
| 9.8
|
{'CWE-697'}
|
{'https://github.com/sodiumoxide/sodiumoxide/pull/381/commits/fae052b834b097ced9a89a8fff8466e18f383070', 'https://github.com/advisories/GHSA-wrvc-72w7-xpmj', 'https://github.com/sodiumoxide/sodiumoxide/pull/381', 'https://rustsec.org/advisories/RUSTSEC-2019-0026.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25002'}
| null |
GHSA
|
GHSA-jr37-66pj-36v7
|
Cross-site Scripting in DayByDay CRM
|
In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.
|
{'CVE-2022-22109'}
|
2022-01-10T21:46:19Z
|
2022-01-08T00:32:00Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-jr37-66pj-36v7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22109', 'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109'}
| null |
GHSA
|
GHSA-gqgv-6jq5-jjj9
|
Prototype Pollution Protection Bypass in qs
|
Affected version of `qs` are vulnerable to Prototype Pollution because it is possible to bypass the protection. The `qs.parse` function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing `[` or `]` may bypass the prototype pollution protection and alter the Object prototype. This allows attackers to override properties that will exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances.
## Recommendation
Upgrade to 6.0.4, 6.1.2, 6.2.3, 6.3.2 or later.
|
{'CVE-2017-1000048'}
|
2021-08-25T21:03:57Z
|
2020-04-30T17:16:47Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://access.redhat.com/errata/RHSA-2017:2672', 'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d', 'https://github.com/advisories/GHSA-gqgv-6jq5-jjj9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000048', 'https://snyk.io/vuln/npm:qs:20170213', 'https://www.npmjs.com/advisories/1469', 'https://github.com/ljharb/qs/issues/200'}
| null |
GHSA
|
GHSA-4jm3-pfpf-h54p
|
espeak-ruby allows arbitrary command execution
|
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
|
{'CVE-2016-10193'}
|
2022-04-25T20:39:16Z
|
2017-10-24T18:33:35Z
|
CRITICAL
| 9.8
|
{'CWE-284'}
|
{'http://www.openwall.com/lists/oss-security/2017/01/31/14', 'https://github.com/dejan/espeak-ruby/issues/7', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193', 'https://github.com/advisories/GHSA-4jm3-pfpf-h54p', 'http://www.openwall.com/lists/oss-security/2017/02/02/5'}
| null |
GHSA
|
GHSA-7wgh-5q4q-6wx5
|
Malicious Package in 1337qq-js
|
All versions of `1337qq-js` contain malicious code. The package exfiltrates sensitive information through install scripts. It targets UNIX systems. The information exfiltrated includes:
- Environment variables
- Running processes
- /etc/hosts
- uname -a
- npmrc file
## Recommendation
Remove the package from your system and rotate any compromised credentials.
| null |
2021-10-04T20:47:21Z
|
2020-09-04T17:30:39Z
|
CRITICAL
| 0
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-7wgh-5q4q-6wx5', 'https://www.npmjs.com/advisories/1455'}
| null |
GHSA
|
GHSA-66ww-999q-mffq
|
Arbitrary code execution in post-loader
|
post-loader is webpack loader for blog posts written in Markdown. The package post-loader from 0.0.0 is vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed. At this time, there is no known workaround or patch available.
|
{'CVE-2022-0748'}
|
2022-03-25T14:29:34Z
|
2022-03-18T00:01:11Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0748', 'https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737', 'https://github.com/advisories/GHSA-66ww-999q-mffq'}
| null |
GHSA
|
GHSA-5chj-xprr-7qqx
|
Cross-site Scripting in GwtUpload
|
The file-upload feature in GwtUpload 1.0.3 allows XSS via a crafted filename.
|
{'CVE-2020-9447'}
|
2022-01-04T19:33:29Z
|
2021-04-22T16:15:33Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-5chj-xprr-7qqx', 'https://github.com/manolo/gwtupload/issues/32', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9447', 'https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality'}
| null |
GHSA
|
GHSA-fc38-mxwr-pfhx
|
Cross-Site Scripting via SVG media files
|
### Impact
Cross-Site Scripting via SVG media files
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
{'CVE-2021-37710'}
|
2021-08-23T19:43:00Z
|
2021-08-23T19:43:00Z
|
HIGH
| 8
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-fc38-mxwr-pfhx', 'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37710', 'https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx'}
| null |
GHSA
|
GHSA-hf55-c445-2w97
|
Cross-site Scripting in @rocket.chat/livechat
|
A blind self XSS vulnerability exists in RocketChat LiveChat versions lower than 1.9 that could allow an attacker to trick a victim pasting malicious code in their chat instance.
|
{'CVE-2022-21830'}
|
2022-04-15T16:57:08Z
|
2022-04-03T00:01:00Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21830', 'https://github.com/advisories/GHSA-hf55-c445-2w97', 'https://hackerone.com/reports/1091118', 'https://github.com/RocketChat/Rocket.Chat.Livechat/releases/tag/v1.9.0', 'https://github.com/RocketChat/Rocket.Chat.Livechat/pull/558'}
| null |
GHSA
|
GHSA-pf46-gqg9-j3v3
|
Insufficient Entropy in DotNetNuke
|
DNN (aka DotNetNuke) 9.2 through 9.2.1 incorrectly converts encryption key source values, resulting in lower than expected entropy.
|
{'CVE-2018-15812'}
|
2021-08-17T16:06:34Z
|
2019-07-05T21:08:24Z
|
HIGH
| 7.5
|
{'CWE-331'}
|
{'https://www.dnnsoftware.com/community/security/security-center', 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://github.com/dnnsoftware/Dnn.Platform/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15812', 'https://github.com/advisories/GHSA-pf46-gqg9-j3v3'}
| null |
GHSA
|
GHSA-v39p-96qg-c8rf
|
Prototype Pollution in object-path
|
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.
|
{'CVE-2021-23434'}
|
2021-10-05T16:03:38Z
|
2021-09-01T18:37:11Z
|
MODERATE
| 5.6
|
{'CWE-843', 'CWE-1321'}
|
{'https://github.com/advisories/GHSA-v39p-96qg-c8rf', 'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423', 'https://github.com/mariocasciaro/object-path#0116', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453', 'https://github.com/mariocasciaro/object-path%230116', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23434'}
| null |
GHSA
|
GHSA-gg6m-fhqv-hg56
|
Denial of Service in yar
|
Versions of `yar` prior to 2.2.0 are affected by a denial of service vulnerability related to an invalid encrypted session cookie value.
When an invalid encryped session cookie value is provided, the process will crash.
## Recommendation
Update to version 2.2.0 or later.
|
{'CVE-2014-4179'}
|
2021-09-23T21:04:52Z
|
2020-09-01T15:15:36Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/44', 'https://github.com/advisories/GHSA-gg6m-fhqv-hg56', 'https://nvd.nist.gov/vuln/detail/CVE-2014-4179', 'https://github.com/spumko/yar/issues/34'}
| null |
GHSA
|
GHSA-r89v-cgv7-3jhx
|
Bypass of fix for CVE-2020-15247, Twig sandbox escape
|
### Impact
A bypass of CVE-2020-15247 (fixed in 1.0.469 and 1.1.0) was discovered that has the same impact as CVE-2020-15247:
An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP.
This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP.
### Patches
Issue has been patched in Build 470 (v1.0.470) and v1.1.1.
### Workarounds
Apply https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7 to your installation manually if unable to upgrade to Build 470 or v1.1.1.
### References
Reported by [ka1n4t](https://github.com/ka1n4t)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1108" alt="Screen Shot 2020-10-10 at 1 21 13 PM" src="https://user-images.githubusercontent.com/7253840/95663316-7de28b80-0afb-11eb-999d-a6526cf78709.png">
|
{'CVE-2020-26231'}
|
2022-04-19T19:02:40Z
|
2020-11-23T20:54:18Z
|
LOW
| 5.2
|
{'CWE-862'}
|
{'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7', 'https://github.com/advisories/GHSA-94vp-rmqv-5875', 'https://github.com/octobercms/october/security/advisories/GHSA-r89v-cgv7-3jhx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26231', 'https://github.com/advisories/GHSA-r89v-cgv7-3jhx'}
| null |
GHSA
|
GHSA-jm5c-rv3w-w83m
|
Denial of service in geth
|
### Impact
Denial-of-service (crash) during block processing
### Details
Affected versions suffer from a vulnerability which can be exploited through the `MULMOD` operation, by specifying a modulo of `0`: `mulmod(a,b,0)`, causing a `panic` in the underlying library.
The crash was in the `uint256` library, where a buffer [underflowed](https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L442).
if `d == 0`, `dLen` remains `0`
and https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L451 will try to access index `[-1]`.
The `uint256` library was first merged in this [commit](https://github.com/ethereum/go-ethereum/commit/cf6674539c589f80031f3371a71c6a80addbe454), on 2020-06-08.
Exploiting this vulnerabilty would cause all vulnerable nodes to drop off the network.
The issue was brought to our attention through a [bug report](https://github.com/ethereum/go-ethereum/issues/21367), showing a `panic` occurring on sync from genesis on the Ropsten network.
It was estimated that the least obvious way to fix this would be to merge the fix into `uint256`, make a new release of that library and then update the geth-dependency.
- https://github.com/holiman/uint256/releases/tag/v1.1.1 was made the same day,
- PR to address the issue: https://github.com/holiman/uint256/pull/80
- PR to update geth deps: https://github.com/ethereum/go-ethereum/pull/21368
### Patches
Upgrade to v1.9.18 or higher
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum)
* Email us at [security@ethereum.org](mailto:security@ethereum.org)
|
{'CVE-2020-26242'}
|
2021-06-29T21:13:20Z
|
2021-06-29T21:13:20Z
|
MODERATE
| 6.5
|
{'CWE-400', 'CWE-191', 'CWE-125'}
|
{'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m', 'https://github.com/advisories/GHSA-jm5c-rv3w-w83m', 'https://blog.ethereum.org/2020/11/12/geth_security_release/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26242'}
| null |
GHSA
|
GHSA-8h8v-6qqm-fwpq
|
Path Traversal in express-cart
|
Versions of `express-cart` before 1.1.7 are vulnerable to Path Traversal.
## Recommendation
Update to version 1.1.7 or later.
| null |
2021-09-24T20:41:18Z
|
2020-09-01T21:06:38Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://hackerone.com/reports/343726', 'https://github.com/advisories/GHSA-8h8v-6qqm-fwpq', 'https://www.npmjs.com/advisories/676'}
| null |
GHSA
|
GHSA-jp46-fw6c-3pm9
|
Directory Traversal in scott-blanch-weather-app
|
Affected versions of `scott-blanch-weather-app` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16184'}
|
2021-01-14T15:39:21Z
|
2020-09-01T18:46:58Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/scott-blanch-weather-app', 'https://www.npmjs.com/advisories/453', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16184', 'https://github.com/advisories/GHSA-jp46-fw6c-3pm9', 'https://nodesecurity.io/advisories/453'}
| null |
GHSA
|
GHSA-76wf-2xcf-6wmx
|
Malicious Package in ngx-pica
|
Version 1.1.5 of `ngx-pica` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-03T00:31:28Z
|
2020-09-03T00:31:28Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/948', 'https://github.com/advisories/GHSA-76wf-2xcf-6wmx'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.