ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-g2xc-35jw-c63p
|
HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress
|
### Impact
Waitress would parse the `Transfer-Encoding` header and only look for a single string value, if that value was not `chunked` it would fall through and use the `Content-Length` header instead.
According to the HTTP standard `Transfer-Encoding` should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with `chunked`.
Requests sent with:
```
Transfer-Encoding: gzip, chunked
```
Would incorrectly get ignored, and the request would use a `Content-Length` header instead to determine the body size of the HTTP message.
This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining.
### Patches
This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies.
Waitress will now return a 501 Not Implemented error if the `Transfer-Encoding` is not `chunked` or contains multiple elements. Waitress does not support any transfer codings such as `gzip` or `deflate`.
The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don't cause any changes in behavior.
### Workarounds
Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn't use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method).
### Issues/more security issues:
* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)
|
{'CVE-2019-16786'}
|
2022-04-25T23:07:25Z
|
2019-12-20T23:04:18Z
|
HIGH
| 7.1
|
{'CWE-444'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16786', 'https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p', 'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://github.com/advisories/GHSA-g2xc-35jw-c63p', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes', 'https://access.redhat.com/errata/RHSA-2020:0720', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/'}
| null |
GHSA
|
GHSA-7xx3-m584-x994
|
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack
|
## Keepalive thread overload/DoS
### Impact
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack.
If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
### Patches
This vulnerability is patched in Puma 4.3.1 and 3.12.2.
### Workarounds
Reverse proxies in front of Puma could be configured to always allow less than X keepalive connections to a Puma cluster or process, where X is the number of threads configured in Puma's thread pool.
### For more information
If you have any questions or comments about this advisory:
* Open an issue at [puma](github.com/puma/puma).
|
{'CVE-2019-16770'}
|
2021-01-08T19:12:48Z
|
2019-12-05T19:26:37Z
|
MODERATE
| 5.3
|
{'CWE-770'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16770', 'https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994', 'https://github.com/advisories/GHSA-7xx3-m584-x994'}
| null |
GHSA
|
GHSA-6866-x7cf-rmh5
|
Directory Traversal in sencisho
|
Affected versions of `sencisho` are vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16092'}
|
2021-01-08T19:47:05Z
|
2018-07-24T13:50:01Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/340', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/sencisho', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16092', 'https://nodesecurity.io/advisories/340', 'https://github.com/advisories/GHSA-6866-x7cf-rmh5'}
| null |
GHSA
|
GHSA-rch9-xh7r-mqgw
|
Cross-Site Scripting in simple-server
|
Versions of `simple-server` before 1.1.0 are vulnerable to stored cross-site scripting (XSS). This is exploitable if an attacker can control a filename on the server.
## Recommendation
Update to version 1.1.0 or later.
|
{'CVE-2018-3717'}
|
2021-01-08T01:58:09Z
|
2018-07-26T15:08:05Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-rch9-xh7r-mqgw', 'https://hackerone.com/reports/309641', 'https://github.com/JacksonTian/anywhere/issues/33#issuecomment-366527448', 'https://www.npmjs.com/advisories/584', 'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b', 'https://hackerone.com/reports/309394', 'https://www.npmjs.com/advisories/595', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3717'}
| null |
GHSA
|
GHSA-qg54-694p-wgpp
|
Regular expression denial of service vulnerability (ReDoS) in date
|
Date’s parsing methods including Date.parse are using Regexps internally, some of which are vulnerable against regular expression denial of service. Applications and libraries that apply such methods to untrusted input may be affected.
The fix limits the input length up to 128 bytes by default instead of changing the regexps. This is because Date gem uses many Regexps and it is possible that there are still undiscovered vulnerable Regexps. For compatibility, it is allowed to remove the limitation by explicitly passing limit keywords as nil like Date.parse(str, limit: nil), but note that it may take a long time to parse.
Please update the date gem to version 3.2.1, 3.1.2, 3.0.2, and 2.0.1, or later. You can use gem update date to update it. If you are using bundler, please add gem "date", ">= 3.2.1" to your Gemfile. If you import `date` from the standard library rather than as a gem you should update your Ruby install to `3.0.3`, `2.7.5`, `2.6.9` or later.
Users unable to upgrade may consider using `Date.strptime` instead with a predefined date format
```ruby
Date.strptime('2001-02-20', '%Y-%m-%d')
```
|
{'CVE-2021-41817'}
|
2022-03-17T23:00:37Z
|
2021-11-16T00:32:30Z
|
MODERATE
| 0
|
{'CWE-1333'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41817', 'https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/', 'https://hackerone.com/reports/1254844', 'https://github.com/advisories/GHSA-qg54-694p-wgpp', 'https://github.com/ruby/date/commit/3959accef8da5c128f8a8e2fd54e932a4fb253b0'}
| null |
GHSA
|
GHSA-9j59-75qj-795w
|
Path traversal in Pillow
|
If the path to the temporary directory on Linux or macOS contained a space, this would break removal of the temporary image file after im.show() (and related actions), and potentially remove an unrelated file. This been present since PIL.
|
{'CVE-2022-24303'}
|
2022-04-07T15:09:46Z
|
2022-03-11T23:10:32Z
|
CRITICAL
| 9.1
| null |
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W4ZUXPKEX72O3E5IHBPVY5ZCPMJ4GHHV/', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security', 'https://github.com/advisories/GHSA-9j59-75qj-795w', 'https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XR6UP2XONXOVXI4446VY72R63YRO2YTP/', 'https://github.com/python-pillow/Pillow/pull/3450', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24303'}
| null |
GHSA
|
GHSA-v648-p92f-9996
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
|
{'CVE-2019-0925'}
|
2021-03-29T20:57:39Z
|
2021-03-29T20:57:39Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0925', 'https://github.com/advisories/GHSA-v648-p92f-9996', 'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0925'}
| null |
GHSA
|
GHSA-xxr8-833v-c7wc
|
Moderate severity vulnerability that affects rails
|
Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an "html" substring.
|
{'CVE-2011-4319'}
|
2021-09-22T18:27:19Z
|
2017-10-24T18:33:38Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'http://openwall.com/lists/oss-security/2011/11/18/8', 'https://github.com/advisories/GHSA-xxr8-833v-c7wc', 'http://www.securitytracker.com/id?1026342', 'http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released', 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1', 'http://www.securityfocus.com/bid/50722', 'http://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released', 'http://osvdb.org/77199', 'https://nvd.nist.gov/vuln/detail/CVE-2011-4319', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/71364'}
| null |
GHSA
|
GHSA-jfcc-rm7f-xgf8
|
Cross-Site Scripting in mavon-editor
|
All versions of `mavon-editor` are vulnerable to Cross-Site Scripting. The package fails to sanitize entered input, allowing attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-11-29T17:41:18Z
|
2020-09-03T20:36:35Z
|
MODERATE
| 6.5
|
{'CWE-79'}
|
{'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72', 'https://www.npmjs.com/advisories/1169', 'https://github.com/advisories/GHSA-jfcc-rm7f-xgf8', 'https://github.com/hinesboy/mavonEditor/issues/472', 'https://github.com/hinesboy/mavonEditor/pull/548', 'https://snyk.io/vuln/SNYK-JS-MAVONEDITOR-459108', 'https://www.npmjs.com/package/mavon-editor'}
| null |
GHSA
|
GHSA-5875-p652-2ppm
|
Exposure of Resource to Wrong Sphere in microweber
|
Exposure of Resource to Wrong Sphere in microweber prior to 1.3 allows users to add deleted products to a cart and buy it.
|
{'CVE-2022-0762'}
|
2022-03-09T20:31:40Z
|
2022-02-27T00:00:16Z
|
MODERATE
| 4.3
|
{'CWE-668'}
|
{'https://huntr.dev/bounties/125b5244-5099-485e-bf75-e5f1ed80dd48', 'https://github.com/microweber/microweber/commit/76361264d9fdfff38a1af79c63141455cc4d36e3', 'https://github.com/advisories/GHSA-5875-p652-2ppm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0762'}
| null |
GHSA
|
GHSA-4v5p-v5h9-6xjx
|
`CHECK`-failures in Tensorflow
|
### Impact
An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated.
### Patches
We have patched the issue in GitHub commit [c2b31ff2d3151acb230edc3f5b1832d2c713a9e0](https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2022-23565'}
|
2022-02-11T15:06:54Z
|
2022-02-09T23:49:01Z
|
MODERATE
| 6.5
|
{'CWE-617'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx', 'https://github.com/advisories/GHSA-4v5p-v5h9-6xjx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23565', 'https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0'}
| null |
GHSA
|
GHSA-9chw-xrwx-f86j
|
Downloads Resources over HTTP in frames-compiler
|
Affected versions of `frames-compiler` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `frames-compiler`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10649'}
|
2021-01-14T15:57:36Z
|
2020-09-01T16:07:53Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/247', 'https://nodesecurity.io/advisories/247', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10649', 'https://github.com/advisories/GHSA-9chw-xrwx-f86j'}
| null |
GHSA
|
GHSA-5x33-h32w-6vr2
|
Cross site-scripting (XSS) moodle
|
The filter in the tag manager required extra sanitizing to prevent a reflected XSS risk. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.
|
{'CVE-2020-25628'}
|
2021-03-29T20:43:15Z
|
2021-03-29T20:43:15Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/moodle/moodle/commit/e8632a4ad0b4da3763cbbe5949594aa449b483bb', 'https://github.com/advisories/GHSA-5x33-h32w-6vr2', 'https://moodle.org/mod/forum/discuss.php?d=410840', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25628', 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69340'}
| null |
GHSA
|
GHSA-vgwr-773q-7j3c
|
Path Traversal within joomla/archive zip class
|
An issue was discovered in Joomla! 3.0.0 through 3.9.24. Extracting an specifilcy crafted zip package could write files outside of the intended path.
|
{'CVE-2021-26028'}
|
2021-03-24T17:58:13Z
|
2021-03-24T17:58:13Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/joomla/archive/CVE-2021-26028.yaml', 'https://github.com/advisories/GHSA-vgwr-773q-7j3c', 'https://github.com/joomla-framework/archive/commit/32c9009a1020d16bc1060c0d06339898b697cf2c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26028', 'https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html'}
| null |
GHSA
|
GHSA-hj5w-xgw9-w4rj
|
Malicious Package in coinstrng
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:58:49Z
|
2020-09-03T19:41:44Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1385', 'https://github.com/advisories/GHSA-hj5w-xgw9-w4rj'}
| null |
GHSA
|
GHSA-mmjr-5q74-p3m4
|
Exposure of Resource to Wrong Sphere in Drupal Core
|
Information Disclosure vulnerability in file module of Drupal Core allows an attacker to gain access to the file metadata of a permanent private file that they do not have access to by guessing the ID of the file. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6.
|
{'CVE-2020-13670'}
|
2022-02-26T00:27:15Z
|
2022-02-12T00:00:47Z
|
HIGH
| 7.5
|
{'CWE-668'}
|
{'https://www.drupal.org/sa-core-2020-011', 'https://github.com/advisories/GHSA-mmjr-5q74-p3m4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13670'}
| null |
GHSA
|
GHSA-6rw3-3whw-jvjj
|
Git LFS can execute a binary from the current directory on Windows
|
### Impact
On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems.
Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run.
More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended program is not found in any directory listed in `PATH`.
The vulnerability occurs because when Git LFS detects that the program it intends to run does not exist in any directory listed in `PATH` then Git LFS passes an empty string as the executable file path to the Go `os/exec` package, which contains a bug such that, on Windows, it prepends the name of the current working directory (i.e., `.`) to the empty string without adding a path separator, and as a result searches in that directory for a file with the base name `.` combined with any file extension from `PATHEXT`, executing the first one it finds.
(The reason `..bat` and `..cmd` files are not executed in the same manner is that, although the Go `os/exec` package tries to execute them just as it does a `..exe` file, the Microsoft Win32 API `CreateProcess()` family of functions have an undocumented feature in that they apparently recognize when a caller is attempting to execute a batch script file and instead run the `cmd.exe` command interpreter, passing the full set of command line arguments as parameters. These are unchanged from the command line arguments set by Git LFS, and as such, the intended program's name is the first, resulting in a command line like `cmd.exe /c git`, which then fails.)
Git LFS has resolved this vulnerability by always reporting an error when a program is not found in any directory listed in `PATH` rather than passing an empty string to the Go `os/exec` package in this case.
The bug in the Go `os/exec` package has been reported to the Go project and is expected to be patched after this security advisory is published.
### Patches
The problem was introduced in v2.12.1 and is patched in v3.1.3 and v3.1.4. Users of affected versions should upgrade to v3.1.4.
### Workarounds
There are no known workarounds at this time.
### References
* https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6rw3-3whw-jvjj
* https://nvd.nist.gov/vuln/detail/CVE-2022-24826
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24826
* https://github.com/git-lfs/git-lfs/releases/tag/v3.1.4
* [git-lfs/git-lfs@762ccd4a49](https://github.com/git-lfs/git-lfs/commit/762ccd4a498f5c17723b91d56b9304434ada5540)
### For more information
If you have any questions or comments about this advisory:
* For general questions, start a discussion in the Git LFS [discussion forum](https://github.com/git-lfs/git-lfs/discussions).
* For reports of additional vulnerabilities, please follow the Git LFS [security reporting policy](https://github.com/git-lfs/git-lfs/blob/main/SECURITY.md).
|
{'CVE-2022-24826'}
|
2022-04-22T20:13:24Z
|
2022-04-22T20:13:21Z
|
CRITICAL
| 9.8
|
{'CWE-426'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24826', 'https://github.com/advisories/GHSA-6rw3-3whw-jvjj', 'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6rw3-3whw-jvjj'}
| null |
GHSA
|
GHSA-7fw7-gh23-f832
|
Vulnerability in singleCrunch function leads to arbitrary code execution via filePath parameters
|
aaptjs is a node wraper for aapt. An issue was discovered in the singleCrunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
|
{'CVE-2020-36381'}
|
2022-05-05T13:48:37Z
|
2021-11-01T19:19:29Z
|
CRITICAL
| 9.8
|
{'CWE-77', 'CWE-78'}
|
{'https://github.com/advisories/GHSA-7fw7-gh23-f832', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36381'}
| null |
GHSA
|
GHSA-vvwv-h69m-wg6f
|
XXE in PHPSpreadsheet due to incomplete fix for previous encoding issue
|
PHPOffice PhpSpreadsheet before 1.8.0 has an XXE issue. The XmlScanner decodes the sheet1.xml from an .xlsx to utf-8 if something else than UTF-8 is declared in the header. This was a security measurement to prevent CVE-2018-19277 but the fix is not sufficient. By double-encoding the the xml payload to utf-7 it is possible to bypass the check for the string ?<!ENTITY? and thus allowing for an xml external entity processing (XXE) attack.
|
{'CVE-2019-12331'}
|
2021-08-18T22:44:16Z
|
2019-11-20T01:39:57Z
|
HIGH
| 8.8
|
{'CWE-611'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12331', 'https://github.com/PHPOffice/PhpSpreadsheet/releases/tag/1.8.0', 'https://github.com/advisories/GHSA-vvwv-h69m-wg6f', 'https://github.com/PHPOffice/PhpSpreadsheet/blob/master/CHANGELOG.md#180---2019-07-01', 'https://herolab.usd.de/security-advisories/usd-2019-0046/'}
| null |
GHSA
|
GHSA-cxcf-78mr-wpg7
|
Malicious Package in oauth-validator
|
Version 1.0.2 of `oauth-validator` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-01T20:29:59Z
|
2020-09-01T20:29:59Z
|
CRITICAL
| 0
| null |
{'https://github.com/advisories/GHSA-cxcf-78mr-wpg7', 'https://www.npmjs.com/advisories/632'}
| null |
GHSA
|
GHSA-hx5x-49mm-vmhw
|
SQL Injection in sails-mysql
|
Versions of `sails-mysql` prior to 0.10.8 are vulnerable to SQL Injection. The `sort` keyword is not properly sanitized and may allow attackers to inject SQL statements and execute arbitrary SQL queries
## Recommendation
Upgrade to version 0.10.8 or later.
| null |
2021-09-27T22:40:37Z
|
2020-09-03T02:36:43Z
|
HIGH
| 7.5
|
{'CWE-89'}
|
{'https://www.npmjs.com/advisories/950', 'https://snyk.io/vuln/SNYK-JS-SAILSMYSQL-174916', 'https://github.com/balderdashy/sails/issues/6679', 'https://github.com/advisories/GHSA-hx5x-49mm-vmhw'}
| null |
GHSA
|
GHSA-56cx-wf47-hx7w
|
Improper Restriction of Excessive Authentication Attempts
|
firefly-iii is vulnerable to Improper Restriction of Excessive Authentication Attempts
|
{'CVE-2021-3663'}
|
2021-08-31T20:58:22Z
|
2021-08-09T20:38:37Z
|
MODERATE
| 5.3
|
{'CWE-307'}
|
{'https://github.com/firefly-iii/firefly-iii/commit/afc9f4b7ebc8a240c85864a6e1abda62bfeefae8', 'https://huntr.dev/bounties/497bdf6d-7dba-49c3-8011-1c64dfbb3380', 'https://github.com/firefly-iii/firefly-iii/releases/tag/5.5.13', 'https://github.com/advisories/GHSA-56cx-wf47-hx7w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3663'}
| null |
GHSA
|
GHSA-8j49-49jq-vwcq
|
Prototype Pollution in getsetdeep
|
All versions of `getsetdeep` are vulnerable to prototype pollution. The `setDeep()` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-01T20:11:01Z
|
2020-09-04T15:15:34Z
|
HIGH
| 0
|
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1334', 'https://github.com/advisories/GHSA-8j49-49jq-vwcq'}
| null |
GHSA
|
GHSA-6f34-pq9f-36vf
|
Hijacked Environment Variables in sqlite.js
|
The `sqlite.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16050'}
|
2021-01-08T19:45:31Z
|
2018-07-23T20:50:29Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/491', 'https://www.npmjs.com/advisories/491', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16050', 'https://github.com/advisories/GHSA-6f34-pq9f-36vf'}
| null |
GHSA
|
GHSA-3fjq-93xj-3f3f
|
Cross-Site Scripting in serialize-to-js
|
Versions of `serialize-to-js` prior to 3.0.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications.
## Recommendation
Upgrade to version 3.0.1 or later.
|
{'CVE-2019-16772'}
|
2021-01-08T20:02:21Z
|
2019-12-06T23:20:26Z
|
MODERATE
| 3.1
|
{'CWE-79'}
|
{'https://github.com/commenthol/serialize-to-js/security/advisories/GHSA-3fjq-93xj-3f3f', 'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3', 'https://github.com/advisories/GHSA-3fjq-93xj-3f3f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16772', 'https://www.npmjs.com/advisories/1429'}
| null |
GHSA
|
GHSA-v9qg-3j8p-r63v
|
Uncontrolled Recursion in Django
|
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
|
{'CVE-2019-14235'}
|
2021-05-10T18:17:48Z
|
2019-08-06T01:43:31Z
|
HIGH
| 7.5
|
{'CWE-674'}
|
{'https://security.gentoo.org/glsa/202004-17', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14235', 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://www.debian.org/security/2019/dsa-4498', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://github.com/advisories/GHSA-v9qg-3j8p-r63v', 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs', 'https://seclists.org/bugtraq/2019/Aug/15', 'https://security.netapp.com/advisory/ntap-20190828-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}
| null |
GHSA
|
GHSA-r863-p739-275c
|
Malicious Package in reuest
|
All versions of `reuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:09:37Z
|
2020-09-11T21:09:24Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/866', 'https://github.com/advisories/GHSA-r863-p739-275c'}
| null |
GHSA
|
GHSA-mpf2-q34c-fc6j
|
Infinite Loop in scapy
|
scapy 2.4.0 is affected by Denial of Service. The impact is infinite loop, resource consumption and program unresponsive. The component is _RADIUSAttrPacketListField.getfield(self..). The attack vector is over the network or in a pcap. both work.
|
{'CVE-2019-1010142'}
|
2021-05-11T16:03:58Z
|
2019-07-22T14:53:58Z
|
HIGH
| 7.5
|
{'CWE-835'}
|
{'http://www.securityfocus.com/bid/106674', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42NRPMC3NS2QVFNIXYP6WV2T3LMLLY7E/', 'https://github.com/advisories/GHSA-mpf2-q34c-fc6j', 'https://github.com/secdev/scapy/pull/1409', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010142', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T46XW4S5BCA3VV3JT3C5Q6LBEXSIACLN/', 'https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058', 'https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/'}
| null |
GHSA
|
GHSA-67cx-rhhq-mfhq
|
High severity vulnerability that affects indico
|
## Local file disclosure through LaTeX injection
### Impact
An external audit of the Indico codebase has discovered a vulnerability in Indico's LaTeX sanitization code, which could have malicious users to run unsafe LaTeX commands on the server. Such commands allowed for example to read local files (e.g. `indico.conf`).
As far as we know it is not possible to write files or execute code using this vulnerability.
### Patches
You need to update to [Indico 2.2.3](https://github.com/indico/indico/releases/tag/v2.2.3) as soon as possible.
We also released [Indico 2.1.10](https://github.com/indico/indico/releases/tag/v2.1.10) in case you cannot update to 2.2 for some reason.
See https://docs.getindico.io/en/stable/installation/upgrade/ for instructions on how to update.
### Workarounds
Setting `XELATEX_PATH = None` in `indico.conf` will result in an error when building a PDF, but without being able to run xelatex, the vulnerability cannot be abused.
### For more information
If you have any questions or comments about this advisory:
* Open a thread in [our forum](https://talk.getindico.io/)
* Email us privately at [indico-team@cern.ch](mailto:indico-team@cern.ch)
| null |
2021-09-01T22:40:24Z
|
2019-10-11T18:28:07Z
|
HIGH
| 0
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-67cx-rhhq-mfhq', 'https://github.com/indico/indico/security/advisories/GHSA-67cx-rhhq-mfhq'}
| null |
GHSA
|
GHSA-p4pj-9g59-4ppv
|
Remote Code Execution in SyliusResourceBundle
|
### Impact
Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution.
The vulnerable versions include: `<=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3`.
### Example
```yaml
foo:
path: /foo/{id}
defaults:
_sylius:
repository:
method: findSome
arguments:
entity: "expr:service('repository').find($id)"
```
In this case, `$id` can be prepared in a way that calls other services.
If you visit `/foo/"~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"`, it will result in a following expression `expr:service('repository').find(""~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"")`, which will execute a query on the currently connected database.
To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language.
### Patches
This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched.
### Workarounds
The fix requires adding `addslashes` in `ParametersParser::parseRequestValueExpression` to sanitize user input before evaluating it using the expression language.
```php
- return is_string($variable) ? sprintf('"%s"', $variable) : $variable;
+ return is_string($variable) ? sprintf('"%s"', addslashes($variable)) : $variable;
```
### Acknowledgements
This security issue has been reported by Craig Blanchette (@isometriks), thanks a lot!
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@sylius.com](mailto:security@sylius.com)
|
{'CVE-2020-15143'}
|
2022-04-19T19:02:33Z
|
2020-08-19T21:04:25Z
|
HIGH
| 7.7
|
{'CWE-917', 'CWE-74'}
|
{'https://github.com/advisories/GHSA-p4pj-9g59-4ppv', 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-p4pj-9g59-4ppv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15143'}
| null |
GHSA
|
GHSA-wv23-pfj7-2mjj
|
Authenticated file write leads to remote code execution in october/system
|
### Impact
Assuming an attacker with "create, modify and delete website pages" privileges in the backend is able to execute PHP code by running specially crafted Twig code in the template markup.
### Patches
Issue has been patched in Build 473 and v1.1.6
### Workarounds
Apply https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26 to your installation manually if you are unable to upgrade.
### References
Credits to:
• David Miller
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
|
{'CVE-2021-32649'}
|
2022-04-19T19:03:20Z
|
2022-01-14T21:08:23Z
|
HIGH
| 8.8
|
{'CWE-74'}
|
{'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26', 'https://github.com/advisories/GHSA-wv23-pfj7-2mjj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32649', 'https://github.com/octobercms/october/security/advisories/GHSA-wv23-pfj7-2mjj'}
| null |
GHSA
|
GHSA-5w4r-wwc3-6qcp
|
Malicious Package in precode.js
|
Version 1.1.1 of `precode.js` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-11T21:23:29Z
|
2020-09-11T21:23:29Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/941', 'https://github.com/advisories/GHSA-5w4r-wwc3-6qcp'}
| null |
GHSA
|
GHSA-mcx4-f5f5-4859
|
Prevent cache poisoning via a Response Content-Type header in Symfony
|
Description
-----------
When a `Response` does not contain a `Content-Type` header, Symfony falls back to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can lead to a corrupted cache where the cached format is not the right one.
Resolution
----------
Symfony does not use the `Accept` header anymore to guess the `Content-Type`.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6) for the 4.4 branch.
Credits
-------
I would like to thank Xavier Lacot from JoliCode for reporting & Yonel Ceruto and Tobias Schultze for fixing the issue.
|
{'CVE-2020-5255'}
|
2022-04-19T19:02:57Z
|
2020-03-30T20:09:16Z
|
LOW
| 2.6
|
{'CWE-435'}
|
{'https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-content-type-header', 'https://github.com/advisories/GHSA-mcx4-f5f5-4859', 'https://github.com/symfony/symfony/security/advisories/GHSA-mcx4-f5f5-4859', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5255', 'https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6'}
| null |
GHSA
|
GHSA-qr82-2c78-4m8h
|
Reference binding to nullptr in map operations
|
### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.Map*` and `tf.raw_ops.OrderedMap*` operations:
```python
import tensorflow as tf
tf.raw_ops.MapPeek(
key=tf.constant([8],dtype=tf.int64),
indices=[],
dtypes=[tf.int32],
capacity=8,
memory_limit=128)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_stage_op.cc#L222-L248) has a check in place to ensure that `indices` is in ascending order, but does not check that `indices` is not empty.
### Patches
We have patched the issue in GitHub commit [532f5c5a547126c634fefd43bbad1dc6417678ac](https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37671'}
|
2021-08-25T14:41:42Z
|
2021-08-25T14:41:42Z
|
HIGH
| 7.8
|
{'CWE-824'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qr82-2c78-4m8h', 'https://github.com/advisories/GHSA-qr82-2c78-4m8h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37671', 'https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac'}
| null |
GHSA
|
GHSA-h2f4-v4c4-6wx4
|
Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server
|
In Eclipse Jetty version 9.3.x and 9.4.x, the server is vulnerable to Denial of Service conditions if a remote client sends either large SETTINGs frames container containing many settings, or many small SETTINGs frames. The vulnerability is due to the additional CPU and memory allocations required to handle changed settings.
|
{'CVE-2018-12545'}
|
2021-06-10T23:29:56Z
|
2019-03-28T18:33:38Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIS4LALKZNLF5X5IGNGRSKERG7FY4QG6/', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=538096', 'https://lists.apache.org/thread.html/70744fe4faba8e2fa7e50a7fc794dd03cb28dad8b21e08ee59bb1606@%3Cdevnull.infra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12545', 'https://lists.apache.org/thread.html/13f5241048ec0bf966a6ddd306feaf40de5b20e1f09096b9cddeddf2@%3Ccommits.accumulo.apache.org%3E', 'https://github.com/advisories/GHSA-h2f4-v4c4-6wx4', 'https://lists.apache.org/thread.html/febc94ffec9275dcda64633e0276a1400cd318e571009e4cda9b7a79@%3Cnotifications.accumulo.apache.org%3E'}
| null |
GHSA
|
GHSA-j7px-6hwj-hpjg
|
Open Redirect in OAuth2 Proxy
|
### Impact
As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access.
This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites.
However, by crafting a redirect URL with HTML encoded whitespace characters (eg. `%0a`, `%0b`,`%09`,`%0d`) the validation could be bypassed and allow a redirect to any URL provided.
### Patches
@rootxharsh and @iamnoooob provided this patch as potential solution:
```
From 4b941f56eda310b5c4dc8080b7635a6bfabccad4 Mon Sep 17 00:00:00 2001
From: Harsh Jaiswal <harsh@pop-os.localdomain>
Date: Fri, 1 May 2020 20:38:31 +0530
Subject: [PATCH] Fixes redirect issue
---
oauthproxy.go | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/oauthproxy.go b/oauthproxy.go
index 1e9bb7c..f8beb4d 100644
--- a/oauthproxy.go
+++ b/oauthproxy.go
@@ -577,8 +577,9 @@ func validOptionalPort(port string) bool {
// IsValidRedirect checks whether the redirect URL is whitelisted
func (p *OAuthProxy) IsValidRedirect(redirect string) bool {
+ matched, _ := regexp.MatchString(`^/\s+/|\\`, redirect)
switch {
- case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//") && !strings.HasPrefix(redirect, "/\\"):
+ case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//") && !matched:
return true
case strings.HasPrefix(redirect, "http://") || strings.HasPrefix(redirect, "https://"):
redirectURL, err := url.Parse(redirect)
--
2.17.1
```
This issue was also reported to us separately by @mik317 several hours later
The fix was implemented in [#xxx]() and released as version 5.1.1
|
{'CVE-2020-11053'}
|
2022-04-19T19:02:25Z
|
2021-12-20T17:59:10Z
|
HIGH
| 7.1
|
{'CWE-601'}
|
{'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-j7px-6hwj-hpjg', 'https://github.com/oauth2-proxy/oauth2-proxy/commit/0d5fa211df8ef2449347a56b22c779eb8d894c43', 'https://github.com/advisories/GHSA-j7px-6hwj-hpjg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11053'}
| null |
GHSA
|
GHSA-86fh-j58m-7pf5
|
Improper Privilege Management in Apache Ozone
|
In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked.
|
{'CVE-2021-36372'}
|
2021-11-23T17:57:14Z
|
2021-11-23T17:57:14Z
|
CRITICAL
| 9.8
|
{'CWE-273'}
|
{'https://github.com/advisories/GHSA-86fh-j58m-7pf5', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C5029c1ac-4685-8492-e3cb-ab48c5c370cf%40apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/11/19/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36372'}
| null |
GHSA
|
GHSA-jr34-mff8-pc6f
|
SQL Injection in Cloud Native Computing Foundation Harbor
|
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows SQL Injection via user-groups in the VMware Harbor Container Registry for the Pivotal Platform.
|
{'CVE-2019-19029'}
|
2021-05-18T18:27:36Z
|
2021-05-18T18:27:36Z
|
MODERATE
| 7.2
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-jr34-mff8-pc6f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19029', 'https://github.com/goharbor/harbor/security/advisories/GHSA-qcfv-8v29-469w', 'https://github.com/goharbor/harbor/security/advisories', 'https://tanzu.vmware.com/security/cve-2019-19029'}
| null |
GHSA
|
GHSA-prg5-hg25-8grq
|
Ability to switch channels via GET parameter enabled in production environments
|
### Impact
This vulnerability gives the ability to switch channels via the `_channel_code` GET parameter in production environments. This was meant to be enabled only when `%kernel.debug%` is set to true.
However, if no `sylius_channel.debug` is set explicitly in the configuration, the default value which is `%kernel.debug%` will be not resolved and cast to boolean, enabling this debug feature even if that parameter is set to false.
### Patches
Patch has been provided for Sylius 1.3.x and newer - **1.3.16, 1.4.12, 1.5.9, 1.6.5**. Versions older than 1.3 are not covered by our security support anymore.
### Workarounds
Unsupported versions could be patched by adding the following configuration to run in production:
```yaml
sylius_channel:
debug: false
```
|
{'CVE-2020-5218'}
|
2021-01-08T20:32:24Z
|
2020-01-31T18:00:58Z
|
LOW
| 4.4
|
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5218', 'https://github.com/advisories/GHSA-prg5-hg25-8grq', 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-8vp7-j5cj-vvm2', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-prg5-hg25-8grq', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/resource-bundle/CVE-2020-5220.yaml'}
| null |
GHSA
|
GHSA-hwvq-6gjx-j797
|
Special Element Injection in notebook
|
### Impact
Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook.
### Patches
5.7.11, 6.4.1
### References
[OWASP Page on Injection Prevention](https://cheatsheetseries.owasp.org/cheatsheets/Injection_Prevention_Cheat_Sheet.html#injection-prevention-rules)
### For more information
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org.
Credit: Guillaume Jeanne from Google
### Example:
A notebook with the following content in a cell and it would display an alert when opened for the first time in Notebook (in an untrusted state):
```
{ "cell_type": "code", "execution_count": 0, "metadata": {}, "outputs": [ { "data": { "text/html": [ "<select><iframe></select><img src=x: onerror=alert('xss')>\n"], "text/plain": [] }, "metadata": {}, "output_type": "display_data" } ], "source": [ "" ] }
````
|
{'CVE-2021-32798'}
|
2022-04-19T19:03:05Z
|
2021-08-23T19:40:38Z
|
CRITICAL
| 10
|
{'CWE-79'}
|
{'https://github.com/jupyter/notebook/commit/79fc76e890a8ec42f73a3d009e44ef84c14ef0d5', 'https://github.com/jupyter/notebook/security/advisories/GHSA-hwvq-6gjx-j797', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32798', 'https://github.com/advisories/GHSA-hwvq-6gjx-j797'}
| null |
GHSA
|
GHSA-m3q7-rj8g-m457
|
Moderate severity vulnerability that affects ember-source
|
Cross-site scripting (XSS) vulnerability in Ember.js 1.8.x through 1.10.x, 1.11.x before 1.11.4, 1.12.x before 1.12.2, 1.13.x before 1.13.12, 2.0.x before 2.0.3, 2.1.x before 2.1.2, and 2.2.x before 2.2.1 allows remote attackers to inject arbitrary web script or HTML.
|
{'CVE-2015-7565'}
|
2022-04-19T19:03:25Z
|
2018-08-28T22:33:24Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'http://emberjs.com/blog/2016/01/14/security-releases-ember-1-11-4-1-12-2-1-13-12-2-0-3-2-1-2-2-2-1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7565', 'https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY', 'https://github.com/advisories/GHSA-m3q7-rj8g-m457'}
| null |
GHSA
|
GHSA-75cq-g75g-rxff
|
use-after-free vulnerability in Rust array-queue
|
An issue was discovered in the array-queue crate through 2020-09-26 for Rust. A pop_back() call may lead to a use-after-free.
|
{'CVE-2020-35900'}
|
2021-08-25T21:00:43Z
|
2021-08-25T21:00:43Z
|
MODERATE
| 5.5
|
{'CWE-416'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35900', 'https://github.com/raviqqe/array-queue/issues/2', 'https://github.com/advisories/GHSA-75cq-g75g-rxff', 'https://rustsec.org/advisories/RUSTSEC-2020-0047.html'}
| null |
GHSA
|
GHSA-q7pf-qr96-2vq5
|
Moderate severity vulnerability that affects io.swagger:swagger-codegen and io.swagger:swagger-parser
|
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
|
{'CVE-2017-1000208'}
|
2021-09-16T19:37:01Z
|
2018-10-19T16:46:41Z
|
HIGH
| 8.8
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000208', 'https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208', 'https://github.com/advisories/GHSA-q7pf-qr96-2vq5', 'https://github.com/swagger-api/swagger-parser/releases/tag/v1.0.31'}
| null |
GHSA
|
GHSA-6gv8-p3vj-pxvr
|
Null pointer dereference in `UncompressElement`
|
### Impact
The code for `tf.raw_ops.UncompressElement` can be made to trigger a null pointer dereference:
```python
import tensorflow as tf
data = tf.data.Dataset.from_tensors([0.0])
tf.raw_ops.UncompressElement(
compressed=tf.data.experimental.to_variant(data),
output_types=[tf.int64],
output_shapes=[2])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/data/experimental/compression_ops.cc#L50-L53) obtains a pointer to a `CompressedElement` from a `Variant` tensor and then proceeds to dereference it for decompressing. There is no check that the `Variant` tensor contained a `CompressedElement`, so the pointer is actually `nullptr`.
### Patches
We have patched the issue in GitHub commit [7bdf50bb4f5c54a4997c379092888546c97c3ebd](https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37649'}
|
2021-08-25T14:43:27Z
|
2021-08-25T14:43:27Z
|
HIGH
| 7.7
|
{'CWE-476'}
|
{'https://github.com/advisories/GHSA-6gv8-p3vj-pxvr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37649', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gv8-p3vj-pxvr', 'https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd'}
| null |
GHSA
|
GHSA-x8h6-xgqx-jqgp
|
Undefined behavior and `CHECK`-fail in `FractionalMaxPoolGrad`
|
### Impact
The implementation of `tf.raw_ops.FractionalMaxPoolGrad` triggers an undefined behavior if one of the input tensors is empty:
```python
import tensorflow as tf
orig_input = tf.constant([2, 3], shape=[1, 1, 1, 2], dtype=tf.int64)
orig_output = tf.constant([], dtype=tf.int64)
out_backprop = tf.zeros([2, 3, 6, 6], dtype=tf.int64)
row_pooling_sequence = tf.constant([0], shape=[1], dtype=tf.int64)
col_pooling_sequence = tf.constant([0], shape=[1], dtype=tf.int64)
tf.raw_ops.FractionalMaxPoolGrad(
orig_input=orig_input, orig_output=orig_output, out_backprop=out_backprop,
row_pooling_sequence=row_pooling_sequence,
col_pooling_sequence=col_pooling_sequence, overlapping=False)
```
The code is also vulnerable to a denial of service attack as a `CHECK` condition becomes false and aborts the process
```python
import tensorflow as tf
orig_input = tf.constant([1], shape=[1], dtype=tf.int64)
orig_output = tf.constant([1], shape=[1], dtype=tf.int64)
out_backprop = tf.constant([1, 1], shape=[2, 1, 1, 1], dtype=tf.int64)
row_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64)
col_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64)
tf.raw_ops.FractionalMaxPoolGrad(
orig_input=orig_input, orig_output=orig_output, out_backprop=out_backprop,
row_pooling_sequence=row_pooling_sequence,
col_pooling_sequence=col_pooling_sequence, overlapping=False)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/169054888d50ce488dfde9ca55d91d6325efbd5b/tensorflow/core/kernels/fractional_max_pool_op.cc#L215) fails to validate that input and output tensors are not empty and are of the same rank. Each of these unchecked assumptions is responsible for the above issues.
### Patches
We have patched the issue in GitHub commit [32fdcbff9d06d010d908fcc4bd4b36eb3ce15925](https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29580'}
|
2021-05-21T14:26:26Z
|
2021-05-21T14:26:26Z
|
LOW
| 2.5
|
{'CWE-908'}
|
{'https://github.com/advisories/GHSA-x8h6-xgqx-jqgp', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x8h6-xgqx-jqgp', 'https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29580'}
| null |
GHSA
|
GHSA-64gv-qg2v-vxv6
|
Array size is not checked in sized-chunks
|
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with From<InlineArray<A, T>>.
|
{'CVE-2020-25793'}
|
2021-08-25T20:45:04Z
|
2021-08-25T20:45:04Z
|
HIGH
| 7.5
|
{'CWE-129'}
|
{'https://github.com/bodil/sized-chunks/issues/11', 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html', 'https://github.com/advisories/GHSA-64gv-qg2v-vxv6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25793'}
| null |
GHSA
|
GHSA-43f8-p5w3-5m25
|
SSRF by connecting to privileged ports
|
### Impact
All users are affected.
### Patches
* Unsuccessfully patched by 0fae40fb, included in version [4.4.0](https://github.com/vrana/adminer/releases/tag/v4.4.0).
* Patched by 35bfaa75, included in version [4.7.8](https://github.com/vrana/adminer/releases/tag/v4.7.8).
### Workarounds
Protect access to Adminer also by other means, e.g. by HTTP password, IP address limiting or by OTP [plugin](https://www.adminer.org/plugins/).
### References
* http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt
* https://sourceforge.net/p/adminer/bugs-and-features/769/
* https://gusralph.info/adminer-ssrf-bypass-cve-2018-7667/ (CVE-2020-28654)
### For more information
If you have any questions or comments about this advisory:
* Comment at 35bfaa75.
|
{'CVE-2018-7667'}
|
2022-04-19T19:02:47Z
|
2021-02-11T21:20:40Z
|
MODERATE
| 0
|
{'CWE-918'}
|
{'http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt', 'https://packagist.org/packages/vrana/adminer', 'https://github.com/advisories/GHSA-43f8-p5w3-5m25', 'https://github.com/vrana/adminer/security/advisories/GHSA-43f8-p5w3-5m25', 'https://sourceforge.net/p/adminer/bugs-and-features/769/', 'https://gusralph.info/adminer-ssrf-bypass-cve-2018-7667'}
| null |
GHSA
|
GHSA-hf64-x4gq-p99h
|
Out-of-bounds Read
|
In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.
|
{'CVE-2020-35655'}
|
2021-03-18T19:55:34Z
|
2021-03-18T19:55:34Z
|
HIGH
| 5.4
|
{'CWE-125'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35655', 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/', 'https://github.com/advisories/GHSA-hf64-x4gq-p99h', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/'}
| null |
GHSA
|
GHSA-g8j8-mgh9-q77p
|
File upload leading to RCE in MCMS
|
An arbitrary file upload vulnerability in the component /ms/file/uploadTemplate.do of MCMS v5.2.4 allows attackers to execute arbitrary code.
|
{'CVE-2021-46036'}
|
2022-03-01T21:32:43Z
|
2022-02-19T00:01:25Z
|
CRITICAL
| 9.8
|
{'CWE-434'}
|
{'https://github.com/advisories/GHSA-g8j8-mgh9-q77p', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46036', 'https://lycshub.github.io/2021/12/28/MCMS-vulnerabilities/'}
| null |
GHSA
|
GHSA-wm77-q74p-5763
|
Path Traversal in superstatic
|
Affected of `superstatic` are vulnerable to path traversal when used on Windows.
Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0).
## Recommendation
Update to version 5.0.2 or later.
| null |
2021-08-09T22:21:04Z
|
2018-07-27T17:06:03Z
|
HIGH
| 0
|
{'CWE-177'}
|
{'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b', 'https://github.com/firebase/superstatic/pull/255', 'https://github.com/advisories/GHSA-wm77-q74p-5763', 'https://github.com/firebase/superstatic/blob/v5.0.1/lib/providers/fs.js#L71', 'https://www.npmjs.com/advisories/652'}
| null |
GHSA
|
GHSA-x88j-93vc-wpmp
|
Moderate severity vulnerability that affects django
|
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.
|
{'CVE-2011-4136'}
|
2021-09-21T22:24:48Z
|
2018-07-23T19:52:39Z
|
MODERATE
| 0
|
{'CWE-20'}
|
{'http://openwall.com/lists/oss-security/2011/09/13/2', 'https://github.com/advisories/GHSA-x88j-93vc-wpmp', 'https://hermes.opensuse.org/messages/14700881', 'https://www.djangoproject.com/weblog/2011/sep/09/', 'https://www.djangoproject.com/weblog/2011/sep/10/127/', 'http://openwall.com/lists/oss-security/2011/09/11/1', 'http://secunia.com/advisories/46614', 'http://www.debian.org/security/2011/dsa-2332', 'https://bugzilla.redhat.com/show_bug.cgi?id=737366', 'https://nvd.nist.gov/vuln/detail/CVE-2011-4136'}
| null |
GHSA
|
GHSA-753c-phhg-cj29
|
Improper Neutralization of Special Elements used in a Command
|
This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function.
|
{'CVE-2021-23352'}
|
2021-03-15T18:08:06Z
|
2021-03-12T23:01:49Z
|
HIGH
| 0
|
{'CWE-89', 'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JS-MADGE-1082875', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23352', 'https://github.com/advisories/GHSA-753c-phhg-cj29', 'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332', 'https://github.com/pahen/madge/blob/master/lib/graph.js%23L27'}
| null |
GHSA
|
GHSA-fm9p-5m9f-rq85
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
|
{'CVE-2019-0915'}
|
2021-03-29T21:00:03Z
|
2021-03-29T21:00:03Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0915', 'https://github.com/advisories/GHSA-fm9p-5m9f-rq85', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0915', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}
| null |
GHSA
|
GHSA-xfv3-rrfm-f2rv
|
Information Exposure in Netty
|
Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters.
|
{'CVE-2015-2156'}
|
2021-09-22T18:45:31Z
|
2020-06-30T21:01:21Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-IONETTY-73571', 'https://github.com/netty/netty/commit/31815598a2af37f0b71ea94eada70d6659c23752', 'http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html', 'http://www.securityfocus.com/bid/74704', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2015/05/17/1', 'https://github.com/netty/netty/pull/3754', 'https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass', 'https://github.com/netty/netty/commit/2caa38a2795fe1f1ae6ceda4d69e826ed7c55e55', 'https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769@%3Ccommits.cassandra.apache.org%3E', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1222923', 'https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3@%3Ccommits.cassandra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2156', 'https://github.com/advisories/GHSA-xfv3-rrfm-f2rv', 'https://github.com/netty/netty/pull/3748/commits/4ac519f534493bb0ca7a77e1c779138a54faa7b9'}
| null |
GHSA
|
GHSA-hwpc-8xqv-jvj4
|
XStream is vulnerable to a Remote Command Execution attack
|
### Impact
The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21345](https://x-stream.github.io/CVE-2021-21345.html).
### Credits
钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-21345'}
|
2022-02-10T11:35:08Z
|
2021-03-22T23:28:38Z
|
MODERATE
| 5.8
|
{'CWE-94'}
|
{'https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4', 'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://x-stream.github.io/CVE-2021-21345.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-hwpc-8xqv-jvj4', 'http://x-stream.github.io/changes.html#1.4.16', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21345', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-mh74-4m5g-fcjx
|
Malicious users could control the content of invitation emails
|
### Impact
A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example.
### Patches
Fixed in 4469d1d, 6b405a8, 65a6e91.
Note that these patches include changes to the *default* email templates. If these templates have been locally modified, they must also be updated.
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org.
|
{'CVE-2021-29432'}
|
2021-04-19T14:54:24Z
|
2021-04-19T14:54:24Z
|
MODERATE
| 5.3
|
{'CWE-20'}
|
{'https://github.com/matrix-org/sydent/releases/tag/v2.3.0', 'https://github.com/advisories/GHSA-mh74-4m5g-fcjx', 'https://github.com/matrix-org/sydent/commit/4469d1d42b2b1612b70638224c07e19623039c42', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29432', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-mh74-4m5g-fcjx', 'https://pypi.org/project/matrix-sydent/'}
| null |
GHSA
|
GHSA-9fcc-7g44-mxrj
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via uploading files with files in `.xsd`, `.asa`, and `.aspx` formats.
|
{'CVE-2022-0942'}
|
2022-03-29T21:28:00Z
|
2022-03-16T00:00:47Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0942', 'https://github.com/advisories/GHSA-9fcc-7g44-mxrj', 'https://huntr.dev/bounties/a412707c-18da-4c84-adc0-9801ed8068c9', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
| null |
GHSA
|
GHSA-f522-ffg8-j8r6
|
Regular Expression Denial of Service in is-my-json-valid
|
Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function.
## Recommendation
Update to version 1.4.1, 2.17.2 or later.
|
{'CVE-2016-2537'}
|
2021-09-09T21:38:37Z
|
2017-10-24T18:33:35Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://hackerone.com/reports/317548', 'https://www.npmjs.com/advisories/572', 'https://www.npmjs.com/advisories/76', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2537', 'https://nodesecurity.io/advisories/76', 'https://github.com/mafintosh/is-my-json-valid/pull/159', 'https://github.com/advisories/GHSA-f522-ffg8-j8r6', 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}
| null |
GHSA
|
GHSA-g8jx-66p8-vcm2
|
SQL injection in pimcore/pimcore
|
This affects the package pimcore/pimcore before 10.0.7. This issue exists due to the absence of check on the storeId parameter in the method collectionsActionGet and groupsActionGet method within the ClassificationstoreController class.
|
{'CVE-2021-23405'}
|
2021-07-28T17:37:01Z
|
2021-07-13T17:42:31Z
|
HIGH
| 8.8
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23405', 'https://github.com/pimcore/pimcore/pull/9572', 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1316297', 'https://github.com/advisories/GHSA-g8jx-66p8-vcm2'}
| null |
GHSA
|
GHSA-m56g-3g8v-2rxw
|
XSS in Adminer
|
**Withdrawn:** Duplicate of GHSA-9pgx-gcph-mpqr.
Adminer before 4.7.9 allows XSS via the history parameter to the default URI.
|
{'CVE-2020-35572'}
|
2021-02-11T20:46:56Z
|
2021-02-11T20:46:53Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/vrana/adminer', 'https://sourceforge.net/p/adminer/bugs-and-features/775/', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://sourceforge.net/p/adminer/news/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35572', 'https://github.com/advisories/GHSA-m56g-3g8v-2rxw', 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'}
| null |
GHSA
|
GHSA-m434-m5pv-p35w
|
Insufficient user authorization in Moodle
|
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The calendar:manageentries capability allowed managers to access or modify any calendar event, but should have been restricted from accessing user level events.
|
{'CVE-2022-0333'}
|
2022-02-02T16:12:14Z
|
2022-01-28T22:08:02Z
|
LOW
| 3.8
|
{'CWE-863'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0333', 'https://github.com/advisories/GHSA-m434-m5pv-p35w', 'https://moodle.org/mod/forum/discuss.php?d=431100', 'https://github.com/moodle/moodle/commit/2ee27313cea0d7073f5a6a35eccdfddcb3a9adad', 'https://bugzilla.redhat.com/show_bug.cgi?id=2043663'}
| null |
GHSA
|
GHSA-mx9f-w8qq-q5jf
|
Low severity vulnerability that affects rest-client
|
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
|
{'CVE-2015-3448'}
|
2021-09-15T21:04:36Z
|
2017-10-24T18:33:36Z
|
LOW
| 0
|
{'CWE-200'}
|
{'http://lists.opensuse.org/opensuse-updates/2015-04/msg00026.html', 'http://www.osvdb.org/117461', 'https://github.com/advisories/GHSA-mx9f-w8qq-q5jf', 'https://github.com/rest-client/rest-client/issues/349', 'http://www.securityfocus.com/bid/74415', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3448'}
| null |
GHSA
|
GHSA-v8w9-2789-6hhr
|
Deserialization of Untrusted Data in bson
|
All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object's _bsotype, leading to cases where an object is serialized as a document rather than the intended BSON type.
|
{'CVE-2020-7610'}
|
2021-05-07T16:04:54Z
|
2021-05-07T16:04:54Z
|
HIGH
| 9.8
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7610', 'https://snyk.io/vuln/SNYK-JS-BSON-561052', 'https://github.com/advisories/GHSA-v8w9-2789-6hhr'}
| null |
GHSA
|
GHSA-qv32-7r6p-xhhh
|
Moderate severity vulnerability that affects com.adobe.xmp:xmpcore
|
XMPCore in Adobe XMP Toolkit for Java before 5.1.3 allows remote attackers to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
|
{'CVE-2016-4216'}
|
2021-09-16T21:06:36Z
|
2018-10-19T16:39:29Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'https://helpx.adobe.com/security/products/xmpcore/apsb16-24.html', 'https://github.com/advisories/GHSA-qv32-7r6p-xhhh', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4216', 'http://www.securityfocus.com/bid/91717'}
| null |
GHSA
|
GHSA-h289-x5wc-xcv8
|
Improper Validation of Certificate with Host Mismatch in mellium.im/xmpp/websocket
|
### Impact
If no TLS configuration is provided by the user, the websocket package constructs its own TLS configuration using recommended defaults. When looking up a WSS endpoint using the DNS TXT record method described in [XEP-0156: Discovering Alternative XMPP Connection Methods](https://xmpp.org/extensions/xep-0156.html) the ServerName field was incorrectly being set to the name of the server returned by the TXT record request, not the name of the initial server we were attempting to connect to. This means that any attacker that can spoof a DNS record (ie. in the absence of DNSSEC, DNS-over-TLS, DNS-over-HTTPS, or similar technologies) could redirect the user to a server of their choosing and as long as it had a valid TLS certificate for itself the connection would succeed, resulting in a MITM situation.
### Patches
All users should upgrade to v0.21.1.
### Workarounds
To work around the issue, manually specify a TLS configuration with the correct hostname.
### References
- https://mellium.im/cve/cve-2022-24968/
- https://nvd.nist.gov/vuln/detail/CVE-2022-24968
### For more information
If you have any questions or comments about this advisory:
* Reach out on XMPP to [sam@samwhited.com](xmpp:sam@samwhited.com?msg)
* Email us at [sam@samwhited.com](mailto:sam@samwhited.com)
| null |
2022-04-19T19:03:23Z
|
2022-02-16T22:56:21Z
|
MODERATE
| 0
|
{'CWE-295'}
|
{'https://github.com/mellium/xmpp/security/advisories/GHSA-h289-x5wc-xcv8', 'https://github.com/advisories/GHSA-h289-x5wc-xcv8'}
| null |
GHSA
|
GHSA-crv7-7245-f45f
|
Improper Handling of Length Parameter Inconsistency in Compress
|
When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
|
{'CVE-2021-35516'}
|
2022-04-22T15:45:20Z
|
2021-08-02T16:55:15Z
|
HIGH
| 7.5
|
{'CWE-130', 'CWE-770'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-crv7-7245-f45f', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://lists.apache.org/thread.html/rf68442d67eb166f4b6cf0bbbe6c7f99098c12954f37332073c9822ca%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35516', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/2', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rf5b1016fb15b7118b9a5e16bb0b78cb4f1dfcf7821eb137ab5757c91@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}
| null |
GHSA
|
GHSA-7hmh-8gwv-mfvq
|
SQL Injection in Kylin
|
Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.
|
{'CVE-2020-1937'}
|
2021-09-22T21:57:08Z
|
2020-07-27T22:51:47Z
|
MODERATE
| 6.5
|
{'CWE-89'}
|
{'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1937', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-552148', 'https://lists.apache.org/thread.html/rc574fef23740522f62ab3bbda4f6171be98aa7a25f3f54be143a80a8%40%3Cuser.kylin.apache.org%3E', 'https://github.com/apache/kylin/commit/e373c64c96a54a7abfe4bccb82e8feb60db04749', 'https://github.com/advisories/GHSA-7hmh-8gwv-mfvq'}
| null |
GHSA
|
GHSA-g3wg-6mcf-8jj6
|
Local Temp Directory Hijacking Vulnerability
|
### Impact
On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
Additionally, any user code uses of [WebAppContext::getTempDirectory](https://www.eclipse.org/jetty/javadoc/9.4.31.v20200723/org/eclipse/jetty/webapp/WebAppContext.html#getTempDirectory()) would similarly be vulnerable.
Additionally, any user application code using the `ServletContext` attribute for the tempdir will also be impacted.
See: https://javaee.github.io/javaee-spec/javadocs/javax/servlet/ServletContext.html#TEMPDIR
For example:
```java
import java.io.File;
import java.io.IOException;
import javax.servlet.ServletContext;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
public class ExampleServlet extends HttpServlet {
@Override
protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
File tempDir = (File)getServletContext().getAttribute(ServletContext.TEMPDIR); // Potentially compromised
// do something with that temp dir
}
}
```
Example: The JSP library itself will use the container temp directory for compiling the JSP source into Java classes before executing them.
### CVSSv3.1 Evaluation
This vulnerability has been calculated to have a [CVSSv3.1 score of 7.8/10 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1)
### Patches
Fixes were applied to the 9.4.x branch with:
- https://github.com/eclipse/jetty.project/commit/53e0e0e9b25a6309bf24ee3b10984f4145701edb
- https://github.com/eclipse/jetty.project/commit/9ad6beb80543b392c91653f6bfce233fc75b9d5f
These will be included in releases: 9.4.33, 10.0.0.beta3, 11.0.0.beta3
### Workarounds
A work around is to set a temporary directory, either for the server or the context, to a directory outside of the shared temporary file system.
For recent releases, a temporary directory can be created simple by creating a directory called `work` in the ${jetty.base} directory (the parent directory of the `webapps` directory).
Alternately the java temporary directory can be set with the System Property `java.io.tmpdir`. A more detailed description of how jetty selects a temporary directory is below.
The Jetty search order for finding a temporary directory is as follows:
1. If the [`WebAppContext` has a temp directory specified](https://www.eclipse.org/jetty/javadoc/current/org/eclipse/jetty/webapp/WebAppContext.html#setTempDirectory(java.io.File)), use it.
2. If the `ServletContext` has the `javax.servlet.context.tempdir` attribute set, and if directory exists, use it.
3. If a `${jetty.base}/work` directory exists, use it (since Jetty 9.1)
4. If a `ServletContext` has the `org.eclipse.jetty.webapp.basetempdir` attribute set, and if the directory exists, use it.
5. Use `System.getProperty("java.io.tmpdir")` and use it.
Jetty will end traversal at the first successful step.
To mitigate this vulnerability the directory must be set to one that is not writable by an attacker. To avoid information leakage, the directory should also not be readable by an attacker.
#### Setting a Jetty server temporary directory.
Choices 3 and 5 apply to the server level, and will impact all deployed webapps on the server.
For choice 3 just create that work directory underneath your `${jetty.base}` and restart Jetty.
For choice 5, just specify your own `java.io.tmpdir` when you start the JVM for Jetty.
``` shell
[jetty-distribution]$ java -Djava.io.tmpdir=/var/web/work -jar start.jar
```
#### Setting a Context specific temporary directory.
The rest of the choices require you to configure the context for that deployed webapp (seen as `${jetty.base}/webapps/<context>.xml`)
Example (excluding the DTD which is version specific):
``` xml
<Configure class="org.eclipse.jetty.webapp.WebAppContext">
<Set name="contextPath"><Property name="foo"/></Set>
<Set name="war">/var/web/webapps/foo.war</Set>
<Set name="tempDirectory">/var/web/work/foo</Set>
</Configure>
```
### References
- https://github.com/eclipse/jetty.project/issues/5451
- [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
- [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
- [CodeQL Query PR To Detect Similar Vulnerabilities](https://github.com/github/codeql/pull/4473)
### Similar Vulnerabilities
Similar, but not the same.
- JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp
- Google Guava - https://github.com/google/guava/issues/4011
- Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945
- JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824
### For more information
The original report of this vulnerability is below:
> On Thu, 15 Oct 2020 at 21:14, Jonathan Leitschuh <jonathan.leitschuh@gmail.com> wrote:
> Hi WebTide Security Team,
>
> I'm a security researcher writing some custom CodeQL queries to find Local Temporary Directory Hijacking Vulnerabilities. One of my queries flagged an issue in Jetty.
>
> https://lgtm.com/query/5615014766184643449/
>
> I've recently been looking into security vulnerabilities involving the temporary directory because on unix-like systems, the system temporary directory is shared between all users.
> There exists a race condition between the deletion of the temporary file and the creation of the directory.
>
> ```java
> // ensure file will always be unique by appending random digits
> tmpDir = File.createTempFile(temp, ".dir", parent); // Attacker knows the full path of the file that will be generated
> // delete the file that was created
> tmpDir.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Jetty.
> // and make a directory of the same name
> // SECURITY VULNERABILITY: Race Condition! - Attacker beats Jetty and now owns this directory
> tmpDir.mkdirs();
> ```
>
> https://github.com/eclipse/jetty.project/blob/1b59672b7f668b8a421690154b98b4b2b03f254b/jetty-webapp/src/main/java/org/eclipse/jetty/webapp/WebInfConfiguration.java#L511-L518
>
> In several cases the `parent` parameter will not be the system temporary directory. However, there is one case where it will be, as the last fallback.
>
>
> https://github.com/eclipse/jetty.project/blob/1b59672b7f668b8a421690154b98b4b2b03f254b/jetty-webapp/src/main/java/org/eclipse/jetty/webapp/WebInfConfiguration.java#L467-L468
>
> If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
>
> Would your team be willing to open a GitHub security advisory to continue the discussion and disclosure there? https://github.com/eclipse/jetty.project/security/advisories
>
> **This vulnerability disclosure follows Google's [90-day vulnerability disclosure policy](https://www.google.com/about/appsecurity/) (I'm not an employee of Google, I just like their policy). Full disclosure will occur either at the end of the 90-day deadline or whenever a patch is made widely available, whichever occurs first.**
>
> Cheers,
> Jonathan Leitschuh
|
{'CVE-2020-27216'}
|
2022-04-19T19:02:38Z
|
2020-11-04T17:50:24Z
|
HIGH
| 7
|
{'CWE-552', 'CWE-379', 'CWE-378'}
|
{'https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/rc9d2ab8a6c7835182f20b01104798e67c75db655c869733a0713a590@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/ra1f19625cc67ac1b459c558f2ea5647d71ce51c6fe4f4cb03baec849@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rafb023a7c61180a1027819678eb2068b0b60cd5c2559cb8490e26c81@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9cc76b98f87738791b8ec3736755f92444d3c8cb26bd4e4ffdb5c1cc@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r769411eb43dd9ef77665700deb7fc491fc3ceb532914260c90b56f2f@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc44d1147f78496ec9932a38b28795ff4fd0c4fa6e3b6f5cc33c14d29@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/refbbb0eb65c185d1fa491cee08ac8ed32708ce3b269133a6da264317@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27216', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921', 'https://lists.apache.org/thread.html/r8dd01541fc49d24ec223365a9974231cbd7378b749247a89b0a52210@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r3e05ab0922876e74fea975d70af82b98580f4c14ba643c4f8a9e3a94@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r4f29fb24639ebc5d15fc477656ebc2b3aa00fcfbe197000009c26b40@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7bdc83513c12db1827b79b8d57a7a0975a25d28bc6c5efe590ec1e02@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0f5e9b93133ef3aaf31484bc3e15cc4b85f8af0fe4de2dacd9379d72@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r5a9462096c71593e771602beb0e69357adb5175d9a5c18d5181e0ab4@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r1ed79516bd6d248ea9f0e704dbfd7de740d5a75b71c7be8699fec824@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rde782fd8e133f7e04e50c8aaa4774df524367764eb5b85bf60d96747@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2d17b2a4803096ba427f3575599ea29b55f5cf9dbc1f12ba044cae1a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd7e62e2972a41c2658f41a824b8bdd15644d80fcadc51fe7b7c855de@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb8c007f87dc57731a7b9a3b05364530422535b7e0bc6a0c5b68d4d55@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/ra5b7313d8cc9411db6790adfba33f2cf0665cb77adb7b02043c95867@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0d95e01f52667f44835c40f6dea72bb4397f33cd70a564ea74f3836d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r761a52f1e214efec286ee80045d0012e955eebaa72395ad62cccbcfc@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r70f8bcccd304bd66c1aca657dbfc2bf11f73add9032571b01f1f733d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r77dd041d8025a869156481d2268c67ad17121f64e31f9b4a1a220145@%3Cissues.beam.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rdddb4b06e86fd58a1beda132f22192af2f9b56aae8849cb3767ccd55@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rf00ea6376f3d0e8b8f62cf6d4a4f28b24e27193acd2c851f618aa41e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/re5706141ca397587f7ee0f500a39ccc590a41f802fc125fc135cb92f@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-g3wg-6mcf-8jj6', 'https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/rfe5caef1fd6cf4b8ceac1b63c33195f2908517b665c946c020d3fbd6@%3Cissues.beam.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r3a763de620be72b6d74f46ec4bf39c9f35f8a0b39993212c0ac778ec@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1d40368a309f9d835dcdd900249966e4fcbdf98c1cc4c84db2cd9964@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r73b5a9b677b707bbb7c1469ea746312c47838b312603bada9e382bba@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/raf9c581b793c30ff8f55f2415c7bd337eb69775aae607bf9ed1b16fb@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6dfa64ecc3d67c1a71c08bfa04064549179d499f8e20a8285c57bd51@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r09b345099b4f88d2bed7f195a96145849243fb4e53661aa3bcf4c176@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3042a9dd2973aa229e52d022df7813e4d74b67df73bfa6d97bb0caf8@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r1dbb87c9255ecefadd8de514fa1d35c1d493c0527d7672cf40505d04@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re08b03cd1754b32f342664eead415af48092c630c8e3e0deba862a26@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r2e02700f7cfecb213de50be83e066086bea90278cd753db7fdc2ccff@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r87b0c69fef09277333a7e1716926d1f237d462e143a335854ddd922f@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r819857361f5a156e90d6d06ccf6c41026bc99030d60d0804be3a9957@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0df8fe10fc36028cf6d0381ab66510917d0d68bc5ef7042001d03830@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r9b790fe3a93121199f41258474222f15002b2f729495aa7ecbf90718@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc4b972ea10c5a65c6a88a6e233778718ab9af7f484affdd5e5de0cff@%3Ccommits.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r8fead0144bb84d8714695c43607dca9c5101aa028a431ec695882fe5@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb5f2558ea2ac63633dfb04db1e8a6ea6bb1a2b8614899095e16c6233@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r5494fdaf4a0a42a15c49841ba7ae577d466d09239ee1050458da0f29@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd58b60ab2e49ebf21022e59e280feb25899ff785c88f31fe314aa5b9@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r66e99d973fd79ddbcb3fbdb24f4767fe9b911f5b0abb05d7b6f65801@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E', 'https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r336b1694a01858111e4625fb9ab2b07ad43a64a525cf6402e06aa6bf@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/ra55e04d5a73afcb8383f4386e2b26832c6e3972e53827021ab885943@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb7e159636b26156f6ef2b2a1a79b3ec9a026923b5456713e68f7c18e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r568d354961fa88f206dc345411fb11d245c6dc1a8da3e80187fc6706@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc2e24756d28580eeac811c5c6a12012c9f424b6e5bffb89f98ee3d03@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/rbc5a622401924fadab61e07393235838918228b3d8a1a6704295b032@%3Cissues.beam.apache.org%3E', 'https://github.com/eclipse/jetty.project/issues/5451', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://lists.apache.org/thread.html/rdbf1cd0ab330c032f3a09b453cb6405dccc905ad53765323bddab957@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7da5ae60d7973e8894cfe92f49ecb5b47417eefab4c77cc87514d3cf@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r1d45051310b11c6d6476f20d71b08ea97cb76846cbf61d196bac1c3f@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E', 'https://cwe.mitre.org/data/definitions/378.html', 'https://security.netapp.com/advisory/ntap-20201123-0005/', 'https://lists.apache.org/thread.html/r100c5c7586a23a19fdb54d8a32e17cd0944bdaa46277b35c397056f6@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r44115ebfbf3b7d294d7a75f2d30bcc822dab186ebbcc2dce11915ca9@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r18b6f10d9939419bae9c225d5058c97533cb376c9d6d0a0733ddd48d@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E', 'https://github.com/github/codeql/pull/4473', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0259b14ae69b87821e27fed1f5333ea86018294fd31aab16b1fac84e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r5a07f274f355c914054c7357ad6d3456ffaca064f26cd780acb90a9a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r4946ffd86ad6eb7cb7863311235c914cb41232380de8d9dcdb3c115c@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r1fe31643fc34b4a33ae3d416d92c271aa97663f1782767d25e1d9ff8@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/rb077d35f2940191daeefca0d6449cddb2e9d06bcf8f5af4da2df3ca2@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rad255c736fad46135f1339408cb0147d0671e45c376c3be85ceeec1a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r874688141495df766e62be095f1dfb0bf4a24ca0340d8e0215c03fab@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r93d5e81e879120d8d87925dbdd4045cb3afa9b066f4370f60b626ce3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1ef28b89ff0281c87ba3a7659058789bf28a99b8074191f1c3678db8@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053', 'https://lists.apache.org/thread.html/rfe6ba83d14545e982400dea89e68b10113cb5202a3dcb558ce64842d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r59e0878013d329dcc481eeafebdb0ee445b1e2852d0c4827b1ddaff2@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E', 'https://cwe.mitre.org/data/definitions/379.html', 'https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0e9efe032cc65433251ee6470c66c334d4e7db9101e24cf91a3961f2@%3Ccommits.directory.apache.org%3E', 'https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r8045eedd6bb74efcd8e01130796adbab98ee4a0d1273509fb1f2077a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r07525dc424ed69b3919618599e762f9ac03791490ca9d724f2241442@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rcdcf32952397c83a1d617a8c9cd5c15c98b8d0d38a607972956bde7e@%3Cissues.beam.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6', 'https://lists.apache.org/thread.html/r87d8337300a635d66f0bb838bf635cdfcbba6b92c608a7813adbf4f4@%3Cissues.beam.apache.org%3E'}
| null |
GHSA
|
GHSA-xw4p-crpj-vjx2
|
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
|
### Impact
The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39152](https://x-stream.github.io/CVE-2021-39152.html).
### Credits
m0d9 of the Security Team of Alibaba Cloud found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-39152'}
|
2022-04-22T15:42:45Z
|
2021-08-25T14:46:59Z
|
HIGH
| 8.5
|
{'CWE-502', 'CWE-918'}
|
{'https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-xw4p-crpj-vjx2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.debian.org/security/2021/dsa-5004', 'https://x-stream.github.io/CVE-2021-39152.html', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39152', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-cfx7-2xpc-8w4h
|
Division by zero in TFLite's implementation of `BatchToSpaceNd`
|
### Impact
The implementation of the `BatchToSpaceNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82):
```cc
TF_LITE_ENSURE_EQ(context, output_batch_size % block_shape[dim], 0);
output_batch_size = output_batch_size / block_shape[dim];
```
An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0.
### Patches
We have patched the issue in GitHub commit [2c74674348a4708ced58ad6eb1b23354df8ee044](https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29593'}
|
2021-05-21T14:27:01Z
|
2021-05-21T14:27:01Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29593', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfx7-2xpc-8w4h', 'https://github.com/advisories/GHSA-cfx7-2xpc-8w4h', 'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'}
| null |
GHSA
|
GHSA-89v2-g37m-g3ff
|
Improper Verification of Cryptographic Signature in aws-encryption-sdk-cli
|
### Impact
This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages.
This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages.
For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit.
Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data.
### Patches
Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues.
Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
### Workarounds
None
### For more information
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
| null |
2021-06-01T21:18:53Z
|
2021-06-01T21:18:53Z
|
MODERATE
| 0
|
{'CWE-347'}
|
{'https://github.com/aws/aws-encryption-sdk-cli/security/advisories/GHSA-89v2-g37m-g3ff', 'https://github.com/advisories/GHSA-89v2-g37m-g3ff'}
| null |
GHSA
|
GHSA-8ffc-79xg-29w8
|
Code Injection in Apache Cassandra
|
When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
|
{'CVE-2021-44521'}
|
2022-02-26T00:32:56Z
|
2022-02-12T00:00:48Z
|
CRITICAL
| 9.1
|
{'CWE-94'}
|
{'https://issues.apache.org/jira/browse/CASSANDRA-17352', 'https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356', 'https://security.netapp.com/advisory/ntap-20220225-0001/', 'http://www.openwall.com/lists/oss-security/2022/02/11/4', 'https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/', 'https://github.com/advisories/GHSA-8ffc-79xg-29w8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44521'}
| null |
GHSA
|
GHSA-qr28-7j6p-9hmv
|
Content Injection via TileJSON attribute in mapbox.js
|
Versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios.
If `L.mapbox.map` or `L.mapbox.tileLayer` are used to load untrusted TileJSON content from a non-Mapbox URL, it is possible for a malicious user with control over the TileJSON content to inject script content into the "attribution" value of the TileJSON which will be executed in the context of the page using Mapbox.js.
## Recommendation
Version 2.x: Update to version 2.1.7 or later.
Version 1.x: Update to version 1.6.5 or later.
|
{'CVE-2017-1000042'}
|
2021-09-16T21:03:24Z
|
2018-11-09T17:47:45Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/49', 'https://github.com/advisories/GHSA-qr28-7j6p-9hmv', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000042', 'https://nodesecurity.io/advisories/49', 'https://hackerone.com/reports/54327'}
| null |
GHSA
|
GHSA-gf7x-2j2x-7f73
|
Missing authorization in xwiki-platform
|
### Impact
Any user with edit right can copy the content of a page it does not have access to by using it as template of a new page.
### Patches
It has been patched in XWiki 13.2CR1 and 12.10.6
### Workarounds
There is no workaround beside patching.
### References
https://jira.xwiki.org/browse/XWIKI-18430
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org)
|
{'CVE-2022-23617'}
|
2022-02-11T15:01:15Z
|
2022-02-09T21:41:46Z
|
MODERATE
| 6.5
|
{'CWE-862'}
|
{'https://github.com/xwiki/xwiki-platform/commit/b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554', 'https://jira.xwiki.org/browse/XWIKI-18430', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23617', 'https://github.com/advisories/GHSA-gf7x-2j2x-7f73', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gf7x-2j2x-7f73', 'https://github.com/xwiki/xwiki-platform/commit/30c52b01559b8ef5ed1035dac7c34aaf805764d5'}
| null |
GHSA
|
GHSA-jf43-3v8j-qwwr
|
Data races in multiqueue
|
Affected versions of multiqueue unconditionally implemented `Send` for types used in queue implementations (`InnerSend<RW, T>`, `InnerRecv<RW, T>`, `FutInnerSend<RW, T>`, `FutInnerRecv<RW, T>`).
This allows users to send non-Send types to other threads, which can lead to data race bugs or other undefined behavior.
| null |
2021-08-25T20:59:56Z
|
2021-08-25T20:59:56Z
|
MODERATE
| 0
|
{'CWE-362'}
|
{'https://github.com/schets/multiqueue/issues/31', 'https://rustsec.org/advisories/RUSTSEC-2020-0143.html', 'https://github.com/advisories/GHSA-jf43-3v8j-qwwr'}
| null |
GHSA
|
GHSA-q43c-g2g7-6gxj
|
Cross-Site Request Forgery (CSRF) in keystone
|
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Request Forgery (CSRF). The package fails to validate the presence of the `X-CSRF-Token` header, which may allow attackers to carry actions on behalf of other users on all endpoints.
## Recommendation
Update to version 4.0.0 or later.
|
{'CVE-2017-16570'}
|
2021-06-10T21:18:40Z
|
2017-11-30T23:14:47Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://snyk.io/vuln/SNYK-JS-KEYSTONE-449663', 'https://www.npmjs.com/advisories/979', 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://github.com/keystonejs/keystone/pull/4478', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16570', 'https://github.com/advisories/GHSA-q43c-g2g7-6gxj', 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'https://github.com/keystonejs/keystone/issues/4437', 'https://www.exploit-db.com/exploits/43922/'}
| null |
GHSA
|
GHSA-pch5-whg9-qr2r
|
netmask npm package vulnerable to octal input data
|
The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.
|
{'CVE-2021-29418'}
|
2021-06-09T23:10:54Z
|
2021-03-29T21:32:05Z
|
MODERATE
| 5.3
|
{'CWE-20'}
|
{'https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/', 'https://github.com/advisories/GHSA-pch5-whg9-qr2r', 'https://security.netapp.com/advisory/ntap-20210604-0001/', 'https://sick.codes/sick-2021-011', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29418', 'https://www.npmjs.com/package/netmask', 'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4', 'https://vuln.ryotak.me/advisories/6'}
| null |
GHSA
|
GHSA-mj63-64x7-57xf
|
Path traversal in impacket
|
Multiple path traversal vulnerabilities exist in smbserver.py in Impacket before 0.9.23. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key.
|
{'CVE-2021-31800'}
|
2021-06-18T18:43:14Z
|
2021-06-18T18:43:14Z
|
CRITICAL
| 9.8
|
{'CWE-22'}
|
{'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2008', 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L3485', 'https://github.com/SecureAuthCorp/impacket/releases/tag/impacket_0_9_23', 'https://github.com/SecureAuthCorp/impacket/commit/99bd29e3995c254e2d6f6c2e3454e4271665955a', 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2958', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31800', 'https://github.com/advisories/GHSA-mj63-64x7-57xf', 'https://github.com/SecureAuthCorp/impacket/commit/49c643bf66620646884ed141c94e5fdd85bcdd2f', 'https://github.com/SecureAuthCorp/impacket/releases', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KRV2C5DATXBHG6TF6CEEX54KZ75THQS3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UF56LYB27LHEIFJTFHU3M75NMNNK2SCG/', 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L876', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPXDPWCAPVX3UWYZ3N2T5OLBSBBUHJP6/'}
| null |
GHSA
|
GHSA-pfwp-8pq4-g7pv
|
Moderate severity vulnerability that affects com.alipay.sofa:hessian
|
SOFA-Hessian through 4.0.2 allows remote attackers to execute arbitrary commands via a crafted serialized Hessian object because blacklisting of com.caucho.naming.QName and com.sun.org.apache.xpath.internal.objects.XString is mishandled, related to Resin Gadget.
|
{'CVE-2019-9212'}
|
2021-09-16T17:29:50Z
|
2019-03-06T17:36:08Z
|
CRITICAL
| 9.8
|
{'CWE-184', 'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9212', 'https://github.com/alipay/sofa-hessian/issues/34', 'https://github.com/advisories/GHSA-pfwp-8pq4-g7pv'}
| null |
GHSA
|
GHSA-j378-6mmw-hqfr
|
Denial of service vulnerability exists when System.IO.Pipelines improperly handles requests
|
A denial of service vulnerability exists when System.IO.Pipelines improperly handles requests, aka "System.IO.Pipelines Denial of Service." This affects .NET Core 2.1, System.IO.Pipelines, ASP.NET Core 2.1.
|
{'CVE-2018-8409'}
|
2022-04-26T19:05:24Z
|
2018-10-16T19:56:38Z
|
HIGH
| 7.5
| null |
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8409', 'http://www.securityfocus.com/bid/105223', 'https://github.com/advisories/GHSA-j378-6mmw-hqfr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8409'}
| null |
GHSA
|
GHSA-6rg3-8h8x-5xfv
|
Unchecked hostname resolution could allow access to local network resources by users outside the local network
|
### Impact
A newly implemented route allowing users to download files from remote endpoints was not properly verifying the destination hostname for user provided URLs. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible.
This vulnerability requires valid authentication credentials and is therefore **not exploitable by unauthenticated users**. If you are running an instance for yourself or other trusted individuals this impact is unlikely to be of major concern to you. However, you should still upgrade for security sake.
### Patches
Users should upgrade to the latest version of Wings.
### Workarounds
There is no workaround available that does not involve modifying Panel or Wings code.
| null |
2021-10-05T17:24:12Z
|
2021-06-23T18:04:50Z
|
MODERATE
| 6.4
|
{'CWE-284', 'CWE-441'}
|
{'https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv', 'https://github.com/advisories/GHSA-6rg3-8h8x-5xfv'}
| null |
GHSA
|
GHSA-q9cp-mc96-m4w2
|
XML External Entity in Dashboard Widget
|
### Problem
It has been discovered that RSS widgets are susceptible to XML external entity processing.
This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability with current PHP versions of supported and maintained system distributions.
At least with _libxml2_ version 2.9, the processing of XML external entities is disabled per default - and cannot be exploited. Besides that, a valid backend user account is needed.
### Solution
Update to TYPO3 version 10.4.10 that fixes the problem described.
|
{'CVE-2020-26229'}
|
2021-01-07T22:39:30Z
|
2020-11-23T21:18:44Z
|
LOW
| 3.7
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-q9cp-mc96-m4w2', 'https://typo3.org/security/advisory/typo3-core-sa-2020-012', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-q9cp-mc96-m4w2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26229'}
| null |
GHSA
|
GHSA-rjmq-6v55-4rjv
|
Improper Authorization in org.cometd.oort
|
### Impact
Internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels.
By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other user's (possibly sensitive) data.
By publishing to those channels, a remote user may be able to create/modify/delete other user's data and modify the cluster structure.
The issue impacts any version up to 5.0.10, 6.0.5 and 7.0.5.
### Patches
The issue has been fixed in 5.0.11, 6.0.6 and 7.0.6.
### Workarounds
The workaround is to install a custom `SecurityPolicy` that forbids subscription and publishing to remote, non-Oort, sessions on Oort and Seti channels.
This workaround could be implemented in any affected version.
### References
cometd/cometd#1146
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@webtide.com](mailto:security@webtide.com)
### Credits
https://www.redteam-pentesting.de/
|
{'CVE-2022-24721'}
|
2022-04-19T19:03:24Z
|
2022-03-15T19:02:36Z
|
HIGH
| 8.1
|
{'CWE-863'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24721', 'https://github.com/cometd/cometd/commit/bb445a143fbf320f17c62e340455cd74acfb5929', 'https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv', 'https://github.com/advisories/GHSA-rjmq-6v55-4rjv', 'https://github.com/cometd/cometd/issues/1146'}
| null |
GHSA
|
GHSA-65rm-h285-5cc5
|
Improper Certificate Validation in Twisted
|
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
|
{'CVE-2019-12855'}
|
2021-08-17T21:07:08Z
|
2019-08-16T14:02:35Z
|
HIGH
| 7.4
|
{'CWE-295'}
|
{'https://github.com/advisories/GHSA-65rm-h285-5cc5', 'https://github.com/twisted/twisted/pull/1147', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12855', 'https://twistedmatrix.com/trac/ticket/9561'}
| null |
GHSA
|
GHSA-8mjx-h23h-w2pg
|
Double free in stack_dst
|
An issue was discovered in the stack_dst crate before 0.6.1 for Rust. Because of the push_inner behavior, a double free can occur upon a val.clone() panic.
|
{'CVE-2021-28034'}
|
2021-09-01T18:30:44Z
|
2021-09-01T18:30:44Z
|
CRITICAL
| 9.8
|
{'CWE-415'}
|
{'https://github.com/advisories/GHSA-8mjx-h23h-w2pg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28034', 'https://rustsec.org/advisories/RUSTSEC-2021-0033.html', 'https://github.com/thepowersgang/stack_dst-rs/commit/2a4d53809e3000f40085f2b229b6b1a33759881d'}
| null |
GHSA
|
GHSA-6w83-22gj-5pv9
|
Directory Traversal in cyber-js
|
Affected versions of `cyber-js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16093'}
|
2021-01-08T19:20:25Z
|
2018-07-27T14:06:00Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16093', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cyber-js', 'https://github.com/advisories/GHSA-6w83-22gj-5pv9', 'https://nodesecurity.io/advisories/347', 'https://www.npmjs.com/advisories/347'}
| null |
GHSA
|
GHSA-v33x-prhc-gph5
|
Insufficiently Protected Credentials and Improper Authentication in Spring Security
|
Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of ?null?.
|
{'CVE-2019-11272'}
|
2021-06-09T20:12:58Z
|
2019-06-27T17:24:58Z
|
HIGH
| 7.3
|
{'CWE-287', 'CWE-522'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-11272', 'https://github.com/advisories/GHSA-v33x-prhc-gph5', 'https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html', 'https://pivotal.io/security/cve-2019-11272'}
| null |
GHSA
|
GHSA-mqvp-7rrg-9jxc
|
Improper Input Validation and Allocation of Resources Without Limits or Throttling in poi-scratchpad
|
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
|
{'CVE-2022-26336'}
|
2022-03-29T19:10:59Z
|
2022-03-05T00:00:44Z
|
MODERATE
| 5.5
|
{'CWE-20', 'CWE-770'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26336', 'https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j', 'https://github.com/advisories/GHSA-mqvp-7rrg-9jxc'}
| null |
GHSA
|
GHSA-6qq8-5wq3-86rp
|
Open redirect in Traefik
|
## Summary
There exists a potential open redirect vulnerability in Traefik's handling of the `X-Forwarded-Prefix` header. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios.
## Details
The Traefik API dashboard component doesn't validate that the value of the header `X-Forwarded-Prefix` is a site relative path and will redirect to any header provided URI.
e.g.
```
$ curl --header 'Host:traefik.localhost' --header 'X-Forwarded-Prefix:https://example.org' 'http://localhost:8081'
<a href="https://example.org/dashboard/">Found</a>.`
```
### Impact
A successful exploitation of an open redirect can be used to entice victims to disclose sensitive information.
### Workarounds
By using the `headers` middleware, the request header `X-Forwarded-Prefix` value can be overridden by the value `.` (dot)
- https://docs.traefik.io/v2.2/middlewares/headers/#customrequestheaders
- https://docs.traefik.io/v1.7/basics/#custom-headers
### For more information
If you have any questions or comments about this advisory, open an issue in [Traefik](https://github.com/containous/traefik/issues).
## Credit
This issue was found by the GitHub Application Security Team and reported on behalf of the GHAS by the GitHub Security Lab Team.
|
{'CVE-2020-15129'}
|
2022-04-19T19:02:31Z
|
2022-02-11T23:19:21Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://github.com/containous/traefik/commit/e63db782c11c7b8bfce30be4c902e7ef8f9f33d2', 'https://github.com/containous/traefik/releases/tag/v1.7.26', 'https://github.com/containous/traefik/releases/tag/v2.3.0-rc3', 'https://github.com/containous/traefik/commit/cfa04c300c5db95ae8a52c31a9d973b6dd9c2254', 'https://github.com/containous/traefik/pull/7109', 'https://github.com/advisories/GHSA-6qq8-5wq3-86rp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15129', 'https://github.com/containous/traefik/releases/tag/v2.2.8', 'https://github.com/containous/traefik/security/advisories/GHSA-6qq8-5wq3-86rp'}
| null |
GHSA
|
GHSA-rc75-cf5c-mxvh
|
Use of Cryptographically Weak Pseudo-Random Number Generator in org.pac4j:pac4j-saml
|
The SAML identifier generated within SAML2Utils.java was found to make use of the apache commons-lang3 RandomStringUtils class which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong. This issue only affects the 3.X release of pac4j-saml.
|
{'CVE-2019-10755'}
|
2021-08-18T22:08:18Z
|
2019-11-06T17:06:28Z
|
MODERATE
| 4.9
|
{'CWE-338'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10755', 'https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407', 'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609', 'https://github.com/advisories/GHSA-rc75-cf5c-mxvh'}
| null |
GHSA
|
GHSA-h73q-5wmj-q8pj
|
Cross site scripting in datatables.net
|
This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped.
|
{'CVE-2021-23445'}
|
2021-10-13T17:26:02Z
|
2021-09-29T17:11:28Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23445', 'https://github.com/advisories/GHSA-h73q-5wmj-q8pj', 'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b', 'https://cdn.datatables.net/1.11.3/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371'}
| null |
GHSA
|
GHSA-vjv5-gp2w-65vm
|
Encoded URIs can access WEB-INF directory in Eclipse Jetty
|
### Description
URIs can be crafted using some encoded characters to access the content of the `WEB-INF` directory and/or bypass some security constraints.
This is a variation of the vulnerability reported in [CVE-2021-28164](https://nvd.nist.gov/vuln/detail/CVE-2021-28164)/[GHSA-v7ff-8wcx-gmc5](https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5).
### Impact
The default compliance mode allows requests with URIs that contain a %u002e segment to access protected resources within the WEB-INF directory. For example, a request to `/%u002e/WEB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. Similarly, an encoded null character can prevent correct normalization so that /.%00/WEB-INF/web.xml cal also retrieve the web.xml file.
### Workarounds
Some Jetty [rewrite rules](https://www.eclipse.org/jetty/documentation/jetty-9/index.html#rewrite-handler) can be deployed to rewrite any request containing encoded dot segments or null characters in the raw request URI, to a known not found resource:
```xml
<Call name="addRule">
<Arg>
<New class="org.eclipse.jetty.rewrite.handler.RewriteRegexRule">
<Set name="regex">.*/(?:\.+/)+.*</Set>
<Set name="replacement">/WEB-INF/Not-Found</Set>
</New>
</Arg>
</Call>
<Call name="addRule">
<Arg>
<New class="org.eclipse.jetty.rewrite.handler.ValidUrlRule"/>
</Arg>
</Call>
```
### Analysis
Prior to 9.4.37, Jetty was protected from this style of attack by two lines of defense:
+ URIs were decoded first and then normalized for `.` and `..` sequences. Whilst this is not according to the RFC, it did remove relative segments that were encoded or parameterized and made the resulting URI paths safe from any repeated normalization (often done by URI manipulation and file system mapping).
+ The `FileResource` class treated any difference between absolute path and canonical path of a resource as an alias, and thus the resource would not be served by default.
Prior to 9.4.37, the `FileResource` class was replaced by the `PathResource` class that did not treat normalization differences as aliases. Then release 9.4.37 updated the URI parsing to be compliant with the RFC, in that normalization is done before decoding. This allowed various encodings or adornments to relative path segments that would not be normalized by the pure RFC URI normalization, but were normalized by the file system, thus allowing protected resources to be accessed via an alias. Specifically by decoding URIs after normalization, it left them vulnerable to any subsequent normalization (potentially after checking security constraints) changing the URI singificantly. Such extra normalization is often down by URI manipulation code and file systems.
With Jetty releases 9.4.43, 10.0.6, 11.0.6, we have restored several lines of defense:
+ URIs are first decoded and then normalized which is not strictly according to the current RFC. Since the normalization is done after decoding, the URI paths produced are safe from further normalisation and the referenced resource cannot easily be so changed after passing security constraints.
+ During URI parsing checks are made for some specific segments/characters that are possible to be seen ambiguously by an application (e.g. encode dot segments, encoded separators, empty segments, parameterized dot segments and/or null characters). So even though Jetty code handles these URIs correctly, there is a risk that an application may not do so, thus such requests are rejected with a 400 Bad Request unless a specific compliance mode is set.
+ Once decoded and normalized by initial URI processing, Jetty will not decode or normalize a received URI again within its own resource handling. This avoids to possibility of double decode attacks.
+ The `ContextHandler.getResource(String path)` method always checks that the passed path is normalized, only accepting a non normal path if approved by an AliasChecker. This is the method that is directly used by Jetty resource serving.
+ The API methods like `ServletContext.getResource(String path)` will normalize the prior to calling `ContextHandler.getResource(String path)`. This allows applications to use non normal paths.
+ The `PathResource` class now considers any difference in normal/canonical name between a request resource name and the found resource name to be an alias, which will only be served if approved by an explicit `AliasChecker`
In summary, the defense is a front line of detection of specific known URI alias attacks, with the last line defense of not allowing any aliasing of resources.
Many thanks to @cangqingzhe from @CloverSecLabs for reporting this issue.
|
{'CVE-2021-34429'}
|
2022-04-22T15:44:29Z
|
2021-07-19T15:15:24Z
|
MODERATE
| 5.3
|
{'CWE-200', 'CWE-551', 'CWE-863'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r2e32390cb7aedb39069e5b18aa130ca53e766258518faee63c31d3ea@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34429', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm', 'https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.43.v20210629', 'https://lists.apache.org/thread.html/r0626f279ebf65506110a897e3a57ccd4072803ee5434b2503e070398@%3Ccommits.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210819-0006/', 'https://lists.apache.org/thread.html/r029c0c6833c8bb6acb094733fd7b75029d633f47a92f1c9d14391fc0@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r46f748c1dc9cf9b6c1c18f6b5bfc3a869907f68f72e17666f2f30f24@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcb157f55b9ae41b3076801de927c6fca1669c6d8eaf11a9df5dbeb46@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r46900f74dbb7d168aeac43bf0e7f64825376bb7eb74d31a5b33344ce@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rb33d65c3e5686f2e3b9bb8a032a44163b2f2ad9d31a8727338f213c1@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r48a93f2bc025acd7c7e341ed3864bfdeb75f0c768d41bc247e1a1f63@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5678d994d4dd8e7c838eed3bbc1a83a7f6bc62724b0cce67e8892a45@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re3de01414ccf682fe0951205f806dd8e94440798fd64c55a4941de3e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r679d96f981d4c92724090ed2d5e8565a1d655a72bb315550489f052e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r756443e9d50af7e8c3df82e2c45105f452c8e8195ddbc0c00f58d5fe@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r02f940c27e997a277ff14e79e84551382e1081e8978b417e0c2b0857@%3Ccommits.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re850203ef8700cb826534dd4a1cb9f5b07bb8f6f973b39ff7838d3ba@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rc26807be68748b3347decdcd03ae183622244b0b4cb09223d4b7e500@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r3aefe613abce594c71ace50088d2529bbde65d08b8e7ff2c2723aaa1@%3Cdev.santuario.apache.org%3E', 'https://lists.apache.org/thread.html/r6e6f50c1ce1fb592cb43e913f5be23df104d50751465f8f1952ace0c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r721ab6a5fa8d45bec76714b674f5d4caed2ebfeca69ad1d6d4caae6c@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4727d282b5c2d951057845a46065d59f6e33132edc0a14f41c26b01e@%3Cdev.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-vjv5-gp2w-65vm', 'https://lists.apache.org/thread.html/r833a4c8bdbbfeb8a2cd38238e7b59f83edd5c1a0e508b587fc551a46@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re01890eef49d4201018f2c97e26536e3e75f441ecdbcf91986c3bc17@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r9d245c6c884bbc804a472116d730c1a01676bf24f93206a34923fc64@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r74fdc446df551fe89a0a16957a1bfdaad19380e0c1afd30625685a9c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r44ea39ca8110de7353bfec88f58aa3aa58a42bb324b8772512ee190c@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9e6158d72ef25077c2dc59fbddade2eacf7d259a2556c97a989f2fe8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/re5e9bb535db779506013ef8799dc2a299e77cdad6668aa94c456dba6@%3Cjira.kafka.apache.org%3E'}
| null |
GHSA
|
GHSA-mhp6-pxh8-r675
|
Cross site scripting in Angular
|
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.
|
{'CVE-2020-7676'}
|
2021-09-22T18:31:00Z
|
2020-06-18T14:19:58Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7676', 'https://lists.apache.org/thread.html/r455ebd83a1c69ae8fd897560534a079c70a483dbe1e75504f1ca499b@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r3f05cfd587c774ea83c18e59eda9fa37fa9bbf3421484d4ee1017a20@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb6423268b25db0f800359986867648e11dbd38e133b9383e85067f02@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r446c297cd6cda2bd7e345c9b0741d7f611df89902e5d515848c6f4b1@%3Cozone-issues.hadoop.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-570058', 'https://github.com/angular/angular.js/pull/17028', 'https://lists.apache.org/thread.html/r57383582dcad2305430321589dfaca6793f5174c55da6ce8d06fbf9b@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://github.com/angular/angular.js/pull/17028,', 'https://github.com/advisories/GHSA-mhp6-pxh8-r675', 'https://lists.apache.org/thread.html/r79e3feaaf87b81e80da0e17a579015f6dcb94c95551ced398d50c8d7@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r80f210a5f4833d59c5d3de17dd7312f9daba0765ec7d4052469f13f1@%3Cozone-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rfa2b19d01d10a8637dc319a7d5994c3dbdb88c0a8f9a21533403577a@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r198985c02829ba8285ed4f9b1de54a33b5f31b08bb38ac51fc86961b@%3Cozone-issues.hadoop.apache.org%3E'}
| null |
GHSA
|
GHSA-c5x2-p679-95wc
|
Null pointer dereference in `SparseTensorSliceDataset`
|
### Impact
When a user does not supply arguments that determine a valid sparse tensor, `tf.raw_ops.SparseTensorSliceDataset` implementation can be made to dereference a null pointer:
```python
import tensorflow as tf
tf.raw_ops.SparseTensorSliceDataset(
indices=[[],[],[]],
values=[1,2,3],
dense_shape=[3,3])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L240-L251) has some argument validation but fails to consider the case when either `indices` or `values` are provided for an empty sparse tensor when the other is not.
If `indices` is empty (as in the example above), then [code that performs validation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L260-L261) (i.e., checking that the indices are monotonically increasing) results in a null pointer dereference:
```cc
for (int64_t i = 0; i < indices->dim_size(0); ++i) {
int64_t next_batch_index = indices->matrix<int64>()(i, 0);
...
}
```
If `indices` as provided by the user is empty, then `indices` in the C++ code above is backed by an empty `std::vector`, hence calling `indices->dim_size(0)` results in null pointer dereferencing (same as calling `std::vector::at()` on an empty vector).
### Patches
We have patched the issue in GitHub commit [02cc160e29d20631de3859c6653184e3f876b9d7](https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37647'}
|
2021-08-25T14:43:32Z
|
2021-08-25T14:43:32Z
|
HIGH
| 7.7
|
{'CWE-476'}
|
{'https://github.com/advisories/GHSA-c5x2-p679-95wc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37647', 'https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c5x2-p679-95wc'}
| null |
GHSA
|
GHSA-cq6w-w5rj-p9x8
|
Cross-site Scripting in Froala Editor
|
Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain conditions, a base64 crafted string leads to persistent Cross-site scripting (XSS) vulnerability within the hyperlink creation module.
|
{'CVE-2021-30109'}
|
2021-10-06T17:47:05Z
|
2021-10-06T17:47:05Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-cq6w-w5rj-p9x8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30109', 'http://froala.com', 'https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md'}
| null |
GHSA
|
GHSA-fxq4-r6mr-9x64
|
CSRF Vuln can expose user's QRcode
|
### Impact
When a user is setting up two-factor authentication using an authenticator app, a QRcode is generated and made available via a GET request to /tf-qrcode. Since GETs do not have any CSRF protection, it is possible a malicious 3rd party could access the QRcode and therefore gain access to two-factor authentication codes. Note that the /tf-qrcode endpoint is ONLY accessible while the user is initially setting up their device. Once setup is complete, there is no vulnerability.
### Patches
This is fixed in the upcoming 4.0.0 release.
### Workarounds
You can provide your own URL for fetching the QRcode by defining SECURITY_TWO_FACTOR_QRCODE_URL and providing your own implementation (that presumably required a POST with CSRF protection). This would require changing the two-factor setup template as well.
### References
None.
### For more information
If you have any questions or comments about this advisory:
* Read this pull request: #423
| null |
2021-04-08T16:46:00Z
|
2021-04-08T16:46:00Z
|
LOW
| 0
|
{'CWE-352'}
|
{'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-fxq4-r6mr-9x64', 'https://github.com/advisories/GHSA-fxq4-r6mr-9x64', 'https://pypi.org/project/Flask-Security-Too'}
| null |
GHSA
|
GHSA-jpwg-6gf5-5vh9
|
Out of bounds write in reorder
|
An issue was discovered in the reorder crate through 1.1.0 for Rust. swap_index can return uninitialized values if an iterator returns a len() that is too large.
|
{'CVE-2021-29942'}
|
2021-08-25T20:54:10Z
|
2021-08-25T20:54:10Z
|
HIGH
| 7.3
|
{'CWE-787'}
|
{'https://rustsec.org/advisories/RUSTSEC-2021-0050.html', 'https://github.com/tiby312/reorder/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29942', 'https://github.com/advisories/GHSA-jpwg-6gf5-5vh9'}
| null |
GHSA
|
GHSA-2m8h-fgr8-2q9w
|
Pivotal Spring Framework Paths provided to the ResourceServlet were not properly sanitized
|
An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks.
|
{'CVE-2016-9878'}
|
2022-04-26T18:36:46Z
|
2018-10-04T20:29:55Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://pivotal.io/security/cve-2016-9878', 'https://security.netapp.com/advisory/ntap-20180419-0002/', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://github.com/advisories/GHSA-2m8h-fgr8-2q9w', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9878', 'http://www.securityfocus.com/bid/95072', 'http://www.securitytracker.com/id/1040698', 'https://access.redhat.com/errata/RHSA-2017:3115'}
| null |
GHSA
|
GHSA-cpgw-2wxr-pww3
|
Open Redirect
|
Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.
|
{'CVE-2018-15178'}
|
2021-06-29T18:32:39Z
|
2021-06-29T18:32:39Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://github.com/gogs/gogs/commit/1f247cf8139cb483276cd8dd06385a800ce9d4b2', 'https://github.com/advisories/GHSA-cpgw-2wxr-pww3', 'https://github.com/gogs/gogs/issues/5364', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15178', 'https://github.com/gogs/gogs/pull/5365'}
| null |
GHSA
|
GHSA-7h6j-2268-fhcm
|
Improper Certificate Handling
|
configurationwatcher.go in Traefik 2.x before 2.1.4 and TraefikEE 2.0.0 mishandles the purging of certificate contents from providers before logging.
|
{'CVE-2020-9321'}
|
2021-09-02T22:00:01Z
|
2021-09-02T22:00:01Z
|
MODERATE
| 4.6
|
{'CWE-200', 'CWE-295'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-9321', 'https://github.com/containous/traefik/releases/tag/v2.1.4', 'https://github.com/containous/traefik/pull/6281', 'https://github.com/advisories/GHSA-7h6j-2268-fhcm'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.