ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-g2xc-35jw-c63p
HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress
### Impact Waitress would parse the `Transfer-Encoding` header and only look for a single string value, if that value was not `chunked` it would fall through and use the `Content-Length` header instead. According to the HTTP standard `Transfer-Encoding` should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with `chunked`. Requests sent with: ``` Transfer-Encoding: gzip, chunked ``` Would incorrectly get ignored, and the request would use a `Content-Length` header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. ### Patches This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies. Waitress will now return a 501 Not Implemented error if the `Transfer-Encoding` is not `chunked` or contains multiple elements. Waitress does not support any transfer codings such as `gzip` or `deflate`. The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don't cause any changes in behavior. ### Workarounds Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn't use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method). ### Issues/more security issues: * open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) * email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)
{'CVE-2019-16786'}
2022-04-25T23:07:25Z
2019-12-20T23:04:18Z
HIGH
7.1
{'CWE-444'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16786', 'https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p', 'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://github.com/advisories/GHSA-g2xc-35jw-c63p', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes', 'https://access.redhat.com/errata/RHSA-2020:0720', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/'}
null
GHSA
GHSA-7xx3-m584-x994
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack
## Keepalive thread overload/DoS ### Impact A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. ### Patches This vulnerability is patched in Puma 4.3.1 and 3.12.2. ### Workarounds Reverse proxies in front of Puma could be configured to always allow less than X keepalive connections to a Puma cluster or process, where X is the number of threads configured in Puma's thread pool. ### For more information If you have any questions or comments about this advisory: * Open an issue at [puma](github.com/puma/puma).
{'CVE-2019-16770'}
2021-01-08T19:12:48Z
2019-12-05T19:26:37Z
MODERATE
5.3
{'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16770', 'https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994', 'https://github.com/advisories/GHSA-7xx3-m584-x994'}
null
GHSA
GHSA-6866-x7cf-rmh5
Directory Traversal in sencisho
Affected versions of `sencisho` are vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16092'}
2021-01-08T19:47:05Z
2018-07-24T13:50:01Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/340', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/sencisho', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16092', 'https://nodesecurity.io/advisories/340', 'https://github.com/advisories/GHSA-6866-x7cf-rmh5'}
null
GHSA
GHSA-rch9-xh7r-mqgw
Cross-Site Scripting in simple-server
Versions of `simple-server` before 1.1.0 are vulnerable to stored cross-site scripting (XSS). This is exploitable if an attacker can control a filename on the server. ## Recommendation Update to version 1.1.0 or later.
{'CVE-2018-3717'}
2021-01-08T01:58:09Z
2018-07-26T15:08:05Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-rch9-xh7r-mqgw', 'https://hackerone.com/reports/309641', 'https://github.com/JacksonTian/anywhere/issues/33#issuecomment-366527448', 'https://www.npmjs.com/advisories/584', 'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b', 'https://hackerone.com/reports/309394', 'https://www.npmjs.com/advisories/595', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3717'}
null
GHSA
GHSA-qg54-694p-wgpp
Regular expression denial of service vulnerability (ReDoS) in date
Date’s parsing methods including Date.parse are using Regexps internally, some of which are vulnerable against regular expression denial of service. Applications and libraries that apply such methods to untrusted input may be affected. The fix limits the input length up to 128 bytes by default instead of changing the regexps. This is because Date gem uses many Regexps and it is possible that there are still undiscovered vulnerable Regexps. For compatibility, it is allowed to remove the limitation by explicitly passing limit keywords as nil like Date.parse(str, limit: nil), but note that it may take a long time to parse. Please update the date gem to version 3.2.1, 3.1.2, 3.0.2, and 2.0.1, or later. You can use gem update date to update it. If you are using bundler, please add gem "date", ">= 3.2.1" to your Gemfile. If you import `date` from the standard library rather than as a gem you should update your Ruby install to `3.0.3`, `2.7.5`, `2.6.9` or later. Users unable to upgrade may consider using `Date.strptime` instead with a predefined date format ```ruby Date.strptime('2001-02-20', '%Y-%m-%d') ```
{'CVE-2021-41817'}
2022-03-17T23:00:37Z
2021-11-16T00:32:30Z
MODERATE
0
{'CWE-1333'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41817', 'https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/', 'https://hackerone.com/reports/1254844', 'https://github.com/advisories/GHSA-qg54-694p-wgpp', 'https://github.com/ruby/date/commit/3959accef8da5c128f8a8e2fd54e932a4fb253b0'}
null
GHSA
GHSA-9j59-75qj-795w
Path traversal in Pillow
If the path to the temporary directory on Linux or macOS contained a space, this would break removal of the temporary image file after im.show() (and related actions), and potentially remove an unrelated file. This been present since PIL.
{'CVE-2022-24303'}
2022-04-07T15:09:46Z
2022-03-11T23:10:32Z
CRITICAL
9.1
null
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W4ZUXPKEX72O3E5IHBPVY5ZCPMJ4GHHV/', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security', 'https://github.com/advisories/GHSA-9j59-75qj-795w', 'https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XR6UP2XONXOVXI4446VY72R63YRO2YTP/', 'https://github.com/python-pillow/Pillow/pull/3450', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24303'}
null
GHSA
GHSA-v648-p92f-9996
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0925'}
2021-03-29T20:57:39Z
2021-03-29T20:57:39Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0925', 'https://github.com/advisories/GHSA-v648-p92f-9996', 'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0925'}
null
GHSA
GHSA-xxr8-833v-c7wc
Moderate severity vulnerability that affects rails
Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an "html" substring.
{'CVE-2011-4319'}
2021-09-22T18:27:19Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-79'}
{'http://openwall.com/lists/oss-security/2011/11/18/8', 'https://github.com/advisories/GHSA-xxr8-833v-c7wc', 'http://www.securitytracker.com/id?1026342', 'http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released', 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1', 'http://www.securityfocus.com/bid/50722', 'http://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released', 'http://osvdb.org/77199', 'https://nvd.nist.gov/vuln/detail/CVE-2011-4319', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/71364'}
null
GHSA
GHSA-jfcc-rm7f-xgf8
Cross-Site Scripting in mavon-editor
All versions of `mavon-editor` are vulnerable to Cross-Site Scripting. The package fails to sanitize entered input, allowing attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-11-29T17:41:18Z
2020-09-03T20:36:35Z
MODERATE
6.5
{'CWE-79'}
{'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72', 'https://www.npmjs.com/advisories/1169', 'https://github.com/advisories/GHSA-jfcc-rm7f-xgf8', 'https://github.com/hinesboy/mavonEditor/issues/472', 'https://github.com/hinesboy/mavonEditor/pull/548', 'https://snyk.io/vuln/SNYK-JS-MAVONEDITOR-459108', 'https://www.npmjs.com/package/mavon-editor'}
null
GHSA
GHSA-5875-p652-2ppm
Exposure of Resource to Wrong Sphere in microweber
Exposure of Resource to Wrong Sphere in microweber prior to 1.3 allows users to add deleted products to a cart and buy it.
{'CVE-2022-0762'}
2022-03-09T20:31:40Z
2022-02-27T00:00:16Z
MODERATE
4.3
{'CWE-668'}
{'https://huntr.dev/bounties/125b5244-5099-485e-bf75-e5f1ed80dd48', 'https://github.com/microweber/microweber/commit/76361264d9fdfff38a1af79c63141455cc4d36e3', 'https://github.com/advisories/GHSA-5875-p652-2ppm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0762'}
null
GHSA
GHSA-4v5p-v5h9-6xjx
`CHECK`-failures in Tensorflow
### Impact An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. ### Patches We have patched the issue in GitHub commit [c2b31ff2d3151acb230edc3f5b1832d2c713a9e0](https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23565'}
2022-02-11T15:06:54Z
2022-02-09T23:49:01Z
MODERATE
6.5
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx', 'https://github.com/advisories/GHSA-4v5p-v5h9-6xjx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23565', 'https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0'}
null
GHSA
GHSA-9chw-xrwx-f86j
Downloads Resources over HTTP in frames-compiler
Affected versions of `frames-compiler` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `frames-compiler`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10649'}
2021-01-14T15:57:36Z
2020-09-01T16:07:53Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/247', 'https://nodesecurity.io/advisories/247', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10649', 'https://github.com/advisories/GHSA-9chw-xrwx-f86j'}
null
GHSA
GHSA-5x33-h32w-6vr2
Cross site-scripting (XSS) moodle
The filter in the tag manager required extra sanitizing to prevent a reflected XSS risk. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.
{'CVE-2020-25628'}
2021-03-29T20:43:15Z
2021-03-29T20:43:15Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/moodle/moodle/commit/e8632a4ad0b4da3763cbbe5949594aa449b483bb', 'https://github.com/advisories/GHSA-5x33-h32w-6vr2', 'https://moodle.org/mod/forum/discuss.php?d=410840', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25628', 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69340'}
null
GHSA
GHSA-vgwr-773q-7j3c
Path Traversal within joomla/archive zip class
An issue was discovered in Joomla! 3.0.0 through 3.9.24. Extracting an specifilcy crafted zip package could write files outside of the intended path.
{'CVE-2021-26028'}
2021-03-24T17:58:13Z
2021-03-24T17:58:13Z
MODERATE
0
{'CWE-22'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/joomla/archive/CVE-2021-26028.yaml', 'https://github.com/advisories/GHSA-vgwr-773q-7j3c', 'https://github.com/joomla-framework/archive/commit/32c9009a1020d16bc1060c0d06339898b697cf2c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26028', 'https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html'}
null
GHSA
GHSA-hj5w-xgw9-w4rj
Malicious Package in coinstrng
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:58:49Z
2020-09-03T19:41:44Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1385', 'https://github.com/advisories/GHSA-hj5w-xgw9-w4rj'}
null
GHSA
GHSA-mmjr-5q74-p3m4
Exposure of Resource to Wrong Sphere in Drupal Core
Information Disclosure vulnerability in file module of Drupal Core allows an attacker to gain access to the file metadata of a permanent private file that they do not have access to by guessing the ID of the file. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6.
{'CVE-2020-13670'}
2022-02-26T00:27:15Z
2022-02-12T00:00:47Z
HIGH
7.5
{'CWE-668'}
{'https://www.drupal.org/sa-core-2020-011', 'https://github.com/advisories/GHSA-mmjr-5q74-p3m4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13670'}
null
GHSA
GHSA-6rw3-3whw-jvjj
Git LFS can execute a binary from the current directory on Windows
### Impact On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run. More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended program is not found in any directory listed in `PATH`. The vulnerability occurs because when Git LFS detects that the program it intends to run does not exist in any directory listed in `PATH` then Git LFS passes an empty string as the executable file path to the Go `os/exec` package, which contains a bug such that, on Windows, it prepends the name of the current working directory (i.e., `.`) to the empty string without adding a path separator, and as a result searches in that directory for a file with the base name `.` combined with any file extension from `PATHEXT`, executing the first one it finds. (The reason `..bat` and `..cmd` files are not executed in the same manner is that, although the Go `os/exec` package tries to execute them just as it does a `..exe` file, the Microsoft Win32 API `CreateProcess()` family of functions have an undocumented feature in that they apparently recognize when a caller is attempting to execute a batch script file and instead run the `cmd.exe` command interpreter, passing the full set of command line arguments as parameters. These are unchanged from the command line arguments set by Git LFS, and as such, the intended program's name is the first, resulting in a command line like `cmd.exe /c git`, which then fails.) Git LFS has resolved this vulnerability by always reporting an error when a program is not found in any directory listed in `PATH` rather than passing an empty string to the Go `os/exec` package in this case. The bug in the Go `os/exec` package has been reported to the Go project and is expected to be patched after this security advisory is published. ### Patches The problem was introduced in v2.12.1 and is patched in v3.1.3 and v3.1.4. Users of affected versions should upgrade to v3.1.4. ### Workarounds There are no known workarounds at this time. ### References * https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6rw3-3whw-jvjj * https://nvd.nist.gov/vuln/detail/CVE-2022-24826 * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24826 * https://github.com/git-lfs/git-lfs/releases/tag/v3.1.4 * [git-lfs/git-lfs@762ccd4a49](https://github.com/git-lfs/git-lfs/commit/762ccd4a498f5c17723b91d56b9304434ada5540) ### For more information If you have any questions or comments about this advisory: * For general questions, start a discussion in the Git LFS [discussion forum](https://github.com/git-lfs/git-lfs/discussions). * For reports of additional vulnerabilities, please follow the Git LFS [security reporting policy](https://github.com/git-lfs/git-lfs/blob/main/SECURITY.md).
{'CVE-2022-24826'}
2022-04-22T20:13:24Z
2022-04-22T20:13:21Z
CRITICAL
9.8
{'CWE-426'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24826', 'https://github.com/advisories/GHSA-6rw3-3whw-jvjj', 'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6rw3-3whw-jvjj'}
null
GHSA
GHSA-7fw7-gh23-f832
Vulnerability in singleCrunch function leads to arbitrary code execution via filePath parameters
aaptjs is a node wraper for aapt. An issue was discovered in the singleCrunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
{'CVE-2020-36381'}
2022-05-05T13:48:37Z
2021-11-01T19:19:29Z
CRITICAL
9.8
{'CWE-77', 'CWE-78'}
{'https://github.com/advisories/GHSA-7fw7-gh23-f832', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36381'}
null
GHSA
GHSA-vvwv-h69m-wg6f
XXE in PHPSpreadsheet due to incomplete fix for previous encoding issue
PHPOffice PhpSpreadsheet before 1.8.0 has an XXE issue. The XmlScanner decodes the sheet1.xml from an .xlsx to utf-8 if something else than UTF-8 is declared in the header. This was a security measurement to prevent CVE-2018-19277 but the fix is not sufficient. By double-encoding the the xml payload to utf-7 it is possible to bypass the check for the string ?<!ENTITY? and thus allowing for an xml external entity processing (XXE) attack.
{'CVE-2019-12331'}
2021-08-18T22:44:16Z
2019-11-20T01:39:57Z
HIGH
8.8
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12331', 'https://github.com/PHPOffice/PhpSpreadsheet/releases/tag/1.8.0', 'https://github.com/advisories/GHSA-vvwv-h69m-wg6f', 'https://github.com/PHPOffice/PhpSpreadsheet/blob/master/CHANGELOG.md#180---2019-07-01', 'https://herolab.usd.de/security-advisories/usd-2019-0046/'}
null
GHSA
GHSA-cxcf-78mr-wpg7
Malicious Package in oauth-validator
Version 1.0.2 of `oauth-validator` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-09-01T20:29:59Z
2020-09-01T20:29:59Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-cxcf-78mr-wpg7', 'https://www.npmjs.com/advisories/632'}
null
GHSA
GHSA-hx5x-49mm-vmhw
SQL Injection in sails-mysql
Versions of `sails-mysql` prior to 0.10.8 are vulnerable to SQL Injection. The `sort` keyword is not properly sanitized and may allow attackers to inject SQL statements and execute arbitrary SQL queries ## Recommendation Upgrade to version 0.10.8 or later.
null
2021-09-27T22:40:37Z
2020-09-03T02:36:43Z
HIGH
7.5
{'CWE-89'}
{'https://www.npmjs.com/advisories/950', 'https://snyk.io/vuln/SNYK-JS-SAILSMYSQL-174916', 'https://github.com/balderdashy/sails/issues/6679', 'https://github.com/advisories/GHSA-hx5x-49mm-vmhw'}
null
GHSA
GHSA-56cx-wf47-hx7w
Improper Restriction of Excessive Authentication Attempts
firefly-iii is vulnerable to Improper Restriction of Excessive Authentication Attempts
{'CVE-2021-3663'}
2021-08-31T20:58:22Z
2021-08-09T20:38:37Z
MODERATE
5.3
{'CWE-307'}
{'https://github.com/firefly-iii/firefly-iii/commit/afc9f4b7ebc8a240c85864a6e1abda62bfeefae8', 'https://huntr.dev/bounties/497bdf6d-7dba-49c3-8011-1c64dfbb3380', 'https://github.com/firefly-iii/firefly-iii/releases/tag/5.5.13', 'https://github.com/advisories/GHSA-56cx-wf47-hx7w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3663'}
null
GHSA
GHSA-8j49-49jq-vwcq
Prototype Pollution in getsetdeep
All versions of `getsetdeep` are vulnerable to prototype pollution. The `setDeep()` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-01T20:11:01Z
2020-09-04T15:15:34Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1334', 'https://github.com/advisories/GHSA-8j49-49jq-vwcq'}
null
GHSA
GHSA-6f34-pq9f-36vf
Hijacked Environment Variables in sqlite.js
The `sqlite.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16050'}
2021-01-08T19:45:31Z
2018-07-23T20:50:29Z
MODERATE
0
{'CWE-506'}
{'https://nodesecurity.io/advisories/491', 'https://www.npmjs.com/advisories/491', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16050', 'https://github.com/advisories/GHSA-6f34-pq9f-36vf'}
null
GHSA
GHSA-3fjq-93xj-3f3f
Cross-Site Scripting in serialize-to-js
Versions of `serialize-to-js` prior to 3.0.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications. ## Recommendation Upgrade to version 3.0.1 or later.
{'CVE-2019-16772'}
2021-01-08T20:02:21Z
2019-12-06T23:20:26Z
MODERATE
3.1
{'CWE-79'}
{'https://github.com/commenthol/serialize-to-js/security/advisories/GHSA-3fjq-93xj-3f3f', 'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3', 'https://github.com/advisories/GHSA-3fjq-93xj-3f3f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16772', 'https://www.npmjs.com/advisories/1429'}
null
GHSA
GHSA-v9qg-3j8p-r63v
Uncontrolled Recursion in Django
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
{'CVE-2019-14235'}
2021-05-10T18:17:48Z
2019-08-06T01:43:31Z
HIGH
7.5
{'CWE-674'}
{'https://security.gentoo.org/glsa/202004-17', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14235', 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://www.debian.org/security/2019/dsa-4498', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://github.com/advisories/GHSA-v9qg-3j8p-r63v', 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs', 'https://seclists.org/bugtraq/2019/Aug/15', 'https://security.netapp.com/advisory/ntap-20190828-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}
null
GHSA
GHSA-r863-p739-275c
Malicious Package in reuest
All versions of `reuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:09:37Z
2020-09-11T21:09:24Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/866', 'https://github.com/advisories/GHSA-r863-p739-275c'}
null
GHSA
GHSA-mpf2-q34c-fc6j
Infinite Loop in scapy
scapy 2.4.0 is affected by Denial of Service. The impact is infinite loop, resource consumption and program unresponsive. The component is _RADIUSAttrPacketListField.getfield(self..). The attack vector is over the network or in a pcap. both work.
{'CVE-2019-1010142'}
2021-05-11T16:03:58Z
2019-07-22T14:53:58Z
HIGH
7.5
{'CWE-835'}
{'http://www.securityfocus.com/bid/106674', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42NRPMC3NS2QVFNIXYP6WV2T3LMLLY7E/', 'https://github.com/advisories/GHSA-mpf2-q34c-fc6j', 'https://github.com/secdev/scapy/pull/1409', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010142', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T46XW4S5BCA3VV3JT3C5Q6LBEXSIACLN/', 'https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058', 'https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/'}
null
GHSA
GHSA-67cx-rhhq-mfhq
High severity vulnerability that affects indico
## Local file disclosure through LaTeX injection ### Impact An external audit of the Indico codebase has discovered a vulnerability in Indico's LaTeX sanitization code, which could have malicious users to run unsafe LaTeX commands on the server. Such commands allowed for example to read local files (e.g. `indico.conf`). As far as we know it is not possible to write files or execute code using this vulnerability. ### Patches You need to update to [Indico 2.2.3](https://github.com/indico/indico/releases/tag/v2.2.3) as soon as possible. We also released [Indico 2.1.10](https://github.com/indico/indico/releases/tag/v2.1.10) in case you cannot update to 2.2 for some reason. See https://docs.getindico.io/en/stable/installation/upgrade/ for instructions on how to update. ### Workarounds Setting `XELATEX_PATH = None` in `indico.conf` will result in an error when building a PDF, but without being able to run xelatex, the vulnerability cannot be abused. ### For more information If you have any questions or comments about this advisory: * Open a thread in [our forum](https://talk.getindico.io/) * Email us privately at [indico-team@cern.ch](mailto:indico-team@cern.ch)
null
2021-09-01T22:40:24Z
2019-10-11T18:28:07Z
HIGH
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-67cx-rhhq-mfhq', 'https://github.com/indico/indico/security/advisories/GHSA-67cx-rhhq-mfhq'}
null
GHSA
GHSA-p4pj-9g59-4ppv
Remote Code Execution in SyliusResourceBundle
### Impact Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution. The vulnerable versions include: `<=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3`. ### Example ```yaml foo: path: /foo/{id} defaults: _sylius: repository: method: findSome arguments: entity: "expr:service('repository').find($id)" ``` In this case, `$id` can be prepared in a way that calls other services. If you visit `/foo/"~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"`, it will result in a following expression `expr:service('repository').find(""~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"")`, which will execute a query on the currently connected database. To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language. ### Patches This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched. ### Workarounds The fix requires adding `addslashes` in `ParametersParser::parseRequestValueExpression` to sanitize user input before evaluating it using the expression language. ```php - return is_string($variable) ? sprintf('"%s"', $variable) : $variable; + return is_string($variable) ? sprintf('"%s"', addslashes($variable)) : $variable; ``` ### Acknowledgements This security issue has been reported by Craig Blanchette (@isometriks), thanks a lot! ### For more information If you have any questions or comments about this advisory: * Email us at [security@sylius.com](mailto:security@sylius.com)
{'CVE-2020-15143'}
2022-04-19T19:02:33Z
2020-08-19T21:04:25Z
HIGH
7.7
{'CWE-917', 'CWE-74'}
{'https://github.com/advisories/GHSA-p4pj-9g59-4ppv', 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-p4pj-9g59-4ppv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15143'}
null
GHSA
GHSA-wv23-pfj7-2mjj
Authenticated file write leads to remote code execution in october/system
### Impact Assuming an attacker with "create, modify and delete website pages" privileges in the backend is able to execute PHP code by running specially crafted Twig code in the template markup. ### Patches Issue has been patched in Build 473 and v1.1.6 ### Workarounds Apply https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26 to your installation manually if you are unable to upgrade. ### References Credits to: • David Miller ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
{'CVE-2021-32649'}
2022-04-19T19:03:20Z
2022-01-14T21:08:23Z
HIGH
8.8
{'CWE-74'}
{'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26', 'https://github.com/advisories/GHSA-wv23-pfj7-2mjj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32649', 'https://github.com/octobercms/october/security/advisories/GHSA-wv23-pfj7-2mjj'}
null
GHSA
GHSA-5w4r-wwc3-6qcp
Malicious Package in precode.js
Version 1.1.1 of `precode.js` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-11T21:23:29Z
2020-09-11T21:23:29Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/941', 'https://github.com/advisories/GHSA-5w4r-wwc3-6qcp'}
null
GHSA
GHSA-mcx4-f5f5-4859
Prevent cache poisoning via a Response Content-Type header in Symfony
Description ----------- When a `Response` does not contain a `Content-Type` header, Symfony falls back to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can lead to a corrupted cache where the cached format is not the right one. Resolution ---------- Symfony does not use the `Accept` header anymore to guess the `Content-Type`. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6) for the 4.4 branch. Credits ------- I would like to thank Xavier Lacot from JoliCode for reporting & Yonel Ceruto and Tobias Schultze for fixing the issue.
{'CVE-2020-5255'}
2022-04-19T19:02:57Z
2020-03-30T20:09:16Z
LOW
2.6
{'CWE-435'}
{'https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-content-type-header', 'https://github.com/advisories/GHSA-mcx4-f5f5-4859', 'https://github.com/symfony/symfony/security/advisories/GHSA-mcx4-f5f5-4859', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5255', 'https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6'}
null
GHSA
GHSA-qr82-2c78-4m8h
Reference binding to nullptr in map operations
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.Map*` and `tf.raw_ops.OrderedMap*` operations: ```python import tensorflow as tf tf.raw_ops.MapPeek( key=tf.constant([8],dtype=tf.int64), indices=[], dtypes=[tf.int32], capacity=8, memory_limit=128) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_stage_op.cc#L222-L248) has a check in place to ensure that `indices` is in ascending order, but does not check that `indices` is not empty. ### Patches We have patched the issue in GitHub commit [532f5c5a547126c634fefd43bbad1dc6417678ac](https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37671'}
2021-08-25T14:41:42Z
2021-08-25T14:41:42Z
HIGH
7.8
{'CWE-824'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qr82-2c78-4m8h', 'https://github.com/advisories/GHSA-qr82-2c78-4m8h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37671', 'https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac'}
null
GHSA
GHSA-h2f4-v4c4-6wx4
Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server
In Eclipse Jetty version 9.3.x and 9.4.x, the server is vulnerable to Denial of Service conditions if a remote client sends either large SETTINGs frames container containing many settings, or many small SETTINGs frames. The vulnerability is due to the additional CPU and memory allocations required to handle changed settings.
{'CVE-2018-12545'}
2021-06-10T23:29:56Z
2019-03-28T18:33:38Z
HIGH
7.5
{'CWE-400'}
{'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIS4LALKZNLF5X5IGNGRSKERG7FY4QG6/', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=538096', 'https://lists.apache.org/thread.html/70744fe4faba8e2fa7e50a7fc794dd03cb28dad8b21e08ee59bb1606@%3Cdevnull.infra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12545', 'https://lists.apache.org/thread.html/13f5241048ec0bf966a6ddd306feaf40de5b20e1f09096b9cddeddf2@%3Ccommits.accumulo.apache.org%3E', 'https://github.com/advisories/GHSA-h2f4-v4c4-6wx4', 'https://lists.apache.org/thread.html/febc94ffec9275dcda64633e0276a1400cd318e571009e4cda9b7a79@%3Cnotifications.accumulo.apache.org%3E'}
null
GHSA
GHSA-j7px-6hwj-hpjg
Open Redirect in OAuth2 Proxy
### Impact As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites. However, by crafting a redirect URL with HTML encoded whitespace characters (eg. `%0a`, `%0b`,`%09`,`%0d`) the validation could be bypassed and allow a redirect to any URL provided. ### Patches @rootxharsh and @iamnoooob provided this patch as potential solution: ``` From 4b941f56eda310b5c4dc8080b7635a6bfabccad4 Mon Sep 17 00:00:00 2001 From: Harsh Jaiswal <harsh@pop-os.localdomain> Date: Fri, 1 May 2020 20:38:31 +0530 Subject: [PATCH] Fixes redirect issue --- oauthproxy.go | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/oauthproxy.go b/oauthproxy.go index 1e9bb7c..f8beb4d 100644 --- a/oauthproxy.go +++ b/oauthproxy.go @@ -577,8 +577,9 @@ func validOptionalPort(port string) bool { // IsValidRedirect checks whether the redirect URL is whitelisted func (p *OAuthProxy) IsValidRedirect(redirect string) bool { + matched, _ := regexp.MatchString(`^/\s+/|\\`, redirect) switch { - case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//") && !strings.HasPrefix(redirect, "/\\"): + case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//") && !matched: return true case strings.HasPrefix(redirect, "http://") || strings.HasPrefix(redirect, "https://"): redirectURL, err := url.Parse(redirect) -- 2.17.1 ``` This issue was also reported to us separately by @mik317 several hours later The fix was implemented in [#xxx]() and released as version 5.1.1
{'CVE-2020-11053'}
2022-04-19T19:02:25Z
2021-12-20T17:59:10Z
HIGH
7.1
{'CWE-601'}
{'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-j7px-6hwj-hpjg', 'https://github.com/oauth2-proxy/oauth2-proxy/commit/0d5fa211df8ef2449347a56b22c779eb8d894c43', 'https://github.com/advisories/GHSA-j7px-6hwj-hpjg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11053'}
null
GHSA
GHSA-86fh-j58m-7pf5
Improper Privilege Management in Apache Ozone
In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked.
{'CVE-2021-36372'}
2021-11-23T17:57:14Z
2021-11-23T17:57:14Z
CRITICAL
9.8
{'CWE-273'}
{'https://github.com/advisories/GHSA-86fh-j58m-7pf5', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C5029c1ac-4685-8492-e3cb-ab48c5c370cf%40apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/11/19/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36372'}
null
GHSA
GHSA-jr34-mff8-pc6f
SQL Injection in Cloud Native Computing Foundation Harbor
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows SQL Injection via user-groups in the VMware Harbor Container Registry for the Pivotal Platform.
{'CVE-2019-19029'}
2021-05-18T18:27:36Z
2021-05-18T18:27:36Z
MODERATE
7.2
{'CWE-89'}
{'https://github.com/advisories/GHSA-jr34-mff8-pc6f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19029', 'https://github.com/goharbor/harbor/security/advisories/GHSA-qcfv-8v29-469w', 'https://github.com/goharbor/harbor/security/advisories', 'https://tanzu.vmware.com/security/cve-2019-19029'}
null
GHSA
GHSA-prg5-hg25-8grq
Ability to switch channels via GET parameter enabled in production environments
### Impact This vulnerability gives the ability to switch channels via the `_channel_code` GET parameter in production environments. This was meant to be enabled only when `%kernel.debug%` is set to true. However, if no `sylius_channel.debug` is set explicitly in the configuration, the default value which is `%kernel.debug%` will be not resolved and cast to boolean, enabling this debug feature even if that parameter is set to false. ### Patches Patch has been provided for Sylius 1.3.x and newer - **1.3.16, 1.4.12, 1.5.9, 1.6.5**. Versions older than 1.3 are not covered by our security support anymore. ### Workarounds Unsupported versions could be patched by adding the following configuration to run in production: ```yaml sylius_channel: debug: false ```
{'CVE-2020-5218'}
2021-01-08T20:32:24Z
2020-01-31T18:00:58Z
LOW
4.4
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5218', 'https://github.com/advisories/GHSA-prg5-hg25-8grq', 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-8vp7-j5cj-vvm2', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-prg5-hg25-8grq', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/resource-bundle/CVE-2020-5220.yaml'}
null
GHSA
GHSA-hwvq-6gjx-j797
Special Element Injection in notebook
### Impact Untrusted notebook can execute code on load. This is a remote code execution, but requires user action to open a notebook. ### Patches 5.7.11, 6.4.1 ### References [OWASP Page on Injection Prevention](https://cheatsheetseries.owasp.org/cheatsheets/Injection_Prevention_Cheat_Sheet.html#injection-prevention-rules) ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list security@ipython.org. Credit: Guillaume Jeanne from Google ### Example: A notebook with the following content in a cell and it would display an alert when opened for the first time in Notebook (in an untrusted state): ``` { "cell_type": "code", "execution_count": 0, "metadata": {}, "outputs": [ { "data": { "text/html": [ "<select><iframe></select><img src=x: onerror=alert('xss')>\n"], "text/plain": [] }, "metadata": {}, "output_type": "display_data" } ], "source": [ "" ] } ````
{'CVE-2021-32798'}
2022-04-19T19:03:05Z
2021-08-23T19:40:38Z
CRITICAL
10
{'CWE-79'}
{'https://github.com/jupyter/notebook/commit/79fc76e890a8ec42f73a3d009e44ef84c14ef0d5', 'https://github.com/jupyter/notebook/security/advisories/GHSA-hwvq-6gjx-j797', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32798', 'https://github.com/advisories/GHSA-hwvq-6gjx-j797'}
null
GHSA
GHSA-m3q7-rj8g-m457
Moderate severity vulnerability that affects ember-source
Cross-site scripting (XSS) vulnerability in Ember.js 1.8.x through 1.10.x, 1.11.x before 1.11.4, 1.12.x before 1.12.2, 1.13.x before 1.13.12, 2.0.x before 2.0.3, 2.1.x before 2.1.2, and 2.2.x before 2.2.1 allows remote attackers to inject arbitrary web script or HTML.
{'CVE-2015-7565'}
2022-04-19T19:03:25Z
2018-08-28T22:33:24Z
MODERATE
6.1
{'CWE-79'}
{'http://emberjs.com/blog/2016/01/14/security-releases-ember-1-11-4-1-12-2-1-13-12-2-0-3-2-1-2-2-2-1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7565', 'https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY', 'https://github.com/advisories/GHSA-m3q7-rj8g-m457'}
null
GHSA
GHSA-75cq-g75g-rxff
use-after-free vulnerability in Rust array-queue
An issue was discovered in the array-queue crate through 2020-09-26 for Rust. A pop_back() call may lead to a use-after-free.
{'CVE-2020-35900'}
2021-08-25T21:00:43Z
2021-08-25T21:00:43Z
MODERATE
5.5
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35900', 'https://github.com/raviqqe/array-queue/issues/2', 'https://github.com/advisories/GHSA-75cq-g75g-rxff', 'https://rustsec.org/advisories/RUSTSEC-2020-0047.html'}
null
GHSA
GHSA-q7pf-qr96-2vq5
Moderate severity vulnerability that affects io.swagger:swagger-codegen and io.swagger:swagger-parser
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
{'CVE-2017-1000208'}
2021-09-16T19:37:01Z
2018-10-19T16:46:41Z
HIGH
8.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000208', 'https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208', 'https://github.com/advisories/GHSA-q7pf-qr96-2vq5', 'https://github.com/swagger-api/swagger-parser/releases/tag/v1.0.31'}
null
GHSA
GHSA-6gv8-p3vj-pxvr
Null pointer dereference in `UncompressElement`
### Impact The code for `tf.raw_ops.UncompressElement` can be made to trigger a null pointer dereference: ```python import tensorflow as tf data = tf.data.Dataset.from_tensors([0.0]) tf.raw_ops.UncompressElement( compressed=tf.data.experimental.to_variant(data), output_types=[tf.int64], output_shapes=[2]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/data/experimental/compression_ops.cc#L50-L53) obtains a pointer to a `CompressedElement` from a `Variant` tensor and then proceeds to dereference it for decompressing. There is no check that the `Variant` tensor contained a `CompressedElement`, so the pointer is actually `nullptr`. ### Patches We have patched the issue in GitHub commit [7bdf50bb4f5c54a4997c379092888546c97c3ebd](https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37649'}
2021-08-25T14:43:27Z
2021-08-25T14:43:27Z
HIGH
7.7
{'CWE-476'}
{'https://github.com/advisories/GHSA-6gv8-p3vj-pxvr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37649', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gv8-p3vj-pxvr', 'https://github.com/tensorflow/tensorflow/commit/7bdf50bb4f5c54a4997c379092888546c97c3ebd'}
null
GHSA
GHSA-x8h6-xgqx-jqgp
Undefined behavior and `CHECK`-fail in `FractionalMaxPoolGrad`
### Impact The implementation of `tf.raw_ops.FractionalMaxPoolGrad` triggers an undefined behavior if one of the input tensors is empty: ```python import tensorflow as tf orig_input = tf.constant([2, 3], shape=[1, 1, 1, 2], dtype=tf.int64) orig_output = tf.constant([], dtype=tf.int64) out_backprop = tf.zeros([2, 3, 6, 6], dtype=tf.int64) row_pooling_sequence = tf.constant([0], shape=[1], dtype=tf.int64) col_pooling_sequence = tf.constant([0], shape=[1], dtype=tf.int64) tf.raw_ops.FractionalMaxPoolGrad( orig_input=orig_input, orig_output=orig_output, out_backprop=out_backprop, row_pooling_sequence=row_pooling_sequence, col_pooling_sequence=col_pooling_sequence, overlapping=False) ``` The code is also vulnerable to a denial of service attack as a `CHECK` condition becomes false and aborts the process ```python import tensorflow as tf orig_input = tf.constant([1], shape=[1], dtype=tf.int64) orig_output = tf.constant([1], shape=[1], dtype=tf.int64) out_backprop = tf.constant([1, 1], shape=[2, 1, 1, 1], dtype=tf.int64) row_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64) col_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64) tf.raw_ops.FractionalMaxPoolGrad( orig_input=orig_input, orig_output=orig_output, out_backprop=out_backprop, row_pooling_sequence=row_pooling_sequence, col_pooling_sequence=col_pooling_sequence, overlapping=False) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/169054888d50ce488dfde9ca55d91d6325efbd5b/tensorflow/core/kernels/fractional_max_pool_op.cc#L215) fails to validate that input and output tensors are not empty and are of the same rank. Each of these unchecked assumptions is responsible for the above issues. ### Patches We have patched the issue in GitHub commit [32fdcbff9d06d010d908fcc4bd4b36eb3ce15925](https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29580'}
2021-05-21T14:26:26Z
2021-05-21T14:26:26Z
LOW
2.5
{'CWE-908'}
{'https://github.com/advisories/GHSA-x8h6-xgqx-jqgp', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x8h6-xgqx-jqgp', 'https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29580'}
null
GHSA
GHSA-64gv-qg2v-vxv6
Array size is not checked in sized-chunks
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with From<InlineArray<A, T>>.
{'CVE-2020-25793'}
2021-08-25T20:45:04Z
2021-08-25T20:45:04Z
HIGH
7.5
{'CWE-129'}
{'https://github.com/bodil/sized-chunks/issues/11', 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html', 'https://github.com/advisories/GHSA-64gv-qg2v-vxv6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25793'}
null
GHSA
GHSA-43f8-p5w3-5m25
SSRF by connecting to privileged ports
### Impact All users are affected. ### Patches * Unsuccessfully patched by 0fae40fb, included in version [4.4.0](https://github.com/vrana/adminer/releases/tag/v4.4.0). * Patched by 35bfaa75, included in version [4.7.8](https://github.com/vrana/adminer/releases/tag/v4.7.8). ### Workarounds Protect access to Adminer also by other means, e.g. by HTTP password, IP address limiting or by OTP [plugin](https://www.adminer.org/plugins/). ### References * http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt * https://sourceforge.net/p/adminer/bugs-and-features/769/ * https://gusralph.info/adminer-ssrf-bypass-cve-2018-7667/ (CVE-2020-28654) ### For more information If you have any questions or comments about this advisory: * Comment at 35bfaa75.
{'CVE-2018-7667'}
2022-04-19T19:02:47Z
2021-02-11T21:20:40Z
MODERATE
0
{'CWE-918'}
{'http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt', 'https://packagist.org/packages/vrana/adminer', 'https://github.com/advisories/GHSA-43f8-p5w3-5m25', 'https://github.com/vrana/adminer/security/advisories/GHSA-43f8-p5w3-5m25', 'https://sourceforge.net/p/adminer/bugs-and-features/769/', 'https://gusralph.info/adminer-ssrf-bypass-cve-2018-7667'}
null
GHSA
GHSA-hf64-x4gq-p99h
Out-of-bounds Read
In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.
{'CVE-2020-35655'}
2021-03-18T19:55:34Z
2021-03-18T19:55:34Z
HIGH
5.4
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35655', 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/', 'https://github.com/advisories/GHSA-hf64-x4gq-p99h', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/'}
null
GHSA
GHSA-g8j8-mgh9-q77p
File upload leading to RCE in MCMS
An arbitrary file upload vulnerability in the component /ms/file/uploadTemplate.do of MCMS v5.2.4 allows attackers to execute arbitrary code.
{'CVE-2021-46036'}
2022-03-01T21:32:43Z
2022-02-19T00:01:25Z
CRITICAL
9.8
{'CWE-434'}
{'https://github.com/advisories/GHSA-g8j8-mgh9-q77p', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46036', 'https://lycshub.github.io/2021/12/28/MCMS-vulnerabilities/'}
null
GHSA
GHSA-wm77-q74p-5763
Path Traversal in superstatic
Affected of `superstatic` are vulnerable to path traversal when used on Windows. Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0). ## Recommendation Update to version 5.0.2 or later.
null
2021-08-09T22:21:04Z
2018-07-27T17:06:03Z
HIGH
0
{'CWE-177'}
{'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b', 'https://github.com/firebase/superstatic/pull/255', 'https://github.com/advisories/GHSA-wm77-q74p-5763', 'https://github.com/firebase/superstatic/blob/v5.0.1/lib/providers/fs.js#L71', 'https://www.npmjs.com/advisories/652'}
null
GHSA
GHSA-x88j-93vc-wpmp
Moderate severity vulnerability that affects django
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.
{'CVE-2011-4136'}
2021-09-21T22:24:48Z
2018-07-23T19:52:39Z
MODERATE
0
{'CWE-20'}
{'http://openwall.com/lists/oss-security/2011/09/13/2', 'https://github.com/advisories/GHSA-x88j-93vc-wpmp', 'https://hermes.opensuse.org/messages/14700881', 'https://www.djangoproject.com/weblog/2011/sep/09/', 'https://www.djangoproject.com/weblog/2011/sep/10/127/', 'http://openwall.com/lists/oss-security/2011/09/11/1', 'http://secunia.com/advisories/46614', 'http://www.debian.org/security/2011/dsa-2332', 'https://bugzilla.redhat.com/show_bug.cgi?id=737366', 'https://nvd.nist.gov/vuln/detail/CVE-2011-4136'}
null
GHSA
GHSA-753c-phhg-cj29
Improper Neutralization of Special Elements used in a Command
This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function.
{'CVE-2021-23352'}
2021-03-15T18:08:06Z
2021-03-12T23:01:49Z
HIGH
0
{'CWE-89', 'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-MADGE-1082875', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23352', 'https://github.com/advisories/GHSA-753c-phhg-cj29', 'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332', 'https://github.com/pahen/madge/blob/master/lib/graph.js%23L27'}
null
GHSA
GHSA-fm9p-5m9f-rq85
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0915'}
2021-03-29T21:00:03Z
2021-03-29T21:00:03Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0915', 'https://github.com/advisories/GHSA-fm9p-5m9f-rq85', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0915', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}
null
GHSA
GHSA-xfv3-rrfm-f2rv
Information Exposure in Netty
Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters.
{'CVE-2015-2156'}
2021-09-22T18:45:31Z
2020-06-30T21:01:21Z
HIGH
7.5
{'CWE-20'}
{'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-IONETTY-73571', 'https://github.com/netty/netty/commit/31815598a2af37f0b71ea94eada70d6659c23752', 'http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html', 'http://www.securityfocus.com/bid/74704', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2015/05/17/1', 'https://github.com/netty/netty/pull/3754', 'https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass', 'https://github.com/netty/netty/commit/2caa38a2795fe1f1ae6ceda4d69e826ed7c55e55', 'https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769@%3Ccommits.cassandra.apache.org%3E', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1222923', 'https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3@%3Ccommits.cassandra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2156', 'https://github.com/advisories/GHSA-xfv3-rrfm-f2rv', 'https://github.com/netty/netty/pull/3748/commits/4ac519f534493bb0ca7a77e1c779138a54faa7b9'}
null
GHSA
GHSA-hwpc-8xqv-jvj4
XStream is vulnerable to a Remote Command Execution attack
### Impact The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21345](https://x-stream.github.io/CVE-2021-21345.html). ### Credits 钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21345'}
2022-02-10T11:35:08Z
2021-03-22T23:28:38Z
MODERATE
5.8
{'CWE-94'}
{'https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4', 'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://x-stream.github.io/CVE-2021-21345.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-hwpc-8xqv-jvj4', 'http://x-stream.github.io/changes.html#1.4.16', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21345', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-mh74-4m5g-fcjx
Malicious users could control the content of invitation emails
### Impact A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example. ### Patches Fixed in 4469d1d, 6b405a8, 65a6e91. Note that these patches include changes to the *default* email templates. If these templates have been locally modified, they must also be updated. ### For more information If you have any questions or comments about this advisory, email us at security@matrix.org.
{'CVE-2021-29432'}
2021-04-19T14:54:24Z
2021-04-19T14:54:24Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/matrix-org/sydent/releases/tag/v2.3.0', 'https://github.com/advisories/GHSA-mh74-4m5g-fcjx', 'https://github.com/matrix-org/sydent/commit/4469d1d42b2b1612b70638224c07e19623039c42', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29432', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-mh74-4m5g-fcjx', 'https://pypi.org/project/matrix-sydent/'}
null
GHSA
GHSA-9fcc-7g44-mxrj
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via uploading files with files in `.xsd`, `.asa`, and `.aspx` formats.
{'CVE-2022-0942'}
2022-03-29T21:28:00Z
2022-03-16T00:00:47Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0942', 'https://github.com/advisories/GHSA-9fcc-7g44-mxrj', 'https://huntr.dev/bounties/a412707c-18da-4c84-adc0-9801ed8068c9', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
null
GHSA
GHSA-f522-ffg8-j8r6
Regular Expression Denial of Service in is-my-json-valid
Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function. ## Recommendation Update to version 1.4.1, 2.17.2 or later.
{'CVE-2016-2537'}
2021-09-09T21:38:37Z
2017-10-24T18:33:35Z
HIGH
7.5
{'CWE-20'}
{'https://hackerone.com/reports/317548', 'https://www.npmjs.com/advisories/572', 'https://www.npmjs.com/advisories/76', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2537', 'https://nodesecurity.io/advisories/76', 'https://github.com/mafintosh/is-my-json-valid/pull/159', 'https://github.com/advisories/GHSA-f522-ffg8-j8r6', 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}
null
GHSA
GHSA-g8jx-66p8-vcm2
SQL injection in pimcore/pimcore
This affects the package pimcore/pimcore before 10.0.7. This issue exists due to the absence of check on the storeId parameter in the method collectionsActionGet and groupsActionGet method within the ClassificationstoreController class.
{'CVE-2021-23405'}
2021-07-28T17:37:01Z
2021-07-13T17:42:31Z
HIGH
8.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23405', 'https://github.com/pimcore/pimcore/pull/9572', 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1316297', 'https://github.com/advisories/GHSA-g8jx-66p8-vcm2'}
null
GHSA
GHSA-m56g-3g8v-2rxw
XSS in Adminer
**Withdrawn:** Duplicate of GHSA-9pgx-gcph-mpqr. Adminer before 4.7.9 allows XSS via the history parameter to the default URI.
{'CVE-2020-35572'}
2021-02-11T20:46:56Z
2021-02-11T20:46:53Z
MODERATE
0
{'CWE-79'}
{'https://github.com/vrana/adminer', 'https://sourceforge.net/p/adminer/bugs-and-features/775/', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://sourceforge.net/p/adminer/news/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35572', 'https://github.com/advisories/GHSA-m56g-3g8v-2rxw', 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'}
null
GHSA
GHSA-m434-m5pv-p35w
Insufficient user authorization in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The calendar:manageentries capability allowed managers to access or modify any calendar event, but should have been restricted from accessing user level events.
{'CVE-2022-0333'}
2022-02-02T16:12:14Z
2022-01-28T22:08:02Z
LOW
3.8
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0333', 'https://github.com/advisories/GHSA-m434-m5pv-p35w', 'https://moodle.org/mod/forum/discuss.php?d=431100', 'https://github.com/moodle/moodle/commit/2ee27313cea0d7073f5a6a35eccdfddcb3a9adad', 'https://bugzilla.redhat.com/show_bug.cgi?id=2043663'}
null
GHSA
GHSA-mx9f-w8qq-q5jf
Low severity vulnerability that affects rest-client
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
{'CVE-2015-3448'}
2021-09-15T21:04:36Z
2017-10-24T18:33:36Z
LOW
0
{'CWE-200'}
{'http://lists.opensuse.org/opensuse-updates/2015-04/msg00026.html', 'http://www.osvdb.org/117461', 'https://github.com/advisories/GHSA-mx9f-w8qq-q5jf', 'https://github.com/rest-client/rest-client/issues/349', 'http://www.securityfocus.com/bid/74415', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3448'}
null
GHSA
GHSA-v8w9-2789-6hhr
Deserialization of Untrusted Data in bson
All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object's _bsotype, leading to cases where an object is serialized as a document rather than the intended BSON type.
{'CVE-2020-7610'}
2021-05-07T16:04:54Z
2021-05-07T16:04:54Z
HIGH
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7610', 'https://snyk.io/vuln/SNYK-JS-BSON-561052', 'https://github.com/advisories/GHSA-v8w9-2789-6hhr'}
null
GHSA
GHSA-qv32-7r6p-xhhh
Moderate severity vulnerability that affects com.adobe.xmp:xmpcore
XMPCore in Adobe XMP Toolkit for Java before 5.1.3 allows remote attackers to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
{'CVE-2016-4216'}
2021-09-16T21:06:36Z
2018-10-19T16:39:29Z
HIGH
7.5
{'CWE-611'}
{'https://helpx.adobe.com/security/products/xmpcore/apsb16-24.html', 'https://github.com/advisories/GHSA-qv32-7r6p-xhhh', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4216', 'http://www.securityfocus.com/bid/91717'}
null
GHSA
GHSA-h289-x5wc-xcv8
Improper Validation of Certificate with Host Mismatch in mellium.im/xmpp/websocket
### Impact If no TLS configuration is provided by the user, the websocket package constructs its own TLS configuration using recommended defaults. When looking up a WSS endpoint using the DNS TXT record method described in [XEP-0156: Discovering Alternative XMPP Connection Methods](https://xmpp.org/extensions/xep-0156.html) the ServerName field was incorrectly being set to the name of the server returned by the TXT record request, not the name of the initial server we were attempting to connect to. This means that any attacker that can spoof a DNS record (ie. in the absence of DNSSEC, DNS-over-TLS, DNS-over-HTTPS, or similar technologies) could redirect the user to a server of their choosing and as long as it had a valid TLS certificate for itself the connection would succeed, resulting in a MITM situation. ### Patches All users should upgrade to v0.21.1. ### Workarounds To work around the issue, manually specify a TLS configuration with the correct hostname. ### References - https://mellium.im/cve/cve-2022-24968/ - https://nvd.nist.gov/vuln/detail/CVE-2022-24968 ### For more information If you have any questions or comments about this advisory: * Reach out on XMPP to [sam@samwhited.com](xmpp:sam@samwhited.com?msg) * Email us at [sam@samwhited.com](mailto:sam@samwhited.com)
null
2022-04-19T19:03:23Z
2022-02-16T22:56:21Z
MODERATE
0
{'CWE-295'}
{'https://github.com/mellium/xmpp/security/advisories/GHSA-h289-x5wc-xcv8', 'https://github.com/advisories/GHSA-h289-x5wc-xcv8'}
null
GHSA
GHSA-crv7-7245-f45f
Improper Handling of Length Parameter Inconsistency in Compress
When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
{'CVE-2021-35516'}
2022-04-22T15:45:20Z
2021-08-02T16:55:15Z
HIGH
7.5
{'CWE-130', 'CWE-770'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-crv7-7245-f45f', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://lists.apache.org/thread.html/rf68442d67eb166f4b6cf0bbbe6c7f99098c12954f37332073c9822ca%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35516', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/2', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rf5b1016fb15b7118b9a5e16bb0b78cb4f1dfcf7821eb137ab5757c91@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}
null
GHSA
GHSA-7hmh-8gwv-mfvq
SQL Injection in Kylin
Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.
{'CVE-2020-1937'}
2021-09-22T21:57:08Z
2020-07-27T22:51:47Z
MODERATE
6.5
{'CWE-89'}
{'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1937', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-552148', 'https://lists.apache.org/thread.html/rc574fef23740522f62ab3bbda4f6171be98aa7a25f3f54be143a80a8%40%3Cuser.kylin.apache.org%3E', 'https://github.com/apache/kylin/commit/e373c64c96a54a7abfe4bccb82e8feb60db04749', 'https://github.com/advisories/GHSA-7hmh-8gwv-mfvq'}
null
GHSA
GHSA-g3wg-6mcf-8jj6
Local Temp Directory Hijacking Vulnerability
### Impact On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability. Additionally, any user code uses of [WebAppContext::getTempDirectory](https://www.eclipse.org/jetty/javadoc/9.4.31.v20200723/org/eclipse/jetty/webapp/WebAppContext.html#getTempDirectory()) would similarly be vulnerable. Additionally, any user application code using the `ServletContext` attribute for the tempdir will also be impacted. See: https://javaee.github.io/javaee-spec/javadocs/javax/servlet/ServletContext.html#TEMPDIR For example: ```java import java.io.File; import java.io.IOException; import javax.servlet.ServletContext; import javax.servlet.ServletException; import javax.servlet.http.HttpServlet; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; public class ExampleServlet extends HttpServlet { @Override protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { File tempDir = (File)getServletContext().getAttribute(ServletContext.TEMPDIR); // Potentially compromised // do something with that temp dir } } ``` Example: The JSP library itself will use the container temp directory for compiling the JSP source into Java classes before executing them. ### CVSSv3.1 Evaluation This vulnerability has been calculated to have a [CVSSv3.1 score of 7.8/10 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1) ### Patches Fixes were applied to the 9.4.x branch with: - https://github.com/eclipse/jetty.project/commit/53e0e0e9b25a6309bf24ee3b10984f4145701edb - https://github.com/eclipse/jetty.project/commit/9ad6beb80543b392c91653f6bfce233fc75b9d5f These will be included in releases: 9.4.33, 10.0.0.beta3, 11.0.0.beta3 ### Workarounds A work around is to set a temporary directory, either for the server or the context, to a directory outside of the shared temporary file system. For recent releases, a temporary directory can be created simple by creating a directory called `work` in the ${jetty.base} directory (the parent directory of the `webapps` directory). Alternately the java temporary directory can be set with the System Property `java.io.tmpdir`. A more detailed description of how jetty selects a temporary directory is below. The Jetty search order for finding a temporary directory is as follows: 1. If the [`WebAppContext` has a temp directory specified](https://www.eclipse.org/jetty/javadoc/current/org/eclipse/jetty/webapp/WebAppContext.html#setTempDirectory(java.io.File)), use it. 2. If the `ServletContext` has the `javax.servlet.context.tempdir` attribute set, and if directory exists, use it. 3. If a `${jetty.base}/work` directory exists, use it (since Jetty 9.1) 4. If a `ServletContext` has the `org.eclipse.jetty.webapp.basetempdir` attribute set, and if the directory exists, use it. 5. Use `System.getProperty("java.io.tmpdir")` and use it. Jetty will end traversal at the first successful step. To mitigate this vulnerability the directory must be set to one that is not writable by an attacker. To avoid information leakage, the directory should also not be readable by an attacker. #### Setting a Jetty server temporary directory. Choices 3 and 5 apply to the server level, and will impact all deployed webapps on the server. For choice 3 just create that work directory underneath your `${jetty.base}` and restart Jetty. For choice 5, just specify your own `java.io.tmpdir` when you start the JVM for Jetty. ``` shell [jetty-distribution]$ java -Djava.io.tmpdir=/var/web/work -jar start.jar ``` #### Setting a Context specific temporary directory. The rest of the choices require you to configure the context for that deployed webapp (seen as `${jetty.base}/webapps/<context>.xml`) Example (excluding the DTD which is version specific): ``` xml <Configure class="org.eclipse.jetty.webapp.WebAppContext"> <Set name="contextPath"><Property name="foo"/></Set> <Set name="war">/var/web/webapps/foo.war</Set> <Set name="tempDirectory">/var/web/work/foo</Set> </Configure> ``` ### References - https://github.com/eclipse/jetty.project/issues/5451 - [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) - [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) - [CodeQL Query PR To Detect Similar Vulnerabilities](https://github.com/github/codeql/pull/4473) ### Similar Vulnerabilities Similar, but not the same. - JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp - Google Guava - https://github.com/google/guava/issues/4011 - Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945 - JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824 ### For more information The original report of this vulnerability is below: > On Thu, 15 Oct 2020 at 21:14, Jonathan Leitschuh <jonathan.leitschuh@gmail.com> wrote: > Hi WebTide Security Team, > > I'm a security researcher writing some custom CodeQL queries to find Local Temporary Directory Hijacking Vulnerabilities. One of my queries flagged an issue in Jetty. > > https://lgtm.com/query/5615014766184643449/ > > I've recently been looking into security vulnerabilities involving the temporary directory because on unix-like systems, the system temporary directory is shared between all users. > There exists a race condition between the deletion of the temporary file and the creation of the directory. > > ```java > // ensure file will always be unique by appending random digits > tmpDir = File.createTempFile(temp, ".dir", parent); // Attacker knows the full path of the file that will be generated > // delete the file that was created > tmpDir.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Jetty. > // and make a directory of the same name > // SECURITY VULNERABILITY: Race Condition! - Attacker beats Jetty and now owns this directory > tmpDir.mkdirs(); > ``` > > https://github.com/eclipse/jetty.project/blob/1b59672b7f668b8a421690154b98b4b2b03f254b/jetty-webapp/src/main/java/org/eclipse/jetty/webapp/WebInfConfiguration.java#L511-L518 > > In several cases the `parent` parameter will not be the system temporary directory. However, there is one case where it will be, as the last fallback. > > > https://github.com/eclipse/jetty.project/blob/1b59672b7f668b8a421690154b98b4b2b03f254b/jetty-webapp/src/main/java/org/eclipse/jetty/webapp/WebInfConfiguration.java#L467-L468 > > If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability. > > Would your team be willing to open a GitHub security advisory to continue the discussion and disclosure there? https://github.com/eclipse/jetty.project/security/advisories > > **This vulnerability disclosure follows Google's [90-day vulnerability disclosure policy](https://www.google.com/about/appsecurity/) (I'm not an employee of Google, I just like their policy). Full disclosure will occur either at the end of the 90-day deadline or whenever a patch is made widely available, whichever occurs first.** > > Cheers, > Jonathan Leitschuh
{'CVE-2020-27216'}
2022-04-19T19:02:38Z
2020-11-04T17:50:24Z
HIGH
7
{'CWE-552', 'CWE-379', 'CWE-378'}
{'https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/rc9d2ab8a6c7835182f20b01104798e67c75db655c869733a0713a590@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/ra1f19625cc67ac1b459c558f2ea5647d71ce51c6fe4f4cb03baec849@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rafb023a7c61180a1027819678eb2068b0b60cd5c2559cb8490e26c81@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9cc76b98f87738791b8ec3736755f92444d3c8cb26bd4e4ffdb5c1cc@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r769411eb43dd9ef77665700deb7fc491fc3ceb532914260c90b56f2f@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc44d1147f78496ec9932a38b28795ff4fd0c4fa6e3b6f5cc33c14d29@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/refbbb0eb65c185d1fa491cee08ac8ed32708ce3b269133a6da264317@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27216', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921', 'https://lists.apache.org/thread.html/r8dd01541fc49d24ec223365a9974231cbd7378b749247a89b0a52210@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r3e05ab0922876e74fea975d70af82b98580f4c14ba643c4f8a9e3a94@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r4f29fb24639ebc5d15fc477656ebc2b3aa00fcfbe197000009c26b40@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7bdc83513c12db1827b79b8d57a7a0975a25d28bc6c5efe590ec1e02@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0f5e9b93133ef3aaf31484bc3e15cc4b85f8af0fe4de2dacd9379d72@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r5a9462096c71593e771602beb0e69357adb5175d9a5c18d5181e0ab4@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r1ed79516bd6d248ea9f0e704dbfd7de740d5a75b71c7be8699fec824@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rde782fd8e133f7e04e50c8aaa4774df524367764eb5b85bf60d96747@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2d17b2a4803096ba427f3575599ea29b55f5cf9dbc1f12ba044cae1a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd7e62e2972a41c2658f41a824b8bdd15644d80fcadc51fe7b7c855de@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb8c007f87dc57731a7b9a3b05364530422535b7e0bc6a0c5b68d4d55@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/ra5b7313d8cc9411db6790adfba33f2cf0665cb77adb7b02043c95867@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0d95e01f52667f44835c40f6dea72bb4397f33cd70a564ea74f3836d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r761a52f1e214efec286ee80045d0012e955eebaa72395ad62cccbcfc@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r70f8bcccd304bd66c1aca657dbfc2bf11f73add9032571b01f1f733d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r77dd041d8025a869156481d2268c67ad17121f64e31f9b4a1a220145@%3Cissues.beam.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rdddb4b06e86fd58a1beda132f22192af2f9b56aae8849cb3767ccd55@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rf00ea6376f3d0e8b8f62cf6d4a4f28b24e27193acd2c851f618aa41e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/re5706141ca397587f7ee0f500a39ccc590a41f802fc125fc135cb92f@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-g3wg-6mcf-8jj6', 'https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/rfe5caef1fd6cf4b8ceac1b63c33195f2908517b665c946c020d3fbd6@%3Cissues.beam.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r3a763de620be72b6d74f46ec4bf39c9f35f8a0b39993212c0ac778ec@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1d40368a309f9d835dcdd900249966e4fcbdf98c1cc4c84db2cd9964@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r73b5a9b677b707bbb7c1469ea746312c47838b312603bada9e382bba@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/raf9c581b793c30ff8f55f2415c7bd337eb69775aae607bf9ed1b16fb@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6dfa64ecc3d67c1a71c08bfa04064549179d499f8e20a8285c57bd51@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r09b345099b4f88d2bed7f195a96145849243fb4e53661aa3bcf4c176@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3042a9dd2973aa229e52d022df7813e4d74b67df73bfa6d97bb0caf8@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r1dbb87c9255ecefadd8de514fa1d35c1d493c0527d7672cf40505d04@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re08b03cd1754b32f342664eead415af48092c630c8e3e0deba862a26@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r2e02700f7cfecb213de50be83e066086bea90278cd753db7fdc2ccff@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r87b0c69fef09277333a7e1716926d1f237d462e143a335854ddd922f@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r819857361f5a156e90d6d06ccf6c41026bc99030d60d0804be3a9957@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0df8fe10fc36028cf6d0381ab66510917d0d68bc5ef7042001d03830@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r9b790fe3a93121199f41258474222f15002b2f729495aa7ecbf90718@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc4b972ea10c5a65c6a88a6e233778718ab9af7f484affdd5e5de0cff@%3Ccommits.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r8fead0144bb84d8714695c43607dca9c5101aa028a431ec695882fe5@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb5f2558ea2ac63633dfb04db1e8a6ea6bb1a2b8614899095e16c6233@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r5494fdaf4a0a42a15c49841ba7ae577d466d09239ee1050458da0f29@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd58b60ab2e49ebf21022e59e280feb25899ff785c88f31fe314aa5b9@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r66e99d973fd79ddbcb3fbdb24f4767fe9b911f5b0abb05d7b6f65801@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E', 'https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r336b1694a01858111e4625fb9ab2b07ad43a64a525cf6402e06aa6bf@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/ra55e04d5a73afcb8383f4386e2b26832c6e3972e53827021ab885943@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb7e159636b26156f6ef2b2a1a79b3ec9a026923b5456713e68f7c18e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r568d354961fa88f206dc345411fb11d245c6dc1a8da3e80187fc6706@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc2e24756d28580eeac811c5c6a12012c9f424b6e5bffb89f98ee3d03@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/rbc5a622401924fadab61e07393235838918228b3d8a1a6704295b032@%3Cissues.beam.apache.org%3E', 'https://github.com/eclipse/jetty.project/issues/5451', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://lists.apache.org/thread.html/rdbf1cd0ab330c032f3a09b453cb6405dccc905ad53765323bddab957@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7da5ae60d7973e8894cfe92f49ecb5b47417eefab4c77cc87514d3cf@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r1d45051310b11c6d6476f20d71b08ea97cb76846cbf61d196bac1c3f@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E', 'https://cwe.mitre.org/data/definitions/378.html', 'https://security.netapp.com/advisory/ntap-20201123-0005/', 'https://lists.apache.org/thread.html/r100c5c7586a23a19fdb54d8a32e17cd0944bdaa46277b35c397056f6@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r44115ebfbf3b7d294d7a75f2d30bcc822dab186ebbcc2dce11915ca9@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r18b6f10d9939419bae9c225d5058c97533cb376c9d6d0a0733ddd48d@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E', 'https://github.com/github/codeql/pull/4473', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0259b14ae69b87821e27fed1f5333ea86018294fd31aab16b1fac84e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r5a07f274f355c914054c7357ad6d3456ffaca064f26cd780acb90a9a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r4946ffd86ad6eb7cb7863311235c914cb41232380de8d9dcdb3c115c@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r1fe31643fc34b4a33ae3d416d92c271aa97663f1782767d25e1d9ff8@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/rb077d35f2940191daeefca0d6449cddb2e9d06bcf8f5af4da2df3ca2@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rad255c736fad46135f1339408cb0147d0671e45c376c3be85ceeec1a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r874688141495df766e62be095f1dfb0bf4a24ca0340d8e0215c03fab@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r93d5e81e879120d8d87925dbdd4045cb3afa9b066f4370f60b626ce3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1ef28b89ff0281c87ba3a7659058789bf28a99b8074191f1c3678db8@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053', 'https://lists.apache.org/thread.html/rfe6ba83d14545e982400dea89e68b10113cb5202a3dcb558ce64842d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r59e0878013d329dcc481eeafebdb0ee445b1e2852d0c4827b1ddaff2@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E', 'https://cwe.mitre.org/data/definitions/379.html', 'https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0e9efe032cc65433251ee6470c66c334d4e7db9101e24cf91a3961f2@%3Ccommits.directory.apache.org%3E', 'https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r8045eedd6bb74efcd8e01130796adbab98ee4a0d1273509fb1f2077a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r07525dc424ed69b3919618599e762f9ac03791490ca9d724f2241442@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rcdcf32952397c83a1d617a8c9cd5c15c98b8d0d38a607972956bde7e@%3Cissues.beam.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6', 'https://lists.apache.org/thread.html/r87d8337300a635d66f0bb838bf635cdfcbba6b92c608a7813adbf4f4@%3Cissues.beam.apache.org%3E'}
null
GHSA
GHSA-xw4p-crpj-vjx2
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
### Impact The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39152](https://x-stream.github.io/CVE-2021-39152.html). ### Credits m0d9 of the Security Team of Alibaba Cloud found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39152'}
2022-04-22T15:42:45Z
2021-08-25T14:46:59Z
HIGH
8.5
{'CWE-502', 'CWE-918'}
{'https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-xw4p-crpj-vjx2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.debian.org/security/2021/dsa-5004', 'https://x-stream.github.io/CVE-2021-39152.html', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39152', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-cfx7-2xpc-8w4h
Division by zero in TFLite's implementation of `BatchToSpaceNd`
### Impact The implementation of the `BatchToSpaceNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82): ```cc TF_LITE_ENSURE_EQ(context, output_batch_size % block_shape[dim], 0); output_batch_size = output_batch_size / block_shape[dim]; ``` An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. ### Patches We have patched the issue in GitHub commit [2c74674348a4708ced58ad6eb1b23354df8ee044](https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29593'}
2021-05-21T14:27:01Z
2021-05-21T14:27:01Z
LOW
2.5
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29593', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfx7-2xpc-8w4h', 'https://github.com/advisories/GHSA-cfx7-2xpc-8w4h', 'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'}
null
GHSA
GHSA-89v2-g37m-g3ff
Improper Verification of Cryptographic Signature in aws-encryption-sdk-cli
### Impact This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. ### Patches Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x ### Workarounds None ### For more information https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
null
2021-06-01T21:18:53Z
2021-06-01T21:18:53Z
MODERATE
0
{'CWE-347'}
{'https://github.com/aws/aws-encryption-sdk-cli/security/advisories/GHSA-89v2-g37m-g3ff', 'https://github.com/advisories/GHSA-89v2-g37m-g3ff'}
null
GHSA
GHSA-8ffc-79xg-29w8
Code Injection in Apache Cassandra
When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
{'CVE-2021-44521'}
2022-02-26T00:32:56Z
2022-02-12T00:00:48Z
CRITICAL
9.1
{'CWE-94'}
{'https://issues.apache.org/jira/browse/CASSANDRA-17352', 'https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356', 'https://security.netapp.com/advisory/ntap-20220225-0001/', 'http://www.openwall.com/lists/oss-security/2022/02/11/4', 'https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/', 'https://github.com/advisories/GHSA-8ffc-79xg-29w8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44521'}
null
GHSA
GHSA-qr28-7j6p-9hmv
Content Injection via TileJSON attribute in mapbox.js
Versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios. If `L.mapbox.map` or `L.mapbox.tileLayer` are used to load untrusted TileJSON content from a non-Mapbox URL, it is possible for a malicious user with control over the TileJSON content to inject script content into the "attribution" value of the TileJSON which will be executed in the context of the page using Mapbox.js. ## Recommendation Version 2.x: Update to version 2.1.7 or later. Version 1.x: Update to version 1.6.5 or later.
{'CVE-2017-1000042'}
2021-09-16T21:03:24Z
2018-11-09T17:47:45Z
MODERATE
6.1
{'CWE-79'}
{'https://www.npmjs.com/advisories/49', 'https://github.com/advisories/GHSA-qr28-7j6p-9hmv', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000042', 'https://nodesecurity.io/advisories/49', 'https://hackerone.com/reports/54327'}
null
GHSA
GHSA-gf7x-2j2x-7f73
Missing authorization in xwiki-platform
### Impact Any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. ### Patches It has been patched in XWiki 13.2CR1 and 12.10.6 ### Workarounds There is no workaround beside patching. ### References https://jira.xwiki.org/browse/XWIKI-18430 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
{'CVE-2022-23617'}
2022-02-11T15:01:15Z
2022-02-09T21:41:46Z
MODERATE
6.5
{'CWE-862'}
{'https://github.com/xwiki/xwiki-platform/commit/b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554', 'https://jira.xwiki.org/browse/XWIKI-18430', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23617', 'https://github.com/advisories/GHSA-gf7x-2j2x-7f73', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gf7x-2j2x-7f73', 'https://github.com/xwiki/xwiki-platform/commit/30c52b01559b8ef5ed1035dac7c34aaf805764d5'}
null
GHSA
GHSA-jf43-3v8j-qwwr
Data races in multiqueue
Affected versions of multiqueue unconditionally implemented `Send` for types used in queue implementations (`InnerSend<RW, T>`, `InnerRecv<RW, T>`, `FutInnerSend<RW, T>`, `FutInnerRecv<RW, T>`). This allows users to send non-Send types to other threads, which can lead to data race bugs or other undefined behavior.
null
2021-08-25T20:59:56Z
2021-08-25T20:59:56Z
MODERATE
0
{'CWE-362'}
{'https://github.com/schets/multiqueue/issues/31', 'https://rustsec.org/advisories/RUSTSEC-2020-0143.html', 'https://github.com/advisories/GHSA-jf43-3v8j-qwwr'}
null
GHSA
GHSA-q43c-g2g7-6gxj
Cross-Site Request Forgery (CSRF) in keystone
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Request Forgery (CSRF). The package fails to validate the presence of the `X-CSRF-Token` header, which may allow attackers to carry actions on behalf of other users on all endpoints. ## Recommendation Update to version 4.0.0 or later.
{'CVE-2017-16570'}
2021-06-10T21:18:40Z
2017-11-30T23:14:47Z
HIGH
8.8
{'CWE-352'}
{'https://snyk.io/vuln/SNYK-JS-KEYSTONE-449663', 'https://www.npmjs.com/advisories/979', 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://github.com/keystonejs/keystone/pull/4478', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16570', 'https://github.com/advisories/GHSA-q43c-g2g7-6gxj', 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'https://github.com/keystonejs/keystone/issues/4437', 'https://www.exploit-db.com/exploits/43922/'}
null
GHSA
GHSA-pch5-whg9-qr2r
netmask npm package vulnerable to octal input data
The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.
{'CVE-2021-29418'}
2021-06-09T23:10:54Z
2021-03-29T21:32:05Z
MODERATE
5.3
{'CWE-20'}
{'https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/', 'https://github.com/advisories/GHSA-pch5-whg9-qr2r', 'https://security.netapp.com/advisory/ntap-20210604-0001/', 'https://sick.codes/sick-2021-011', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29418', 'https://www.npmjs.com/package/netmask', 'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4', 'https://vuln.ryotak.me/advisories/6'}
null
GHSA
GHSA-mj63-64x7-57xf
Path traversal in impacket
Multiple path traversal vulnerabilities exist in smbserver.py in Impacket before 0.9.23. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key.
{'CVE-2021-31800'}
2021-06-18T18:43:14Z
2021-06-18T18:43:14Z
CRITICAL
9.8
{'CWE-22'}
{'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2008', 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L3485', 'https://github.com/SecureAuthCorp/impacket/releases/tag/impacket_0_9_23', 'https://github.com/SecureAuthCorp/impacket/commit/99bd29e3995c254e2d6f6c2e3454e4271665955a', 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2958', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31800', 'https://github.com/advisories/GHSA-mj63-64x7-57xf', 'https://github.com/SecureAuthCorp/impacket/commit/49c643bf66620646884ed141c94e5fdd85bcdd2f', 'https://github.com/SecureAuthCorp/impacket/releases', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KRV2C5DATXBHG6TF6CEEX54KZ75THQS3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UF56LYB27LHEIFJTFHU3M75NMNNK2SCG/', 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L876', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPXDPWCAPVX3UWYZ3N2T5OLBSBBUHJP6/'}
null
GHSA
GHSA-pfwp-8pq4-g7pv
Moderate severity vulnerability that affects com.alipay.sofa:hessian
SOFA-Hessian through 4.0.2 allows remote attackers to execute arbitrary commands via a crafted serialized Hessian object because blacklisting of com.caucho.naming.QName and com.sun.org.apache.xpath.internal.objects.XString is mishandled, related to Resin Gadget.
{'CVE-2019-9212'}
2021-09-16T17:29:50Z
2019-03-06T17:36:08Z
CRITICAL
9.8
{'CWE-184', 'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9212', 'https://github.com/alipay/sofa-hessian/issues/34', 'https://github.com/advisories/GHSA-pfwp-8pq4-g7pv'}
null
GHSA
GHSA-j378-6mmw-hqfr
Denial of service vulnerability exists when System.IO.Pipelines improperly handles requests
A denial of service vulnerability exists when System.IO.Pipelines improperly handles requests, aka "System.IO.Pipelines Denial of Service." This affects .NET Core 2.1, System.IO.Pipelines, ASP.NET Core 2.1.
{'CVE-2018-8409'}
2022-04-26T19:05:24Z
2018-10-16T19:56:38Z
HIGH
7.5
null
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8409', 'http://www.securityfocus.com/bid/105223', 'https://github.com/advisories/GHSA-j378-6mmw-hqfr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8409'}
null
GHSA
GHSA-6rg3-8h8x-5xfv
Unchecked hostname resolution could allow access to local network resources by users outside the local network
### Impact A newly implemented route allowing users to download files from remote endpoints was not properly verifying the destination hostname for user provided URLs. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible. This vulnerability requires valid authentication credentials and is therefore **not exploitable by unauthenticated users**. If you are running an instance for yourself or other trusted individuals this impact is unlikely to be of major concern to you. However, you should still upgrade for security sake. ### Patches Users should upgrade to the latest version of Wings. ### Workarounds There is no workaround available that does not involve modifying Panel or Wings code.
null
2021-10-05T17:24:12Z
2021-06-23T18:04:50Z
MODERATE
6.4
{'CWE-284', 'CWE-441'}
{'https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv', 'https://github.com/advisories/GHSA-6rg3-8h8x-5xfv'}
null
GHSA
GHSA-q9cp-mc96-m4w2
XML External Entity in Dashboard Widget
### Problem It has been discovered that RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability with current PHP versions of supported and maintained system distributions. At least with _libxml2_ version 2.9, the processing of XML external entities is disabled per default - and cannot be exploited. Besides that, a valid backend user account is needed. ### Solution Update to TYPO3 version 10.4.10 that fixes the problem described.
{'CVE-2020-26229'}
2021-01-07T22:39:30Z
2020-11-23T21:18:44Z
LOW
3.7
{'CWE-611'}
{'https://github.com/advisories/GHSA-q9cp-mc96-m4w2', 'https://typo3.org/security/advisory/typo3-core-sa-2020-012', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-q9cp-mc96-m4w2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26229'}
null
GHSA
GHSA-rjmq-6v55-4rjv
Improper Authorization in org.cometd.oort
### Impact Internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels. By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other user's (possibly sensitive) data. By publishing to those channels, a remote user may be able to create/modify/delete other user's data and modify the cluster structure. The issue impacts any version up to 5.0.10, 6.0.5 and 7.0.5. ### Patches The issue has been fixed in 5.0.11, 6.0.6 and 7.0.6. ### Workarounds The workaround is to install a custom `SecurityPolicy` that forbids subscription and publishing to remote, non-Oort, sessions on Oort and Seti channels. This workaround could be implemented in any affected version. ### References cometd/cometd#1146 ### For more information If you have any questions or comments about this advisory: * Email us at [security@webtide.com](mailto:security@webtide.com) ### Credits https://www.redteam-pentesting.de/
{'CVE-2022-24721'}
2022-04-19T19:03:24Z
2022-03-15T19:02:36Z
HIGH
8.1
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24721', 'https://github.com/cometd/cometd/commit/bb445a143fbf320f17c62e340455cd74acfb5929', 'https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv', 'https://github.com/advisories/GHSA-rjmq-6v55-4rjv', 'https://github.com/cometd/cometd/issues/1146'}
null
GHSA
GHSA-65rm-h285-5cc5
Improper Certificate Validation in Twisted
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
{'CVE-2019-12855'}
2021-08-17T21:07:08Z
2019-08-16T14:02:35Z
HIGH
7.4
{'CWE-295'}
{'https://github.com/advisories/GHSA-65rm-h285-5cc5', 'https://github.com/twisted/twisted/pull/1147', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12855', 'https://twistedmatrix.com/trac/ticket/9561'}
null
GHSA
GHSA-8mjx-h23h-w2pg
Double free in stack_dst
An issue was discovered in the stack_dst crate before 0.6.1 for Rust. Because of the push_inner behavior, a double free can occur upon a val.clone() panic.
{'CVE-2021-28034'}
2021-09-01T18:30:44Z
2021-09-01T18:30:44Z
CRITICAL
9.8
{'CWE-415'}
{'https://github.com/advisories/GHSA-8mjx-h23h-w2pg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28034', 'https://rustsec.org/advisories/RUSTSEC-2021-0033.html', 'https://github.com/thepowersgang/stack_dst-rs/commit/2a4d53809e3000f40085f2b229b6b1a33759881d'}
null
GHSA
GHSA-6w83-22gj-5pv9
Directory Traversal in cyber-js
Affected versions of `cyber-js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16093'}
2021-01-08T19:20:25Z
2018-07-27T14:06:00Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16093', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cyber-js', 'https://github.com/advisories/GHSA-6w83-22gj-5pv9', 'https://nodesecurity.io/advisories/347', 'https://www.npmjs.com/advisories/347'}
null
GHSA
GHSA-v33x-prhc-gph5
Insufficiently Protected Credentials and Improper Authentication in Spring Security
Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of ?null?.
{'CVE-2019-11272'}
2021-06-09T20:12:58Z
2019-06-27T17:24:58Z
HIGH
7.3
{'CWE-287', 'CWE-522'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-11272', 'https://github.com/advisories/GHSA-v33x-prhc-gph5', 'https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html', 'https://pivotal.io/security/cve-2019-11272'}
null
GHSA
GHSA-mqvp-7rrg-9jxc
Improper Input Validation and Allocation of Resources Without Limits or Throttling in poi-scratchpad
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
{'CVE-2022-26336'}
2022-03-29T19:10:59Z
2022-03-05T00:00:44Z
MODERATE
5.5
{'CWE-20', 'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26336', 'https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j', 'https://github.com/advisories/GHSA-mqvp-7rrg-9jxc'}
null
GHSA
GHSA-6qq8-5wq3-86rp
Open redirect in Traefik
## Summary There exists a potential open redirect vulnerability in Traefik's handling of the `X-Forwarded-Prefix` header. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios. ## Details The Traefik API dashboard component doesn't validate that the value of the header `X-Forwarded-Prefix` is a site relative path and will redirect to any header provided URI. e.g. ``` $ curl --header 'Host:traefik.localhost' --header 'X-Forwarded-Prefix:https://example.org' 'http://localhost:8081' <a href="https://example.org/dashboard/">Found</a>.` ``` ### Impact A successful exploitation of an open redirect can be used to entice victims to disclose sensitive information. ### Workarounds By using the `headers` middleware, the request header `X-Forwarded-Prefix` value can be overridden by the value `.` (dot) - https://docs.traefik.io/v2.2/middlewares/headers/#customrequestheaders - https://docs.traefik.io/v1.7/basics/#custom-headers ### For more information If you have any questions or comments about this advisory, open an issue in [Traefik](https://github.com/containous/traefik/issues). ## Credit This issue was found by the GitHub Application Security Team and reported on behalf of the GHAS by the GitHub Security Lab Team.
{'CVE-2020-15129'}
2022-04-19T19:02:31Z
2022-02-11T23:19:21Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/containous/traefik/commit/e63db782c11c7b8bfce30be4c902e7ef8f9f33d2', 'https://github.com/containous/traefik/releases/tag/v1.7.26', 'https://github.com/containous/traefik/releases/tag/v2.3.0-rc3', 'https://github.com/containous/traefik/commit/cfa04c300c5db95ae8a52c31a9d973b6dd9c2254', 'https://github.com/containous/traefik/pull/7109', 'https://github.com/advisories/GHSA-6qq8-5wq3-86rp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15129', 'https://github.com/containous/traefik/releases/tag/v2.2.8', 'https://github.com/containous/traefik/security/advisories/GHSA-6qq8-5wq3-86rp'}
null
GHSA
GHSA-rc75-cf5c-mxvh
Use of Cryptographically Weak Pseudo-Random Number Generator in org.pac4j:pac4j-saml
The SAML identifier generated within SAML2Utils.java was found to make use of the apache commons-lang3 RandomStringUtils class which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong. This issue only affects the 3.X release of pac4j-saml.
{'CVE-2019-10755'}
2021-08-18T22:08:18Z
2019-11-06T17:06:28Z
MODERATE
4.9
{'CWE-338'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10755', 'https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407', 'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609', 'https://github.com/advisories/GHSA-rc75-cf5c-mxvh'}
null
GHSA
GHSA-h73q-5wmj-q8pj
Cross site scripting in datatables.net
This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped.
{'CVE-2021-23445'}
2021-10-13T17:26:02Z
2021-09-29T17:11:28Z
MODERATE
0
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23445', 'https://github.com/advisories/GHSA-h73q-5wmj-q8pj', 'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b', 'https://cdn.datatables.net/1.11.3/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371'}
null
GHSA
GHSA-vjv5-gp2w-65vm
Encoded URIs can access WEB-INF directory in Eclipse Jetty
### Description URIs can be crafted using some encoded characters to access the content of the `WEB-INF` directory and/or bypass some security constraints. This is a variation of the vulnerability reported in [CVE-2021-28164](https://nvd.nist.gov/vuln/detail/CVE-2021-28164)/[GHSA-v7ff-8wcx-gmc5](https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5). ### Impact The default compliance mode allows requests with URIs that contain a %u002e segment to access protected resources within the WEB-INF directory. For example, a request to `/%u002e/WEB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. Similarly, an encoded null character can prevent correct normalization so that /.%00/WEB-INF/web.xml cal also retrieve the web.xml file. ### Workarounds Some Jetty [rewrite rules](https://www.eclipse.org/jetty/documentation/jetty-9/index.html#rewrite-handler) can be deployed to rewrite any request containing encoded dot segments or null characters in the raw request URI, to a known not found resource: ```xml <Call name="addRule"> <Arg> <New class="org.eclipse.jetty.rewrite.handler.RewriteRegexRule"> <Set name="regex">.*/(?:\.+/)+.*</Set> <Set name="replacement">/WEB-INF/Not-Found</Set> </New> </Arg> </Call> <Call name="addRule"> <Arg> <New class="org.eclipse.jetty.rewrite.handler.ValidUrlRule"/> </Arg> </Call> ``` ### Analysis Prior to 9.4.37, Jetty was protected from this style of attack by two lines of defense: + URIs were decoded first and then normalized for `.` and `..` sequences. Whilst this is not according to the RFC, it did remove relative segments that were encoded or parameterized and made the resulting URI paths safe from any repeated normalization (often done by URI manipulation and file system mapping). + The `FileResource` class treated any difference between absolute path and canonical path of a resource as an alias, and thus the resource would not be served by default. Prior to 9.4.37, the `FileResource` class was replaced by the `PathResource` class that did not treat normalization differences as aliases. Then release 9.4.37 updated the URI parsing to be compliant with the RFC, in that normalization is done before decoding. This allowed various encodings or adornments to relative path segments that would not be normalized by the pure RFC URI normalization, but were normalized by the file system, thus allowing protected resources to be accessed via an alias. Specifically by decoding URIs after normalization, it left them vulnerable to any subsequent normalization (potentially after checking security constraints) changing the URI singificantly. Such extra normalization is often down by URI manipulation code and file systems. With Jetty releases 9.4.43, 10.0.6, 11.0.6, we have restored several lines of defense: + URIs are first decoded and then normalized which is not strictly according to the current RFC. Since the normalization is done after decoding, the URI paths produced are safe from further normalisation and the referenced resource cannot easily be so changed after passing security constraints. + During URI parsing checks are made for some specific segments/characters that are possible to be seen ambiguously by an application (e.g. encode dot segments, encoded separators, empty segments, parameterized dot segments and/or null characters). So even though Jetty code handles these URIs correctly, there is a risk that an application may not do so, thus such requests are rejected with a 400 Bad Request unless a specific compliance mode is set. + Once decoded and normalized by initial URI processing, Jetty will not decode or normalize a received URI again within its own resource handling. This avoids to possibility of double decode attacks. + The `ContextHandler.getResource(String path)` method always checks that the passed path is normalized, only accepting a non normal path if approved by an AliasChecker. This is the method that is directly used by Jetty resource serving. + The API methods like `ServletContext.getResource(String path)` will normalize the prior to calling `ContextHandler.getResource(String path)`. This allows applications to use non normal paths. + The `PathResource` class now considers any difference in normal/canonical name between a request resource name and the found resource name to be an alias, which will only be served if approved by an explicit `AliasChecker` In summary, the defense is a front line of detection of specific known URI alias attacks, with the last line defense of not allowing any aliasing of resources. Many thanks to @cangqingzhe from @CloverSecLabs for reporting this issue.
{'CVE-2021-34429'}
2022-04-22T15:44:29Z
2021-07-19T15:15:24Z
MODERATE
5.3
{'CWE-200', 'CWE-551', 'CWE-863'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r2e32390cb7aedb39069e5b18aa130ca53e766258518faee63c31d3ea@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34429', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm', 'https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.43.v20210629', 'https://lists.apache.org/thread.html/r0626f279ebf65506110a897e3a57ccd4072803ee5434b2503e070398@%3Ccommits.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210819-0006/', 'https://lists.apache.org/thread.html/r029c0c6833c8bb6acb094733fd7b75029d633f47a92f1c9d14391fc0@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r46f748c1dc9cf9b6c1c18f6b5bfc3a869907f68f72e17666f2f30f24@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcb157f55b9ae41b3076801de927c6fca1669c6d8eaf11a9df5dbeb46@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r46900f74dbb7d168aeac43bf0e7f64825376bb7eb74d31a5b33344ce@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rb33d65c3e5686f2e3b9bb8a032a44163b2f2ad9d31a8727338f213c1@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r48a93f2bc025acd7c7e341ed3864bfdeb75f0c768d41bc247e1a1f63@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5678d994d4dd8e7c838eed3bbc1a83a7f6bc62724b0cce67e8892a45@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re3de01414ccf682fe0951205f806dd8e94440798fd64c55a4941de3e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r679d96f981d4c92724090ed2d5e8565a1d655a72bb315550489f052e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r756443e9d50af7e8c3df82e2c45105f452c8e8195ddbc0c00f58d5fe@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r02f940c27e997a277ff14e79e84551382e1081e8978b417e0c2b0857@%3Ccommits.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re850203ef8700cb826534dd4a1cb9f5b07bb8f6f973b39ff7838d3ba@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rc26807be68748b3347decdcd03ae183622244b0b4cb09223d4b7e500@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r3aefe613abce594c71ace50088d2529bbde65d08b8e7ff2c2723aaa1@%3Cdev.santuario.apache.org%3E', 'https://lists.apache.org/thread.html/r6e6f50c1ce1fb592cb43e913f5be23df104d50751465f8f1952ace0c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r721ab6a5fa8d45bec76714b674f5d4caed2ebfeca69ad1d6d4caae6c@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4727d282b5c2d951057845a46065d59f6e33132edc0a14f41c26b01e@%3Cdev.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-vjv5-gp2w-65vm', 'https://lists.apache.org/thread.html/r833a4c8bdbbfeb8a2cd38238e7b59f83edd5c1a0e508b587fc551a46@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re01890eef49d4201018f2c97e26536e3e75f441ecdbcf91986c3bc17@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r9d245c6c884bbc804a472116d730c1a01676bf24f93206a34923fc64@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r74fdc446df551fe89a0a16957a1bfdaad19380e0c1afd30625685a9c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r44ea39ca8110de7353bfec88f58aa3aa58a42bb324b8772512ee190c@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9e6158d72ef25077c2dc59fbddade2eacf7d259a2556c97a989f2fe8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/re5e9bb535db779506013ef8799dc2a299e77cdad6668aa94c456dba6@%3Cjira.kafka.apache.org%3E'}
null
GHSA
GHSA-mhp6-pxh8-r675
Cross site scripting in Angular
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.
{'CVE-2020-7676'}
2021-09-22T18:31:00Z
2020-06-18T14:19:58Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7676', 'https://lists.apache.org/thread.html/r455ebd83a1c69ae8fd897560534a079c70a483dbe1e75504f1ca499b@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r3f05cfd587c774ea83c18e59eda9fa37fa9bbf3421484d4ee1017a20@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb6423268b25db0f800359986867648e11dbd38e133b9383e85067f02@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r446c297cd6cda2bd7e345c9b0741d7f611df89902e5d515848c6f4b1@%3Cozone-issues.hadoop.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-570058', 'https://github.com/angular/angular.js/pull/17028', 'https://lists.apache.org/thread.html/r57383582dcad2305430321589dfaca6793f5174c55da6ce8d06fbf9b@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://github.com/angular/angular.js/pull/17028,', 'https://github.com/advisories/GHSA-mhp6-pxh8-r675', 'https://lists.apache.org/thread.html/r79e3feaaf87b81e80da0e17a579015f6dcb94c95551ced398d50c8d7@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r80f210a5f4833d59c5d3de17dd7312f9daba0765ec7d4052469f13f1@%3Cozone-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rfa2b19d01d10a8637dc319a7d5994c3dbdb88c0a8f9a21533403577a@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r198985c02829ba8285ed4f9b1de54a33b5f31b08bb38ac51fc86961b@%3Cozone-issues.hadoop.apache.org%3E'}
null
GHSA
GHSA-c5x2-p679-95wc
Null pointer dereference in `SparseTensorSliceDataset`
### Impact When a user does not supply arguments that determine a valid sparse tensor, `tf.raw_ops.SparseTensorSliceDataset` implementation can be made to dereference a null pointer: ```python import tensorflow as tf tf.raw_ops.SparseTensorSliceDataset( indices=[[],[],[]], values=[1,2,3], dense_shape=[3,3]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L240-L251) has some argument validation but fails to consider the case when either `indices` or `values` are provided for an empty sparse tensor when the other is not. If `indices` is empty (as in the example above), then [code that performs validation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L260-L261) (i.e., checking that the indices are monotonically increasing) results in a null pointer dereference: ```cc for (int64_t i = 0; i < indices->dim_size(0); ++i) { int64_t next_batch_index = indices->matrix<int64>()(i, 0); ... } ``` If `indices` as provided by the user is empty, then `indices` in the C++ code above is backed by an empty `std::vector`, hence calling `indices->dim_size(0)` results in null pointer dereferencing (same as calling `std::vector::at()` on an empty vector). ### Patches We have patched the issue in GitHub commit [02cc160e29d20631de3859c6653184e3f876b9d7](https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37647'}
2021-08-25T14:43:32Z
2021-08-25T14:43:32Z
HIGH
7.7
{'CWE-476'}
{'https://github.com/advisories/GHSA-c5x2-p679-95wc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37647', 'https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c5x2-p679-95wc'}
null
GHSA
GHSA-cq6w-w5rj-p9x8
Cross-site Scripting in Froala Editor
Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain conditions, a base64 crafted string leads to persistent Cross-site scripting (XSS) vulnerability within the hyperlink creation module.
{'CVE-2021-30109'}
2021-10-06T17:47:05Z
2021-10-06T17:47:05Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-cq6w-w5rj-p9x8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30109', 'http://froala.com', 'https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md'}
null
GHSA
GHSA-fxq4-r6mr-9x64
CSRF Vuln can expose user's QRcode
### Impact When a user is setting up two-factor authentication using an authenticator app, a QRcode is generated and made available via a GET request to /tf-qrcode. Since GETs do not have any CSRF protection, it is possible a malicious 3rd party could access the QRcode and therefore gain access to two-factor authentication codes. Note that the /tf-qrcode endpoint is ONLY accessible while the user is initially setting up their device. Once setup is complete, there is no vulnerability. ### Patches This is fixed in the upcoming 4.0.0 release. ### Workarounds You can provide your own URL for fetching the QRcode by defining SECURITY_TWO_FACTOR_QRCODE_URL and providing your own implementation (that presumably required a POST with CSRF protection). This would require changing the two-factor setup template as well. ### References None. ### For more information If you have any questions or comments about this advisory: * Read this pull request: #423
null
2021-04-08T16:46:00Z
2021-04-08T16:46:00Z
LOW
0
{'CWE-352'}
{'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-fxq4-r6mr-9x64', 'https://github.com/advisories/GHSA-fxq4-r6mr-9x64', 'https://pypi.org/project/Flask-Security-Too'}
null
GHSA
GHSA-jpwg-6gf5-5vh9
Out of bounds write in reorder
An issue was discovered in the reorder crate through 1.1.0 for Rust. swap_index can return uninitialized values if an iterator returns a len() that is too large.
{'CVE-2021-29942'}
2021-08-25T20:54:10Z
2021-08-25T20:54:10Z
HIGH
7.3
{'CWE-787'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0050.html', 'https://github.com/tiby312/reorder/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29942', 'https://github.com/advisories/GHSA-jpwg-6gf5-5vh9'}
null
GHSA
GHSA-2m8h-fgr8-2q9w
Pivotal Spring Framework Paths provided to the ResourceServlet were not properly sanitized
An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks.
{'CVE-2016-9878'}
2022-04-26T18:36:46Z
2018-10-04T20:29:55Z
HIGH
7.5
{'CWE-22'}
{'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://pivotal.io/security/cve-2016-9878', 'https://security.netapp.com/advisory/ntap-20180419-0002/', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://github.com/advisories/GHSA-2m8h-fgr8-2q9w', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9878', 'http://www.securityfocus.com/bid/95072', 'http://www.securitytracker.com/id/1040698', 'https://access.redhat.com/errata/RHSA-2017:3115'}
null
GHSA
GHSA-cpgw-2wxr-pww3
Open Redirect
Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.
{'CVE-2018-15178'}
2021-06-29T18:32:39Z
2021-06-29T18:32:39Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/gogs/gogs/commit/1f247cf8139cb483276cd8dd06385a800ce9d4b2', 'https://github.com/advisories/GHSA-cpgw-2wxr-pww3', 'https://github.com/gogs/gogs/issues/5364', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15178', 'https://github.com/gogs/gogs/pull/5365'}
null
GHSA
GHSA-7h6j-2268-fhcm
Improper Certificate Handling
configurationwatcher.go in Traefik 2.x before 2.1.4 and TraefikEE 2.0.0 mishandles the purging of certificate contents from providers before logging.
{'CVE-2020-9321'}
2021-09-02T22:00:01Z
2021-09-02T22:00:01Z
MODERATE
4.6
{'CWE-200', 'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-9321', 'https://github.com/containous/traefik/releases/tag/v2.1.4', 'https://github.com/containous/traefik/pull/6281', 'https://github.com/advisories/GHSA-7h6j-2268-fhcm'}
null