ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-29vr-79w7-p649
|
Incorrect Authorization in Gerapy
|
An Access Control vunerabiity exists in Gerapy v 0.9.7 via the spider parameter in project_configure function.
|
{'CVE-2021-44597'}
|
2022-03-29T21:07:12Z
|
2022-03-11T00:02:00Z
|
CRITICAL
| 9.8
|
{'CWE-863'}
|
{'https://github.com/advisories/GHSA-29vr-79w7-p649', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44597', 'https://github.com/Gerapy/Gerapy/releases/tag/v0.9.8', 'https://github.com/Gerapy/Gerapy/issues/219'}
| null |
GHSA
|
GHSA-3h9m-9g3g-5wqx
|
Malicious Package in buffer-xov
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:13:03Z
|
2020-09-03T22:13:14Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1252', 'https://github.com/advisories/GHSA-3h9m-9g3g-5wqx'}
| null |
GHSA
|
GHSA-hhh6-cm2m-3fhc
|
Allocation of Resources Without Limits or Throttling in iText
|
iText v7.1.17 was discovered to contain an out-of-memory error via the component readStreamBytesRaw, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
|
{'CVE-2022-24196'}
|
2022-04-15T16:39:31Z
|
2022-02-02T00:01:45Z
|
MODERATE
| 6.5
|
{'CWE-770'}
|
{'https://github.com/advisories/GHSA-hhh6-cm2m-3fhc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24196', 'https://github.com/itext/itext7/pull/78#issuecomment-1089279222', 'https://github.com/itext/itext7/pull/78'}
| null |
GHSA
|
GHSA-qqxp-xp9v-vvx6
|
Moderate severity vulnerability that affects jquery-ui
|
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.
|
{'CVE-2012-6662'}
|
2021-09-16T20:04:39Z
|
2017-10-24T18:33:37Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'http://rhn.redhat.com/errata/RHSA-2015-0442.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6662', 'https://github.com/advisories/GHSA-qqxp-xp9v-vvx6', 'http://bugs.jqueryui.com/ticket/8861', 'http://seclists.org/oss-sec/2014/q4/616', 'http://seclists.org/oss-sec/2014/q4/613', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e', 'http://www.securityfocus.com/bid/71107', 'http://rhn.redhat.com/errata/RHSA-2015-1462.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98697', 'https://github.com/jquery/jquery/issues/2432', 'http://bugs.jqueryui.com/ticket/8859'}
| null |
GHSA
|
GHSA-jm6p-wfjg-xm7x
|
bookstack is vulnerable to Improper Access Control
|
bookstack is vulnerable to Improper Access Control.
|
{'CVE-2021-4026'}
|
2021-12-02T15:29:38Z
|
2021-12-01T18:26:48Z
|
MODERATE
| 4.3
|
{'CWE-668', 'CWE-284'}
|
{'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.2', 'https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92', 'https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1d', 'https://github.com/advisories/GHSA-jm6p-wfjg-xm7x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4026'}
| null |
GHSA
|
GHSA-p2j5-3f4c-224r
|
Improper Input Validation in HashiCorp Consul
|
HashiCorp Consul and Consul Enterprise did not appropriately enforce scope for local tokens issued by a primary data center, where replication to a secondary data center was not enabled. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
|
{'CVE-2020-13170'}
|
2021-05-18T18:21:21Z
|
2021-05-18T18:21:21Z
|
MODERATE
| 5.3
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13170', 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/commit/242994a016a181d6c62a5bb83189716ad13d4216', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/8068', 'https://github.com/advisories/GHSA-p2j5-3f4c-224r'}
| null |
GHSA
|
GHSA-cxfm-5m4g-x7xp
|
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
|
### Impact
The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39150](https://x-stream.github.io/CVE-2021-39150.html).
### Credits
Lai Han of NSFOCUS security team found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-39150'}
|
2022-04-22T15:43:06Z
|
2021-08-25T14:47:19Z
|
HIGH
| 8.5
|
{'CWE-502', 'CWE-918'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39150', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/advisories/GHSA-cxfm-5m4g-x7xp', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://x-stream.github.io/CVE-2021-39150.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-cxfm-5m4g-x7xp'}
| null |
GHSA
|
GHSA-5cmw-fhq9-8fhh
|
Type Confusion in LiveHelperChat
|
Live Helper Chat provides live support for your website. Loose comparison causes IDOR on multiple endpoints in LiveHelperChat prior to 3.96. There is a fix released in versions 3.96 and 3.97. Currently, there is no known workaround.
|
{'CVE-2022-1176'}
|
2022-04-12T18:10:01Z
|
2022-04-01T00:00:40Z
|
HIGH
| 7.5
|
{'CWE-843'}
|
{'https://huntr.dev/bounties/3e30171b-c9bf-415c-82f1-6f55a44d09d3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1176', 'https://github.com/livehelperchat/livehelperchat/commit/72c0df160bfe9838c618652facef29af99392ce3', 'https://github.com/advisories/GHSA-5cmw-fhq9-8fhh'}
| null |
GHSA
|
GHSA-q448-6c3m-cxmj
|
Cross-site Scripting in jeecg-boot
|
jeecg-boot is a code generator. A Cross Site Scripting (XSS) vulnerabilitiy exists in jeecg-boot 3.0 in /jeecg-boot/jmreport/view with a mouseover event.
|
{'CVE-2021-44585'}
|
2022-03-28T14:30:55Z
|
2022-03-11T00:01:59Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/jeecgboot/jeecg-boot/issues/3223', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44585', 'https://github.com/jeecgboot/jeecg-boot/commit/dbba190980fe44ab5377703dc1a9487806ee2a91', 'https://github.com/advisories/GHSA-q448-6c3m-cxmj'}
| null |
GHSA
|
GHSA-4hv7-3q38-97m8
|
Arbitrary code execution in djv
|
This affects the package djv before 2.1.4. By controlling the schema file, an attacker can run arbitrary JavaScript code on the victim machine.
|
{'CVE-2020-28464'}
|
2021-07-28T19:29:06Z
|
2021-04-13T15:24:47Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://github.com/korzio/djv/blob/master/lib/utils/properties.js%23L55', 'https://github.com/advisories/GHSA-4hv7-3q38-97m8', 'https://snyk.io/vuln/SNYK-JS-DJV-1014545', 'https://github.com/korzio/djv/pull/98/files', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28464'}
| null |
GHSA
|
GHSA-j6jg-w79c-7p8v
|
File Upload Restriction Bypass leading to Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to a file upload restriction bypass leading to stored cross-site scripting.
|
{'CVE-2022-0951'}
|
2022-03-29T21:23:38Z
|
2022-03-16T00:00:48Z
|
MODERATE
| 6.1
|
{'CWE-434', 'CWE-79'}
|
{'https://huntr.dev/bounties/b3a983a3-17f9-4aa8-92d7-8a0c92a93932', 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0951', 'https://github.com/advisories/GHSA-j6jg-w79c-7p8v'}
| null |
GHSA
|
GHSA-fvcj-hvfw-7f2v
|
Improper Authentication
|
### Impact
A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an attacker to have internal knowledge of the bot.
### Patches
The problem has been patched in all affected versions. Please see the list of patched versions for the most appropriate one for your individual case.
### Workarounds
Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator, which throws an exception if the Claims are Skill Claims.
For detailed instructions, see the link in the References section.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botbuilder-dotnet)
* Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com)
|
{'CVE-2021-1725'}
|
2021-03-08T15:49:53Z
|
2021-03-08T15:49:53Z
|
HIGH
| 0
|
{'CWE-287'}
|
{'https://aka.ms/SkillClaimsValidationJavascript', 'https://www.npmjs.com/package/botframework-connector', 'https://github.com/advisories/GHSA-fvcj-hvfw-7f2v', 'https://github.com/microsoft/botbuilder-js/security/advisories/GHSA-fvcj-hvfw-7f2v'}
| null |
GHSA
|
GHSA-3c87-r9f7-qfgq
|
Downloads Resources over HTTP in macaca-chromedriver-zxa
|
Affected versions of `macaca-chromedriver-zxa` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `macaca-chromedriver-zxa`.
## Recommendation
The best mitigation is to manually set the download URL to a safe HTTPS server via the `CHROMEDRIVER_CDNURL` environment variable.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10623'}
|
2021-01-08T20:02:34Z
|
2019-02-18T23:56:56Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/221', 'https://github.com/advisories/GHSA-3c87-r9f7-qfgq', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10623', 'https://nodesecurity.io/advisories/221'}
| null |
GHSA
|
GHSA-rm7c-x424-g2mw
|
Malicious Package in asyync
|
All versions of `asyync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:47:20Z
|
2020-09-02T18:36:31Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/843', 'https://github.com/advisories/GHSA-rm7c-x424-g2mw'}
| null |
GHSA
|
GHSA-8xx9-rxrj-2m2w
|
Cross-site Scripting in pimcore
|
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-4139'}
|
2022-01-05T20:35:12Z
|
2022-01-05T20:35:12Z
|
MODERATE
| 6.6
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/6ec59e43-095f-4ba3-8b75-e92250da8e3a', 'https://github.com/advisories/GHSA-8xx9-rxrj-2m2w', 'https://github.com/pimcore/pimcore/commit/d5c3e876d910784000335061c3bd24d301351245', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4139'}
| null |
GHSA
|
GHSA-94vp-rmqv-5875
|
Twig Sandbox Escape by authenticated users with access to editing CMS templates when safemode is enabled.
|
### Impact
An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP.
This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP.
### Patches
Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
### Workarounds
Apply https://github.com/octobercms/october/compare/106daa2930de4cebb18732732d47d4056f01dd5b...7cb148c1677373ac30ccfd3069d18098e403e1ca to your installation manually if unable to upgrade to Build 469.
### References
Reported by [ka1n4t](https://github.com/ka1n4t)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1108" alt="Screen Shot 2020-10-10 at 1 21 13 PM" src="https://user-images.githubusercontent.com/7253840/95663316-7de28b80-0afb-11eb-999d-a6526cf78709.png">
|
{'CVE-2020-15247'}
|
2022-04-19T19:02:37Z
|
2020-11-23T19:48:27Z
|
MODERATE
| 5.2
|
{'CWE-862'}
|
{'https://github.com/octobercms/october/security/advisories/GHSA-94vp-rmqv-5875', 'https://github.com/advisories/GHSA-94vp-rmqv-5875', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15247', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'}
| null |
GHSA
|
GHSA-p867-fxfr-ph2w
|
b2-sdk-python TOCTOU application key disclosure
|
### Impact
Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition.
SDK users of the `SqliteAccountInfo` format are vulnerable while users of the `InMemoryAccountInfo` format are safe. The `SqliteAccountInfo` saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/account_info`, `~/.b2_account_info` or a user-defined path). When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory containing the file is readable by a local attacker then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it.
Consumers of this SDK who rely on it to save data using `SqliteAccountInfo` class should upgrade to the latest version of the SDK. Those who believe a local user might have opened a handle using this race condition, should remove the affected database files and regenerate all application keys.
### Patches
Users should upgrade to b2-sdk-python 1.14.1 or later.
### For more information
See the related advisory in the [B2 Command Line Tool](https://github.com/Backblaze/B2_Command_Line_Tool), a consumer of this SDK.
If you have any questions or comments about this advisory:
* Open an issue in [b2-sdk-python](https://github.com/Backblaze/b2-sdk-python)
* Email us at [security@backblaze.com](mailto:security@backblaze.com)
|
{'CVE-2022-23651'}
|
2022-04-19T19:03:23Z
|
2022-02-24T12:08:24Z
|
MODERATE
| 4.7
|
{'CWE-367'}
|
{'https://github.com/Backblaze/b2-sdk-python/security/advisories/GHSA-p867-fxfr-ph2w', 'https://github.com/advisories/GHSA-p867-fxfr-ph2w', 'https://github.com/Backblaze/b2-sdk-python/commit/62476638986e5b6d7459aca5ef8ce220760226e0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23651', 'https://pypi.org/project/b2sdk/'}
| null |
GHSA
|
GHSA-8gf5-q9p9-wvmc
|
Data race in atomic-option
|
An issue was discovered in the atomic-option crate through 2020-10-31 for Rust. Because AtomicOption<T> implements Sync unconditionally, a data race can occur.
|
{'CVE-2020-36219'}
|
2021-08-25T20:51:42Z
|
2021-08-25T20:51:42Z
|
MODERATE
| 5.9
|
{'CWE-662'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36219', 'https://rustsec.org/advisories/RUSTSEC-2020-0113.html', 'https://github.com/reem/rust-atomic-option/issues/4', 'https://github.com/advisories/GHSA-8gf5-q9p9-wvmc'}
| null |
GHSA
|
GHSA-xm34-v85h-9pg2
|
Authentication Bypass by CSRF Weakness
|
### Impact
CSRF vulnerability that allows user account takeover.
All applications using any version of the frontend component of `solidus_auth_devise` are affected if `protect_from_forgery` method is both:
- Executed whether as:
- A `before_action` callback (the default)
- A `prepend_before_action` (option `prepend: true` given) before the `:load_object` hook in `Spree::UserController` (most likely order to find).
- Configured to use `:null_session` or `:reset_session` strategies (`:null_session` is the default in case the no strategy is given, but `rails --new` generated skeleton use `:exception`).
That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
### Patches
Users should promptly update to `solidus_auth_devise` version `2.5.4`.
### Workarounds
A couple of options:
- If possible, change your strategy to `:exception`:
```ruby
class ApplicationController < ActionController::Base
protect_from_forgery with: :exception
end
```
- Add the following to `config/application.rb` to at least run the `:exception` strategy on the affected controller:
```ruby
config.after_initialize do
Spree::UsersController.protect_from_forgery with: :exception
end
```
- We've also released new Solidus versions monkey patching `solidus_auth_devise` with the quick fix. Those versions are `v3.1.3`, `v.3.0.3` & `v2.11.12`. See [GHSA-5629-8855-gf4g](https://github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g) for details.
### References
- [CSRF on the Rails guides](https://guides.rubyonrails.org/security.html#cross-site-request-forgery-csrf)
- [Solidus security](https://solidus.io/security/)
### Thanks
We'd like to thank [vampire000](https://hackerone.com/vampire000) for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [solidus_auth_devise](https://github.com/solidusio/solidus_auth_devise/issues) or a discussion in [solidus](https://github.com/solidusio/solidus/discussions)
* Email us at [security@solidus.io](mailto:security@soliidus.io)
* Contact the core team on [Slack](http://slack.solidus.io/)
|
{'CVE-2021-41274'}
|
2021-11-18T20:09:32Z
|
2021-11-18T20:09:32Z
|
CRITICAL
| 9.3
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-xm34-v85h-9pg2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41274', 'https://github.com/solidusio/solidus_auth_devise/commit/731a6645e90ea9fd228f78ec53c6976c048a0555', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/solidusio/solidus_auth_devise/releases/tag/v2.5.4'}
| null |
GHSA
|
GHSA-j4vm-hg8g-g9qv
|
Malicious Package in antd-cloud
|
All versions of `antd-cloud` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T18:39:55Z
|
2020-09-03T17:33:50Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-j4vm-hg8g-g9qv', 'https://www.npmjs.com/advisories/1049'}
| null |
GHSA
|
GHSA-fc7x-2cmc-8j2g
|
Incorrect hash in sha2
|
An issue was discovered in the sha2 crate 0.9.7 before 0.9.8 for Rust. Hashes of long messages may be incorrect when the AVX2-accelerated backend is used.
|
{'CVE-2021-45696'}
|
2022-01-07T17:57:50Z
|
2022-01-06T22:10:26Z
|
CRITICAL
| 9.8
| null |
{'https://rustsec.org/advisories/RUSTSEC-2021-0100.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45696', 'https://github.com/advisories/GHSA-fc7x-2cmc-8j2g', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/sha2/RUSTSEC-2021-0100.md'}
| null |
GHSA
|
GHSA-q4rf-3fhx-88pf
|
YAML deserialization can run untrusted code
|
### Impact
An authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can make a POST request, that can cause the server to run untrusted code on Rundeck Enterprise Edition.
The zip-format plugin issues requires authentication and authorization to these access levels, and affects all Rundeck editions:
* `admin` level access to the `system` resource type
The ACL Policy yaml file upload issues requires authentication and authorization to these access levels, and affects all Rundeck editions:
* `create` `update` or `admin` level access to a `project_acl` resource
* `create` `update` or `admin` level access to the `system_acl` resource
The unauthorized POST request requires authentication, but no specific authorization, and affects Rundeck Enterprise only.
### Patches
Versions 3.4.3, 3.3.14
### Workarounds
Please visit [https://rundeck.com/security](https://rundeck.com/security) for information about specific workarounds.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@rundeck.com](mailto:security@rundeck.com)
To report security issues to Rundeck please use the form at [https://rundeck.com/security](https://rundeck.com/security)
Reporter: Rojan Rijal from Tinder Red Team
|
{'CVE-2021-39132'}
|
2021-09-01T18:27:01Z
|
2021-09-01T18:27:01Z
|
MODERATE
| 8.8
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39132', 'https://github.com/rundeck/rundeck/security/advisories/GHSA-q4rf-3fhx-88pf', 'https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6', 'https://github.com/advisories/GHSA-q4rf-3fhx-88pf'}
| null |
GHSA
|
GHSA-8mq9-fqv8-59wf
|
Cross-Site Scripting in Page Preview
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC` (5.0)
### Problem
Failing to properly encode _Page TSconfig_ settings, corresponding page preview module (_Web>View_) is vulnerable to persistent cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 9.5.28, 10.4.18, 11.3.1 that fix the problem described.
### Credits
Thanks to TYPO3 core merger Oliver Bartsch who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2021-009](https://typo3.org/security/advisory/typo3-core-sa-2021-009)
|
{'CVE-2021-32667'}
|
2022-04-19T19:02:59Z
|
2021-07-22T19:34:43Z
|
MODERATE
| 6.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32667', 'https://github.com/TYPO3/typo3/security/advisories/GHSA-8mq9-fqv8-59wf', 'https://typo3.org/security/advisory/typo3-core-sa-2021-009', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-8mq9-fqv8-59wf', 'https://github.com/advisories/GHSA-8mq9-fqv8-59wf'}
| null |
GHSA
|
GHSA-m8wh-mqgf-rr8g
|
Code injection in Kubernetes Java Client
|
Loading specially-crafted yaml with the Kubernetes Java Client library can lead to code execution.
|
{'CVE-2021-25738'}
|
2021-10-12T17:50:25Z
|
2021-10-12T17:50:25Z
|
MODERATE
| 6.7
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25738', 'https://github.com/kubernetes-client/java/issues/1698', 'https://github.com/advisories/GHSA-m8wh-mqgf-rr8g', 'https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk'}
| null |
GHSA
|
GHSA-h6m3-cx24-9626
|
Malicious Package in js-sla3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-10-01T14:17:17Z
|
2020-09-03T23:11:45Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-h6m3-cx24-9626', 'https://www.npmjs.com/advisories/1292'}
| null |
GHSA
|
GHSA-m6cj-93v6-cvr5
|
Infinite loop in junrar
|
### Impact
A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users.
### Patches
The problem is partially patched in 7.4.1
### Workarounds
None
### References
https://github.com/junrar/junrar/issues/73
https://github.com/junrar/junrar/issues/81
|
{'CVE-2022-23596'}
|
2022-04-19T17:55:14Z
|
2022-02-01T00:47:23Z
|
HIGH
| 7.5
|
{'CWE-835', 'CWE-400'}
|
{'https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7', 'https://github.com/advisories/GHSA-m6cj-93v6-cvr5', 'https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23596', 'https://github.com/junrar/junrar/issues/73'}
| null |
GHSA
|
GHSA-67j9-c52g-w2q9
|
Authorization Bypass in I hate money
|
### Impact
An authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code.
With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated.
### Patches
```diff
ihatemoney/models.py | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/ihatemoney/models.py b/ihatemoney/models.py
index fe7b519..5691c75 100644
--- a/ihatemoney/models.py
+++ b/ihatemoney/models.py
@@ -380,7 +380,7 @@ class Person(db.Model):
def get_by_name(self, name, project):
return (
Person.query.filter(Person.name == name)
- .filter(Project.id == project.id)
+ .filter(Person.project_id == project.id)
.one()
)
@@ -389,7 +389,7 @@ class Person(db.Model):
project = g.project
return (
Person.query.filter(Person.id == id)
- .filter(Project.id == project.id)
+ .filter(Person.project_id == project.id)
.one()
)
```
### Workarounds
To limit the impact, it is possible to disable public project creation by setting `ALLOW_PUBLIC_PROJECT_CREATION = False` in the configuration (see [documentation](https://ihatemoney.readthedocs.io/en/latest/configuration.html)). Existing users will still be able to exploit the flaw, but this will prevent an external attacker from creating a new project.
### For more information
`Person.query.get()` and `Person.query.get_by_name()` were mistakenly running a database join on the Project table without constraining the result.
As a result, `Person.query.get(42, "projectfoo")` would return the Person with id=42, even if it is not associated to the project "projectfoo". The only condition is that "projectfoo" must exist.
This flaw can be exploited in several places:
1) API: PUT requests to `/api/projects/<project>/members/<personID>` will succeed even though `<personID>` is not a member of `<project>`.
This allows an authenticated attacker to alter the state of a member (name, weight, activated) in any project. In addition, the altered member will no longer be associated with its original project but will be associated to the attacker project instead, breaking many features of IHateMoney. For instance, bills referencing the altered member will no longer be visible in the original project.
This causes an additional information disclosure and loss of integrity on bills: the attacker will now be able to see, edit and delete bills belonging to the altered member, because IHateMoney now believes that these bills are associated to the attacker project through the altered member.
For instance, assume that `Person(id=42)` is a member of project "targetProject", and that the attacker has access to another project "attackerProject" with the private code "attackerPassword". The attacker can modify `Person(id=42)` with this command:
$ curl -X PUT -d "name=Pwn3d&activated=1" --basic -u attackerProject:attackerPassword http://$SERVER/api/projects/attackerProject/members/42
The attacker can now see, edit and delete bills paid by `Person(id=42)` by simply browsing to http://$SERVER/attackerProject/
2) Editing a member through the web interface at `/<project>/members/<personID>/edit` will succeed even though `<personID>` is not a member of `<project>`.
This is very similar to the PUT exploit. Reusing the same example, the attacker needs to login to its "attackerProject" project with the private code "attackerPassword". It can then alter the state of `Person(id=42)` by accessing the edit form at the following URL:
http://$SERVER/attackerProject/members/42/edit
Again, as a result of the alteration, the altered member will become associated to the project "attackerProject", resulting in the same information disclosure and loss of integrity on bills.
3) API: DELETE requests to `/api/projects/<project>/members/<personID>` will similarly allow to delete the member `<personID>` even if it belongs to a different project than `<project>`.
$ curl -X DELETE --basic -u attackerProject:attackerPassword http://$SERVER/api/projects/attackerProject/members/42
The impact is less serious than with PUT, because DELETE only deactivates a member (it does not really delete it).
All these exploits require authentication: an attacker needs to know a valid project name and its associated "private code". Once this requirement is fullfilled, the attacker can exploit this flaw to alter the state of members in any other project, without needing to know the target project name or its private code.
`Person.query.get_by_name()` suffers from the same issue as `Person.query.get()`. It has an additional issue: if multiple Person objects with the same name exist (this is possible if they are associated to different projects), `get_by_name()` will crash with `MultipleResultsFound` because of the call to `one()`.
However, since `Person.query.get_by_name()` is currently not used anywhere in IHateMoney, the bug affecting this function has no impact and is not exploitable.
|
{'CVE-2020-15120'}
|
2022-04-19T19:02:31Z
|
2020-07-27T17:47:52Z
|
MODERATE
| 4.9
|
{'CWE-863'}
|
{'https://github.com/advisories/GHSA-67j9-c52g-w2q9', 'https://github.com/spiral-project/ihatemoney/commit/8d77cf5d5646e1d2d8ded13f0660638f57e98471', 'https://github.com/spiral-project/ihatemoney/security/advisories/GHSA-67j9-c52g-w2q9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15120'}
| null |
GHSA
|
GHSA-wxjg-p59j-6c92
|
Command injection in github.com/google/fscrypt
|
The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above
|
{'CVE-2022-25328'}
|
2022-03-08T18:26:50Z
|
2022-02-26T00:00:44Z
|
MODERATE
| 5
|
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-wxjg-p59j-6c92', 'https://github.com/google/fscrypt/pull/346', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25328'}
| null |
GHSA
|
GHSA-g452-6rfc-vrvx
|
Prototype Pollution in open-graph
|
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
|
{'CVE-2021-23419'}
|
2021-09-01T18:31:53Z
|
2021-09-01T18:31:53Z
|
MODERATE
| 5.3
|
{'CWE-915'}
|
{'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348', 'https://github.com/advisories/GHSA-g452-6rfc-vrvx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23419', 'https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747'}
| null |
GHSA
|
GHSA-4j6x-w426-6rc6
|
Default Express middleware security check is ignored in production
|
## Default Express middleware security check is ignored in production
### Impact
All Cube.js deployments that use affected versions of `@cubejs-backend/api-gateway` with default express authentication middleware in production environment are affected.
### Patches
@cubejs-backend/api-gateway@0.11.17
### Workarounds
Override default authentication express middleware: https://cube.dev/docs/@cubejs-backend-server-core#options-reference-check-auth-middleware
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/cube-js/cube.js/issues
* Reach out us in community Slack: https://slack.cube.dev/
| null |
2019-11-08T17:31:17Z
|
2019-11-08T17:31:17Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-4j6x-w426-6rc6'}
| null |
GHSA
|
GHSA-g376-whg7-896m
|
Directory Traversal in yjmyjmyjm
|
Affected versions of `yjmyjmyjm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
| null |
2021-09-23T21:47:16Z
|
2020-09-01T18:45:53Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yjmyjmyjm', 'https://github.com/advisories/GHSA-g376-whg7-896m', 'https://www.npmjs.com/advisories/451'}
| null |
GHSA
|
GHSA-g78f-549w-c354
|
Prototype Pollution in multi-ini
|
This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array.
|
{'CVE-2020-28448'}
|
2021-04-13T15:23:59Z
|
2021-04-13T15:23:59Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-g78f-549w-c354', 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28448', 'https://github.com/evangelion1204/multi-ini/pull/37'}
| null |
GHSA
|
GHSA-jwvr-vv7p-gpwq
|
Privilege escalation for users with create/update permissions in Global Roles in Rancher
|
### Impact
This vulnerability affects customers who utilize non-admin users that are able to create or edit [Global Roles](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/). The most common use case for this scenario is the [`restricted-admin`](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/global-permissions/#restricted-admin) role.
A flaw was discovered in Rancher versions from 2.5.0 up to and including 2.5.12 and from 2.6.0 up to and including 2.6.3 which allows users who have create or update permissions on Global Roles to escalate their permissions, or those of another user, to admin-level permissions. Global Roles grant users Rancher-wide permissions, such as the ability to create clusters. In the identified versions of Rancher, when users are given permission to edit or create Global Roles, they are not restricted to only granting permissions which they already posses.
The privilege escalation can be taken advantage of in two ways by users with create or update permissions on Global Roles (including the `restricted-admin`):
1. Editing the global `admin` role to make it the default for new users, then creating a new user that will be elevated to the global `admin` role.
2. Creating a new global role with permissions already possessed by the `restricted-admin`, assigning this new role to a user, then modifying the global role to grant additional administrive like permissions (`'*'`) to the elevated user.
### Patches
Patched versions include releases 2.5.13, 2.6.4 and later versions.
### Workarounds
Limit access in Rancher to trusted users. There is not a direct mitigation besides upgrading to the patched Rancher versions.
**Note:** If you have users who have create or edit permissions on Global Roles but are not admin users (for example, the `restricted-admin`), it is highly advised to review the roles and users created by those users for possible privilege escalations.
### For more information
If you have any questions or comments about this advisory:
* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.
* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
|
{'CVE-2021-36784'}
|
2022-05-02T19:39:36Z
|
2022-05-02T19:39:35Z
|
MODERATE
| 6.5
|
{'CWE-285', 'CWE-269'}
|
{'https://github.com/rancher/rancher/releases/tag/v2.5.13', 'https://github.com/rancher/rancher/releases/tag/v2.6.4', 'https://github.com/advisories/GHSA-jwvr-vv7p-gpwq', 'https://github.com/rancher/rancher/security/advisories/GHSA-jwvr-vv7p-gpwq'}
| null |
GHSA
|
GHSA-h29c-wcm8-883h
|
Incorrect Permission Assignment for Critical Resource in OnionShare
|
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerability ID: OTF-006
- Vulnerability type: Broken Website Hardening Control
- Threat level: Low
## Description:
The CSP can be turned on or off but not configured for the specific needs of the website.
## Technical description:
The website mode of the application allows to use a hardened CSP, which will block any scripts and external resources. It is not possible to configure this CSP for individual pages and therefore the security enhancement cannot be used for websites using javascript or external resources like fonts or images.
If CSP were configurable, the website creator could harden it accordingly to the needs of the application.
As this issue correlates with the Github issue for exposing the flask application directly (https://github.com/onionshare/ onionshare/issues/1389), it can be assumed that this can be solved by either changing to a well-known webserver, which supports this kind of configuration, or enhancing the status quo by making the CSP a configurable part of each website.
We believe that bundling the nginx or apache webserver would add complexity and dependencies to the application that could result in a larger attack surface - as these packages receive regular security updates. On the other hand it is not recommended to directly expose the flask webserver, due to lack of hardening. This is a trade-off which needs to be evaluated by the Onionshare developers, as multiple features are involved. Ideally the application user could choose between the built-in flask webserver or a system webserver of choice.
## Impact:
As this is a general weakness and not a direct vulnerability in the Onionshare application, the direct impact of this issue is rather low.
## Recommendation:
- Consider offering a configurable webserver choice
- Consider configurable CSP
|
{'CVE-2022-21694'}
|
2022-01-21T23:20:17Z
|
2022-01-21T23:20:17Z
|
LOW
| 3.7
|
{'CWE-732'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21694', 'https://github.com/onionshare/onionshare/security/advisories/GHSA-h29c-wcm8-883h', 'https://github.com/onionshare/onionshare/releases/tag/v2.5', 'https://github.com/advisories/GHSA-h29c-wcm8-883h', 'https://github.com/onionshare/onionshare/issues/1389'}
| null |
GHSA
|
GHSA-m2r5-4w96-qxg5
|
Arbitrary file access through XML parsing in org.xwiki.commons:xwiki-commons-xml
|
### Impact
It's possible in a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service.
For example:
```
{{velocity}}
#set($xml=$services.get('xml'))
#set($xxe_payload = "<?xml version='1.0' encoding='UTF-8'?><!DOCTYPE root[<!ENTITY xxe SYSTEM 'file:///etc/passwd' >]><root><foo>&xxe;</foo></root>")
#set($doc=$xml.parse($xxe_payload))
$xml.serialize($doc)
{{/velocity}}
```
### Patches
The problem has been patched on versions 12.10.10, 13.4.4 and 13.8RC1.
### Workarounds
There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
### References
https://jira.xwiki.org/browse/XWIKI-18946
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [XWiki Security mailing-list](mailto:security@xwiki.org)
|
{'CVE-2022-24898'}
|
2022-04-28T19:31:55Z
|
2022-04-28T19:31:55Z
|
MODERATE
| 4.9
|
{'CWE-611'}
|
{'https://jira.xwiki.org/browse/XWIKI-18946', 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m2r5-4w96-qxg5', 'https://github.com/advisories/GHSA-m2r5-4w96-qxg5', 'https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5'}
| null |
GHSA
|
GHSA-5xgh-643p-cp2g
|
Moderate severity vulnerability that affects yapi-vendor
|
An issue was discovered in YMFE YApi 1.3.23. There is stored XSS in the name field of a project.
|
{'CVE-2018-17574'}
|
2021-09-01T22:22:30Z
|
2018-11-21T22:19:59Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/YMFE/yapi/issues/520', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17574', 'https://github.com/advisories/GHSA-5xgh-643p-cp2g'}
| null |
GHSA
|
GHSA-4c4w-3q45-hp9j
|
Aescrypt does not sufficiently use random values
|
The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to defeat cryptographic protection mechanisms via a chosen plaintext attack.
|
{'CVE-2013-7463'}
|
2022-04-25T20:54:02Z
|
2017-10-24T18:33:36Z
|
HIGH
| 7.5
|
{'CWE-330'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2013-7463', 'http://www.securityfocus.com/bid/98035', 'https://github.com/advisories/GHSA-4c4w-3q45-hp9j', 'https://github.com/Gurpartap/aescrypt/issues/4'}
| null |
GHSA
|
GHSA-6c8p-qphv-668v
|
Moderate severity vulnerability that affects ruby-openid
|
The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack.
|
{'CVE-2013-1812'}
|
2021-09-02T15:54:33Z
|
2017-10-24T18:33:37Z
|
MODERATE
| 0
| null |
{'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120361.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=918134', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1812', 'https://github.com/openid/ruby-openid/pull/43', 'http://www.openwall.com/lists/oss-security/2013/03/03/8', 'https://github.com/openid/ruby-openid/blob/master/CHANGELOG.md', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120204.html', 'https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed', 'https://github.com/advisories/GHSA-6c8p-qphv-668v'}
| null |
GHSA
|
GHSA-jp7f-grcv-6mjf
|
Partial path traversal in sharpcompress
|
SharpCompress recreates a hierarchy of directories under destinationDirectory if ExtractFullPath is set to true in options. In order to prevent extraction outside the destination directory the destinationFileName path is verified to begin with fullDestinationDirectoryPath. However it is not enforced that fullDestinationDirectoryPath ends with slash:
```csharp
public static void WriteEntryToDirectory(IEntry entry,
string destinationDirectory,
ExtractionOptions? options,
Action<string, ExtractionOptions?> write)
{
string destinationFileName;
string file = Path.GetFileName(entry.Key);
string fullDestinationDirectoryPath = Path.GetFullPath(destinationDirectory);
...
throw new ExtractionException("Entry is trying to write a file outside of the destination directory.");
}
```
If the destinationDirectory is not slash terminated like /home/user/dir it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. /home/user/dir.sh.
#### Impact
Because of the file name and destination directory constraints the arbitrary file creation impact is limited and depends on the use case.
|
{'CVE-2021-39208'}
|
2022-04-19T19:03:07Z
|
2021-09-20T19:53:42Z
|
MODERATE
| 4.3
|
{'CWE-22'}
|
{'https://github.com/adamhathcock/sharpcompress/releases/tag/0.29.0', 'https://github.com/adamhathcock/sharpcompress/pull/614', 'https://github.com/advisories/GHSA-jp7f-grcv-6mjf', 'https://github.com/adamhathcock/sharpcompress/security/advisories/GHSA-jp7f-grcv-6mjf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39208'}
| null |
GHSA
|
GHSA-v2rg-8cwr-75g8
|
Deserializer tampering in Apache Dubbo
|
Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it.
|
{'CVE-2021-25641'}
|
2022-03-21T21:53:06Z
|
2022-03-18T17:56:08Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://lists.apache.org/thread.html/r99ef7fa35585d3a68762de07e8d2b2bc48b8fa669a03e8d84b9673f3%40%3Cdev.dubbo.apache.org%3E', 'https://github.com/advisories/GHSA-v2rg-8cwr-75g8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25641'}
| null |
GHSA
|
GHSA-hhqj-cfjx-vj25
|
Cross site scripting in reveal.js
|
The onmessage event listener in /plugin/notes/speaker-view.html does not check the origin of postMessage before adding the content to the webpage. The vulnerable code allows any origin to postMessage on the browser window and feeds attacker's input to parts using which attacker can execute arbitrary javascript code on victim's browser window hosting reveal.js
|
{'CVE-2022-0776'}
|
2022-03-10T16:00:14Z
|
2022-03-02T00:00:20Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/be2b7ee4-f487-42e1-874a-6bcc410e4001', 'https://github.com/advisories/GHSA-hhqj-cfjx-vj25', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0776', 'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2'}
| null |
GHSA
|
GHSA-8jq6-w5cg-wm45
|
Exploitable inventory component chaining in PocketMine-MP
|
### Impact
Specially crafted `InventoryTransactionPacket`s sent by malicious clients were able to exploit the behaviour of `InventoryTransaction->findResultItem()` and cause it to take an abnormally long time to execute (causing an apparent server freeze).
The affected code is intended to compact conflicting `InventoryActions` which are in the same `InventoryTransaction` by flattening them into a single action. When multiple pathways to a result existed, the complexity of this flattening became exponential.
The problem was fixed by bailing when ambiguities are detected.
**At the time of writing, this exploit is being used in the wild by attackers to deny service to servers.**
### Patches
Upgrade to 3.15.4 or newer.
### Workarounds
No practical workarounds are possible, short of backporting the fix or implementing checks in a plugin listening to `DataPacketReceiveEvent`.
### References
c368ebb5e74632bc622534b37cd1447b97281e20
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null |
2022-04-19T19:02:39Z
|
2020-11-11T21:38:18Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-8jq6-w5cg-wm45', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-8jq6-w5cg-wm45'}
| null |
GHSA
|
GHSA-m2c7-42rf-c62f
|
Unrestricted Upload of File with Dangerous Type in motionEye
|
motionEye <= 0.42.1 and motioneEyeOS <= 20200606 allow a remote attacker to upload a configuration backup file containing a malicious python pickle file. This is possible when an installation is accessible over the Internet and uses no or poor authentication credentials.
The GitHub repositories for motionEye and motionEyeOS are no longer being actively maintained as of January 2022, so release of a patched version is unlikely. Keeping a motionEye or motionEyeOS installation off of the Internet and/or using strong credentials provide protection against this issue.
|
{'CVE-2021-44255'}
|
2022-02-14T21:02:54Z
|
2022-02-01T00:00:44Z
|
HIGH
| 7.2
|
{'CWE-434'}
|
{'https://github.com/advisories/GHSA-m2c7-42rf-c62f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44255', 'https://github.com/ccrisan/motioneyeos/issues/2843', 'https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/'}
| null |
GHSA
|
GHSA-c35v-qwqg-87jc
|
Timing Attack in express-basic-auth
|
Versions of `express-basic-auth` prior to 1.2.0 are vulnerable to Timing Attacks. The package uses nating string comparison instead of a constant time string compare which may lead to Timing Attacks. Timing Attacks can be used to increase the efficiency of brute-force attacks by removing the exponential increase in entropy gained from longer secrets.
## Recommendation
Upgrade to version 1.2.0 or later.
| null |
2021-08-04T20:58:12Z
|
2019-06-06T15:32:32Z
|
LOW
| 3.1
|
{'CWE-208'}
|
{'https://github.com/LionC/express-basic-auth/pull/20', 'https://www.npmjs.com/advisories/827', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263', 'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f', 'https://github.com/advisories/GHSA-c35v-qwqg-87jc', 'https://github.com/LionC/express-basic-auth/pull/21', 'https://snyk.io/vuln/SNYK-JS-EXPRESSBASICAUTH-174345'}
| null |
GHSA
|
GHSA-6v7p-v754-j89v
|
HTTP Response Splitting in Styx
|
# Vulnerability
Styx is vulnerable to CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting').
# Vulnerable Component
The vulnerable component is the `com.hotels.styx.api.HttpHeaders.Builder` due to disabling the HTTP Header validation built into Netty in these locations:
https://github.com/HotelsDotCom/styx/blob/e1d578e9b9c38df9cd19c21dc2eb9b949d85b558/components/api/src/main/java/com/hotels/styx/api/HttpHeaders.java#L145
https://github.com/HotelsDotCom/styx/blob/e1d578e9b9c38df9cd19c21dc2eb9b949d85b558/components/api/src/main/java/com/hotels/styx/api/HttpHeaders.java#L145
`new DefaultHttpHeaders(false)` disables the built-in validation in Netty. Either use the default constructor or `new DefaultHttpHeaders(true` instead.
Additionally, another vulnerable component is the StyxToNettyResponseTranslator due to also disabling the HTTP Header validation built into netty in this location.
https://github.com/HotelsDotCom/styx/blob/8d60e5493e65d0d536afc0b350dcb02d24e0f7a7/components/server/src/main/java/com/hotels/styx/server/netty/connectors/StyxToNettyResponseTranslator.java#L30
`DefaultHttpResponse nettyResponse = new DefaultHttpResponse(version, httpResponseStatus, false); `
`new DefaultHttpResponse(version, httpResponseStatus, false);` disables the built-in validation in Netty. Please use the constructor `new DefaultHttpResponse(version, httpResponseStatus, true);`
# Proof of Concept
The following test plugin proves that there is no header validation occurring.
```java
static class VulnerablePlugin implements Plugin {
@Override
public Eventual<LiveHttpResponse> intercept(LiveHttpRequest request, Chain chain) {
String header = request.queryParam("header-value").get();
LiveHttpRequest newRequest = request.newBuilder()
.header("myRequestHeader", header)
.build();
return chain.proceed(newRequest).map(response ->
response.newBuilder().header("myResponseHeader", header).build()
) ;
}
}
@Test
public void simpleHeaderInjectionVulnerabilityPOC() {
Plugin vulnerablePlugin = new VulnerablePlugin();
// a simple way to mock the downstream system
HttpInterceptor.Chain chain = request -> {
assertThat(request.header("myRequestHeader").orElse(null), is("test\r\nAnother: CRLF_Injection"));
return Eventual.of(response(OK).build());
};
// an example request you expect your plugin to receive
String encodedGet = URLEncoder.encode("test\r\nAnother: CRLF_Injection");
LiveHttpRequest request = get("/foo?header-value=" + encodedGet)
.build();
// since this is a test, we want to wait for the response
LiveHttpResponse response = Mono.from(vulnerablePlugin.intercept(request, chain)).block();
assertThat(response.header("myResponseHeader").orElse(null), is("test\r\nAnother: CRLF_Injection"));
}
```
Additionally, if you run this LiveHttpResponse from this test through the `StyxToNettyResponseTranslator::toNettyResponse`, ideally, it would have caused an exception to be thrown. In its current state, it does not.
# Similar Vulnerabilities
There have been reports of similar vulnerabilities in other popular libraries.
GHSA-35fr-h7jr-hh86 -> CVE-2019-16771
GHSA-mvqp-q37c-wf9j -> CVE-2019-17513
# Finding
This vulnerability was found due to this query that [Jonathan Leitschuh](https://twitter.com/jlleitschuh) contributed to the Semmle QL project.
https://lgtm.com/rules/1510696449842/alerts/
|
{'CVE-2020-6858'}
|
2022-04-19T19:02:23Z
|
2020-03-03T15:32:03Z
|
MODERATE
| 6.5
|
{'CWE-74'}
|
{'https://github.com/HotelsDotCom/styx/security/advisories/GHSA-6v7p-v754-j89v', 'https://github.com/advisories/GHSA-6v7p-v754-j89v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6858', 'https://twitter.com/JLLeitschuh'}
| null |
GHSA
|
GHSA-cmfg-87vq-g5g4
|
Deserialization of untrusted data in FasterXML jackson-databind
|
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.
|
{'CVE-2019-12814'}
|
2021-04-23T20:14:52Z
|
2019-07-17T15:26:12Z
|
MODERATE
| 5.9
|
{'CWE-502'}
|
{'https://lists.apache.org/thread.html/2ff264b6a94c5363a35c4c88fa93216f60ec54d1d973ed6b76a9f560@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/bf20574dbc2db255f1fd489942b5720f675e32a2c4f44eb6a36060cd@%3Ccommits.accumulo.apache.org%3E', 'https://lists.apache.org/thread.html/b148fa2e9ef468c4de00de255dd728b74e2a97d935f8ced31eb41ba2@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/eff7280055fc717ea8129cd28a9dd57b8446d00b36260c1caee10b87@%3Cnotifications.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3046', 'https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682@%3Cnotifications.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.apache.org/thread.html/71f9ffd92410a889e27b95a219eaa843fd820f8550898633d85d4ea3@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://access.redhat.com/errata/RHSA-2019:3297', 'https://lists.apache.org/thread.html/28be28ffd6471d230943a255c36fe196a54ef5afc494a4781d16e37c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/1e04d9381c801b31ab28dec813c31c304b2a596b2a3707fa5462c5c0@%3Cnotifications.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3044', 'https://lists.apache.org/thread.html/8fe2983f6d9fee0aa737e4bd24483f8f5cf9b938b9adad0c4e79b2a4@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/a3ae8a8c5e32c413cd27071d3a204166050bf79ce7f1299f6866338f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/', 'https://lists.apache.org/thread.html/129da0204c876f746636018751a086cc581e0e07bcdeb3ee22ff5731@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/4b832d1327703d6b287a6d223307f8f884d798821209a10647e93324@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E', 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2936', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190625-0006/', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://github.com/FasterXML/jackson-databind/issues/2341', 'https://lists.apache.org/thread.html/a78239b1f11cddfa86e4edee19064c40b6272214630bfef070c37957@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-cmfg-87vq-g5g4', 'https://access.redhat.com/errata/RHSA-2019:3050', 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12814', 'https://access.redhat.com/errata/RHSA-2019:2937', 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/15a55e1d837fa686db493137cc0330c7ee1089ed9a9eea7ae7151ef1@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html', 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3045', 'https://lists.apache.org/thread.html/b0a2b2cca072650dbd5882719976c3d353972c44f6736ddf0ba95209@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3292'}
| null |
GHSA
|
GHSA-qjwc-v72v-fq6r
|
HTTP request smuggling in Undertow
|
A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. The highest threat from this vulnerability is to data confidentiality and integrity.
|
{'CVE-2021-20220'}
|
2022-02-11T21:11:27Z
|
2021-06-16T17:47:52Z
|
MODERATE
| 4.8
|
{'CWE-444'}
|
{'https://github.com/advisories/GHSA-qjwc-v72v-fq6r', 'https://github.com/undertow-io/undertow/commit/9e797b2f99617fdad0471eaa88c711ee7f44605f', 'https://bugzilla.redhat.com/show_bug.cgi?id=1923133', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20220', 'https://security.netapp.com/advisory/ntap-20220210-0013/'}
| null |
GHSA
|
GHSA-q879-9g95-56mx
|
Wrong type for `Linker`-define functions when used across two `Engine`s
|
### Impact
As a Rust library the `wasmtime` crate clearly marks which functions are safe and which are `unsafe`, guaranteeing that if consumers never use `unsafe` then it should not be possible to have memory unsafety issues in their embeddings of Wasmtime. An issue was discovered in the safe API of `Linker::func_*` APIs. These APIs were previously not sound when one `Engine` was used to create the `Linker` and then a different `Engine` was used to create a `Store` and then the `Linker` was used to instantiate a module into that `Store`. Cross-`Engine` usage of functions is not supported in Wasmtime and this can result in type confusion of function pointers, resulting in being able to safely call a function with the wrong type.
Triggering this bug requires using at least two `Engine` values in an embedding and then additionally using two different values with a `Linker` (one at the creation time of the `Linker` and another when instantiating a module with the `Linker`).
It's expected that usage of more-than-one `Engine` in an embedding is relatively rare since an `Engine` is intended to be a globally shared resource, so the expectation is that the impact of this issue is relatively small.
The fix implemented is to change this behavior to `panic!()` in Rust instead of silently allowing it. Using different `Engine` instances with a `Linker` is a programmer bug that `wasmtime` catches at runtime.
### Patches
This bug has been patched and users should upgrade to Wasmtime version 0.30.0.
### Workarounds
If you cannot upgrade Wasmtime and are using more than one `Engine` in your embedding it's recommended to instead use only one `Engine` for the entire program if possible. An `Engine` is designed to be a globally shared resource that is suitable to have only one for the lifetime of an entire process. If using multiple `Engine`s is required then code should be audited to ensure that `Linker` is only used with one `Engine`.
### For more information
If you have any questions or comments about this advisory:
* Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)
* Open an issue in [the `bytecodealliance/wasmtime` repository](https://github.com/bytecodealliance/wasmtime/)
|
{'CVE-2021-39219'}
|
2022-04-19T19:03:08Z
|
2021-09-20T19:54:26Z
|
MODERATE
| 6.3
|
{'CWE-843'}
|
{'https://github.com/advisories/GHSA-q879-9g95-56mx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39219', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/', 'https://crates.io/crates/wasmtime', 'https://github.com/bytecodealliance/wasmtime/commit/b39f087414f27ae40c44449ed5d1154e03449bff', 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-q879-9g95-56mx', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/'}
| null |
GHSA
|
GHSA-9r5x-fjv3-q6h4
|
Incorrect Access Control in github.com/nats-io/jwt and github.com/nats-io/nats-server/v2
|
NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled.
|
{'CVE-2021-3127'}
|
2022-04-12T22:11:19Z
|
2022-02-15T01:57:18Z
|
HIGH
| 7.5
|
{'CWE-863', 'CWE-284'}
|
{'https://advisories.nats.io/CVE/CVE-2021-3127.txt', 'https://github.com/nats-io/jwt/pull/149/commits/a826c77dc9d2671c961b75ceefdb439c41029866', 'https://github.com/advisories/GHSA-9r5x-fjv3-q6h4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3127', 'https://github.com/nats-io/nats-server/commit/423b79440c80c863de9f4e20548504e6c5d5e403'}
| null |
GHSA
|
GHSA-x56p-c8cg-q435
|
Open Redirect in Next.js versions
|
### Impact
- **Affected**: Users of Next.js between 9.5.0 and 9.5.3
- **Not affected**: Deployments on Vercel ([https://vercel.com](https://vercel.com)) are not affected
- **Not affected**: Deployments using `next export`
We recommend everyone to upgrade regardless of whether you can reproduce the issue or not.
### Patches
https://github.com/vercel/next.js/releases/tag/v9.5.4
### References
https://github.com/vercel/next.js/releases/tag/v9.5.4
|
{'CVE-2020-15242'}
|
2021-10-06T21:27:32Z
|
2020-10-08T19:28:07Z
|
MODERATE
| 4.7
|
{'CWE-601'}
|
{'https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15242', 'https://github.com/zeit/next.js/releases/tag/v9.5.4', 'https://github.com/advisories/GHSA-x56p-c8cg-q435'}
| null |
GHSA
|
GHSA-c65v-p733-9796
|
Cross-site Scripting in snipe/snipe-it
|
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-3961'}
|
2021-11-23T18:17:33Z
|
2021-11-23T18:17:33Z
|
HIGH
| 8
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-c65v-p733-9796', 'https://huntr.dev/bounties/5987aed5-6613-4937-8a3e-d48009b7da10', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3961', 'https://github.com/snipe/snipe-it/commit/7ce5993f5ae9d713a0955c2fd8e2dff7a7ce886e'}
| null |
GHSA
|
GHSA-q2qw-rmrh-vv42
|
Moderate severity vulnerability that affects activejob
|
A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have.
|
{'CVE-2018-16476'}
|
2021-06-10T21:20:30Z
|
2018-12-05T17:24:27Z
|
HIGH
| 7.5
|
{'CWE-502', 'CWE-284'}
|
{'https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/', 'https://github.com/advisories/GHSA-q2qw-rmrh-vv42', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16476', 'https://access.redhat.com/errata/RHSA-2019:0600', 'https://groups.google.com/d/msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ'}
| null |
GHSA
|
GHSA-jgpv-4h4c-xhw3
|
Uncontrolled Resource Consumption in pillow
|
### Impact
_Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large._
### Patches
_An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._
### Workarounds
_An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._
### References
https://nvd.nist.gov/vuln/detail/CVE-2021-27921
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
| null |
2021-04-23T16:54:36Z
|
2021-04-23T16:54:36Z
|
MODERATE
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-jgpv-4h4c-xhw3', 'https://github.com/calix2/pyVulApp/security/advisories/GHSA-jgpv-4h4c-xhw3'}
| null |
GHSA
|
GHSA-qjfh-xc44-rm9x
|
Path Traversal in file-static-server
|
All versions of `file-static-server` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-09-28T17:06:42Z
|
2020-09-03T16:49:43Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://hackerone.com/reports/310671', 'https://github.com/advisories/GHSA-qjfh-xc44-rm9x', 'https://www.npmjs.com/advisories/1008'}
| null |
GHSA
|
GHSA-78j3-7wpm-qhvp
|
Critical severity vulnerability that affects kelredd-pruview
|
kelredd-pruview gem 0.3.8 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument to (1) document.rb, (2) video.rb, or (3) video_image.rb.
|
{'CVE-2013-1947'}
|
2021-09-02T20:58:51Z
|
2017-10-24T18:33:37Z
|
CRITICAL
| 0
|
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-78j3-7wpm-qhvp', 'http://www.openwall.com/lists/oss-security/2013/04/10/3', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1947', 'http://www.openwall.com/lists/oss-security/2013/04/12/2'}
| null |
GHSA
|
GHSA-5fq8-3q2f-4m5g
|
Session key exposure through session list in Django User Sessions
|
### Impact
The views provided by django-user-sessions allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen.
### Patches
Patch is under way.
### Workarounds
Remove the session_key from the template.
### References
_None._
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Bouke/django-user-sessions](https://github.com/Bouke/django-user-sessions/issues)
* Email us at [bouke@haarsma.eu](mailto:bouke@haarsma.eu)
|
{'CVE-2020-5224'}
|
2021-01-08T20:33:15Z
|
2020-01-24T19:56:59Z
|
LOW
| 6.5
|
{'CWE-287'}
|
{'https://github.com/advisories/GHSA-5fq8-3q2f-4m5g', 'https://github.com/jazzband/django-user-sessions/commit/f0c4077e7d1436ba6d721af85cee89222ca5d2d9', 'https://github.com/Bouke/django-user-sessions/security/advisories/GHSA-5fq8-3q2f-4m5g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5224'}
| null |
GHSA
|
GHSA-6r58-4xgr-gm6m
|
Access escalation for CMS users with limited access through permission cache pollution
|
In SilverStripe through 4.3.3, there is access escalation for CMS users with limited access through permission cache pollution.
|
{'CVE-2019-12617'}
|
2019-11-13T17:02:26Z
|
2019-11-12T23:01:59Z
|
MODERATE
| 0
| null |
{'https://www.silverstripe.org/blog/tag/release', 'https://forum.silverstripe.org/c/releases', 'https://github.com/advisories/GHSA-6r58-4xgr-gm6m', 'https://www.silverstripe.org/download/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12617', 'https://www.silverstripe.org/download/security-releases/CVE-2019-12617'}
| null |
GHSA
|
GHSA-6c3f-p5wp-34mh
|
OS Command Injection in async-git
|
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing it to one of the vulnerable functions as a workaround or update async-git to version 1.13.1.
|
{'CVE-2021-3190'}
|
2022-05-03T02:56:05Z
|
2021-01-29T18:14:00Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3190', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a', 'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://github.com/omrilotan/async-git/pull/13', 'https://advisory.checkmarx.net/advisory/CX-2021-4772', 'https://www.npmjs.com/package/async-git', 'https://github.com/omrilotan/async-git/pull/14', 'https://github.com/advisories/GHSA-6c3f-p5wp-34mh'}
| null |
GHSA
|
GHSA-cwg9-c9cr-p5fq
|
Improper Neutralization of Input in Theia console
|
In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected.
|
{'CVE-2021-28161'}
|
2021-04-13T15:18:53Z
|
2021-04-13T15:18:53Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-cwg9-c9cr-p5fq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28161', 'https://github.com/eclipse-theia/theia/issues/8794'}
| null |
GHSA
|
GHSA-8cr8-4vfw-mr7h
|
Round-trip instability in REXML
|
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
|
{'CVE-2021-28965'}
|
2021-06-01T17:23:48Z
|
2021-04-30T17:30:37Z
|
HIGH
| 0
|
{'CWE-611', 'CWE-115'}
|
{'https://github.com/ruby/rexml/commit/9b311e59ae05749e082eb6bbefa1cb620d1a786e', 'https://github.com/ruby/rexml/commit/3c137eb119550874b2b3e27d12b733ca67033377', 'https://github.com/ruby/rexml/commit/2fe62e29094d95921d7e19abbd2e26b23d78dc5b', 'https://github.com/ruby/rexml/commit/a659c63e37414506dfb0d4655e031bb7a2e73fc8', 'https://github.com/ruby/rexml/commit/f7bab8937513b1403cea5aff874cbf32fd5e8551', 'https://rubygems.org/gems/rexml', 'https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexml-cve-2021-28965/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28965', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTVFTLFVCSUE5CXHINJEUCKSHU4SWDMT/', 'https://security.netapp.com/advisory/ntap-20210528-0003/', 'https://hackerone.com/reports/1104077', 'https://github.com/ruby/rexml/commit/6a250d2cd1194c2be72becbdd9c3e770aa16e752', 'https://github.com/ruby/rexml/commit/f9d88e4948b4a43294c25dc0edb16815bd9d8618', 'https://github.com/advisories/GHSA-8cr8-4vfw-mr7h'}
| null |
GHSA
|
GHSA-q9x4-q76f-5h5j
|
Unauthenticated users can exploit an enumeration vulnerability in Harbor (CVE-2019-19030)
|
# Impact
Sean Wright from Secureworks has discovered an enumeration vulnerability. An attacker can make use of the Harbor API to make unauthenticated calls to the Harbor instance. Based on the HTTP status code in the response, an attacker is then able to work out which resources exist, and which do not. This would likely be accomplished by either providing a wordlist or enumerating through a sequence an
unauthenticated attacker is able to enumerate resources on the system. This provides them with information such as existing projects, repositories, etc.
The vulnerability was immediately fixed by the Harbor team.
# Issue
The following API resources where found to be vulnerable to enumeration attacks:
/api/chartrepo/{repo}/prov (POST)
/api/chartrepo/{repo}/charts (GET, POST)
/api/chartrepo/{repo}/charts/{name} (GET, DELETE)
/api/chartrepo/{repo}/charts/{name}/{version} (GET, DELETE)
/api/labels?name={name}&scope=p (GET)
/api/repositories?project_id={id} (GET)
/api/repositories/{repo_name}/ (GET, PUT, DELETE)
/api/repositories/{repo_name}/tags (GET)
/api/repositories/{repo_name}/tags/{tag}/manifest?version={version} (GET)
/api/repositories/{repo_name/{tag}/labels (GET)
/api/projects?project_name={name} (HEAD)
/api/projects/{project_id}/summary (GET)
/api/projects/{project_id}/logs (GET)
/api/projects/{project_id} (GET, PUT, DELETE)
/api/projects/{project_id}/metadatas (GET, POST)
/api/projects/{project_id}/metadatas/{metadata_name} (GET, PUT)
# Known Attack Vectors
Successful exploitation of this issue will lead to bad actors identifying which resources exist in Harbor without requiring authentication for the Harbor API.
# Patches
If your product uses the affected releases of Harbor, update to version 1.10.3 or 2.0.1 to patch this issue immediately.
https://github.com/goharbor/harbor/releases/tag/v1.10.3
https://github.com/goharbor/harbor/releases/tag/v2.0.1
# Workarounds
There is no known workaround
# For more information
If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io
View our security policy at https://github.com/goharbor/harbor/security/policy
|
{'CVE-2019-19030'}
|
2022-02-11T23:17:25Z
|
2022-02-11T23:17:25Z
|
LOW
| 0
| null |
{'https://github.com/advisories/GHSA-q9x4-q76f-5h5j', 'https://github.com/goharbor/harbor/security/advisories/GHSA-q9x4-q76f-5h5j'}
| null |
GHSA
|
GHSA-jjr8-m8g8-p6wv
|
Null pointer dereference in TFLite's `Reshape` operator
|
### Impact
The fix for [CVE-2020-15209](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15209) missed the case when the target shape of `Reshape` operator is given by the elements of a 1-D tensor. As such, the [fix for the vulnerability](https://github.com/tensorflow/tensorflow/blob/9c1dc920d8ffb4893d6c9d27d1f039607b326743/tensorflow/lite/core/subgraph.cc#L1062-L1074) allowed passing a null-buffer-backed tensor with a 1D shape:
```cc
if (tensor->data.raw == nullptr && tensor->bytes > 0) {
if (registration.builtin_code == kTfLiteBuiltinReshape && i == 1) {
// In general, having a tensor here with no buffer will be an error.
// However, for the reshape operator, the second input tensor is only
// used for the shape, not for the data. Thus, null buffer is ok.
continue;
} else {
// In all other cases, we need to return an error as otherwise we will
// trigger a null pointer dereference (likely).
ReportError("Input tensor %d lacks data", tensor_index);
return kTfLiteError;
}
}
```
### Patches
We have patched the issue in GitHub commit [f8378920345f4f4604202d4ab15ef64b2aceaa16](https://github.com/tensorflow/tensorflow/commit/f8378920345f4f4604202d4ab15ef64b2aceaa16).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29592'}
|
2021-05-21T14:26:58Z
|
2021-05-21T14:26:58Z
|
MODERATE
| 4.4
|
{'CWE-476'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jjr8-m8g8-p6wv', 'https://github.com/advisories/GHSA-jjr8-m8g8-p6wv', 'https://github.com/tensorflow/tensorflow/commit/f8378920345f4f4604202d4ab15ef64b2aceaa16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29592'}
| null |
GHSA
|
GHSA-f78g-q7r4-9wcv
|
Division by 0 in `FractionalAvgPool`
|
### Impact
An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.FractionalAvgPool`:
```python
import tensorflow as tf
value = tf.constant([60], shape=[1, 1, 1, 1], dtype=tf.int32)
pooling_ratio = [1.0, 1.0000014345305555, 1.0, 1.0]
pseudo_random = False
overlapping = False
deterministic = False
seed = 0
seed2 = 0
tf.raw_ops.FractionalAvgPool(
value=value, pooling_ratio=pooling_ratio, pseudo_random=pseudo_random,
overlapping=overlapping, deterministic=deterministic, seed=seed, seed2=seed2)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L85-L89) computes a divisor quantity by dividing two user controlled values:
```cc
for (int i = 0; i < tensor_in_and_out_dims; ++i) {
output_size[i] = static_cast<int>(std::floor(input_size[i] / pooling_ratio_[i]));
DCHECK_GT(output_size[i], 0);
}
```
The user controls the values of `input_size[i]` and `pooling_ratio_[i]` (via the `value.shape()` and `pooling_ratio` arguments). If the value in `input_size[i]` is smaller than the `pooling_ratio_[i]`, then the floor operation results in `output_size[i]` being 0. The `DCHECK_GT` line is a no-op outside of debug mode, so in released versions of TF this does not trigger.
Later, these computed values [are used as arguments](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L96-L99) to [`GeneratePoolingSequence`](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_pool_common.cc#L100-L108). There, the first computation is a division in a modulo operation:
```cc
std::vector<int64> GeneratePoolingSequence(int input_length, int output_length,
GuardedPhiloxRandom* generator,
bool pseudo_random) {
...
if (input_length % output_length == 0) {
diff = std::vector<int64>(output_length, input_length / output_length);
}
...
}
```
Since `output_length` can be 0, this results in runtime crashing.
### Patches
We have patched the issue in GitHub commit [548b5eaf23685d86f722233d8fbc21d0a4aecb96](https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29550'}
|
2021-05-21T14:23:41Z
|
2021-05-21T14:23:41Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f78g-q7r4-9wcv', 'https://github.com/advisories/GHSA-f78g-q7r4-9wcv', 'https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29550'}
| null |
GHSA
|
GHSA-x3wr-v4wx-5qpc
|
Prototype Pollution
|
Prototype pollution vulnerability in ‘expand-hash’ versions 0.1.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25948'}
|
2021-10-21T13:56:15Z
|
2021-06-21T17:14:01Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-x3wr-v4wx-5qpc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25948', 'https://github.com/doowb/expand-hash/blob/556913f6c2f05848110b5b8261cfc78e5ce3dc77/index.js#L19', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25948'}
| null |
GHSA
|
GHSA-rpxh-vg2x-526v
|
List of order ids, number, items total and token value exposed for unauthorized uses via new API
|
### Impact
Part of the details (order ID, order number, items total, and token value) of all placed orders were exposed to unauthorized users. If exploited properly, a few additional information like the number of items in the cart and the date of the shipping may be fetched as well. This data seems to not be crucial nor is personal data, however, could be used for sociotechnical attacks or may expose a few details about shop condition to the third parties. The data possible to aggregate are the number of processed orders or their value in the moment of time.
### Patches
The problem has been patched at Sylius 1.9.5 and 1.10.0
### Workarounds
There are a few ways to fix this without updating the code.
The first possible solution is to hide the problematic endpoints behind the firewall from not logged in users. In order to achieve it one has to add the configuration in `config/packages/security.yaml`:
```yaml
access_control:
# ...
- { path: "%sylius.security.new_api_shop_regex%/orders", role: IS_AUTHENTICATED_ANONYMOUSLY, methods: [POST] }
- { path: "%sylius.security.new_api_shop_regex%/orders", role: ROLE_USER, methods: [GET] }
```
This would put only the order list under the firewall and allow only authorized users to access it. Once a user is authorized, it will have access to theirs orders only.
The second possible solution is to decorate the `\Sylius\Bundle\ApiBundle\Doctrine\QueryCollectionExtension\OrdersByLoggedInUserExtension` and throw `Symfony\Component\Security\Core\Exception\AccessDeniedException` if the class is executed for unauthorized user.
|
{'CVE-2021-32720'}
|
2022-04-19T19:03:00Z
|
2021-06-29T03:12:04Z
|
MODERATE
| 5.3
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-rpxh-vg2x-526v', 'https://github.com/Sylius/Sylius/commit/21d509851559230d03292b2a635a6951748c2758', 'https://packagist.org/packages/sylius/sylius', 'https://github.com/Sylius/Sylius/releases/tag/v1.9.5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32720', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-rpxh-vg2x-526v'}
| null |
GHSA
|
GHSA-w7q9-xr2x-wh7x
|
Moderate severity vulnerability that affects delayed_job_web
|
An exploitable cross site scripting (XSS) vulnerability exists in the filter functionality of the delayed_job_web rails gem version 1.4. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
|
{'CVE-2017-12097'}
|
2021-09-21T18:04:59Z
|
2018-03-05T19:06:00Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-w7q9-xr2x-wh7x', 'http://www.securityfocus.com/bid/102484', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12097', 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0449'}
| null |
GHSA
|
GHSA-r2wf-q3x4-hrv9
|
Default development error handler in Ratpack is vulnerable to HTML content injection (XSS)
|
Versions of Ratpack from 0.9.10 through 1.7.5 are vulnerable to [CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')](https://cwe.mitre.org/data/definitions/79.html) (aka. XSS) in the development error handler. An attacker can utilize this to perform XSS when an exception message contains untrusted data.
As a simplistic example:
```java
RatpackServer startedServer = RatpackServer.start(server -> {
server.handlers(chain -> chain.all(ctx -> {
// User supplied query parameter
String message = ctx.getRequest().getQueryParams().get("message");
// User supplied data appended to the message in an exception
throw new RuntimeException("An error occurred: " + message);
}));
});
```
### Impact
- Cross-Site Scripting
### Patches
This vulnerability has been patched in Ratpack version 1.7.6.
### Workarounds
If you are unable to update your version of Ratpack, we recommend the following workarounds and mitigations.
- Ensure that development mode is disabled in production.
- Don't use real customer data (ie. untrusted user input) in development.
### References
- [Ratpack development mode](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#development-boolean-)
- [Code Patch - a3cbb13](https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [ratpack/ratpack](https://github.com/ratpack/ratpack/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc)
- Ask in our [Slack channel](https://slack-signup.ratpack.io/)
|
{'CVE-2019-10770'}
|
2022-04-19T19:02:47Z
|
2020-01-27T19:28:20Z
|
MODERATE
| 6.1
|
{'CWE-779'}
|
{'https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3', 'https://snyk.io/vuln/SNYK-JAVA-IORATPACK-534882', 'https://github.com/advisories/GHSA-r2wf-q3x4-hrv9', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-r2wf-q3x4-hrv9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10770'}
| null |
GHSA
|
GHSA-8796-gc9j-63rv
|
File upload local preview can run embedded scripts after user interaction
|
### Impact
When uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file, but only after several user interactions to open the preview in a separate tab. This only impacts the local user while in the process of uploading. It cannot be exploited remotely or by other users.
### Patches
This has been fixed by https://github.com/matrix-org/matrix-react-sdk/pull/5981, which is included in 3.21.0.
### Workarounds
There are no known workarounds.
| null |
2022-04-19T19:02:57Z
|
2021-05-17T20:51:16Z
|
MODERATE
| 4.2
|
{'CWE-74'}
|
{'https://github.com/advisories/GHSA-8796-gc9j-63rv', 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-8796-gc9j-63rv'}
| null |
GHSA
|
GHSA-jrcf-4jp8-m28v
|
miow invalidly assumes the memory layout of std::net::SocketAddr
|
An issue was discovered in the miow crate before 0.3.6 for Rust. It has false expectations about the std::net::SocketAddr memory representation.
|
{'CVE-2020-35921'}
|
2021-08-25T20:50:35Z
|
2021-08-25T20:50:35Z
|
MODERATE
| 5.5
|
{'CWE-188'}
|
{'https://github.com/yoshuawuyts/miow/issues/38', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35921', 'https://rustsec.org/advisories/RUSTSEC-2020-0080.html', 'https://github.com/advisories/GHSA-jrcf-4jp8-m28v', 'https://github.com/yoshuawuyts/miow/pull/39'}
| null |
GHSA
|
GHSA-9697-98pf-4rw7
|
Heap OOB in `UpperBound` and `LowerBound`
|
### Impact
An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.UpperBound`:
```python
import tensorflow as tf
tf.raw_ops.UpperBound(
sorted_input=[1,2,3],
values=tf.constant(value=[[0,0,0],[1,1,1],[2,2,2]],dtype=tf.int64),
out_type=tf.int64)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/searchsorted_op.cc#L85-L104) does not validate the rank of `sorted_input` argument:
```cc
void Compute(OpKernelContext* ctx) override {
const Tensor& sorted_inputs_t = ctx->input(0);
// ...
OP_REQUIRES(ctx, sorted_inputs_t.dim_size(0) == values_t.dim_size(0),
Status(error::INVALID_ARGUMENT,
"Leading dim_size of both tensors must match."));
// ...
if (output_t->dtype() == DT_INT32) {
OP_REQUIRES(ctx,
FastBoundsCheck(sorted_inputs_t.dim_size(1), ...));
// ...
}
```
As we access the first two dimensions of `sorted_inputs_t` tensor, it must have rank at least 2.
A similar issue occurs in `tf.raw_ops.LowerBound`.
### Patches
We have patched the issue in GitHub commit [42459e4273c2e47a3232cc16c4f4fff3b3a35c38](https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37670'}
|
2021-08-25T14:41:44Z
|
2021-08-25T14:41:44Z
|
MODERATE
| 5.5
|
{'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7', 'https://github.com/advisories/GHSA-9697-98pf-4rw7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37670'}
| null |
GHSA
|
GHSA-m25q-fwg4-9v2p
|
Malicious Package in awesome_react_utility
|
Version 1.0.2 of `awesome_react_utility` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T16:36:58Z
|
2020-09-01T19:47:07Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-m25q-fwg4-9v2p', 'https://github.com/kooinam/awesome_react_utility', 'https://www.npmjs.com/advisories/618'}
| null |
GHSA
|
GHSA-f8pv-x7h8-687v
|
Cross-site scripting in feehicms
|
Insufficient filtering of the tag parameters in feehicms 0.1.3 allows attackers to execute arbitrary web or HTML via a crafted payload.
|
{'CVE-2020-19709'}
|
2021-09-02T18:50:43Z
|
2021-08-30T16:22:25Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/liufee/feehicms/issues/2', 'https://github.com/advisories/GHSA-f8pv-x7h8-687v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19709'}
| null |
GHSA
|
GHSA-qfh2-6f7q-gr86
|
Cross-Site Scripting in sexstatic
|
All versions of `sexstatic` are vulnerable to stored cross-site scripting (xss). This is exploitable if an attacker can control a filename that is served by `sexstatic`.
## Recommendation
As there is no fix is currently available for this vulnerability it is our recommendation to not install or used this module at this time.
|
{'CVE-2018-3755'}
|
2021-01-08T18:15:59Z
|
2018-10-01T16:30:38Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-qfh2-6f7q-gr86', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3755', 'https://www.npmjs.com/advisories/671', 'https://hackerone.com/reports/328210'}
| null |
GHSA
|
GHSA-cm8g-544f-p9x9
|
Use After Free in rusqlite
|
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_collation has a use-after-free.
|
{'CVE-2021-45716'}
|
2022-01-07T16:13:53Z
|
2022-01-06T22:03:16Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://github.com/advisories/GHSA-cm8g-544f-p9x9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45716', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
| null |
GHSA
|
GHSA-g982-9r8g-6qxw
|
Ciborg gem for Ruby allows local users to write files and gain privileges via Symlink
|
chef/travis-cookbooks/ci_environment/perlbrew/recipes/default.rb in the ciborg gem 3.0.0 for Ruby allows local users to write to arbitrary files and gain privileges via a symlink attack on /tmp/perlbrew-installer.
|
{'CVE-2014-5003'}
|
2022-04-26T18:16:50Z
|
2018-07-23T19:50:15Z
|
MODERATE
| 5.5
|
{'CWE-20'}
|
{'http://www.vapid.dhs.org/advisories/ciborg-3.0.0.html', 'http://www.openwall.com/lists/oss-security/2014/07/07/24', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5003', 'http://www.openwall.com/lists/oss-security/2014/07/17/5', 'https://github.com/advisories/GHSA-g982-9r8g-6qxw'}
| null |
GHSA
|
GHSA-wx69-rvg3-x7fc
|
XSS via prototype pollution in NodeBB
|
### Impact
A prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report.
### Patches
The vulnerability has been patched as of v1.18.5.
### Workarounds
Cherry-pick commit hash 1783f918bc19568f421473824461ff2ed7755e4c to receive this patch in lieu of a full upgrade.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@nodebb.org](mailto:security@nodebb.org)
|
{'CVE-2021-43787'}
|
2022-04-19T19:03:13Z
|
2021-11-30T22:21:01Z
|
CRITICAL
| 9
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-wx69-rvg3-x7fc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43787', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-wx69-rvg3-x7fc'}
| null |
GHSA
|
GHSA-rgfv-v3jh-7ffp
|
Prototype Pollution in deeps
|
All versions of package deeps up to and including version 1.4.5 are vulnerable to Prototype Pollution via the set function.
|
{'CVE-2020-7716'}
|
2021-07-29T21:17:13Z
|
2021-05-06T18:11:52Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-DEEPS-598667', 'https://github.com/advisories/GHSA-rgfv-v3jh-7ffp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7716'}
| null |
GHSA
|
GHSA-cv25-3gmg-c6m8
|
Injection in UserFrosting
|
In Userfrosting, versions v0.3.1 to v4.6.2 are vulnerable to Host Header Injection. By luring a victim application user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
|
{'CVE-2021-25994'}
|
2022-01-14T19:42:48Z
|
2022-01-06T22:22:32Z
|
HIGH
| 8.8
|
{'CWE-74'}
|
{'https://github.com/userfrosting/UserFrosting/commit/796dd78757902435d1bd286415feea78098e45ba', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25994', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25994', 'https://github.com/advisories/GHSA-cv25-3gmg-c6m8'}
| null |
GHSA
|
GHSA-5qw5-89mw-wcg2
|
Out of bounds write in Tensorflow
|
### Impact
TensorFlow is vulnerable to a heap OOB write in [Grappler](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141):
```cc
Status SetUnknownShape(const NodeDef* node, int output_port) {
shape_inference::ShapeHandle shape =
GetUnknownOutputShape(node, output_port);
InferenceContext* ctx = GetContext(node);
if (ctx == nullptr) {
return errors::InvalidArgument("Missing context");
}
ctx->set_output(output_port, shape);
return Status::OK();
}
```
The [`set_output`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.h#L394) function writes to an array at the specified index:
```cc
void set_output(int idx, ShapeHandle shape) { outputs_.at(idx) = shape; }
```
Hence, this gives a malicious user a write primitive.
### Patches
We have patched the issue in GitHub commit [97282c6d0d34476b6ba033f961590b783fa184cd](https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2022-23566'}
|
2022-02-11T20:48:39Z
|
2022-02-09T23:55:43Z
|
HIGH
| 8.8
|
{'CWE-787'}
|
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.h#L394', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23566', 'https://github.com/advisories/GHSA-5qw5-89mw-wcg2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5qw5-89mw-wcg2', 'https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd'}
| null |
GHSA
|
GHSA-whcm-29f4-j4mx
|
Directory Traversal in zwserver
|
Affected versions of `zwserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16149'}
|
2021-01-14T15:53:50Z
|
2020-09-01T16:56:50Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-whcm-29f4-j4mx', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16149', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/zwserver', 'https://nodesecurity.io/advisories/372', 'https://www.npmjs.com/advisories/372'}
| null |
GHSA
|
GHSA-674v-3g2w-84gx
|
Sandbox bypass in fenom
|
In fenom 2.12.1 and before, there is a way in fenom/src/Fenom/Template.php function getTemplateCode()to bypass sandbox to execute arbitrary PHP code when disable_native_funcs is true.
|
{'CVE-2021-46433'}
|
2022-04-05T21:19:59Z
|
2022-03-29T00:01:15Z
|
CRITICAL
| 10
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2021-46433', 'https://github.com/advisories/GHSA-674v-3g2w-84gx', 'https://github.com/fenom-template/fenom/issues/331'}
| null |
GHSA
|
GHSA-43hg-g44q-474q
|
Cross Site Scripting (XSS) in XWiki
|
XWiki 12.10.2 allows XSS via an SVG document to the upload feature of the comment section.
|
{'CVE-2021-3137'}
|
2021-01-29T18:13:03Z
|
2021-01-29T18:13:03Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3137', 'https://github.com/advisories/GHSA-43hg-g44q-474q', 'https://www.exploit-db.com/exploits/49437'}
| null |
GHSA
|
GHSA-r6mv-ppjc-4hgr
|
PHP file inclusion via insert tags
|
### Impact
It is possible for untrusted users to load arbitrary PHP files via insert tags.
Installations are only affected if there are untrusted back end users.
### Patches
Update to Contao 4.4.56, 4.9.18 or 4.11.7.
### Workarounds
Disable the login for untrusted back end users.
### References
https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
|
{'CVE-2021-37626'}
|
2022-04-19T19:03:05Z
|
2021-08-23T19:41:04Z
|
MODERATE
| 6.7
|
{'CWE-94'}
|
{'https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37626', 'https://github.com/advisories/GHSA-r6mv-ppjc-4hgr', 'https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html'}
| null |
GHSA
|
GHSA-6x4w-8w53-xrvv
|
XXE in Apache Standard Taglibs
|
Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) <x:parse> or (2) <x:transform> JSTL XML tag.
|
{'CVE-2015-0254'}
|
2021-07-22T22:16:25Z
|
2020-09-14T18:44:01Z
|
HIGH
| 0
|
{'CWE-611'}
|
{'https://lists.apache.org/thread.html/8a20e48acb2a40be5130df91cf9d39d8ad93181989413d4abcaa4914@%3Cdev.tomcat.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2016-1839.html', 'http://rhn.redhat.com/errata/RHSA-2016-1838.html', 'http://rhn.redhat.com/errata/RHSA-2016-1841.html', 'https://github.com/advisories/GHSA-6x4w-8w53-xrvv', 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00033.html', 'http://rhn.redhat.com/errata/RHSA-2016-1840.html', 'https://lists.apache.org/thread.html/rfc2bfd99c340dafd501676693cd889c1f9f838b97bdd0776a8f5557d@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0254', 'https://lists.apache.org/thread.html/rf1179e6971bc46f0f68879a9a10cc97ad4424451b0889aeef04c8077@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r6c93d8ade3788dbc00f5a37238bc278e7d859f2446b885460783a16f@%3Cpluto-dev.portals.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/tomcat-taglibs-user/201502.mbox/%3C82207A16-6348-4DEE-877E-F7B87292576A%40apache.org%3E', 'http://www.ubuntu.com/usn/USN-2551-1', 'http://www.securitytracker.com/id/1034934', 'http://www.securityfocus.com/bid/72809', 'https://lists.apache.org/thread.html/rc1686f6196bb9063bf26577a21b8033c19c1a30e5a9159869c8f3d38@%3Cpluto-dev.portals.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'http://packetstormsecurity.com/files/130575/Apache-Standard-Taglibs-1.2.1-XXE-Remote-Command-Execution.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2016:1376', 'https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@%3Cdev.tomcat.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2015-1695.html', 'http://www.securityfocus.com/archive/1/534772/100/0/threaded', 'https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@%3Cdev.tomcat.apache.org%3E'}
| null |
GHSA
|
GHSA-w83x-fp72-p9qc
|
Command Injection in geojson2kml
|
All versions up to and including version 0.1.1 of package geojson2kml are vulnerable to Command Injection via the index.js file. PoC: var a =require("geojson2kml"); a("./","& touch JHU",function(){})
|
{'CVE-2020-28429'}
|
2021-05-10T15:59:33Z
|
2021-05-10T15:59:33Z
|
CRITICAL
| 9.8
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-w83x-fp72-p9qc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28429', 'https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412'}
| null |
GHSA
|
GHSA-4m3p-x2hp-2pgx
|
Malicious Package in bitcroe-lib
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:44:12Z
|
2020-09-04T16:45:23Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1371', 'https://github.com/advisories/GHSA-4m3p-x2hp-2pgx'}
| null |
GHSA
|
GHSA-84p7-fh9c-6g8h
|
Prototype Pollution in mixme
|
### Impact
When copying properties from a source object to a target object, the target object can gain access to certain properties of the source object and modify their content.
### Patches
The problem was patch with a more agressive discovery of secured properties to filter out.
| null |
2021-09-20T19:52:24Z
|
2021-09-20T19:52:24Z
|
HIGH
| 0
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-79jw-6wg7-r9g4', 'https://github.com/adaltas/node-mixme/issues/2', 'https://github.com/advisories/GHSA-84p7-fh9c-6g8h', 'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-84p7-fh9c-6g8h', 'https://github.com/adaltas/node-mixme/issues/1'}
| null |
GHSA
|
GHSA-r2mj-8wgq-73m6
|
XML External Entity Reference in Glances
|
The package glances before 3.2.1 are vulnerable to XML External Entity (XXE) Injection via the use of Fault to parse untrusted XML data, which is known to be vulnerable to XML attacks.
|
{'CVE-2021-23418'}
|
2021-08-31T21:14:37Z
|
2021-08-09T20:43:14Z
|
MODERATE
| 6.3
|
{'CWE-611'}
|
{'https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807', 'https://github.com/nicolargo/glances/issues/1025', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23418', 'https://github.com/advisories/GHSA-r2mj-8wgq-73m6', 'https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94', 'https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a', 'https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32'}
| null |
GHSA
|
GHSA-c2jg-hw38-jrqq
|
Inconsistent Interpretation of HTTP Requests in twisted.web
|
The Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230:
1. The Content-Length header value could have a `+` or `-` prefix.
2. Illegal characters were permitted in chunked extensions, such as the LF (`\n`) character.
3. Chunk lengths, which are expressed in hexadecimal format, could have a prefix of `0x`.
4. HTTP headers were stripped of all leading and trailing ASCII whitespace, rather than only space and HTAB (`\t`).
This non-conformant parsing can lead to desync if requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling.
### Impact
You may be affected if:
1. You use Twisted Web's HTTP 1.1 server and/or proxy
2. You also pass requests through a different HTTP server and/or proxy
The specifics of the other HTTP parser matter. The original report notes that some versions of Apache Traffic Server and HAProxy have been vulnerable in the past. HTTP request smuggling may be a serious concern if you use a proxy to perform request validation or access control.
The Twisted Web client is not affected. The HTTP 2.0 server uses a different parser, so it is not affected.
### Patches
The issue has been addressed in Twisted 22.4.0rc1 and later.
### Workarounds
Other than upgrading Twisted, you could:
* Ensure any vulnerabilities in upstream proxies have been addressed, such as by upgrading them
* Filter malformed requests by other means, such as configuration of an upstream proxy
### Credits
This issue was initially reported by [Zhang Zeyu](https://github.com/zeyu2001).
|
{'CVE-2022-24801'}
|
2022-05-04T03:49:00Z
|
2022-04-04T21:29:41Z
|
HIGH
| 8.1
|
{'CWE-444'}
|
{'https://lists.debian.org/debian-lts-announce/2022/05/msg00003.html', 'https://github.com/twisted/twisted/releases/tag/twisted-22.4.0rc1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24801', 'https://github.com/advisories/GHSA-c2jg-hw38-jrqq', 'https://github.com/twisted/twisted/security/advisories/GHSA-c2jg-hw38-jrqq', 'https://github.com/twisted/twisted/commit/592217e951363d60e9cd99c5bbfd23d4615043ac'}
| null |
GHSA
|
GHSA-8rxg-9g6f-vq9p
|
Malicious Package in another-date-range-picker
|
Version 4.1.48 of `another-date-range-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 4.1.48 of this module is found installed you will want to replace it with a version before or after 4.1.48. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T16:18:51Z
|
2020-09-01T19:46:01Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/bi-a/mydaterangepicker', 'https://www.npmjs.com/advisories/617', 'https://github.com/advisories/GHSA-8rxg-9g6f-vq9p', 'https://github.com/kekeh/mydaterangepicker', 'https://snyk.io/vuln/SNYK-JS-ANOTHERDATERANGEPICKER-451011'}
| null |
GHSA
|
GHSA-xm6j-x342-gwq9
|
Unpublished files are exposed publicly
|
In the Versioned Files module through 2.0.3 for SilverStripe 3.x, unpublished versions of files are publicly exposed to anyone who can guess their URL. This guess could be highly informed by a basic understanding of the symbiote/silverstripe-versionedfiles source code. (Users who upgrade from SilverStripe 3.x to 4.x and had Versioned Files installed have no further need for this module, because the 4.x release has built-in versioning. However, nothing in the upgrade process automates the destruction of these insecure artefacts, nor alerts the user to the criticality of destruction.)
|
{'CVE-2019-16409'}
|
2021-07-27T22:02:46Z
|
2019-11-12T23:01:05Z
|
MODERATE
| 5.3
|
{'CWE-200'}
|
{'https://github.com/silverstripe/silverstripe-framework', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16409', 'https://github.com/advisories/GHSA-xm6j-x342-gwq9', 'https://www.silverstripe.org/download/security-releases/cve-2019-16409', 'https://github.com/symbiote/silverstripe-versionedfiles'}
| null |
GHSA
|
GHSA-7553-jr98-vx47
|
libxml as used in Nokogiri has an infinite loop in a certain end-of-file situation
|
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
The Nokogiri RubyGem has patched its vendored copy of libxml2 in order to prevent this issue from affecting nokogiri.
|
{'CVE-2020-7595'}
|
2022-04-22T17:29:45Z
|
2020-02-24T19:12:36Z
|
HIGH
| 7.5
|
{'CWE-835'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://usn.ubuntu.com/4274-1/', 'https://github.com/advisories/GHSA-7553-jr98-vx47', 'https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076', 'https://security.netapp.com/advisory/ntap-20200702-0005/', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/', 'https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf', 'https://security.gentoo.org/glsa/202010-04', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7595', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/', 'https://github.com/sparklemotion/nokogiri/issues/1992', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html', 'https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08'}
| null |
GHSA
|
GHSA-2m9w-9xh2-wxc3
|
Link Following in Jenkins Pipeline Multibranch Plugin
|
Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.
|
{'CVE-2022-25179'}
|
2022-02-26T00:55:53Z
|
2022-02-16T00:01:33Z
|
MODERATE
| 6.5
|
{'CWE-59'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25179', 'https://github.com/advisories/GHSA-2m9w-9xh2-wxc3', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613'}
| null |
GHSA
|
GHSA-r9w6-rhh9-7v53
|
Incorrect Authorization in HashiCorp Consul
|
HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3.
|
{'CVE-2020-7955'}
|
2021-07-28T17:57:57Z
|
2021-07-28T17:57:57Z
|
MODERATE
| 5.3
|
{'CWE-863'}
|
{'https://github.com/advisories/GHSA-r9w6-rhh9-7v53', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7955', 'https://github.com/hashicorp/consul/issues/7160', 'https://www.hashicorp.com/blog/category/consul/'}
| null |
GHSA
|
GHSA-65f3-3278-7m65
|
Improper Authorization in Gogs
|
### Impact
Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected.
### Patches
Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.13.0+dev.
### Workarounds
In addition to marking PAM accounts as expired, also disable/lock them. Running `usermod -L <username>` will add an exclamation mark to the password hash and would result in wrong passwords responses when trying to login.
### References
https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62/
### For more information
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6810.
|
{'CVE-2022-0871'}
|
2022-03-29T19:10:32Z
|
2022-03-12T00:00:34Z
|
HIGH
| 8.2
|
{'CWE-863', 'CWE-285'}
|
{'https://github.com/advisories/GHSA-65f3-3278-7m65', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0871', 'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78', 'https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62'}
| null |
GHSA
|
GHSA-2p25-55c9-h58q
|
Overflow/crash in `tf.tile` when tiling tensor is large
|
### Impact
If `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow.
```python
import tensorflow as tf
import numpy as np
tf.keras.backend.tile(x=np.ones((1,1,1)), n=[100000000,100000000, 100000000])
```
The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process.
### Patches
We have patched the issue in GitHub commit [9294094df6fea79271778eb7e7ae1bad8b5ef98f](https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f) (merging [#51138](https://github.com/tensorflow/tensorflow/pull/51138)).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46911).
|
{'CVE-2021-41198'}
|
2021-11-10T19:33:58Z
|
2021-11-10T19:33:58Z
|
MODERATE
| 5.5
|
{'CWE-190'}
|
{'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q', 'https://github.com/advisories/GHSA-2p25-55c9-h58q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41198', 'https://github.com/tensorflow/tensorflow/issues/46911'}
| null |
GHSA
|
GHSA-3ccq-5vw3-2p6x
|
XStream is vulnerable to an Arbitrary Code Execution attack
|
### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39149](https://x-stream.github.io/CVE-2021-39149.html).
### Credits
Lai Han of NSFOCUS security team found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-39149'}
|
2022-04-22T15:43:13Z
|
2021-08-25T14:47:28Z
|
HIGH
| 8.5
|
{'CWE-434', 'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://x-stream.github.io/CVE-2021-39149.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://github.com/advisories/GHSA-3ccq-5vw3-2p6x', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39149', 'https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-xvcg-2q82-r87j
|
Panic mishandled in libpulse-binding
|
An issue was discovered in the libpulse-binding crate before 2.6.0 for Rust. It mishandles a panic that crosses a Foreign Function Interface (FFI) boundary.
|
{'CVE-2019-25055'}
|
2022-01-07T16:25:12Z
|
2022-01-06T22:18:19Z
|
HIGH
| 7.5
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2019-25055', 'https://rustsec.org/advisories/RUSTSEC-2019-0038.html', 'https://github.com/advisories/GHSA-xvcg-2q82-r87j', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/libpulse-binding/RUSTSEC-2019-0038.md'}
| null |
GHSA
|
GHSA-h23m-w6x5-jwr4
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
|
{'CVE-2019-0923'}
|
2021-03-29T21:00:08Z
|
2021-03-29T21:00:08Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0923', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0923', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/advisories/GHSA-h23m-w6x5-jwr4'}
| null |
GHSA
|
GHSA-p6xc-xr62-6r2g
|
Improper Input Validation and Uncontrolled Recursion in Apache Log4j2
|
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3.
# Affected packages
Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.
|
{'CVE-2021-45105'}
|
2022-04-26T20:58:03Z
|
2021-12-18T18:00:07Z
|
HIGH
| 8.6
|
{'CWE-20', 'CWE-674'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'http://www.openwall.com/lists/oss-security/2021/12/19/1', 'https://logging.apache.org/log4j/2.x/security.html', 'https://www.debian.org/security/2021/dsa-5024', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/', 'https://github.com/advisories/GHSA-p6xc-xr62-6r2g', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.zerodayinitiative.com/advisories/ZDI-21-1541/', 'https://security.netapp.com/advisory/ntap-20211218-0001/', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html', 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf', 'https://www.kb.cert.org/vuls/id/930724', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45105', 'https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.