ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-29vr-79w7-p649
Incorrect Authorization in Gerapy
An Access Control vunerabiity exists in Gerapy v 0.9.7 via the spider parameter in project_configure function.
{'CVE-2021-44597'}
2022-03-29T21:07:12Z
2022-03-11T00:02:00Z
CRITICAL
9.8
{'CWE-863'}
{'https://github.com/advisories/GHSA-29vr-79w7-p649', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44597', 'https://github.com/Gerapy/Gerapy/releases/tag/v0.9.8', 'https://github.com/Gerapy/Gerapy/issues/219'}
null
GHSA
GHSA-3h9m-9g3g-5wqx
Malicious Package in buffer-xov
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:13:03Z
2020-09-03T22:13:14Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1252', 'https://github.com/advisories/GHSA-3h9m-9g3g-5wqx'}
null
GHSA
GHSA-hhh6-cm2m-3fhc
Allocation of Resources Without Limits or Throttling in iText
iText v7.1.17 was discovered to contain an out-of-memory error via the component readStreamBytesRaw, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
{'CVE-2022-24196'}
2022-04-15T16:39:31Z
2022-02-02T00:01:45Z
MODERATE
6.5
{'CWE-770'}
{'https://github.com/advisories/GHSA-hhh6-cm2m-3fhc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24196', 'https://github.com/itext/itext7/pull/78#issuecomment-1089279222', 'https://github.com/itext/itext7/pull/78'}
null
GHSA
GHSA-qqxp-xp9v-vvx6
Moderate severity vulnerability that affects jquery-ui
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.
{'CVE-2012-6662'}
2021-09-16T20:04:39Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-79'}
{'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'http://rhn.redhat.com/errata/RHSA-2015-0442.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6662', 'https://github.com/advisories/GHSA-qqxp-xp9v-vvx6', 'http://bugs.jqueryui.com/ticket/8861', 'http://seclists.org/oss-sec/2014/q4/616', 'http://seclists.org/oss-sec/2014/q4/613', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e', 'http://www.securityfocus.com/bid/71107', 'http://rhn.redhat.com/errata/RHSA-2015-1462.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98697', 'https://github.com/jquery/jquery/issues/2432', 'http://bugs.jqueryui.com/ticket/8859'}
null
GHSA
GHSA-jm6p-wfjg-xm7x
bookstack is vulnerable to Improper Access Control
bookstack is vulnerable to Improper Access Control.
{'CVE-2021-4026'}
2021-12-02T15:29:38Z
2021-12-01T18:26:48Z
MODERATE
4.3
{'CWE-668', 'CWE-284'}
{'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.2', 'https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92', 'https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1d', 'https://github.com/advisories/GHSA-jm6p-wfjg-xm7x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4026'}
null
GHSA
GHSA-p2j5-3f4c-224r
Improper Input Validation in HashiCorp Consul
HashiCorp Consul and Consul Enterprise did not appropriately enforce scope for local tokens issued by a primary data center, where replication to a secondary data center was not enabled. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
{'CVE-2020-13170'}
2021-05-18T18:21:21Z
2021-05-18T18:21:21Z
MODERATE
5.3
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13170', 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/commit/242994a016a181d6c62a5bb83189716ad13d4216', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/8068', 'https://github.com/advisories/GHSA-p2j5-3f4c-224r'}
null
GHSA
GHSA-cxfm-5m4g-x7xp
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
### Impact The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39150](https://x-stream.github.io/CVE-2021-39150.html). ### Credits Lai Han of NSFOCUS security team found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39150'}
2022-04-22T15:43:06Z
2021-08-25T14:47:19Z
HIGH
8.5
{'CWE-502', 'CWE-918'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39150', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/advisories/GHSA-cxfm-5m4g-x7xp', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://x-stream.github.io/CVE-2021-39150.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-cxfm-5m4g-x7xp'}
null
GHSA
GHSA-5cmw-fhq9-8fhh
Type Confusion in LiveHelperChat
Live Helper Chat provides live support for your website. Loose comparison causes IDOR on multiple endpoints in LiveHelperChat prior to 3.96. There is a fix released in versions 3.96 and 3.97. Currently, there is no known workaround.
{'CVE-2022-1176'}
2022-04-12T18:10:01Z
2022-04-01T00:00:40Z
HIGH
7.5
{'CWE-843'}
{'https://huntr.dev/bounties/3e30171b-c9bf-415c-82f1-6f55a44d09d3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1176', 'https://github.com/livehelperchat/livehelperchat/commit/72c0df160bfe9838c618652facef29af99392ce3', 'https://github.com/advisories/GHSA-5cmw-fhq9-8fhh'}
null
GHSA
GHSA-q448-6c3m-cxmj
Cross-site Scripting in jeecg-boot
jeecg-boot is a code generator. A Cross Site Scripting (XSS) vulnerabilitiy exists in jeecg-boot 3.0 in /jeecg-boot/jmreport/view with a mouseover event.
{'CVE-2021-44585'}
2022-03-28T14:30:55Z
2022-03-11T00:01:59Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/jeecgboot/jeecg-boot/issues/3223', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44585', 'https://github.com/jeecgboot/jeecg-boot/commit/dbba190980fe44ab5377703dc1a9487806ee2a91', 'https://github.com/advisories/GHSA-q448-6c3m-cxmj'}
null
GHSA
GHSA-4hv7-3q38-97m8
Arbitrary code execution in djv
This affects the package djv before 2.1.4. By controlling the schema file, an attacker can run arbitrary JavaScript code on the victim machine.
{'CVE-2020-28464'}
2021-07-28T19:29:06Z
2021-04-13T15:24:47Z
CRITICAL
9.8
{'CWE-94'}
{'https://github.com/korzio/djv/blob/master/lib/utils/properties.js%23L55', 'https://github.com/advisories/GHSA-4hv7-3q38-97m8', 'https://snyk.io/vuln/SNYK-JS-DJV-1014545', 'https://github.com/korzio/djv/pull/98/files', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28464'}
null
GHSA
GHSA-j6jg-w79c-7p8v
File Upload Restriction Bypass leading to Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to a file upload restriction bypass leading to stored cross-site scripting.
{'CVE-2022-0951'}
2022-03-29T21:23:38Z
2022-03-16T00:00:48Z
MODERATE
6.1
{'CWE-434', 'CWE-79'}
{'https://huntr.dev/bounties/b3a983a3-17f9-4aa8-92d7-8a0c92a93932', 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0951', 'https://github.com/advisories/GHSA-j6jg-w79c-7p8v'}
null
GHSA
GHSA-fvcj-hvfw-7f2v
Improper Authentication
### Impact A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an attacker to have internal knowledge of the bot. ### Patches The problem has been patched in all affected versions. Please see the list of patched versions for the most appropriate one for your individual case. ### Workarounds Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator, which throws an exception if the Claims are Skill Claims. For detailed instructions, see the link in the References section. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botbuilder-dotnet) * Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com)
{'CVE-2021-1725'}
2021-03-08T15:49:53Z
2021-03-08T15:49:53Z
HIGH
0
{'CWE-287'}
{'https://aka.ms/SkillClaimsValidationJavascript', 'https://www.npmjs.com/package/botframework-connector', 'https://github.com/advisories/GHSA-fvcj-hvfw-7f2v', 'https://github.com/microsoft/botbuilder-js/security/advisories/GHSA-fvcj-hvfw-7f2v'}
null
GHSA
GHSA-3c87-r9f7-qfgq
Downloads Resources over HTTP in macaca-chromedriver-zxa
Affected versions of `macaca-chromedriver-zxa` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `macaca-chromedriver-zxa`. ## Recommendation The best mitigation is to manually set the download URL to a safe HTTPS server via the `CHROMEDRIVER_CDNURL` environment variable. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10623'}
2021-01-08T20:02:34Z
2019-02-18T23:56:56Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/221', 'https://github.com/advisories/GHSA-3c87-r9f7-qfgq', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10623', 'https://nodesecurity.io/advisories/221'}
null
GHSA
GHSA-rm7c-x424-g2mw
Malicious Package in asyync
All versions of `asyync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:47:20Z
2020-09-02T18:36:31Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/843', 'https://github.com/advisories/GHSA-rm7c-x424-g2mw'}
null
GHSA
GHSA-8xx9-rxrj-2m2w
Cross-site Scripting in pimcore
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4139'}
2022-01-05T20:35:12Z
2022-01-05T20:35:12Z
MODERATE
6.6
{'CWE-79'}
{'https://huntr.dev/bounties/6ec59e43-095f-4ba3-8b75-e92250da8e3a', 'https://github.com/advisories/GHSA-8xx9-rxrj-2m2w', 'https://github.com/pimcore/pimcore/commit/d5c3e876d910784000335061c3bd24d301351245', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4139'}
null
GHSA
GHSA-94vp-rmqv-5875
Twig Sandbox Escape by authenticated users with access to editing CMS templates when safemode is enabled.
### Impact An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP. ### Patches Issue has been patched in Build 469 (v1.0.469) and v1.1.0. ### Workarounds Apply https://github.com/octobercms/october/compare/106daa2930de4cebb18732732d47d4056f01dd5b...7cb148c1677373ac30ccfd3069d18098e403e1ca to your installation manually if unable to upgrade to Build 469. ### References Reported by [ka1n4t](https://github.com/ka1n4t) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1108" alt="Screen Shot 2020-10-10 at 1 21 13 PM" src="https://user-images.githubusercontent.com/7253840/95663316-7de28b80-0afb-11eb-999d-a6526cf78709.png">
{'CVE-2020-15247'}
2022-04-19T19:02:37Z
2020-11-23T19:48:27Z
MODERATE
5.2
{'CWE-862'}
{'https://github.com/octobercms/october/security/advisories/GHSA-94vp-rmqv-5875', 'https://github.com/advisories/GHSA-94vp-rmqv-5875', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15247', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'}
null
GHSA
GHSA-p867-fxfr-ph2w
b2-sdk-python TOCTOU application key disclosure
### Impact Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. SDK users of the `SqliteAccountInfo` format are vulnerable while users of the `InMemoryAccountInfo` format are safe. The `SqliteAccountInfo` saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/account_info`, `~/.b2_account_info` or a user-defined path). When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory containing the file is readable by a local attacker then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Consumers of this SDK who rely on it to save data using `SqliteAccountInfo` class should upgrade to the latest version of the SDK. Those who believe a local user might have opened a handle using this race condition, should remove the affected database files and regenerate all application keys. ### Patches Users should upgrade to b2-sdk-python 1.14.1 or later. ### For more information See the related advisory in the [B2 Command Line Tool](https://github.com/Backblaze/B2_Command_Line_Tool), a consumer of this SDK. If you have any questions or comments about this advisory: * Open an issue in [b2-sdk-python](https://github.com/Backblaze/b2-sdk-python) * Email us at [security@backblaze.com](mailto:security@backblaze.com)
{'CVE-2022-23651'}
2022-04-19T19:03:23Z
2022-02-24T12:08:24Z
MODERATE
4.7
{'CWE-367'}
{'https://github.com/Backblaze/b2-sdk-python/security/advisories/GHSA-p867-fxfr-ph2w', 'https://github.com/advisories/GHSA-p867-fxfr-ph2w', 'https://github.com/Backblaze/b2-sdk-python/commit/62476638986e5b6d7459aca5ef8ce220760226e0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23651', 'https://pypi.org/project/b2sdk/'}
null
GHSA
GHSA-8gf5-q9p9-wvmc
Data race in atomic-option
An issue was discovered in the atomic-option crate through 2020-10-31 for Rust. Because AtomicOption<T> implements Sync unconditionally, a data race can occur.
{'CVE-2020-36219'}
2021-08-25T20:51:42Z
2021-08-25T20:51:42Z
MODERATE
5.9
{'CWE-662'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36219', 'https://rustsec.org/advisories/RUSTSEC-2020-0113.html', 'https://github.com/reem/rust-atomic-option/issues/4', 'https://github.com/advisories/GHSA-8gf5-q9p9-wvmc'}
null
GHSA
GHSA-xm34-v85h-9pg2
Authentication Bypass by CSRF Weakness
### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `solidus_auth_devise` are affected if `protect_from_forgery` method is both: - Executed whether as: - A `before_action` callback (the default) - A `prepend_before_action` (option `prepend: true` given) before the `:load_object` hook in `Spree::UserController` (most likely order to find). - Configured to use `:null_session` or `:reset_session` strategies (`:null_session` is the default in case the no strategy is given, but `rails --new` generated skeleton use `:exception`). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. ### Patches Users should promptly update to `solidus_auth_devise` version `2.5.4`. ### Workarounds A couple of options: - If possible, change your strategy to `:exception`: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` - Add the following to `config/application.rb` to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` - We've also released new Solidus versions monkey patching `solidus_auth_devise` with the quick fix. Those versions are `v3.1.3`, `v.3.0.3` & `v2.11.12`. See [GHSA-5629-8855-gf4g](https://github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g) for details. ### References - [CSRF on the Rails guides](https://guides.rubyonrails.org/security.html#cross-site-request-forgery-csrf) - [Solidus security](https://solidus.io/security/) ### Thanks We'd like to thank [vampire000](https://hackerone.com/vampire000) for reporting this issue. ### For more information If you have any questions or comments about this advisory: * Open an issue in [solidus_auth_devise](https://github.com/solidusio/solidus_auth_devise/issues) or a discussion in [solidus](https://github.com/solidusio/solidus/discussions) * Email us at [security@solidus.io](mailto:security@soliidus.io) * Contact the core team on [Slack](http://slack.solidus.io/)
{'CVE-2021-41274'}
2021-11-18T20:09:32Z
2021-11-18T20:09:32Z
CRITICAL
9.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-xm34-v85h-9pg2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41274', 'https://github.com/solidusio/solidus_auth_devise/commit/731a6645e90ea9fd228f78ec53c6976c048a0555', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/solidusio/solidus_auth_devise/releases/tag/v2.5.4'}
null
GHSA
GHSA-j4vm-hg8g-g9qv
Malicious Package in antd-cloud
All versions of `antd-cloud` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T18:39:55Z
2020-09-03T17:33:50Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-j4vm-hg8g-g9qv', 'https://www.npmjs.com/advisories/1049'}
null
GHSA
GHSA-fc7x-2cmc-8j2g
Incorrect hash in sha2
An issue was discovered in the sha2 crate 0.9.7 before 0.9.8 for Rust. Hashes of long messages may be incorrect when the AVX2-accelerated backend is used.
{'CVE-2021-45696'}
2022-01-07T17:57:50Z
2022-01-06T22:10:26Z
CRITICAL
9.8
null
{'https://rustsec.org/advisories/RUSTSEC-2021-0100.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45696', 'https://github.com/advisories/GHSA-fc7x-2cmc-8j2g', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/sha2/RUSTSEC-2021-0100.md'}
null
GHSA
GHSA-q4rf-3fhx-88pf
YAML deserialization can run untrusted code
### Impact An authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can make a POST request, that can cause the server to run untrusted code on Rundeck Enterprise Edition. The zip-format plugin issues requires authentication and authorization to these access levels, and affects all Rundeck editions: * `admin` level access to the `system` resource type The ACL Policy yaml file upload issues requires authentication and authorization to these access levels, and affects all Rundeck editions: * `create` `update` or `admin` level access to a `project_acl` resource * `create` `update` or `admin` level access to the `system_acl` resource The unauthorized POST request requires authentication, but no specific authorization, and affects Rundeck Enterprise only. ### Patches Versions 3.4.3, 3.3.14 ### Workarounds Please visit [https://rundeck.com/security](https://rundeck.com/security) for information about specific workarounds. ### For more information If you have any questions or comments about this advisory: * Email us at [security@rundeck.com](mailto:security@rundeck.com) To report security issues to Rundeck please use the form at [https://rundeck.com/security](https://rundeck.com/security) Reporter: Rojan Rijal from Tinder Red Team
{'CVE-2021-39132'}
2021-09-01T18:27:01Z
2021-09-01T18:27:01Z
MODERATE
8.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39132', 'https://github.com/rundeck/rundeck/security/advisories/GHSA-q4rf-3fhx-88pf', 'https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6', 'https://github.com/advisories/GHSA-q4rf-3fhx-88pf'}
null
GHSA
GHSA-8mq9-fqv8-59wf
Cross-Site Scripting in Page Preview
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC` (5.0) ### Problem Failing to properly encode _Page TSconfig_ settings, corresponding page preview module (_Web>View_) is vulnerable to persistent cross-site scripting. A valid backend user account is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 9.5.28, 10.4.18, 11.3.1 that fix the problem described. ### Credits Thanks to TYPO3 core merger Oliver Bartsch who reported and fixed the issue. ### References * [TYPO3-CORE-SA-2021-009](https://typo3.org/security/advisory/typo3-core-sa-2021-009)
{'CVE-2021-32667'}
2022-04-19T19:02:59Z
2021-07-22T19:34:43Z
MODERATE
6.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32667', 'https://github.com/TYPO3/typo3/security/advisories/GHSA-8mq9-fqv8-59wf', 'https://typo3.org/security/advisory/typo3-core-sa-2021-009', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-8mq9-fqv8-59wf', 'https://github.com/advisories/GHSA-8mq9-fqv8-59wf'}
null
GHSA
GHSA-m8wh-mqgf-rr8g
Code injection in Kubernetes Java Client
Loading specially-crafted yaml with the Kubernetes Java Client library can lead to code execution.
{'CVE-2021-25738'}
2021-10-12T17:50:25Z
2021-10-12T17:50:25Z
MODERATE
6.7
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25738', 'https://github.com/kubernetes-client/java/issues/1698', 'https://github.com/advisories/GHSA-m8wh-mqgf-rr8g', 'https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk'}
null
GHSA
GHSA-h6m3-cx24-9626
Malicious Package in js-sla3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T14:17:17Z
2020-09-03T23:11:45Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-h6m3-cx24-9626', 'https://www.npmjs.com/advisories/1292'}
null
GHSA
GHSA-m6cj-93v6-cvr5
Infinite loop in junrar
### Impact A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. ### Patches The problem is partially patched in 7.4.1 ### Workarounds None ### References https://github.com/junrar/junrar/issues/73 https://github.com/junrar/junrar/issues/81
{'CVE-2022-23596'}
2022-04-19T17:55:14Z
2022-02-01T00:47:23Z
HIGH
7.5
{'CWE-835', 'CWE-400'}
{'https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7', 'https://github.com/advisories/GHSA-m6cj-93v6-cvr5', 'https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23596', 'https://github.com/junrar/junrar/issues/73'}
null
GHSA
GHSA-67j9-c52g-w2q9
Authorization Bypass in I hate money
### Impact An authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code. With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated. ### Patches ```diff ihatemoney/models.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/ihatemoney/models.py b/ihatemoney/models.py index fe7b519..5691c75 100644 --- a/ihatemoney/models.py +++ b/ihatemoney/models.py @@ -380,7 +380,7 @@ class Person(db.Model): def get_by_name(self, name, project): return ( Person.query.filter(Person.name == name) - .filter(Project.id == project.id) + .filter(Person.project_id == project.id) .one() ) @@ -389,7 +389,7 @@ class Person(db.Model): project = g.project return ( Person.query.filter(Person.id == id) - .filter(Project.id == project.id) + .filter(Person.project_id == project.id) .one() ) ``` ### Workarounds To limit the impact, it is possible to disable public project creation by setting `ALLOW_PUBLIC_PROJECT_CREATION = False` in the configuration (see [documentation](https://ihatemoney.readthedocs.io/en/latest/configuration.html)). Existing users will still be able to exploit the flaw, but this will prevent an external attacker from creating a new project. ### For more information `Person.query.get()` and `Person.query.get_by_name()` were mistakenly running a database join on the Project table without constraining the result. As a result, `Person.query.get(42, "projectfoo")` would return the Person with id=42, even if it is not associated to the project "projectfoo". The only condition is that "projectfoo" must exist. This flaw can be exploited in several places: 1) API: PUT requests to `/api/projects/<project>/members/<personID>` will succeed even though `<personID>` is not a member of `<project>`. This allows an authenticated attacker to alter the state of a member (name, weight, activated) in any project. In addition, the altered member will no longer be associated with its original project but will be associated to the attacker project instead, breaking many features of IHateMoney. For instance, bills referencing the altered member will no longer be visible in the original project. This causes an additional information disclosure and loss of integrity on bills: the attacker will now be able to see, edit and delete bills belonging to the altered member, because IHateMoney now believes that these bills are associated to the attacker project through the altered member. For instance, assume that `Person(id=42)` is a member of project "targetProject", and that the attacker has access to another project "attackerProject" with the private code "attackerPassword". The attacker can modify `Person(id=42)` with this command: $ curl -X PUT -d "name=Pwn3d&activated=1" --basic -u attackerProject:attackerPassword http://$SERVER/api/projects/attackerProject/members/42 The attacker can now see, edit and delete bills paid by `Person(id=42)` by simply browsing to http://$SERVER/attackerProject/ 2) Editing a member through the web interface at `/<project>/members/<personID>/edit` will succeed even though `<personID>` is not a member of `<project>`. This is very similar to the PUT exploit. Reusing the same example, the attacker needs to login to its "attackerProject" project with the private code "attackerPassword". It can then alter the state of `Person(id=42)` by accessing the edit form at the following URL: http://$SERVER/attackerProject/members/42/edit Again, as a result of the alteration, the altered member will become associated to the project "attackerProject", resulting in the same information disclosure and loss of integrity on bills. 3) API: DELETE requests to `/api/projects/<project>/members/<personID>` will similarly allow to delete the member `<personID>` even if it belongs to a different project than `<project>`. $ curl -X DELETE --basic -u attackerProject:attackerPassword http://$SERVER/api/projects/attackerProject/members/42 The impact is less serious than with PUT, because DELETE only deactivates a member (it does not really delete it). All these exploits require authentication: an attacker needs to know a valid project name and its associated "private code". Once this requirement is fullfilled, the attacker can exploit this flaw to alter the state of members in any other project, without needing to know the target project name or its private code. `Person.query.get_by_name()` suffers from the same issue as `Person.query.get()`. It has an additional issue: if multiple Person objects with the same name exist (this is possible if they are associated to different projects), `get_by_name()` will crash with `MultipleResultsFound` because of the call to `one()`. However, since `Person.query.get_by_name()` is currently not used anywhere in IHateMoney, the bug affecting this function has no impact and is not exploitable.
{'CVE-2020-15120'}
2022-04-19T19:02:31Z
2020-07-27T17:47:52Z
MODERATE
4.9
{'CWE-863'}
{'https://github.com/advisories/GHSA-67j9-c52g-w2q9', 'https://github.com/spiral-project/ihatemoney/commit/8d77cf5d5646e1d2d8ded13f0660638f57e98471', 'https://github.com/spiral-project/ihatemoney/security/advisories/GHSA-67j9-c52g-w2q9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15120'}
null
GHSA
GHSA-wxjg-p59j-6c92
Command injection in github.com/google/fscrypt
The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above
{'CVE-2022-25328'}
2022-03-08T18:26:50Z
2022-02-26T00:00:44Z
MODERATE
5
{'CWE-78'}
{'https://github.com/advisories/GHSA-wxjg-p59j-6c92', 'https://github.com/google/fscrypt/pull/346', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25328'}
null
GHSA
GHSA-g452-6rfc-vrvx
Prototype Pollution in open-graph
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
{'CVE-2021-23419'}
2021-09-01T18:31:53Z
2021-09-01T18:31:53Z
MODERATE
5.3
{'CWE-915'}
{'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348', 'https://github.com/advisories/GHSA-g452-6rfc-vrvx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23419', 'https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747'}
null
GHSA
GHSA-4j6x-w426-6rc6
Default Express middleware security check is ignored in production
## Default Express middleware security check is ignored in production ### Impact All Cube.js deployments that use affected versions of `@cubejs-backend/api-gateway` with default express authentication middleware in production environment are affected. ### Patches @cubejs-backend/api-gateway@0.11.17 ### Workarounds Override default authentication express middleware: https://cube.dev/docs/@cubejs-backend-server-core#options-reference-check-auth-middleware ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/cube-js/cube.js/issues * Reach out us in community Slack: https://slack.cube.dev/
null
2019-11-08T17:31:17Z
2019-11-08T17:31:17Z
HIGH
0
null
{'https://github.com/advisories/GHSA-4j6x-w426-6rc6'}
null
GHSA
GHSA-g376-whg7-896m
Directory Traversal in yjmyjmyjm
Affected versions of `yjmyjmyjm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
null
2021-09-23T21:47:16Z
2020-09-01T18:45:53Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yjmyjmyjm', 'https://github.com/advisories/GHSA-g376-whg7-896m', 'https://www.npmjs.com/advisories/451'}
null
GHSA
GHSA-g78f-549w-c354
Prototype Pollution in multi-ini
This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array.
{'CVE-2020-28448'}
2021-04-13T15:23:59Z
2021-04-13T15:23:59Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/advisories/GHSA-g78f-549w-c354', 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28448', 'https://github.com/evangelion1204/multi-ini/pull/37'}
null
GHSA
GHSA-jwvr-vv7p-gpwq
Privilege escalation for users with create/update permissions in Global Roles in Rancher
### Impact This vulnerability affects customers who utilize non-admin users that are able to create or edit [Global Roles](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/). The most common use case for this scenario is the [`restricted-admin`](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/global-permissions/#restricted-admin) role. A flaw was discovered in Rancher versions from 2.5.0 up to and including 2.5.12 and from 2.6.0 up to and including 2.6.3 which allows users who have create or update permissions on Global Roles to escalate their permissions, or those of another user, to admin-level permissions. Global Roles grant users Rancher-wide permissions, such as the ability to create clusters. In the identified versions of Rancher, when users are given permission to edit or create Global Roles, they are not restricted to only granting permissions which they already posses. The privilege escalation can be taken advantage of in two ways by users with create or update permissions on Global Roles (including the `restricted-admin`): 1. Editing the global `admin` role to make it the default for new users, then creating a new user that will be elevated to the global `admin` role. 2. Creating a new global role with permissions already possessed by the `restricted-admin`, assigning this new role to a user, then modifying the global role to grant additional administrive like permissions (`'*'`) to the elevated user. ### Patches Patched versions include releases 2.5.13, 2.6.4 and later versions. ### Workarounds Limit access in Rancher to trusted users. There is not a direct mitigation besides upgrading to the patched Rancher versions. **Note:** If you have users who have create or edit permissions on Global Roles but are not admin users (for example, the `restricted-admin`), it is highly advised to review the roles and users created by those users for possible privilege escalations. ### For more information If you have any questions or comments about this advisory: * Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. * Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. * Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
{'CVE-2021-36784'}
2022-05-02T19:39:36Z
2022-05-02T19:39:35Z
MODERATE
6.5
{'CWE-285', 'CWE-269'}
{'https://github.com/rancher/rancher/releases/tag/v2.5.13', 'https://github.com/rancher/rancher/releases/tag/v2.6.4', 'https://github.com/advisories/GHSA-jwvr-vv7p-gpwq', 'https://github.com/rancher/rancher/security/advisories/GHSA-jwvr-vv7p-gpwq'}
null
GHSA
GHSA-h29c-wcm8-883h
Incorrect Permission Assignment for Critical Resource in OnionShare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerability ID: OTF-006 - Vulnerability type: Broken Website Hardening Control - Threat level: Low ## Description: The CSP can be turned on or off but not configured for the specific needs of the website. ## Technical description: The website mode of the application allows to use a hardened CSP, which will block any scripts and external resources. It is not possible to configure this CSP for individual pages and therefore the security enhancement cannot be used for websites using javascript or external resources like fonts or images. If CSP were configurable, the website creator could harden it accordingly to the needs of the application. As this issue correlates with the Github issue for exposing the flask application directly (https://github.com/onionshare/ onionshare/issues/1389), it can be assumed that this can be solved by either changing to a well-known webserver, which supports this kind of configuration, or enhancing the status quo by making the CSP a configurable part of each website. We believe that bundling the nginx or apache webserver would add complexity and dependencies to the application that could result in a larger attack surface - as these packages receive regular security updates. On the other hand it is not recommended to directly expose the flask webserver, due to lack of hardening. This is a trade-off which needs to be evaluated by the Onionshare developers, as multiple features are involved. Ideally the application user could choose between the built-in flask webserver or a system webserver of choice. ## Impact: As this is a general weakness and not a direct vulnerability in the Onionshare application, the direct impact of this issue is rather low. ## Recommendation: - Consider offering a configurable webserver choice - Consider configurable CSP
{'CVE-2022-21694'}
2022-01-21T23:20:17Z
2022-01-21T23:20:17Z
LOW
3.7
{'CWE-732'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21694', 'https://github.com/onionshare/onionshare/security/advisories/GHSA-h29c-wcm8-883h', 'https://github.com/onionshare/onionshare/releases/tag/v2.5', 'https://github.com/advisories/GHSA-h29c-wcm8-883h', 'https://github.com/onionshare/onionshare/issues/1389'}
null
GHSA
GHSA-m2r5-4w96-qxg5
Arbitrary file access through XML parsing in org.xwiki.commons:xwiki-commons-xml
### Impact It's possible in a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service. For example: ``` {{velocity}} #set($xml=$services.get('xml')) #set($xxe_payload = "<?xml version='1.0' encoding='UTF-8'?><!DOCTYPE root[<!ENTITY xxe SYSTEM 'file:///etc/passwd' >]><root><foo>&xxe;</foo></root>") #set($doc=$xml.parse($xxe_payload)) $xml.serialize($doc) {{/velocity}} ``` ### Patches The problem has been patched on versions 12.10.10, 13.4.4 and 13.8RC1. ### Workarounds There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights. ### References https://jira.xwiki.org/browse/XWIKI-18946 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [XWiki Security mailing-list](mailto:security@xwiki.org)
{'CVE-2022-24898'}
2022-04-28T19:31:55Z
2022-04-28T19:31:55Z
MODERATE
4.9
{'CWE-611'}
{'https://jira.xwiki.org/browse/XWIKI-18946', 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m2r5-4w96-qxg5', 'https://github.com/advisories/GHSA-m2r5-4w96-qxg5', 'https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5'}
null
GHSA
GHSA-5xgh-643p-cp2g
Moderate severity vulnerability that affects yapi-vendor
An issue was discovered in YMFE YApi 1.3.23. There is stored XSS in the name field of a project.
{'CVE-2018-17574'}
2021-09-01T22:22:30Z
2018-11-21T22:19:59Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/YMFE/yapi/issues/520', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17574', 'https://github.com/advisories/GHSA-5xgh-643p-cp2g'}
null
GHSA
GHSA-4c4w-3q45-hp9j
Aescrypt does not sufficiently use random values
The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to defeat cryptographic protection mechanisms via a chosen plaintext attack.
{'CVE-2013-7463'}
2022-04-25T20:54:02Z
2017-10-24T18:33:36Z
HIGH
7.5
{'CWE-330'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-7463', 'http://www.securityfocus.com/bid/98035', 'https://github.com/advisories/GHSA-4c4w-3q45-hp9j', 'https://github.com/Gurpartap/aescrypt/issues/4'}
null
GHSA
GHSA-6c8p-qphv-668v
Moderate severity vulnerability that affects ruby-openid
The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack.
{'CVE-2013-1812'}
2021-09-02T15:54:33Z
2017-10-24T18:33:37Z
MODERATE
0
null
{'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120361.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=918134', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1812', 'https://github.com/openid/ruby-openid/pull/43', 'http://www.openwall.com/lists/oss-security/2013/03/03/8', 'https://github.com/openid/ruby-openid/blob/master/CHANGELOG.md', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120204.html', 'https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed', 'https://github.com/advisories/GHSA-6c8p-qphv-668v'}
null
GHSA
GHSA-jp7f-grcv-6mjf
Partial path traversal in sharpcompress
SharpCompress recreates a hierarchy of directories under destinationDirectory if ExtractFullPath is set to true in options. In order to prevent extraction outside the destination directory the destinationFileName path is verified to begin with fullDestinationDirectoryPath. However it is not enforced that fullDestinationDirectoryPath ends with slash: ```csharp public static void WriteEntryToDirectory(IEntry entry, string destinationDirectory, ExtractionOptions? options, Action<string, ExtractionOptions?> write) { string destinationFileName; string file = Path.GetFileName(entry.Key); string fullDestinationDirectoryPath = Path.GetFullPath(destinationDirectory); ... throw new ExtractionException("Entry is trying to write a file outside of the destination directory."); } ``` If the destinationDirectory is not slash terminated like /home/user/dir it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. /home/user/dir.sh. #### Impact Because of the file name and destination directory constraints the arbitrary file creation impact is limited and depends on the use case.
{'CVE-2021-39208'}
2022-04-19T19:03:07Z
2021-09-20T19:53:42Z
MODERATE
4.3
{'CWE-22'}
{'https://github.com/adamhathcock/sharpcompress/releases/tag/0.29.0', 'https://github.com/adamhathcock/sharpcompress/pull/614', 'https://github.com/advisories/GHSA-jp7f-grcv-6mjf', 'https://github.com/adamhathcock/sharpcompress/security/advisories/GHSA-jp7f-grcv-6mjf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39208'}
null
GHSA
GHSA-v2rg-8cwr-75g8
Deserializer tampering in Apache Dubbo
Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it.
{'CVE-2021-25641'}
2022-03-21T21:53:06Z
2022-03-18T17:56:08Z
CRITICAL
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/r99ef7fa35585d3a68762de07e8d2b2bc48b8fa669a03e8d84b9673f3%40%3Cdev.dubbo.apache.org%3E', 'https://github.com/advisories/GHSA-v2rg-8cwr-75g8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25641'}
null
GHSA
GHSA-hhqj-cfjx-vj25
Cross site scripting in reveal.js
The onmessage event listener in /plugin/notes/speaker-view.html does not check the origin of postMessage before adding the content to the webpage. The vulnerable code allows any origin to postMessage on the browser window and feeds attacker's input to parts using which attacker can execute arbitrary javascript code on victim's browser window hosting reveal.js
{'CVE-2022-0776'}
2022-03-10T16:00:14Z
2022-03-02T00:00:20Z
MODERATE
6.1
{'CWE-79'}
{'https://huntr.dev/bounties/be2b7ee4-f487-42e1-874a-6bcc410e4001', 'https://github.com/advisories/GHSA-hhqj-cfjx-vj25', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0776', 'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2'}
null
GHSA
GHSA-8jq6-w5cg-wm45
Exploitable inventory component chaining in PocketMine-MP
### Impact Specially crafted `InventoryTransactionPacket`s sent by malicious clients were able to exploit the behaviour of `InventoryTransaction->findResultItem()` and cause it to take an abnormally long time to execute (causing an apparent server freeze). The affected code is intended to compact conflicting `InventoryActions` which are in the same `InventoryTransaction` by flattening them into a single action. When multiple pathways to a result existed, the complexity of this flattening became exponential. The problem was fixed by bailing when ambiguities are detected. **At the time of writing, this exploit is being used in the wild by attackers to deny service to servers.** ### Patches Upgrade to 3.15.4 or newer. ### Workarounds No practical workarounds are possible, short of backporting the fix or implementing checks in a plugin listening to `DataPacketReceiveEvent`. ### References c368ebb5e74632bc622534b37cd1447b97281e20 ### For more information If you have any questions or comments about this advisory: * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-04-19T19:02:39Z
2020-11-11T21:38:18Z
HIGH
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-8jq6-w5cg-wm45', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-8jq6-w5cg-wm45'}
null
GHSA
GHSA-m2c7-42rf-c62f
Unrestricted Upload of File with Dangerous Type in motionEye
motionEye <= 0.42.1 and motioneEyeOS <= 20200606 allow a remote attacker to upload a configuration backup file containing a malicious python pickle file. This is possible when an installation is accessible over the Internet and uses no or poor authentication credentials. The GitHub repositories for motionEye and motionEyeOS are no longer being actively maintained as of January 2022, so release of a patched version is unlikely. Keeping a motionEye or motionEyeOS installation off of the Internet and/or using strong credentials provide protection against this issue.
{'CVE-2021-44255'}
2022-02-14T21:02:54Z
2022-02-01T00:00:44Z
HIGH
7.2
{'CWE-434'}
{'https://github.com/advisories/GHSA-m2c7-42rf-c62f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44255', 'https://github.com/ccrisan/motioneyeos/issues/2843', 'https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/'}
null
GHSA
GHSA-c35v-qwqg-87jc
Timing Attack in express-basic-auth
Versions of `express-basic-auth` prior to 1.2.0 are vulnerable to Timing Attacks. The package uses nating string comparison instead of a constant time string compare which may lead to Timing Attacks. Timing Attacks can be used to increase the efficiency of brute-force attacks by removing the exponential increase in entropy gained from longer secrets. ## Recommendation Upgrade to version 1.2.0 or later.
null
2021-08-04T20:58:12Z
2019-06-06T15:32:32Z
LOW
3.1
{'CWE-208'}
{'https://github.com/LionC/express-basic-auth/pull/20', 'https://www.npmjs.com/advisories/827', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263', 'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f', 'https://github.com/advisories/GHSA-c35v-qwqg-87jc', 'https://github.com/LionC/express-basic-auth/pull/21', 'https://snyk.io/vuln/SNYK-JS-EXPRESSBASICAUTH-174345'}
null
GHSA
GHSA-6v7p-v754-j89v
HTTP Response Splitting in Styx
# Vulnerability Styx is vulnerable to CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers (&#39;HTTP Response Splitting&#39;). # Vulnerable Component The vulnerable component is the `com.hotels.styx.api.HttpHeaders.Builder` due to disabling the HTTP Header validation built into Netty in these locations: https://github.com/HotelsDotCom/styx/blob/e1d578e9b9c38df9cd19c21dc2eb9b949d85b558/components/api/src/main/java/com/hotels/styx/api/HttpHeaders.java#L145 https://github.com/HotelsDotCom/styx/blob/e1d578e9b9c38df9cd19c21dc2eb9b949d85b558/components/api/src/main/java/com/hotels/styx/api/HttpHeaders.java#L145 `new DefaultHttpHeaders(false)` disables the built-in validation in Netty. Either use the default constructor or `new DefaultHttpHeaders(true` instead. Additionally, another vulnerable component is the StyxToNettyResponseTranslator due to also disabling the HTTP Header validation built into netty in this location. https://github.com/HotelsDotCom/styx/blob/8d60e5493e65d0d536afc0b350dcb02d24e0f7a7/components/server/src/main/java/com/hotels/styx/server/netty/connectors/StyxToNettyResponseTranslator.java#L30 `DefaultHttpResponse nettyResponse = new DefaultHttpResponse(version, httpResponseStatus, false); ` `new DefaultHttpResponse(version, httpResponseStatus, false);` disables the built-in validation in Netty. Please use the constructor `new DefaultHttpResponse(version, httpResponseStatus, true);` # Proof of Concept The following test plugin proves that there is no header validation occurring. ```java static class VulnerablePlugin implements Plugin { @Override public Eventual&lt;LiveHttpResponse&gt; intercept(LiveHttpRequest request, Chain chain) { String header = request.queryParam(&quot;header-value&quot;).get(); LiveHttpRequest newRequest = request.newBuilder() .header(&quot;myRequestHeader&quot;, header) .build(); return chain.proceed(newRequest).map(response -&gt; response.newBuilder().header(&quot;myResponseHeader&quot;, header).build() ) ; } } @Test public void simpleHeaderInjectionVulnerabilityPOC() { Plugin vulnerablePlugin = new VulnerablePlugin(); // a simple way to mock the downstream system HttpInterceptor.Chain chain = request -&gt; { assertThat(request.header(&quot;myRequestHeader&quot;).orElse(null), is(&quot;test\r\nAnother: CRLF_Injection&quot;)); return Eventual.of(response(OK).build()); }; // an example request you expect your plugin to receive String encodedGet = URLEncoder.encode(&quot;test\r\nAnother: CRLF_Injection&quot;); LiveHttpRequest request = get(&quot;/foo?header-value=&quot; + encodedGet) .build(); // since this is a test, we want to wait for the response LiveHttpResponse response = Mono.from(vulnerablePlugin.intercept(request, chain)).block(); assertThat(response.header(&quot;myResponseHeader&quot;).orElse(null), is(&quot;test\r\nAnother: CRLF_Injection&quot;)); } ``` Additionally, if you run this LiveHttpResponse from this test through the `StyxToNettyResponseTranslator::toNettyResponse`, ideally, it would have caused an exception to be thrown. In its current state, it does not. # Similar Vulnerabilities There have been reports of similar vulnerabilities in other popular libraries. GHSA-35fr-h7jr-hh86 -&gt; CVE-2019-16771 GHSA-mvqp-q37c-wf9j -&gt; CVE-2019-17513 # Finding This vulnerability was found due to this query that [Jonathan Leitschuh](https://twitter.com/jlleitschuh) contributed to the Semmle QL project. https://lgtm.com/rules/1510696449842/alerts/
{'CVE-2020-6858'}
2022-04-19T19:02:23Z
2020-03-03T15:32:03Z
MODERATE
6.5
{'CWE-74'}
{'https://github.com/HotelsDotCom/styx/security/advisories/GHSA-6v7p-v754-j89v', 'https://github.com/advisories/GHSA-6v7p-v754-j89v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6858', 'https://twitter.com/JLLeitschuh'}
null
GHSA
GHSA-cmfg-87vq-g5g4
Deserialization of untrusted data in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.
{'CVE-2019-12814'}
2021-04-23T20:14:52Z
2019-07-17T15:26:12Z
MODERATE
5.9
{'CWE-502'}
{'https://lists.apache.org/thread.html/2ff264b6a94c5363a35c4c88fa93216f60ec54d1d973ed6b76a9f560@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/bf20574dbc2db255f1fd489942b5720f675e32a2c4f44eb6a36060cd@%3Ccommits.accumulo.apache.org%3E', 'https://lists.apache.org/thread.html/b148fa2e9ef468c4de00de255dd728b74e2a97d935f8ced31eb41ba2@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/eff7280055fc717ea8129cd28a9dd57b8446d00b36260c1caee10b87@%3Cnotifications.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3046', 'https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682@%3Cnotifications.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.apache.org/thread.html/71f9ffd92410a889e27b95a219eaa843fd820f8550898633d85d4ea3@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://access.redhat.com/errata/RHSA-2019:3297', 'https://lists.apache.org/thread.html/28be28ffd6471d230943a255c36fe196a54ef5afc494a4781d16e37c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/1e04d9381c801b31ab28dec813c31c304b2a596b2a3707fa5462c5c0@%3Cnotifications.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3044', 'https://lists.apache.org/thread.html/8fe2983f6d9fee0aa737e4bd24483f8f5cf9b938b9adad0c4e79b2a4@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/a3ae8a8c5e32c413cd27071d3a204166050bf79ce7f1299f6866338f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/', 'https://lists.apache.org/thread.html/129da0204c876f746636018751a086cc581e0e07bcdeb3ee22ff5731@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/4b832d1327703d6b287a6d223307f8f884d798821209a10647e93324@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E', 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2936', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190625-0006/', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://github.com/FasterXML/jackson-databind/issues/2341', 'https://lists.apache.org/thread.html/a78239b1f11cddfa86e4edee19064c40b6272214630bfef070c37957@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-cmfg-87vq-g5g4', 'https://access.redhat.com/errata/RHSA-2019:3050', 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12814', 'https://access.redhat.com/errata/RHSA-2019:2937', 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/15a55e1d837fa686db493137cc0330c7ee1089ed9a9eea7ae7151ef1@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html', 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3045', 'https://lists.apache.org/thread.html/b0a2b2cca072650dbd5882719976c3d353972c44f6736ddf0ba95209@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3292'}
null
GHSA
GHSA-qjwc-v72v-fq6r
HTTP request smuggling in Undertow
A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. The highest threat from this vulnerability is to data confidentiality and integrity.
{'CVE-2021-20220'}
2022-02-11T21:11:27Z
2021-06-16T17:47:52Z
MODERATE
4.8
{'CWE-444'}
{'https://github.com/advisories/GHSA-qjwc-v72v-fq6r', 'https://github.com/undertow-io/undertow/commit/9e797b2f99617fdad0471eaa88c711ee7f44605f', 'https://bugzilla.redhat.com/show_bug.cgi?id=1923133', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20220', 'https://security.netapp.com/advisory/ntap-20220210-0013/'}
null
GHSA
GHSA-q879-9g95-56mx
Wrong type for `Linker`-define functions when used across two `Engine`s
### Impact As a Rust library the `wasmtime` crate clearly marks which functions are safe and which are `unsafe`, guaranteeing that if consumers never use `unsafe` then it should not be possible to have memory unsafety issues in their embeddings of Wasmtime. An issue was discovered in the safe API of `Linker::func_*` APIs. These APIs were previously not sound when one `Engine` was used to create the `Linker` and then a different `Engine` was used to create a `Store` and then the `Linker` was used to instantiate a module into that `Store`. Cross-`Engine` usage of functions is not supported in Wasmtime and this can result in type confusion of function pointers, resulting in being able to safely call a function with the wrong type. Triggering this bug requires using at least two `Engine` values in an embedding and then additionally using two different values with a `Linker` (one at the creation time of the `Linker` and another when instantiating a module with the `Linker`). It's expected that usage of more-than-one `Engine` in an embedding is relatively rare since an `Engine` is intended to be a globally shared resource, so the expectation is that the impact of this issue is relatively small. The fix implemented is to change this behavior to `panic!()` in Rust instead of silently allowing it. Using different `Engine` instances with a `Linker` is a programmer bug that `wasmtime` catches at runtime. ### Patches This bug has been patched and users should upgrade to Wasmtime version 0.30.0. ### Workarounds If you cannot upgrade Wasmtime and are using more than one `Engine` in your embedding it's recommended to instead use only one `Engine` for the entire program if possible. An `Engine` is designed to be a globally shared resource that is suitable to have only one for the lifetime of an entire process. If using multiple `Engine`s is required then code should be audited to ensure that `Linker` is only used with one `Engine`. ### For more information If you have any questions or comments about this advisory: * Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime) * Open an issue in [the `bytecodealliance/wasmtime` repository](https://github.com/bytecodealliance/wasmtime/)
{'CVE-2021-39219'}
2022-04-19T19:03:08Z
2021-09-20T19:54:26Z
MODERATE
6.3
{'CWE-843'}
{'https://github.com/advisories/GHSA-q879-9g95-56mx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39219', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/', 'https://crates.io/crates/wasmtime', 'https://github.com/bytecodealliance/wasmtime/commit/b39f087414f27ae40c44449ed5d1154e03449bff', 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-q879-9g95-56mx', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/'}
null
GHSA
GHSA-9r5x-fjv3-q6h4
Incorrect Access Control in github.com/nats-io/jwt and github.com/nats-io/nats-server/v2
NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled.
{'CVE-2021-3127'}
2022-04-12T22:11:19Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-863', 'CWE-284'}
{'https://advisories.nats.io/CVE/CVE-2021-3127.txt', 'https://github.com/nats-io/jwt/pull/149/commits/a826c77dc9d2671c961b75ceefdb439c41029866', 'https://github.com/advisories/GHSA-9r5x-fjv3-q6h4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3127', 'https://github.com/nats-io/nats-server/commit/423b79440c80c863de9f4e20548504e6c5d5e403'}
null
GHSA
GHSA-x56p-c8cg-q435
Open Redirect in Next.js versions
### Impact - **Affected**: Users of Next.js between 9.5.0 and 9.5.3 - **Not affected**: Deployments on Vercel ([https://vercel.com](https://vercel.com)) are not affected - **Not affected**: Deployments using `next export` We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. ### Patches https://github.com/vercel/next.js/releases/tag/v9.5.4 ### References https://github.com/vercel/next.js/releases/tag/v9.5.4
{'CVE-2020-15242'}
2021-10-06T21:27:32Z
2020-10-08T19:28:07Z
MODERATE
4.7
{'CWE-601'}
{'https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15242', 'https://github.com/zeit/next.js/releases/tag/v9.5.4', 'https://github.com/advisories/GHSA-x56p-c8cg-q435'}
null
GHSA
GHSA-c65v-p733-9796
Cross-site Scripting in snipe/snipe-it
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3961'}
2021-11-23T18:17:33Z
2021-11-23T18:17:33Z
HIGH
8
{'CWE-79'}
{'https://github.com/advisories/GHSA-c65v-p733-9796', 'https://huntr.dev/bounties/5987aed5-6613-4937-8a3e-d48009b7da10', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3961', 'https://github.com/snipe/snipe-it/commit/7ce5993f5ae9d713a0955c2fd8e2dff7a7ce886e'}
null
GHSA
GHSA-q2qw-rmrh-vv42
Moderate severity vulnerability that affects activejob
A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have.
{'CVE-2018-16476'}
2021-06-10T21:20:30Z
2018-12-05T17:24:27Z
HIGH
7.5
{'CWE-502', 'CWE-284'}
{'https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/', 'https://github.com/advisories/GHSA-q2qw-rmrh-vv42', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16476', 'https://access.redhat.com/errata/RHSA-2019:0600', 'https://groups.google.com/d/msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ'}
null
GHSA
GHSA-jgpv-4h4c-xhw3
Uncontrolled Resource Consumption in pillow
### Impact _Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large._ ### Patches _An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._ ### Workarounds _An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._ ### References https://nvd.nist.gov/vuln/detail/CVE-2021-27921 ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)
null
2021-04-23T16:54:36Z
2021-04-23T16:54:36Z
MODERATE
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-jgpv-4h4c-xhw3', 'https://github.com/calix2/pyVulApp/security/advisories/GHSA-jgpv-4h4c-xhw3'}
null
GHSA
GHSA-qjfh-xc44-rm9x
Path Traversal in file-static-server
All versions of `file-static-server` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-28T17:06:42Z
2020-09-03T16:49:43Z
HIGH
0
{'CWE-22'}
{'https://hackerone.com/reports/310671', 'https://github.com/advisories/GHSA-qjfh-xc44-rm9x', 'https://www.npmjs.com/advisories/1008'}
null
GHSA
GHSA-78j3-7wpm-qhvp
Critical severity vulnerability that affects kelredd-pruview
kelredd-pruview gem 0.3.8 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument to (1) document.rb, (2) video.rb, or (3) video_image.rb.
{'CVE-2013-1947'}
2021-09-02T20:58:51Z
2017-10-24T18:33:37Z
CRITICAL
0
{'CWE-78'}
{'https://github.com/advisories/GHSA-78j3-7wpm-qhvp', 'http://www.openwall.com/lists/oss-security/2013/04/10/3', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1947', 'http://www.openwall.com/lists/oss-security/2013/04/12/2'}
null
GHSA
GHSA-5fq8-3q2f-4m5g
Session key exposure through session list in Django User Sessions
### Impact The views provided by django-user-sessions allow users to terminate specific sessions. The session key is used to identify sessions, and thus included in the rendered HTML. In itself this is not a problem. However if the website has an XSS vulnerability, the session key could be extracted by the attacker and a session takeover could happen. ### Patches Patch is under way. ### Workarounds Remove the session_key from the template. ### References _None._ ### For more information If you have any questions or comments about this advisory: * Open an issue in [Bouke/django-user-sessions](https://github.com/Bouke/django-user-sessions/issues) * Email us at [bouke@haarsma.eu](mailto:bouke@haarsma.eu)
{'CVE-2020-5224'}
2021-01-08T20:33:15Z
2020-01-24T19:56:59Z
LOW
6.5
{'CWE-287'}
{'https://github.com/advisories/GHSA-5fq8-3q2f-4m5g', 'https://github.com/jazzband/django-user-sessions/commit/f0c4077e7d1436ba6d721af85cee89222ca5d2d9', 'https://github.com/Bouke/django-user-sessions/security/advisories/GHSA-5fq8-3q2f-4m5g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5224'}
null
GHSA
GHSA-6r58-4xgr-gm6m
Access escalation for CMS users with limited access through permission cache pollution
In SilverStripe through 4.3.3, there is access escalation for CMS users with limited access through permission cache pollution.
{'CVE-2019-12617'}
2019-11-13T17:02:26Z
2019-11-12T23:01:59Z
MODERATE
0
null
{'https://www.silverstripe.org/blog/tag/release', 'https://forum.silverstripe.org/c/releases', 'https://github.com/advisories/GHSA-6r58-4xgr-gm6m', 'https://www.silverstripe.org/download/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12617', 'https://www.silverstripe.org/download/security-releases/CVE-2019-12617'}
null
GHSA
GHSA-6c3f-p5wp-34mh
OS Command Injection in async-git
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing it to one of the vulnerable functions as a workaround or update async-git to version 1.13.1.
{'CVE-2021-3190'}
2022-05-03T02:56:05Z
2021-01-29T18:14:00Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3190', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a', 'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://github.com/omrilotan/async-git/pull/13', 'https://advisory.checkmarx.net/advisory/CX-2021-4772', 'https://www.npmjs.com/package/async-git', 'https://github.com/omrilotan/async-git/pull/14', 'https://github.com/advisories/GHSA-6c3f-p5wp-34mh'}
null
GHSA
GHSA-cwg9-c9cr-p5fq
Improper Neutralization of Input in Theia console
In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected.
{'CVE-2021-28161'}
2021-04-13T15:18:53Z
2021-04-13T15:18:53Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-cwg9-c9cr-p5fq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28161', 'https://github.com/eclipse-theia/theia/issues/8794'}
null
GHSA
GHSA-8cr8-4vfw-mr7h
Round-trip instability in REXML
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
{'CVE-2021-28965'}
2021-06-01T17:23:48Z
2021-04-30T17:30:37Z
HIGH
0
{'CWE-611', 'CWE-115'}
{'https://github.com/ruby/rexml/commit/9b311e59ae05749e082eb6bbefa1cb620d1a786e', 'https://github.com/ruby/rexml/commit/3c137eb119550874b2b3e27d12b733ca67033377', 'https://github.com/ruby/rexml/commit/2fe62e29094d95921d7e19abbd2e26b23d78dc5b', 'https://github.com/ruby/rexml/commit/a659c63e37414506dfb0d4655e031bb7a2e73fc8', 'https://github.com/ruby/rexml/commit/f7bab8937513b1403cea5aff874cbf32fd5e8551', 'https://rubygems.org/gems/rexml', 'https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexml-cve-2021-28965/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28965', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTVFTLFVCSUE5CXHINJEUCKSHU4SWDMT/', 'https://security.netapp.com/advisory/ntap-20210528-0003/', 'https://hackerone.com/reports/1104077', 'https://github.com/ruby/rexml/commit/6a250d2cd1194c2be72becbdd9c3e770aa16e752', 'https://github.com/ruby/rexml/commit/f9d88e4948b4a43294c25dc0edb16815bd9d8618', 'https://github.com/advisories/GHSA-8cr8-4vfw-mr7h'}
null
GHSA
GHSA-q9x4-q76f-5h5j
Unauthenticated users can exploit an enumeration vulnerability in Harbor (CVE-2019-19030)
# Impact Sean Wright from Secureworks has discovered an enumeration vulnerability. An attacker can make use of the Harbor API to make unauthenticated calls to the Harbor instance. Based on the HTTP status code in the response, an attacker is then able to work out which resources exist, and which do not. This would likely be accomplished by either providing a wordlist or enumerating through a sequence an unauthenticated attacker is able to enumerate resources on the system. This provides them with information such as existing projects, repositories, etc. The vulnerability was immediately fixed by the Harbor team. # Issue The following API resources where found to be vulnerable to enumeration attacks: /api/chartrepo/{repo}/prov (POST) /api/chartrepo/{repo}/charts (GET, POST) /api/chartrepo/{repo}/charts/{name} (GET, DELETE) /api/chartrepo/{repo}/charts/{name}/{version} (GET, DELETE) /api/labels?name={name}&scope=p (GET) /api/repositories?project_id={id} (GET) /api/repositories/{repo_name}/ (GET, PUT, DELETE) /api/repositories/{repo_name}/tags (GET) /api/repositories/{repo_name}/tags/{tag}/manifest?version={version} (GET) /api/repositories/{repo_name/{tag}/labels (GET) /api/projects?project_name={name} (HEAD) /api/projects/{project_id}/summary (GET) /api/projects/{project_id}/logs (GET) /api/projects/{project_id} (GET, PUT, DELETE) /api/projects/{project_id}/metadatas (GET, POST) /api/projects/{project_id}/metadatas/{metadata_name} (GET, PUT) # Known Attack Vectors Successful exploitation of this issue will lead to bad actors identifying which resources exist in Harbor without requiring authentication for the Harbor API. # Patches If your product uses the affected releases of Harbor, update to version 1.10.3 or 2.0.1 to patch this issue immediately. https://github.com/goharbor/harbor/releases/tag/v1.10.3 https://github.com/goharbor/harbor/releases/tag/v2.0.1 # Workarounds There is no known workaround # For more information If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io View our security policy at https://github.com/goharbor/harbor/security/policy
{'CVE-2019-19030'}
2022-02-11T23:17:25Z
2022-02-11T23:17:25Z
LOW
0
null
{'https://github.com/advisories/GHSA-q9x4-q76f-5h5j', 'https://github.com/goharbor/harbor/security/advisories/GHSA-q9x4-q76f-5h5j'}
null
GHSA
GHSA-jjr8-m8g8-p6wv
Null pointer dereference in TFLite's `Reshape` operator
### Impact The fix for [CVE-2020-15209](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15209) missed the case when the target shape of `Reshape` operator is given by the elements of a 1-D tensor. As such, the [fix for the vulnerability](https://github.com/tensorflow/tensorflow/blob/9c1dc920d8ffb4893d6c9d27d1f039607b326743/tensorflow/lite/core/subgraph.cc#L1062-L1074) allowed passing a null-buffer-backed tensor with a 1D shape: ```cc if (tensor->data.raw == nullptr && tensor->bytes > 0) { if (registration.builtin_code == kTfLiteBuiltinReshape && i == 1) { // In general, having a tensor here with no buffer will be an error. // However, for the reshape operator, the second input tensor is only // used for the shape, not for the data. Thus, null buffer is ok. continue; } else { // In all other cases, we need to return an error as otherwise we will // trigger a null pointer dereference (likely). ReportError("Input tensor %d lacks data", tensor_index); return kTfLiteError; } } ``` ### Patches We have patched the issue in GitHub commit [f8378920345f4f4604202d4ab15ef64b2aceaa16](https://github.com/tensorflow/tensorflow/commit/f8378920345f4f4604202d4ab15ef64b2aceaa16). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29592'}
2021-05-21T14:26:58Z
2021-05-21T14:26:58Z
MODERATE
4.4
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jjr8-m8g8-p6wv', 'https://github.com/advisories/GHSA-jjr8-m8g8-p6wv', 'https://github.com/tensorflow/tensorflow/commit/f8378920345f4f4604202d4ab15ef64b2aceaa16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29592'}
null
GHSA
GHSA-f78g-q7r4-9wcv
Division by 0 in `FractionalAvgPool`
### Impact An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.FractionalAvgPool`: ```python import tensorflow as tf value = tf.constant([60], shape=[1, 1, 1, 1], dtype=tf.int32) pooling_ratio = [1.0, 1.0000014345305555, 1.0, 1.0] pseudo_random = False overlapping = False deterministic = False seed = 0 seed2 = 0 tf.raw_ops.FractionalAvgPool( value=value, pooling_ratio=pooling_ratio, pseudo_random=pseudo_random, overlapping=overlapping, deterministic=deterministic, seed=seed, seed2=seed2) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L85-L89) computes a divisor quantity by dividing two user controlled values: ```cc for (int i = 0; i < tensor_in_and_out_dims; ++i) { output_size[i] = static_cast<int>(std::floor(input_size[i] / pooling_ratio_[i])); DCHECK_GT(output_size[i], 0); } ``` The user controls the values of `input_size[i]` and `pooling_ratio_[i]` (via the `value.shape()` and `pooling_ratio` arguments). If the value in `input_size[i]` is smaller than the `pooling_ratio_[i]`, then the floor operation results in `output_size[i]` being 0. The `DCHECK_GT` line is a no-op outside of debug mode, so in released versions of TF this does not trigger. Later, these computed values [are used as arguments](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L96-L99) to [`GeneratePoolingSequence`](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_pool_common.cc#L100-L108). There, the first computation is a division in a modulo operation: ```cc std::vector<int64> GeneratePoolingSequence(int input_length, int output_length, GuardedPhiloxRandom* generator, bool pseudo_random) { ... if (input_length % output_length == 0) { diff = std::vector<int64>(output_length, input_length / output_length); } ... } ``` Since `output_length` can be 0, this results in runtime crashing. ### Patches We have patched the issue in GitHub commit [548b5eaf23685d86f722233d8fbc21d0a4aecb96](https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29550'}
2021-05-21T14:23:41Z
2021-05-21T14:23:41Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f78g-q7r4-9wcv', 'https://github.com/advisories/GHSA-f78g-q7r4-9wcv', 'https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29550'}
null
GHSA
GHSA-x3wr-v4wx-5qpc
Prototype Pollution
Prototype pollution vulnerability in ‘expand-hash’ versions 0.1.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25948'}
2021-10-21T13:56:15Z
2021-06-21T17:14:01Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/advisories/GHSA-x3wr-v4wx-5qpc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25948', 'https://github.com/doowb/expand-hash/blob/556913f6c2f05848110b5b8261cfc78e5ce3dc77/index.js#L19', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25948'}
null
GHSA
GHSA-rpxh-vg2x-526v
List of order ids, number, items total and token value exposed for unauthorized uses via new API
### Impact Part of the details (order ID, order number, items total, and token value) of all placed orders were exposed to unauthorized users. If exploited properly, a few additional information like the number of items in the cart and the date of the shipping may be fetched as well. This data seems to not be crucial nor is personal data, however, could be used for sociotechnical attacks or may expose a few details about shop condition to the third parties. The data possible to aggregate are the number of processed orders or their value in the moment of time. ### Patches The problem has been patched at Sylius 1.9.5 and 1.10.0 ### Workarounds There are a few ways to fix this without updating the code. The first possible solution is to hide the problematic endpoints behind the firewall from not logged in users. In order to achieve it one has to add the configuration in `config/packages/security.yaml`: ```yaml access_control: # ... - { path: "%sylius.security.new_api_shop_regex%/orders", role: IS_AUTHENTICATED_ANONYMOUSLY, methods: [POST] } - { path: "%sylius.security.new_api_shop_regex%/orders", role: ROLE_USER, methods: [GET] } ``` This would put only the order list under the firewall and allow only authorized users to access it. Once a user is authorized, it will have access to theirs orders only. The second possible solution is to decorate the `\Sylius\Bundle\ApiBundle\Doctrine\QueryCollectionExtension\OrdersByLoggedInUserExtension` and throw `Symfony\Component\Security\Core\Exception\AccessDeniedException` if the class is executed for unauthorized user.
{'CVE-2021-32720'}
2022-04-19T19:03:00Z
2021-06-29T03:12:04Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/advisories/GHSA-rpxh-vg2x-526v', 'https://github.com/Sylius/Sylius/commit/21d509851559230d03292b2a635a6951748c2758', 'https://packagist.org/packages/sylius/sylius', 'https://github.com/Sylius/Sylius/releases/tag/v1.9.5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32720', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-rpxh-vg2x-526v'}
null
GHSA
GHSA-w7q9-xr2x-wh7x
Moderate severity vulnerability that affects delayed_job_web
An exploitable cross site scripting (XSS) vulnerability exists in the filter functionality of the delayed_job_web rails gem version 1.4. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
{'CVE-2017-12097'}
2021-09-21T18:04:59Z
2018-03-05T19:06:00Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-w7q9-xr2x-wh7x', 'http://www.securityfocus.com/bid/102484', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12097', 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0449'}
null
GHSA
GHSA-r2wf-q3x4-hrv9
Default development error handler in Ratpack is vulnerable to HTML content injection (XSS)
Versions of Ratpack from 0.9.10 through 1.7.5 are vulnerable to [CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')](https://cwe.mitre.org/data/definitions/79.html) (aka. XSS) in the development error handler. An attacker can utilize this to perform XSS when an exception message contains untrusted data. As a simplistic example: ```java RatpackServer startedServer = RatpackServer.start(server -> { server.handlers(chain -> chain.all(ctx -> { // User supplied query parameter String message = ctx.getRequest().getQueryParams().get("message"); // User supplied data appended to the message in an exception throw new RuntimeException("An error occurred: " + message); })); }); ``` ### Impact - Cross-Site Scripting ### Patches This vulnerability has been patched in Ratpack version 1.7.6. ### Workarounds If you are unable to update your version of Ratpack, we recommend the following workarounds and mitigations. - Ensure that development mode is disabled in production. - Don't use real customer data (ie. untrusted user input) in development. ### References - [Ratpack development mode](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#development-boolean-) - [Code Patch - a3cbb13](https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3) ### For more information If you have any questions or comments about this advisory: - Open an issue in [ratpack/ratpack](https://github.com/ratpack/ratpack/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc) - Ask in our [Slack channel](https://slack-signup.ratpack.io/)
{'CVE-2019-10770'}
2022-04-19T19:02:47Z
2020-01-27T19:28:20Z
MODERATE
6.1
{'CWE-779'}
{'https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3', 'https://snyk.io/vuln/SNYK-JAVA-IORATPACK-534882', 'https://github.com/advisories/GHSA-r2wf-q3x4-hrv9', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-r2wf-q3x4-hrv9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10770'}
null
GHSA
GHSA-8796-gc9j-63rv
File upload local preview can run embedded scripts after user interaction
### Impact When uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file, but only after several user interactions to open the preview in a separate tab. This only impacts the local user while in the process of uploading. It cannot be exploited remotely or by other users. ### Patches This has been fixed by https://github.com/matrix-org/matrix-react-sdk/pull/5981, which is included in 3.21.0. ### Workarounds There are no known workarounds.
null
2022-04-19T19:02:57Z
2021-05-17T20:51:16Z
MODERATE
4.2
{'CWE-74'}
{'https://github.com/advisories/GHSA-8796-gc9j-63rv', 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-8796-gc9j-63rv'}
null
GHSA
GHSA-jrcf-4jp8-m28v
miow invalidly assumes the memory layout of std::net::SocketAddr
An issue was discovered in the miow crate before 0.3.6 for Rust. It has false expectations about the std::net::SocketAddr memory representation.
{'CVE-2020-35921'}
2021-08-25T20:50:35Z
2021-08-25T20:50:35Z
MODERATE
5.5
{'CWE-188'}
{'https://github.com/yoshuawuyts/miow/issues/38', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35921', 'https://rustsec.org/advisories/RUSTSEC-2020-0080.html', 'https://github.com/advisories/GHSA-jrcf-4jp8-m28v', 'https://github.com/yoshuawuyts/miow/pull/39'}
null
GHSA
GHSA-9697-98pf-4rw7
Heap OOB in `UpperBound` and `LowerBound`
### Impact An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.UpperBound`: ```python import tensorflow as tf tf.raw_ops.UpperBound( sorted_input=[1,2,3], values=tf.constant(value=[[0,0,0],[1,1,1],[2,2,2]],dtype=tf.int64), out_type=tf.int64) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/searchsorted_op.cc#L85-L104) does not validate the rank of `sorted_input` argument: ```cc void Compute(OpKernelContext* ctx) override { const Tensor& sorted_inputs_t = ctx->input(0); // ... OP_REQUIRES(ctx, sorted_inputs_t.dim_size(0) == values_t.dim_size(0), Status(error::INVALID_ARGUMENT, "Leading dim_size of both tensors must match.")); // ... if (output_t->dtype() == DT_INT32) { OP_REQUIRES(ctx, FastBoundsCheck(sorted_inputs_t.dim_size(1), ...)); // ... } ``` As we access the first two dimensions of `sorted_inputs_t` tensor, it must have rank at least 2. A similar issue occurs in `tf.raw_ops.LowerBound`. ### Patches We have patched the issue in GitHub commit [42459e4273c2e47a3232cc16c4f4fff3b3a35c38](https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37670'}
2021-08-25T14:41:44Z
2021-08-25T14:41:44Z
MODERATE
5.5
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/42459e4273c2e47a3232cc16c4f4fff3b3a35c38', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7', 'https://github.com/advisories/GHSA-9697-98pf-4rw7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37670'}
null
GHSA
GHSA-m25q-fwg4-9v2p
Malicious Package in awesome_react_utility
Version 1.0.2 of `awesome_react_utility` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T16:36:58Z
2020-09-01T19:47:07Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-m25q-fwg4-9v2p', 'https://github.com/kooinam/awesome_react_utility', 'https://www.npmjs.com/advisories/618'}
null
GHSA
GHSA-f8pv-x7h8-687v
Cross-site scripting in feehicms
Insufficient filtering of the tag parameters in feehicms 0.1.3 allows attackers to execute arbitrary web or HTML via a crafted payload.
{'CVE-2020-19709'}
2021-09-02T18:50:43Z
2021-08-30T16:22:25Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/liufee/feehicms/issues/2', 'https://github.com/advisories/GHSA-f8pv-x7h8-687v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19709'}
null
GHSA
GHSA-qfh2-6f7q-gr86
Cross-Site Scripting in sexstatic
All versions of `sexstatic` are vulnerable to stored cross-site scripting (xss). This is exploitable if an attacker can control a filename that is served by `sexstatic`. ## Recommendation As there is no fix is currently available for this vulnerability it is our recommendation to not install or used this module at this time.
{'CVE-2018-3755'}
2021-01-08T18:15:59Z
2018-10-01T16:30:38Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-qfh2-6f7q-gr86', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3755', 'https://www.npmjs.com/advisories/671', 'https://hackerone.com/reports/328210'}
null
GHSA
GHSA-cm8g-544f-p9x9
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_collation has a use-after-free.
{'CVE-2021-45716'}
2022-01-07T16:13:53Z
2022-01-06T22:03:16Z
HIGH
7.5
{'CWE-416'}
{'https://github.com/advisories/GHSA-cm8g-544f-p9x9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45716', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
null
GHSA
GHSA-g982-9r8g-6qxw
Ciborg gem for Ruby allows local users to write files and gain privileges via Symlink
chef/travis-cookbooks/ci_environment/perlbrew/recipes/default.rb in the ciborg gem 3.0.0 for Ruby allows local users to write to arbitrary files and gain privileges via a symlink attack on /tmp/perlbrew-installer.
{'CVE-2014-5003'}
2022-04-26T18:16:50Z
2018-07-23T19:50:15Z
MODERATE
5.5
{'CWE-20'}
{'http://www.vapid.dhs.org/advisories/ciborg-3.0.0.html', 'http://www.openwall.com/lists/oss-security/2014/07/07/24', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5003', 'http://www.openwall.com/lists/oss-security/2014/07/17/5', 'https://github.com/advisories/GHSA-g982-9r8g-6qxw'}
null
GHSA
GHSA-wx69-rvg3-x7fc
XSS via prototype pollution in NodeBB
### Impact A prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report. ### Patches The vulnerability has been patched as of v1.18.5. ### Workarounds Cherry-pick commit hash 1783f918bc19568f421473824461ff2ed7755e4c to receive this patch in lieu of a full upgrade. ### For more information If you have any questions or comments about this advisory: * Email us at [security@nodebb.org](mailto:security@nodebb.org)
{'CVE-2021-43787'}
2022-04-19T19:03:13Z
2021-11-30T22:21:01Z
CRITICAL
9
{'CWE-79'}
{'https://github.com/advisories/GHSA-wx69-rvg3-x7fc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43787', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-wx69-rvg3-x7fc'}
null
GHSA
GHSA-rgfv-v3jh-7ffp
Prototype Pollution in deeps
All versions of package deeps up to and including version 1.4.5 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7716'}
2021-07-29T21:17:13Z
2021-05-06T18:11:52Z
CRITICAL
9.8
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-DEEPS-598667', 'https://github.com/advisories/GHSA-rgfv-v3jh-7ffp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7716'}
null
GHSA
GHSA-cv25-3gmg-c6m8
Injection in UserFrosting
In Userfrosting, versions v0.3.1 to v4.6.2 are vulnerable to Host Header Injection. By luring a victim application user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
{'CVE-2021-25994'}
2022-01-14T19:42:48Z
2022-01-06T22:22:32Z
HIGH
8.8
{'CWE-74'}
{'https://github.com/userfrosting/UserFrosting/commit/796dd78757902435d1bd286415feea78098e45ba', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25994', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25994', 'https://github.com/advisories/GHSA-cv25-3gmg-c6m8'}
null
GHSA
GHSA-5qw5-89mw-wcg2
Out of bounds write in Tensorflow
### Impact TensorFlow is vulnerable to a heap OOB write in [Grappler](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141): ```cc Status SetUnknownShape(const NodeDef* node, int output_port) { shape_inference::ShapeHandle shape = GetUnknownOutputShape(node, output_port); InferenceContext* ctx = GetContext(node); if (ctx == nullptr) { return errors::InvalidArgument("Missing context"); } ctx->set_output(output_port, shape); return Status::OK(); } ``` The [`set_output`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.h#L394) function writes to an array at the specified index: ```cc void set_output(int idx, ShapeHandle shape) { outputs_.at(idx) = shape; } ``` Hence, this gives a malicious user a write primitive. ### Patches We have patched the issue in GitHub commit [97282c6d0d34476b6ba033f961590b783fa184cd](https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23566'}
2022-02-11T20:48:39Z
2022-02-09T23:55:43Z
HIGH
8.8
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.h#L394', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23566', 'https://github.com/advisories/GHSA-5qw5-89mw-wcg2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5qw5-89mw-wcg2', 'https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd'}
null
GHSA
GHSA-whcm-29f4-j4mx
Directory Traversal in zwserver
Affected versions of `zwserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16149'}
2021-01-14T15:53:50Z
2020-09-01T16:56:50Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-whcm-29f4-j4mx', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16149', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/zwserver', 'https://nodesecurity.io/advisories/372', 'https://www.npmjs.com/advisories/372'}
null
GHSA
GHSA-674v-3g2w-84gx
Sandbox bypass in fenom
In fenom 2.12.1 and before, there is a way in fenom/src/Fenom/Template.php function getTemplateCode()to bypass sandbox to execute arbitrary PHP code when disable_native_funcs is true.
{'CVE-2021-46433'}
2022-04-05T21:19:59Z
2022-03-29T00:01:15Z
CRITICAL
10
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-46433', 'https://github.com/advisories/GHSA-674v-3g2w-84gx', 'https://github.com/fenom-template/fenom/issues/331'}
null
GHSA
GHSA-43hg-g44q-474q
Cross Site Scripting (XSS) in XWiki
XWiki 12.10.2 allows XSS via an SVG document to the upload feature of the comment section.
{'CVE-2021-3137'}
2021-01-29T18:13:03Z
2021-01-29T18:13:03Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3137', 'https://github.com/advisories/GHSA-43hg-g44q-474q', 'https://www.exploit-db.com/exploits/49437'}
null
GHSA
GHSA-r6mv-ppjc-4hgr
PHP file inclusion via insert tags
### Impact It is possible for untrusted users to load arbitrary PHP files via insert tags. Installations are only affected if there are untrusted back end users. ### Patches Update to Contao 4.4.56, 4.9.18 or 4.11.7. ### Workarounds Disable the login for untrusted back end users. ### References https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
{'CVE-2021-37626'}
2022-04-19T19:03:05Z
2021-08-23T19:41:04Z
MODERATE
6.7
{'CWE-94'}
{'https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37626', 'https://github.com/advisories/GHSA-r6mv-ppjc-4hgr', 'https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html'}
null
GHSA
GHSA-6x4w-8w53-xrvv
XXE in Apache Standard Taglibs
Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) <x:parse> or (2) <x:transform> JSTL XML tag.
{'CVE-2015-0254'}
2021-07-22T22:16:25Z
2020-09-14T18:44:01Z
HIGH
0
{'CWE-611'}
{'https://lists.apache.org/thread.html/8a20e48acb2a40be5130df91cf9d39d8ad93181989413d4abcaa4914@%3Cdev.tomcat.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2016-1839.html', 'http://rhn.redhat.com/errata/RHSA-2016-1838.html', 'http://rhn.redhat.com/errata/RHSA-2016-1841.html', 'https://github.com/advisories/GHSA-6x4w-8w53-xrvv', 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00033.html', 'http://rhn.redhat.com/errata/RHSA-2016-1840.html', 'https://lists.apache.org/thread.html/rfc2bfd99c340dafd501676693cd889c1f9f838b97bdd0776a8f5557d@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0254', 'https://lists.apache.org/thread.html/rf1179e6971bc46f0f68879a9a10cc97ad4424451b0889aeef04c8077@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r6c93d8ade3788dbc00f5a37238bc278e7d859f2446b885460783a16f@%3Cpluto-dev.portals.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/tomcat-taglibs-user/201502.mbox/%3C82207A16-6348-4DEE-877E-F7B87292576A%40apache.org%3E', 'http://www.ubuntu.com/usn/USN-2551-1', 'http://www.securitytracker.com/id/1034934', 'http://www.securityfocus.com/bid/72809', 'https://lists.apache.org/thread.html/rc1686f6196bb9063bf26577a21b8033c19c1a30e5a9159869c8f3d38@%3Cpluto-dev.portals.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'http://packetstormsecurity.com/files/130575/Apache-Standard-Taglibs-1.2.1-XXE-Remote-Command-Execution.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2016:1376', 'https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@%3Cdev.tomcat.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2015-1695.html', 'http://www.securityfocus.com/archive/1/534772/100/0/threaded', 'https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@%3Cdev.tomcat.apache.org%3E'}
null
GHSA
GHSA-w83x-fp72-p9qc
Command Injection in geojson2kml
All versions up to and including version 0.1.1 of package geojson2kml are vulnerable to Command Injection via the index.js file. PoC: var a =require("geojson2kml"); a("./","& touch JHU",function(){})
{'CVE-2020-28429'}
2021-05-10T15:59:33Z
2021-05-10T15:59:33Z
CRITICAL
9.8
{'CWE-77'}
{'https://github.com/advisories/GHSA-w83x-fp72-p9qc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28429', 'https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412'}
null
GHSA
GHSA-4m3p-x2hp-2pgx
Malicious Package in bitcroe-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:44:12Z
2020-09-04T16:45:23Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1371', 'https://github.com/advisories/GHSA-4m3p-x2hp-2pgx'}
null
GHSA
GHSA-84p7-fh9c-6g8h
Prototype Pollution in mixme
### Impact When copying properties from a source object to a target object, the target object can gain access to certain properties of the source object and modify their content. ### Patches The problem was patch with a more agressive discovery of secured properties to filter out.
null
2021-09-20T19:52:24Z
2021-09-20T19:52:24Z
HIGH
0
{'CWE-1321'}
{'https://github.com/advisories/GHSA-79jw-6wg7-r9g4', 'https://github.com/adaltas/node-mixme/issues/2', 'https://github.com/advisories/GHSA-84p7-fh9c-6g8h', 'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-84p7-fh9c-6g8h', 'https://github.com/adaltas/node-mixme/issues/1'}
null
GHSA
GHSA-r2mj-8wgq-73m6
XML External Entity Reference in Glances
The package glances before 3.2.1 are vulnerable to XML External Entity (XXE) Injection via the use of Fault to parse untrusted XML data, which is known to be vulnerable to XML attacks.
{'CVE-2021-23418'}
2021-08-31T21:14:37Z
2021-08-09T20:43:14Z
MODERATE
6.3
{'CWE-611'}
{'https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807', 'https://github.com/nicolargo/glances/issues/1025', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23418', 'https://github.com/advisories/GHSA-r2mj-8wgq-73m6', 'https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94', 'https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a', 'https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32'}
null
GHSA
GHSA-c2jg-hw38-jrqq
Inconsistent Interpretation of HTTP Requests in twisted.web
The Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230: 1. The Content-Length header value could have a `+` or `-` prefix. 2. Illegal characters were permitted in chunked extensions, such as the LF (`\n`) character. 3. Chunk lengths, which are expressed in hexadecimal format, could have a prefix of `0x`. 4. HTTP headers were stripped of all leading and trailing ASCII whitespace, rather than only space and HTAB (`\t`). This non-conformant parsing can lead to desync if requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling. ### Impact You may be affected if: 1. You use Twisted Web's HTTP 1.1 server and/or proxy 2. You also pass requests through a different HTTP server and/or proxy The specifics of the other HTTP parser matter. The original report notes that some versions of Apache Traffic Server and HAProxy have been vulnerable in the past. HTTP request smuggling may be a serious concern if you use a proxy to perform request validation or access control. The Twisted Web client is not affected. The HTTP 2.0 server uses a different parser, so it is not affected. ### Patches The issue has been addressed in Twisted 22.4.0rc1 and later. ### Workarounds Other than upgrading Twisted, you could: * Ensure any vulnerabilities in upstream proxies have been addressed, such as by upgrading them * Filter malformed requests by other means, such as configuration of an upstream proxy ### Credits This issue was initially reported by [Zhang Zeyu](https://github.com/zeyu2001).
{'CVE-2022-24801'}
2022-05-04T03:49:00Z
2022-04-04T21:29:41Z
HIGH
8.1
{'CWE-444'}
{'https://lists.debian.org/debian-lts-announce/2022/05/msg00003.html', 'https://github.com/twisted/twisted/releases/tag/twisted-22.4.0rc1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24801', 'https://github.com/advisories/GHSA-c2jg-hw38-jrqq', 'https://github.com/twisted/twisted/security/advisories/GHSA-c2jg-hw38-jrqq', 'https://github.com/twisted/twisted/commit/592217e951363d60e9cd99c5bbfd23d4615043ac'}
null
GHSA
GHSA-8rxg-9g6f-vq9p
Malicious Package in another-date-range-picker
Version 4.1.48 of `another-date-range-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 4.1.48 of this module is found installed you will want to replace it with a version before or after 4.1.48. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T16:18:51Z
2020-09-01T19:46:01Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/bi-a/mydaterangepicker', 'https://www.npmjs.com/advisories/617', 'https://github.com/advisories/GHSA-8rxg-9g6f-vq9p', 'https://github.com/kekeh/mydaterangepicker', 'https://snyk.io/vuln/SNYK-JS-ANOTHERDATERANGEPICKER-451011'}
null
GHSA
GHSA-xm6j-x342-gwq9
Unpublished files are exposed publicly
In the Versioned Files module through 2.0.3 for SilverStripe 3.x, unpublished versions of files are publicly exposed to anyone who can guess their URL. This guess could be highly informed by a basic understanding of the symbiote/silverstripe-versionedfiles source code. (Users who upgrade from SilverStripe 3.x to 4.x and had Versioned Files installed have no further need for this module, because the 4.x release has built-in versioning. However, nothing in the upgrade process automates the destruction of these insecure artefacts, nor alerts the user to the criticality of destruction.)
{'CVE-2019-16409'}
2021-07-27T22:02:46Z
2019-11-12T23:01:05Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/silverstripe/silverstripe-framework', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16409', 'https://github.com/advisories/GHSA-xm6j-x342-gwq9', 'https://www.silverstripe.org/download/security-releases/cve-2019-16409', 'https://github.com/symbiote/silverstripe-versionedfiles'}
null
GHSA
GHSA-7553-jr98-vx47
libxml as used in Nokogiri has an infinite loop in a certain end-of-file situation
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation. The Nokogiri RubyGem has patched its vendored copy of libxml2 in order to prevent this issue from affecting nokogiri.
{'CVE-2020-7595'}
2022-04-22T17:29:45Z
2020-02-24T19:12:36Z
HIGH
7.5
{'CWE-835'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://usn.ubuntu.com/4274-1/', 'https://github.com/advisories/GHSA-7553-jr98-vx47', 'https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076', 'https://security.netapp.com/advisory/ntap-20200702-0005/', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/', 'https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf', 'https://security.gentoo.org/glsa/202010-04', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7595', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/', 'https://github.com/sparklemotion/nokogiri/issues/1992', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html', 'https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08'}
null
GHSA
GHSA-2m9w-9xh2-wxc3
Link Following in Jenkins Pipeline Multibranch Plugin
Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.
{'CVE-2022-25179'}
2022-02-26T00:55:53Z
2022-02-16T00:01:33Z
MODERATE
6.5
{'CWE-59'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25179', 'https://github.com/advisories/GHSA-2m9w-9xh2-wxc3', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613'}
null
GHSA
GHSA-r9w6-rhh9-7v53
Incorrect Authorization in HashiCorp Consul
HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3.
{'CVE-2020-7955'}
2021-07-28T17:57:57Z
2021-07-28T17:57:57Z
MODERATE
5.3
{'CWE-863'}
{'https://github.com/advisories/GHSA-r9w6-rhh9-7v53', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7955', 'https://github.com/hashicorp/consul/issues/7160', 'https://www.hashicorp.com/blog/category/consul/'}
null
GHSA
GHSA-65f3-3278-7m65
Improper Authorization in Gogs
### Impact Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected. ### Patches Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.13.0+dev. ### Workarounds In addition to marking PAM accounts as expired, also disable/lock them. Running `usermod -L <username>` will add an exclamation mark to the password hash and would result in wrong passwords responses when trying to login. ### References https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62/ ### For more information If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6810.
{'CVE-2022-0871'}
2022-03-29T19:10:32Z
2022-03-12T00:00:34Z
HIGH
8.2
{'CWE-863', 'CWE-285'}
{'https://github.com/advisories/GHSA-65f3-3278-7m65', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0871', 'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78', 'https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62'}
null
GHSA
GHSA-2p25-55c9-h58q
Overflow/crash in `tf.tile` when tiling tensor is large
### Impact If `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. ```python import tensorflow as tf import numpy as np tf.keras.backend.tile(x=np.ones((1,1,1)), n=[100000000,100000000, 100000000]) ``` The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. ### Patches We have patched the issue in GitHub commit [9294094df6fea79271778eb7e7ae1bad8b5ef98f](https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f) (merging [#51138](https://github.com/tensorflow/tensorflow/pull/51138)). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46911).
{'CVE-2021-41198'}
2021-11-10T19:33:58Z
2021-11-10T19:33:58Z
MODERATE
5.5
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q', 'https://github.com/advisories/GHSA-2p25-55c9-h58q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41198', 'https://github.com/tensorflow/tensorflow/issues/46911'}
null
GHSA
GHSA-3ccq-5vw3-2p6x
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39149](https://x-stream.github.io/CVE-2021-39149.html). ### Credits Lai Han of NSFOCUS security team found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39149'}
2022-04-22T15:43:13Z
2021-08-25T14:47:28Z
HIGH
8.5
{'CWE-434', 'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://x-stream.github.io/CVE-2021-39149.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://github.com/advisories/GHSA-3ccq-5vw3-2p6x', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39149', 'https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-xvcg-2q82-r87j
Panic mishandled in libpulse-binding
An issue was discovered in the libpulse-binding crate before 2.6.0 for Rust. It mishandles a panic that crosses a Foreign Function Interface (FFI) boundary.
{'CVE-2019-25055'}
2022-01-07T16:25:12Z
2022-01-06T22:18:19Z
HIGH
7.5
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-25055', 'https://rustsec.org/advisories/RUSTSEC-2019-0038.html', 'https://github.com/advisories/GHSA-xvcg-2q82-r87j', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/libpulse-binding/RUSTSEC-2019-0038.md'}
null
GHSA
GHSA-h23m-w6x5-jwr4
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0923'}
2021-03-29T21:00:08Z
2021-03-29T21:00:08Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0923', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0923', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/advisories/GHSA-h23m-w6x5-jwr4'}
null
GHSA
GHSA-p6xc-xr62-6r2g
Improper Input Validation and Uncontrolled Recursion in Apache Log4j2
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3. # Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.
{'CVE-2021-45105'}
2022-04-26T20:58:03Z
2021-12-18T18:00:07Z
HIGH
8.6
{'CWE-20', 'CWE-674'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'http://www.openwall.com/lists/oss-security/2021/12/19/1', 'https://logging.apache.org/log4j/2.x/security.html', 'https://www.debian.org/security/2021/dsa-5024', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/', 'https://github.com/advisories/GHSA-p6xc-xr62-6r2g', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.zerodayinitiative.com/advisories/ZDI-21-1541/', 'https://security.netapp.com/advisory/ntap-20211218-0001/', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html', 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf', 'https://www.kb.cert.org/vuls/id/930724', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45105', 'https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd'}
null