ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-mw6q-98mp-g8g8
|
Cross-site Scripting in bootstrap-table
|
This affects all versions of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
|
{'CVE-2021-23472'}
|
2021-11-30T14:51:27Z
|
2021-11-08T17:54:46Z
|
LOW
| 3.1
|
{'CWE-79', 'CWE-843'}
|
{'https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23472', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690', 'https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597', 'https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688', 'https://github.com/advisories/GHSA-mw6q-98mp-g8g8'}
| null |
GHSA
|
GHSA-gff3-739c-gxfq
|
Reflected cross-site scripting issue in Datasette
|
Datasette is an open source multi-tool for exploring and publishing data. The `?_trace=1` debugging feature in Datasette does not correctly escape generated HTML, resulting in a [reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) vulnerability. This vulnerability is particularly relevant if your Datasette installation includes authenticated features using plugins such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords) as an attacker could use the vulnerability to access protected data. Datasette 0.57 and 0.56.1 both include patches for this issue. If you run Datasette behind a proxy you can workaround this issue by rejecting any incoming requests with `?_trace=` or `&_trace=` in their query string parameters.
|
{'CVE-2021-32670'}
|
2021-06-10T17:22:59Z
|
2021-06-10T17:22:59Z
|
HIGH
| 7.2
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-gff3-739c-gxfq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32670', 'https://datasette.io/plugins/datasette-auth-passwords', 'https://github.com/simonw/datasette/issues/1360', 'https://github.com/simonw/datasette/security/advisories/GHSA-xw7c-jx9m-xh5g', 'https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks', 'https://pypi.org/project/datasette/'}
| null |
GHSA
|
GHSA-2frx-j9hj-6c65
|
User enumeration in authentication mechanisms
|
Description
-----------
The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not.
Resolution
----------
We now ensure that a generic message is returned whether the user exists or not if the password is invalid or if the user does not exist.
The patch for this issue is available [here](https://github.com/lexik/LexikJWTAuthenticationBundle/commit/a175d6dab968d93e96a3e4f80c495435f71d5eb7) for branch 2.10.x and 2.x.
Credits
-------
I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue.
| null |
2022-04-19T19:02:57Z
|
2021-05-17T20:52:21Z
|
LOW
| 0
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-2frx-j9hj-6c65', 'https://github.com/lexik/LexikJWTAuthenticationBundle/commit/a175d6dab968d93e96a3e4f80c495435f71d5eb7', 'https://github.com/lexik/LexikJWTAuthenticationBundle/security/advisories/GHSA-2frx-j9hj-6c65'}
| null |
GHSA
|
GHSA-xcqr-9h24-vrgw
|
Improper Restriction of Excessive Authentication Attempts in Argo API
|
As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.
|
{'CVE-2020-8827'}
|
2021-07-26T21:19:37Z
|
2021-07-26T21:19:37Z
|
HIGH
| 7.5
|
{'CWE-307'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8827', 'https://github.com/argoproj/argo-cd/pull/3404', 'https://argoproj.github.io/argo-cd/security_considerations/', 'https://github.com/advisories/GHSA-xcqr-9h24-vrgw', 'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1', 'https://github.com/argoproj/argo-cd/pull/3369', 'https://www.soluble.ai/blog/argo-cves-2020', 'https://github.com/argoproj/argo/releases', 'https://argoproj.github.io/argo-cd/operator-manual/user-management/#disable-admin-user'}
| null |
GHSA
|
GHSA-qvxv-pmq9-4q7g
|
High severity vulnerability that affects org.scala-lang:scala-compiler
|
The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges.
|
{'CVE-2017-15288'}
|
2021-09-16T21:08:27Z
|
2018-10-19T16:51:11Z
|
HIGH
| 7.8
|
{'CWE-732'}
|
{'http://scala-lang.org/news/security-update-nov17.html', 'https://lists.apache.org/thread.html/r10dd8e5b3bbe3bb531aa4a65472ce56f91efbb77ea9fe04bb8272e2c@%3Cjira.kafka.apache.org%3E', 'https://github.com/scala/scala/pull/6128', 'https://lists.apache.org/thread.html/r18a05115cfa078c0f4e5c1ea2e8d64804f63e0095aa2174a3afecc0f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r32e0b1d5ff43ac3ed4b179a4e663022d1c5ccac77884a99ea149e633@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r628ea3ea2fed4d9c1c5232a0b1ed108a15abc9fd2f0aaca1e8cc9164@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r33665e9213cc6df1e48c3d99d1b0c7a3203e9bd0ef4fc4ba838bcb04@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re72f4d04dfc398aae0e38dbfeccf44780df2782623a610cbfcec6f3a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15288', 'https://security.gentoo.org/glsa/201812-08', 'https://github.com/scala/scala/pull/6108', 'https://github.com/scala/scala/pull/6120', 'https://lists.apache.org/thread.html/r5a1418a4f5101f5af3fc14bf358c54f2c7200e6a3701de2e2f581e1b@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3f10022ec972c8df29a950d1a591c16562eeddd9194d3010e46b9b76@%3Cjira.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-qvxv-pmq9-4q7g', 'https://lists.apache.org/thread.html/r1d51eae81ceb7bfd1780936a48b460ab31d53ff2ed526a88a7f60fe4@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf57e4d7211b30e51803911304f3b7b54393f7a4bd60bb0784c31eec1@%3Cjira.kafka.apache.org%3E'}
| null |
GHSA
|
GHSA-9j2c-x8qm-qmjq
|
SQL injection in Tortoise ORM
|
### Impact
Various forms of SQL injection has been found, for MySQL and when filtering or doing mass-updates on char/text fields.
SQLite & PostgreSQL was only affected when filtering with ``contains``, ``starts_with`` or ``ends_with`` filters (and their case-insensitive counterparts)
### Patches
Please upgrade to 0.15.23+ or 0.16.6+
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Github](https://github.com/tortoise/tortoise-orm/issues)
* Chat to us on [Gitter](https://gitter.im/tortoise/community)
|
{'CVE-2020-11010'}
|
2021-01-08T20:21:41Z
|
2020-04-20T21:31:23Z
|
MODERATE
| 6.3
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11010', 'https://github.com/tortoise/tortoise-orm/commit/91c364053e0ddf77edc5442914c6f049512678b3', 'https://github.com/advisories/GHSA-9j2c-x8qm-qmjq', 'https://github.com/tortoise/tortoise-orm/security/advisories/GHSA-9j2c-x8qm-qmjq'}
| null |
GHSA
|
GHSA-vcw4-8ph6-7vw8
|
Use after free in Rocket
|
An issue was discovered in the rocket crate before 0.4.7 for Rust. uri::Formatter can have a use-after-free if a user-provided function panics.
|
{'CVE-2021-29935'}
|
2021-08-25T20:54:20Z
|
2021-08-25T20:54:20Z
|
HIGH
| 7.3
|
{'CWE-416'}
|
{'https://rustsec.org/advisories/RUSTSEC-2021-0044.html', 'https://github.com/advisories/GHSA-vcw4-8ph6-7vw8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29935', 'https://github.com/SergioBenitez/Rocket/issues/1534'}
| null |
GHSA
|
GHSA-4whq-r978-2x68
|
Arbitrary code execution in ExifTool
|
### Impact
Arbitrary code execution can occur when running `exiftool` against files with hostile metadata payloads.
### Patches
ExifTool has already been patched in version 12.24. exiftool-vendored, which vendors ExifTool, includes this patch in v14.3.0.
### Workarounds
No.
### References
https://twitter.com/wcbowling/status/1385803927321415687
https://nvd.nist.gov/vuln/detail/CVE-2021-22204
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [exiftool-vendored](https://github.com/photostructure/exiftool-vendored.js)
| null |
2022-04-19T19:02:56Z
|
2021-05-04T17:43:52Z
|
HIGH
| 7.8
|
{'CWE-74'}
|
{'https://github.com/advisories/GHSA-4whq-r978-2x68', 'https://github.com/photostructure/exiftool-vendored.js/security/advisories/GHSA-4whq-r978-2x68'}
| null |
GHSA
|
GHSA-v6wh-2wvh-c8x5
|
Regular Expression Denial of Service in djvalidator
|
All versions of package djvalidator are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails - for example, --@------------------------------------------------------------------------------------------------------------------------!.
|
{'CVE-2020-7779'}
|
2022-02-09T23:15:52Z
|
2022-02-09T23:15:46Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-DJVALIDATOR-1018709', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7779', 'https://github.com/advisories/GHSA-v6wh-2wvh-c8x5'}
| null |
GHSA
|
GHSA-8q5c-93vg-c747
|
WITHDRAWN
|
WITHDRAWN
| null |
2021-08-25T21:00:30Z
|
2021-08-25T21:00:30Z
|
MODERATE
| 0
|
{'CWE-362'}
|
{'https://github.com/ratel-rust/toolshed/issues/12', 'https://github.com/advisories/GHSA-8q5c-93vg-c747', 'https://rustsec.org/advisories/RUSTSEC-2020-0136.html'}
| null |
GHSA
|
GHSA-vc5r-xfc4-4x22
|
Cross-site Scripting in Pimcore Datahub
|
Pimcore Datahub prior to 1.2.4 is vulnerable to stored cross-site scripting. An admin user accessing Datahub triggers the attack, which may result in the user's cookie being stolen.
|
{'CVE-2022-0955'}
|
2022-04-05T20:53:20Z
|
2022-03-25T00:00:33Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0955', 'https://github.com/advisories/GHSA-vc5r-xfc4-4x22', 'https://github.com/pimcore/data-hub/commit/15d5b57af2466eebd3bbc531ead5dafa35d0a36e', 'https://huntr.dev/bounties/708971a6-1e6c-4c51-a411-255caeba51df'}
| null |
GHSA
|
GHSA-xp5m-4c9f-498q
|
Moderate severity vulnerability that affects django-epiceditor
|
There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field.
|
{'CVE-2017-6591'}
|
2021-09-22T14:59:43Z
|
2018-07-13T15:17:18Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-xp5m-4c9f-498q', 'https://nvd.nist.gov/vuln/detail/CVE-2017-6591', 'http://morningchen.com/2017/03/09/Cross-site-scripting-vulnerability-in-django-epiceditor/', 'http://www.securityfocus.com/bid/96946'}
| null |
GHSA
|
GHSA-pwfw-mgfj-7g3g
|
Low severity vulnerability that affects ecdsa
|
## possible DoS in signature verification and signature malleability
### Impact
Code using `VerifyingKey.verify()` and `VerifyingKey.verify_digest()` may receive exceptions other than the documented `BadSignatureError` when signatures are malformed. If those other exceptions are not caught, they may lead to program termination and thus Denial of Service
Code using `VerifyingKey.verify()` and `VerifyingKey.verify_digest()` with `sigdecode` option using `ecdsa.util.sigdecode_der` will accept signatures even if they are not properly formatted DER. This makes the signatures malleable. It impacts only applications that later sign the signatures or verify signatures of signatures, e.g. Bitcoin.
All versions between 0.5 and 0.13.2 (inclusive) are thought to be vulnerable. Code before 0.5 may be vulnerable but didn't receive extended analysis to rule this issue out.
### Patches
The patches have been merged to `master` branch in https://github.com/warner/python-ecdsa/pull/115.
The backported patches for a release in the 0.13 branch are in https://github.com/warner/python-ecdsa/pull/124
They are part of the 0.13.3 release.
There are no plans to backport them to earlier releases.
### Workarounds
It may be possible to prevent the Denial of Service by catching also `UnexpectedDER`, `IndexError` and `AssertionError` exceptions. That list hasn't been verified to be complete though. If those exceptions are raised, the signature verification process should consider the signature to be invalid.
To remediate signature malleability and the Denial of Service vulnerability, it may be possible to first verify that the signature is properly DER formatted ECDSA-Sig-Value, as defined in [RFC3279](https://tools.ietf.org/html/rfc3279), before passing it to `verify()` or `verify_digest()` methods. If the signature is determined to not follow the DER or encode a different structure, the signature verification process should consider the signature to be invalid.
### References
https://en.bitcoinwiki.org/wiki/Transaction_Malleability
### For more information
If you have any questions or comments about this advisory please open an issue in [python-ecdsa](https://github.com/warner/python-ecdsa/issues) project.
|
{'CVE-2019-14853'}
|
2021-08-30T14:39:55Z
|
2019-10-08T16:30:17Z
|
HIGH
| 7.5
|
{'CWE-391', 'CWE-755'}
|
{'https://github.com/advisories/GHSA-pwfw-mgfj-7g3g', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14853', 'https://github.com/warner/python-ecdsa/security/advisories/GHSA-pwfw-mgfj-7g3g'}
| null |
GHSA
|
GHSA-5phf-pp7p-vc2r
|
Using default SSLContext for HTTPS requests in an HTTPS proxy doesn't verify certificate hostname for proxy connection
|
### Impact
Users who are using an HTTPS proxy to issue HTTPS requests and haven't configured their own SSLContext via `proxy_config`.
Only the default SSLContext is impacted.
### Patches
[urllib3 >=1.26.4 has the issue resolved](https://github.com/urllib3/urllib3/releases/tag/1.26.4). urllib3<1.26 is not impacted due to not supporting HTTPS requests via HTTPS proxies.
### Workarounds
Upgrading is recommended as this is a minor release and not likely to break current usage.
Configuring an `SSLContext` with `check_hostname=True` and passing via `proxy_config` instead of relying on the default `SSLContext`
### For more information
If you have any questions or comments about this advisory:
* Email us at [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)
|
{'CVE-2021-28363'}
|
2022-04-19T19:02:50Z
|
2021-03-19T19:42:11Z
|
MODERATE
| 6.5
|
{'CWE-295'}
|
{'https://security.gentoo.org/glsa/202107-36', 'https://pypi.org/project/urllib3/1.26.4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4S65ZQVZ2ODGB52IC7VJDBUK4M5INCXL/', 'https://github.com/urllib3/urllib3/commit/8d65ea1ecf6e2cdc27d42124e587c1b83a3118b0', 'https://github.com/advisories/GHSA-5phf-pp7p-vc2r', 'https://github.com/urllib3/urllib3/releases/tag/1.26.4', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/urllib3/urllib3/commits/main', 'https://github.com/urllib3/urllib3/blob/main/CHANGES.rst#1264-2021-03-15', 'https://github.com/pypa/advisory-db/tree/main/vulns/urllib3/PYSEC-2021-59.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28363', 'https://github.com/urllib3/urllib3/security/advisories/GHSA-5phf-pp7p-vc2r'}
| null |
GHSA
|
GHSA-vpmw-77vm-4mjg
|
Cross-site Scripting in Cipi
|
Cipi 3.1.15 allows Add Server stored cross-site scripting via the /api/servers name field.
|
{'CVE-2022-26332'}
|
2022-03-11T23:24:35Z
|
2022-03-02T00:00:21Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://www.exploit-db.com/exploits/50788', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26332', 'https://github.com/andreapollastri/cipi/releases', 'https://github.com/advisories/GHSA-vpmw-77vm-4mjg'}
| null |
GHSA
|
GHSA-5rrq-pxf6-6jx5
|
Prototype Pollution in node-forge debug API.
|
### Impact
The `forge.debug` API had a potential prototype pollution issue if called with untrusted input. The API was only used for internal debug purposes in a safe way and never documented or advertised. It is suspected that uses of this API, if any exist, would likely not have used untrusted inputs in a vulnerable way.
### Patches
The `forge.debug` API and related functions were removed in 1.0.0.
### Workarounds
Don't use the `forge.debug` API directly or indirectly with untrusted input.
### References
- https://www.huntr.dev/bounties/1-npm-node-forge/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge).
* Email us at support@digitalbazaar.com.
| null |
2022-01-08T00:22:42Z
|
2022-01-08T00:22:42Z
|
LOW
| 0
|
{'CWE-1321'}
|
{'https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5', 'https://github.com/advisories/GHSA-5rrq-pxf6-6jx5'}
| null |
GHSA
|
GHSA-xpxm-pf7g-2534
|
Cross-site scripting in media2click
|
The media2click (aka 2 Clicks for External Media) extension 1.x before 1.3.3 for TYPO3 allows XSS by a backend user account.
|
{'CVE-2021-31778'}
|
2021-06-08T20:11:52Z
|
2021-06-08T20:11:52Z
|
MODERATE
| 6.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-xpxm-pf7g-2534', 'https://github.com/ghermens/media2click/commit/3c4e413fbc7d35c47212e754c24d5070637a11a3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31778', 'https://packagist.org/packages/amazing/media2click', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-004'}
| null |
GHSA
|
GHSA-cfh5-3ghh-wfjx
|
Moderate severity vulnerability that affects org.apache.httpcomponents:httpclient
|
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
|
{'CVE-2014-3577'}
|
2021-10-08T20:35:21Z
|
2018-10-17T00:05:06Z
|
MODERATE
| 0
|
{'CWE-347'}
|
{'http://www.osvdb.org/110143', 'https://github.com/advisories/GHSA-cfh5-3ghh-wfjx', 'http://rhn.redhat.com/errata/RHSA-2015-0675.html', 'http://www.securitytracker.com/id/1030812', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/95327', 'http://rhn.redhat.com/errata/RHSA-2014-1834.html', 'http://rhn.redhat.com/errata/RHSA-2014-1892.html', 'http://rhn.redhat.com/errata/RHSA-2015-0125.html', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'http://secunia.com/advisories/60589', 'http://rhn.redhat.com/errata/RHSA-2014-1146.html', 'http://seclists.org/fulldisclosure/2014/Aug/48', 'http://rhn.redhat.com/errata/RHSA-2015-0720.html', 'http://rhn.redhat.com/errata/RHSA-2015-0850.html', 'http://rhn.redhat.com/errata/RHSA-2015-1177.html', 'http://rhn.redhat.com/errata/RHSA-2014-1166.html', 'http://rhn.redhat.com/errata/RHSA-2015-0851.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3577', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://secunia.com/advisories/60466', 'http://www.ubuntu.com/usn/USN-2769-1', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'http://www.securityfocus.com/bid/69258', 'http://rhn.redhat.com/errata/RHSA-2014-1891.html', 'http://rhn.redhat.com/errata/RHSA-2014-1835.html', 'http://rhn.redhat.com/errata/RHSA-2016-1773.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05363782', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2014-1833.html', 'http://rhn.redhat.com/errata/RHSA-2014-1836.html', 'http://rhn.redhat.com/errata/RHSA-2016-1931.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html', 'http://rhn.redhat.com/errata/RHSA-2015-1888.html', 'http://packetstormsecurity.com/files/127913/Apache-HttpComponents-Man-In-The-Middle.html', 'http://rhn.redhat.com/errata/RHSA-2015-0765.html', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'http://secunia.com/advisories/60713', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564', 'http://rhn.redhat.com/errata/RHSA-2015-1176.html', 'http://www.openwall.com/lists/oss-security/2021/10/06/1', 'http://rhn.redhat.com/errata/RHSA-2015-0158.html', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://access.redhat.com/solutions/1165533', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}
| null |
GHSA
|
GHSA-8v38-pw62-9cw2
|
Incorrect returned href via an '@' sign but no user info and hostname
|
A specially crafted URL with an '@' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular,
`````
parse(\"http://@/127.0.0.1\")
`````
Will return:
`````
{
slashes: true,
protocol: 'http:',
hash: '',
query: '',
pathname: '/127.0.0.1',
auth: '',
host: '',
port: '',
hostname: '',
password: '',
username: '',
origin: 'null',
href: 'http:///127.0.0.1'
}
`````
If the 'hostname' or 'origin' attributes of the output from url-parse are used in security decisions and the final 'href' attribute of the output is then used to make a request, the decision may be incorrect.
|
{'CVE-2022-0639'}
|
2022-04-19T19:03:27Z
|
2022-02-18T00:00:33Z
|
MODERATE
| 6.5
|
{'CWE-639'}
|
{'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788', 'https://github.com/advisories/GHSA-8v38-pw62-9cw2', 'https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0639'}
| null |
GHSA
|
GHSA-7257-96vg-qf6x
|
Remote Code Execution in Red Discord Bot
|
### Impact
A RCE exploit has been discovered in the Streams module: this exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.
### Patches
This critical exploit has been fixed on version ``3.3.12`` & ``3.4``.
### Workarounds
Unloading the Streams module with ``unload streams`` can render this exploit not accessible. We still highly recommend updating to ``3.3.12`` or ``3.4`` to completely patch this issue.
### References
* https://github.com/Cog-Creators/Red-DiscordBot/pull/4183
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot)
* Over on our [Discord server](https://discord.gg/red)
|
{'CVE-2020-15147'}
|
2022-04-19T19:02:33Z
|
2020-08-21T17:03:24Z
|
HIGH
| 8.5
|
{'CWE-94', 'CWE-74'}
|
{'https://github.com/advisories/GHSA-7257-96vg-qf6x', 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-7257-96vg-qf6x', 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4183/commits/e269ea0d3bc88417163c18431b1df38a9be92bfc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15147', 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4183'}
| null |
GHSA
|
GHSA-mx9v-gmh4-mgqw
|
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
|
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.
|
{'CVE-2018-19361'}
|
2021-06-10T22:10:26Z
|
2019-01-04T19:07:01Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4452', 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://github.com/FasterXML/jackson-databind/issues/2186', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://github.com/advisories/GHSA-mx9v-gmh4-mgqw', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://issues.apache.org/jira/browse/TINKERPOP-2121', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1782', 'http://www.securityfocus.com/bid/107985', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19361'}
| null |
GHSA
|
GHSA-48hw-37g6-3gw4
|
Malicious Package in mx-nested-menu
|
Version 0.1.30 of `mx-nested-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-03T02:35:41Z
|
2020-09-03T02:35:41Z
|
CRITICAL
| 0
| null |
{'https://github.com/advisories/GHSA-48hw-37g6-3gw4', 'https://www.npmjs.com/advisories/947'}
| null |
GHSA
|
GHSA-4cww-f7w5-x525
|
Stack consumption in trust-dns-server
|
An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption.
|
{'CVE-2020-35857'}
|
2021-08-25T20:46:13Z
|
2021-08-25T20:46:13Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35857', 'https://github.com/bluejekyll/trust-dns/issues/980', 'https://github.com/advisories/GHSA-4cww-f7w5-x525', 'https://rustsec.org/advisories/RUSTSEC-2020-0001.html'}
| null |
GHSA
|
GHSA-fhpf-pp6p-55qc
|
Unsafe handling of user-specified cookies in treq
|
### Impact
Treq's request methods (`treq.get`, `treq.post`, `HTTPClient.request`, `HTTPClient.get`, etc.) accept cookies as a dictionary, for example:
```py
treq.get('https://example.com/', cookies={'session': '1234'})
```
Such cookies are not bound to a single domain, and are therefore sent to *every* domain ("supercookies"). This can potentially cause sensitive information to leak upon an HTTP redirect to a different domain., e.g. should `https://example.com` redirect to `http://cloudstorageprovider.com` the latter will receive the cookie `session`.
### Patches
Treq 2021.1.0 and later bind cookies given to request methods (`treq.request`, `treq.get`, `HTTPClient.request`, `HTTPClient.get`, etc.) to the origin of the *url* parameter.
### Workarounds
Instead of passing a dictionary as the *cookies* argument, pass a `http.cookiejar.CookieJar` instance with properly domain- and scheme-scoped cookies in it:
```py
from http.cookiejar import CookieJar
from requests.cookies import create_cookie
jar = CookieJar()
jar.add_cookie(
create_cookie(
name='session',
value='1234',
domain='example.com',
secure=True,
),
)
client = HTTPClient(cookies=jar)
client.get('https://example.com/')
```
### References
* Originally reported at [huntr.dev](https://huntr.dev/bounties/3c9204fc-a3d1-4441-8599-924c5f57e7ae/?token=06d930e37046c914bcb037e85cc227dc7b510b475989fc69837566562ba899277d46b0fb4b1e21cdcb6ddc1b7d9b1ded632cf3a3551ecb89afca16a63b34641284b50479d5195bba2ac09b116f3dd4fad27f54404c2de922c05c8c8b744aec27bb4d4d198cb8b3abf479af0c2d5fbaa10412da7922594ac3eb39)
* A related issue in the handling of HTTP basic authentication was addressed in Twisted 22.1 ([GHSA-92x2-jw7w-xvvx](https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx), CVE-2022-21712).
|
{'CVE-2022-23607'}
|
2022-03-25T19:28:28Z
|
2022-02-01T00:43:38Z
|
MODERATE
| 6.5
|
{'CWE-200', 'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23607', 'https://huntr.dev/bounties/3c9204fc-a3d1-4441-8599-924c5f57e7ae/?token=06d930e37046c914bcb037e85cc227dc7b510b475989fc69837566562ba899277d46b0fb4b1e21cdcb6ddc1b7d9b1ded632cf3a3551ecb89afca16a63b34641284b50479d5195bba2ac09b116f3dd4fad27f54404c2de922c05c8c8b744aec27bb4d4d198cb8b3abf479af0c2d5fbaa10412da7922594ac3eb39', 'https://github.com/twisted/treq/releases/tag/release-22.1.0', 'https://github.com/advisories/GHSA-fhpf-pp6p-55qc', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00025.html', 'https://github.com/twisted/treq/commit/1da6022cc880bbcff59321abe02bf8498b89efb2', 'https://github.com/twisted/treq/security/advisories/GHSA-fhpf-pp6p-55qc'}
| null |
GHSA
|
GHSA-7wpw-2hjm-89gp
|
Prototype Pollution in merge
|
All versions of package merge <2.1.1 are vulnerable to Prototype Pollution via _recursiveMerge .
|
{'CVE-2020-28499'}
|
2021-05-18T21:54:59Z
|
2021-05-04T20:18:47Z
|
HIGH
| 7.3
|
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JS-MERGE-1042987', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049', 'https://vuldb.com/?id.170146', 'https://github.com/yeikos/js.merge/blob/master/src/index.ts%23L64', 'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4', 'https://github.com/advisories/GHSA-7wpw-2hjm-89gp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28499', 'https://github.com/yeikos/js.merge/blob/56ca75b2dd0f2820f1e08a49f62f04bbfb8c5f8f/src/index.ts#L64'}
| null |
GHSA
|
GHSA-wjm3-fq3r-5x46
|
Denial of service
|
GJSON <1.6.5 allows attackers to cause a denial of service (remote) via crafted JSON.
|
{'CVE-2020-36066'}
|
2021-05-18T21:07:54Z
|
2021-05-18T21:07:54Z
|
MODERATE
| 7.5
|
{'CWE-400'}
|
{'https://github.com/tidwall/match/commit/c2f534168b739a7ec1821a33839fb2f029f26bbc', 'https://github.com/advisories/GHSA-wjm3-fq3r-5x46', 'https://github.com/tidwall/gjson/issues/195', 'https://github.com/tidwall/gjson/issues/195#issuecomment-755303148', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36066'}
| null |
GHSA
|
GHSA-wjpc-cgvw-xx23
|
Prototype Pollution in sey
|
All versions of package `sey` are vulnerable to Prototype Pollution via the deepmerge() function.
|
{'CVE-2021-23663'}
|
2021-12-16T14:29:34Z
|
2021-12-16T14:29:34Z
|
MODERATE
| 6.5
|
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23663', 'https://snyk.io/vuln/SNYK-JS-SEY-1727592', 'https://github.com/advisories/GHSA-wjpc-cgvw-xx23'}
| null |
GHSA
|
GHSA-772p-x54p-hjrv
|
Division by zero in `Conv3D`
|
### Impact
A malicious user could trigger a division by 0 in `Conv3D` implementation:
```python
import tensorflow as tf
input_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32)
filter_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32)
tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 56, 56, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 23, 1])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/42033603003965bffac51ae171b51801565e002d/tensorflow/core/kernels/conv_ops_3d.cc#L143-L145) does a modulo operation based on user controlled input:
```cc
const int64 out_depth = filter.dim_size(4);
OP_REQUIRES(context, in_depth % filter_depth == 0, ...);
```
Thus, when `filter` has a 0 as the fifth element, this results in a division by 0.
Additionally, if the shape of the two tensors is not valid, an Eigen assertion can be triggered, resulting in a program crash:
```python
import tensorflow as tf
input_tensor = tf.constant([], shape=[2, 2, 2, 2, 0], dtype=tf.float32)
filter_tensor = tf.constant([], shape=[0, 0, 2, 6, 2], dtype=tf.float32)
tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 39, 34, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 1, 1])
```
The shape of the two tensors must follow the constraints specified in the [op description](https://www.tensorflow.org/api_docs/python/tf/raw_ops/Conv3D).
### Patches
We have patched the issue in GitHub commit [799f835a3dfa00a4d852defa29b15841eea9d64f](https://github.com/tensorflow/tensorflow/commit/799f835a3dfa00a4d852defa29b15841eea9d64f).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29517'}
|
2021-05-21T14:21:01Z
|
2021-05-21T14:21:01Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/commit/799f835a3dfa00a4d852defa29b15841eea9d64f', 'https://github.com/advisories/GHSA-772p-x54p-hjrv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29517', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772p-x54p-hjrv'}
| null |
GHSA
|
GHSA-pv55-r6j3-wp94
|
Malicious Package in eslint-config-eslint
|
Version 5.0.2 of `eslint-config-eslint` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to a remote server.
## Recommendation
The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
| null |
2020-09-01T20:45:57Z
|
2020-09-01T20:45:57Z
|
CRITICAL
| 0
| null |
{'https://github.com/advisories/GHSA-pv55-r6j3-wp94', 'https://www.npmjs.com/advisories/674'}
| null |
GHSA
|
GHSA-p463-639r-q9g9
|
High severity vulnerability that affects dragonfly
|
The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request.
|
{'CVE-2013-1756'}
|
2021-09-15T21:29:21Z
|
2017-10-24T18:33:37Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'http://secunia.com/advisories/52380', 'https://groups.google.com/forum/?fromgroups=#!topic/dragonfly-users/3c3WIU3VQTo', 'https://github.com/advisories/GHSA-p463-639r-q9g9', 'http://www.securityfocus.com/bid/58225', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1756', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82476', 'https://github.com/markevans/dragonfly/commit/a8775aacf9e5c81cf11bec34b7afa7f27ddfe277'}
| null |
GHSA
|
GHSA-6956-83fg-5wc5
|
Prototype Pollution in set-in
|
The package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)
|
{'CVE-2022-25354'}
|
2022-03-29T21:05:16Z
|
2022-03-18T00:01:11Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24', 'https://github.com/ahdinosaur/set-in/blob/dfc226d95cce8129de6708661e06e0c2c06f3490/index.js%23L5', 'https://github.com/advisories/GHSA-6956-83fg-5wc5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25354', 'https://snyk.io/vuln/SNYK-JS-SETIN-2388571'}
| null |
GHSA
|
GHSA-p63h-7hw8-5cw4
|
Cross-Site Request Forgery in OpenNMS Horizon
|
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection, and since there is no validation of an existing user name while renaming a user. As a result, privileges of the renamed user are being overwritten by the old user and the old user is being deleted from the user list.
|
{'CVE-2021-25930'}
|
2021-05-28T22:25:42Z
|
2021-05-25T18:46:49Z
|
MODERATE
| 4.3
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-p63h-7hw8-5cw4', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25930', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25930'}
| null |
GHSA
|
GHSA-p9f8-gqjf-m75j
|
Uncontrolled Resource Consumption in fastify-multipart
|
Prototype pollution vulnerability in `fastify-multipart` < 1.0.5 allows an attacker to crash fastify applications parsing multipart requests by sending a specially crafted request.
|
{'CVE-2020-8136'}
|
2021-05-26T20:05:48Z
|
2021-05-06T17:28:36Z
|
MODERATE
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-p9f8-gqjf-m75j', 'https://hackerone.com/reports/804772', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8136'}
| null |
GHSA
|
GHSA-3rx2-x6mx-grj3
|
Cross-site scripting in Apache JSPWiki
|
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
|
{'CVE-2019-10089'}
|
2021-08-17T22:35:56Z
|
2019-10-11T18:41:54Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-3rx2-x6mx-grj3', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10089'}
| null |
GHSA
|
GHSA-3r9x-mjrm-2725
|
Prototype pollution vulnerability in 'libnested'
|
Prototype pollution vulnerability in 'libnested' versions 0.0.0 through 1.5.0 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2020-28283'}
|
2021-10-12T16:27:02Z
|
2021-10-12T16:27:02Z
|
CRITICAL
| 9.8
| null |
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28284', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28283', 'https://github.com/advisories/GHSA-3r9x-mjrm-2725', 'https://github.com/dominictarr/libnested/blob/d028a1b0f2e5f16fc28e568f52b936ae0bca0647/index.js#L27'}
| null |
GHSA
|
GHSA-w9mp-p2wp-2xf7
|
Improper file downloads in Apache Tapestry
|
In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run.
|
{'CVE-2020-13953'}
|
2022-02-10T20:35:42Z
|
2022-02-10T20:35:42Z
|
MODERATE
| 5.3
|
{'CWE-552'}
|
{'https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb@%3Cusers.tapestry.apache.org%3E', 'https://github.com/advisories/GHSA-w9mp-p2wp-2xf7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13953', 'https://lists.apache.org/thread.html/r50eb12e8a12074a9b7ed63cbab91d180d19cc23dc1da3ed5b6e1280f%40%3Cusers.tapestry.apache.org%3E'}
| null |
GHSA
|
GHSA-cxmj-qjv6-vx9p
|
Low severity vulnerability that affects mcstatic
|
A server directory traversal vulnerability was found on node module mcstatic <=0.0.20 that would allow an attack to access sensitive information in the file system by appending slashes in the URL path.
|
{'CVE-2018-16482'}
|
2021-01-08T18:55:25Z
|
2019-02-07T18:15:44Z
|
LOW
| 0
|
{'CWE-22'}
|
{'https://hackerone.com/reports/330285', 'https://github.com/advisories/GHSA-cxmj-qjv6-vx9p', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16482'}
| null |
GHSA
|
GHSA-9gp7-jvm2-r4mx
|
Moderate severity vulnerability that affects org.apache.struts:struts2-core
|
If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12.
|
{'CVE-2017-7672'}
|
2021-09-07T21:36:01Z
|
2018-10-16T19:36:43Z
|
MODERATE
| 5.9
|
{'CWE-20'}
|
{'http://www.securityfocus.com/bid/99563', 'https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d@%3Cannouncements.struts.apache.org%3E', 'http://struts.apache.org/docs/s2-047.html', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7672', 'https://security.netapp.com/advisory/ntap-20180706-0002/', 'https://github.com/advisories/GHSA-9gp7-jvm2-r4mx', 'http://www.securitytracker.com/id/1039114'}
| null |
GHSA
|
GHSA-rqp5-pg7w-832p
|
Code Injection in datagrid
|
The datagrid gem 1.0.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party.
|
{'CVE-2019-14281'}
|
2021-08-17T20:22:55Z
|
2019-07-31T04:21:27Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-14281', 'https://rubygems.org/gems/datagrid/versions', 'https://github.com/rubygems/rubygems.org/issues/2072', 'https://github.com/advisories/GHSA-rqp5-pg7w-832p'}
| null |
GHSA
|
GHSA-j39c-c8hj-x4j3
|
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
|
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
|
{'CVE-2021-25122'}
|
2022-02-08T21:34:10Z
|
2021-06-16T17:45:29Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25122', 'http://www.openwall.com/lists/oss-security/2021/03/01/1', 'https://security.netapp.com/advisory/ntap-20210409-0002/', 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4891', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-j39c-c8hj-x4j3', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-mrq4-7ch7-2465
|
Server Side Twig Template Injection
|
PrestaShop is an Open Source e-commerce platform. Starting with version 1.7.0.0 and ending with version 1.7.8.3, an attacker is able to inject twig code inside the back office when using the legacy layout. The problem is fixed in version 1.7.8.3. There are no known workarounds.
|
{'CVE-2022-21686'}
|
2022-04-19T19:03:20Z
|
2022-01-27T18:32:47Z
|
CRITICAL
| 9
|
{'CWE-94'}
|
{'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21686', 'https://github.com/PrestaShop/PrestaShop/commit/d02b469ec365822e6a9f017e57f588966248bf21', 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-mrq4-7ch7-2465', 'https://github.com/advisories/GHSA-mrq4-7ch7-2465'}
| null |
GHSA
|
GHSA-wgfq-7857-4jcc
|
Uncontrolled Resource Consumption in json-bigint
|
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
|
{'CVE-2020-8237'}
|
2021-05-07T16:47:19Z
|
2021-05-07T16:47:19Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-wgfq-7857-4jcc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8237', 'https://hackerone.com/reports/916430'}
| null |
GHSA
|
GHSA-rw98-5846-pqhx
|
Open redirect in microweber
|
Open Redirect in Packagist microweber/microweber prior to 1.2.11.
|
{'CVE-2022-0597'}
|
2022-02-24T13:56:27Z
|
2022-02-16T00:01:45Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://huntr.dev/bounties/68c22eab-cc69-4e9f-bcb6-2df3db626813', 'https://github.com/microweber/microweber/commit/acfc6a581d1ea86096d1b0ecd8a0eec927c0e9b2', 'https://github.com/advisories/GHSA-rw98-5846-pqhx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0597'}
| null |
GHSA
|
GHSA-cr3x-7m39-c6jq
|
Potential remote code execution of user-provided local names in ActionView
|
The is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.
|
{'CVE-2020-8163'}
|
2021-01-07T23:47:59Z
|
2020-07-07T16:34:27Z
|
MODERATE
| 0
|
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-cr3x-7m39-c6jq', 'https://hackerone.com/reports/304805', 'https://groups.google.com/forum/#!topic/rubyonrails-security/hWuKcHyoKh0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8163', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8163.yml', 'https://groups.google.com/g/rubyonrails-security/c/hWuKcHyoKh0', 'http://packetstormsecurity.com/files/158604/Ruby-On-Rails-5.0.1-Remote-Code-Execution.html'}
| null |
GHSA
|
GHSA-8v99-48m9-c8pm
|
Incorrect Authorization in imgcrypt
|
Imgcrypt implements a function `CheckAuthorization()` that is supposed to check whether a user is authorized to access an encrypted image given the keys that the user has provided on the command line that would enable decryption of the image. The check is to prevent that a user can start a container from an image that has previously been decrypted by another user on the same system and therefore a decrypted version of the image layers may be already available in the cache locally.
The failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. In the version prior to the fix, only the first architecture in the list was tested, which may not have its layers available locally (were not pulled) since it cannot be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run lead to other architectures in the ManifestList be able to run an image without providing keys if that image had previously been decrypted. The fixed version now skips over irrelevant architectures and tests the Manifest of the local architecture, if available.
Known projects that use the `CheckAuthorization()` of imgcrypt is for example the ctr-enc client tool provided by imgcrypt. In this implementation, the call to `CheckAuthorization()` is used on the client side and could therefore also be easily circumvented by a modified client tool not calling this function.
In relation to the vulnerability in ctr-enc, affected environments would have to allow different users to invoke ctr-enc indirectly using some sort of management stack that gives user indirect access to ctr-enc.
The patch has been applied to imgcrypt v1.1.4. Workarounds may include usage of different namespaces for each remote user.
|
{'CVE-2022-24778'}
|
2022-04-13T03:57:34Z
|
2022-03-28T19:33:44Z
|
HIGH
| 7.5
|
{'CWE-863'}
|
{'https://github.com/containerd/imgcrypt/releases/tag/v1.1.4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24778', 'https://github.com/containerd/imgcrypt/security/advisories/GHSA-8v99-48m9-c8pm', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFTJR5CR5EOYDVOSBZEMLBHLJRTPJPUA/', 'https://github.com/containerd/imgcrypt/issues/69', 'https://github.com/containerd/imgcrypt/commit/6fdd9818a4d8142107b7ecd767d839c9707700d9', 'https://github.com/advisories/GHSA-8v99-48m9-c8pm', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAHAAOOA3KZJC2I5WHCR3XVBJBNWTWUE/'}
| null |
GHSA
|
GHSA-qm58-cvvm-c5qr
|
Unsafe upload filtering leading to remote code execution
|
### Impact
Before elFinder 2.1.58, the upload filter did not disallow the upload of `.phar` files. As several Linux distributions are now shipping Apache configured in a way it will process these files as PHP scripts, attackers could gain arbitrary code execution on the server hosting the PHP connector (even in minimal configuration).
### Patches
The issue has been addressed with https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1, associating `.phar` files to the right MIME type. Unless explicitly allowed in the configuration, such files cannot be uploaded anymore. This patch is part of the last release of elFinder, 2.1.58.
### Workarounds
If you can't update to 2.1.58, make sure your connector is not exposed without authentication.
### Important tips
Server-side scripts can often be created as text files. Currently, elFinder has an appropriate MIME type set for file extensions that are generally runnable on a web server.
However, the server has various settings. In some cases, the executable file may be judged as "text/plain". Therefore, elFinder installers should understand the extensions that can be executed on the web server where elFinder is installed, and check if there are any missing items in the elFinder settings.
The elFinder PHP connector has an option "additionalMimeMap" that specifies the MIME type for each extension. See [#3295(comment)](https://github.com/Studio-42/elFinder/issues/3295#issuecomment-853042139) for more information.
### References
- https://snyk.io/vuln/composer:studio-42%2Felfinder
- https://github.com/Studio-42/elFinder/issues/3295
- Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time.
### For more information
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to support [at] snyk.io or vulnerability.research [at] sonarsource.com;
- The maintainers, by opening an issue on this repository.
|
{'CVE-2021-23394'}
|
2022-04-19T19:02:59Z
|
2021-06-15T15:51:02Z
|
HIGH
| 8.1
|
{'CWE-434'}
|
{'https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23394', 'https://github.com/advisories/GHSA-qm58-cvvm-c5qr', 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr', 'https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1', 'https://github.com/Studio-42/elFinder', 'https://github.com/Studio-42/elFinder/issues/3295'}
| null |
GHSA
|
GHSA-qx2f-477c-35rq
|
Regular Expression Denial of Service in method-override
|
Affected versions of `method-override` are vulnerable to a regular expression denial of service vulnerability when untrusted user input is passed into the `X-HTTP-Method-Override` header.
## Recommendation
Update to version 2.3.10 or later
|
{'CVE-2017-16136'}
|
2021-01-08T01:58:18Z
|
2018-07-24T20:06:04Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-qx2f-477c-35rq', 'https://www.npmjs.com/advisories/538', 'https://nodesecurity.io/advisories/538', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16136'}
| null |
GHSA
|
GHSA-hwh3-fhf6-73x9
|
Malicious Package in bictoinjs-lib
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:38:21Z
|
2020-09-04T15:36:09Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-hwh3-fhf6-73x9', 'https://www.npmjs.com/advisories/1356'}
| null |
GHSA
|
GHSA-4xcv-9jjx-gfj3
|
Denial of Service in mem
|
Versions of `mem` prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its `maxAge` property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging.
## Recommendation
Upgrade to version 4.0.0 or later.
| null |
2021-08-17T15:44:45Z
|
2019-07-05T21:07:58Z
|
MODERATE
| 5.1
|
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/1084', 'https://github.com/advisories/GHSA-4xcv-9jjx-gfj3', 'https://bugzilla.redhat.com/show_bug.cgi?id=1623744', 'https://snyk.io/vuln/npm:mem:20180117', 'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'}
| null |
GHSA
|
GHSA-j8f4-2w4p-mhjc
|
Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc
|
A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.
|
{'CVE-2017-0256'}
|
2021-07-01T21:44:55Z
|
2018-10-16T19:57:48Z
|
MODERATE
| 5.3
|
{'CWE-20'}
|
{'https://github.com/aspnet/Announcements/issues/239', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0256', 'https://github.com/advisories/GHSA-j8f4-2w4p-mhjc'}
| null |
GHSA
|
GHSA-9pv8-q5rx-c8gq
|
Critical severity vulnerability that affects django_make_app
|
An exploitable vulnerability exists in the YAML parsing functionality in the read_yaml_file method in io_utils.py in django_make_app 0.1.3. A YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.
|
{'CVE-2017-16764'}
|
2021-09-08T20:21:23Z
|
2018-07-13T15:16:59Z
|
CRITICAL
| 9.8
| null |
{'https://github.com/advisories/GHSA-9pv8-q5rx-c8gq', 'https://github.com/illagrenan/django-make-app/issues/5', 'https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16764-vulnerability-in-django-make-app/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16764'}
| null |
GHSA
|
GHSA-qvrv-2x7x-78x2
|
Reflected XSS in SilverStripe
|
SilverStripe through 4.4.x before 4.4.5 and 4.5.x before 4.5.2 allows Reflected XSS on the login form and custom forms. Silverstripe Forms allow malicious HTML or JavaScript to be inserted through non-scalar FormField attributes, which allows performing XSS (Cross-Site Scripting) on some forms built with user input (Request data). This can lead to phishing attempts to obtain a user&#39;s credentials or other sensitive user input.
|
{'CVE-2019-19325'}
|
2021-08-19T17:22:37Z
|
2020-02-24T17:33:31Z
|
MODERATE
| 6.1
|
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-qvrv-2x7x-78x2', 'https://www.silverstripe.org/download/security-releases/cve-2019-19325', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19325', 'https://github.com/silverstripe/silverstripe-framework/commit/49fda52b12ba59f0a04bcabf78425586a8779e89'}
| null |
GHSA
|
GHSA-8gc6-65mm-xr6r
|
Malicious Package in bp66
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:44:27Z
|
2020-09-04T16:46:28Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-8gc6-65mm-xr6r', 'https://www.npmjs.com/advisories/1372'}
| null |
GHSA
|
GHSA-c6fh-56w7-fvjw
|
Integer overflow in Tensorflow
|
### Impact
The [implementation of shape inference for `Dequantize`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034) is vulnerable to an integer overflow weakness:
```python
import tensorflow as tf
input = tf.constant([1,1],dtype=tf.qint32)
@tf.function
def test():
y = tf.raw_ops.Dequantize(
input=input,
min_range=[1.0],
max_range=[10.0],
mode='MIN_COMBINED',
narrow_range=False,
axis=2**31-1,
dtype=tf.bfloat16)
return y
test()
```
The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked, and, since the code computes `axis + 1`, an attacker can trigger an integer overflow:
```cc
int axis = -1;
Status s = c->GetAttr("axis", &axis);
// ...
if (axis < -1) {
return errors::InvalidArgument("axis should be at least -1, got ",
axis);
}
// ...
if (axis != -1) {
ShapeHandle input;
TF_RETURN_IF_ERROR(c->WithRankAtLeast(c->input(0), axis + 1, &input));
// ...
}
```
### Patches
We have patched the issue in GitHub commit [b64638ec5ccaa77b7c1eb90958e3d85ce381f91b](https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
|
{'CVE-2022-21727'}
|
2022-02-10T00:16:34Z
|
2022-02-09T18:29:13Z
|
HIGH
| 7.6
|
{'CWE-190'}
|
{'https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c6fh-56w7-fvjw', 'https://github.com/advisories/GHSA-c6fh-56w7-fvjw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21727'}
| null |
GHSA
|
GHSA-grh7-935j-hg6w
|
Cross-site Scripting in Sidekiq
|
Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used.
|
{'CVE-2021-30151'}
|
2022-03-11T21:27:31Z
|
2021-10-06T17:47:17Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-grh7-935j-hg6w', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30151', 'https://github.com/mperham/sidekiq/commit/64f70339d1dcf50a55c00d36bfdb61d97ec63ed8', 'https://github.com/mperham/sidekiq/issues/4852'}
| null |
GHSA
|
GHSA-rc4q-9m69-gqp8
|
Lack of protection against cookie tossing attacks in fastify-csrf
|
### Impact
Users that used fastify-csrf with the "double submit" mechanism using cookies with an application deployed across multiple subdomains, e.g. "heroku"-style platform as a service.
### Patches
Version 3.1.0 of the fastify-csrf fixes it.
See https://github.com/fastify/fastify-csrf/pull/51 and https://github.com/fastify/csrf/pull/2.
The user of the module would need to supply a `userInfo` when generating the CSRF token to fully implement the protection on their end. This is needed only for applications hosted on different subdomains.
### Workarounds
None available.
### References
1. https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
2. https://owasp.org/www-pdf-archive/David_Johansson-Double_Defeat_of_Double-Submit_Cookie.pdf
### Credits
This vulnerability was found by Xhelal Likaj <xhelallikaj20@gmail.com>.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fastify-csrf](https://github.com/fastify/fastify-csrf)
* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
|
{'CVE-2021-29624'}
|
2021-05-28T22:03:58Z
|
2021-05-17T20:53:30Z
|
MODERATE
| 6.5
|
{'CWE-352', 'CWE-565'}
|
{'https://github.com/fastify/fastify-csrf/pull/51', 'https://github.com/fastify/csrf/pull/2', 'https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29624', 'https://github.com/advisories/GHSA-rc4q-9m69-gqp8', 'https://github.com/fastify/fastify-csrf/security/advisories/GHSA-rc4q-9m69-gqp8', 'https://github.com/fastify/fastify-csrf/releases/tag/v3.1.0', 'https://owasp.org/www-pdf-archive/David_Johansson-Double_Defeat_of_Double-Submit_Cookie.pdf'}
| null |
GHSA
|
GHSA-29gp-2c3m-3j6m
|
Sandbox Escape by math function in smarty
|
### Impact
Template authors could run arbitrary PHP code by crafting a malicious math string.
If a math string is passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string.
### Patches
Please upgrade to 4.0.2 or 3.1.42 or higher.
### References
See [documentation on Math function](https://www.smarty.net/docs/en/language.function.math.tpl).
### For more information
If you have any questions or comments about this advisory please open an issue in [the Smarty repo](https://github.com/smarty-php/smarty)
|
{'CVE-2021-29454'}
|
2022-01-20T15:34:11Z
|
2022-01-12T22:43:00Z
|
HIGH
| 8.1
|
{'CWE-74'}
|
{'https://github.com/smarty-php/smarty/releases/tag/v3.1.42', 'https://www.smarty.net/docs/en/language.function.math.tpl', 'https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71', 'https://github.com/advisories/GHSA-29gp-2c3m-3j6m', 'https://github.com/smarty-php/smarty/releases/tag/v4.0.2', 'https://packagist.org/packages/smarty/smarty', 'https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29454'}
| null |
GHSA
|
GHSA-f7ph-p5rv-phw2
|
Cross-Site Scripting in nunjucks
|
Affected versions of `nunjucks` do not properly escape specially structured user input in template vars when in auto-escape mode, resulting in a cross-site scripting vulnerability.
## Proof of Concept
By using an array for the keys in a template var, escaping is bypassed.
```javascript
name[]=<script>alert(1)</script>
```
A full PoC is available in the references section.
## Recommendation
Update to version 2.4.3 or later.
|
{'CVE-2016-10547'}
|
2021-01-08T18:53:55Z
|
2018-11-06T23:13:37Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/matt-/nunjucks_test', 'https://github.com/mozilla/nunjucks/issues/835', 'https://github.com/advisories/GHSA-f7ph-p5rv-phw2', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10547', 'https://nodesecurity.io/advisories/147', 'https://www.npmjs.com/advisories/147'}
| null |
GHSA
|
GHSA-6vwx-mwp8-fh44
|
Cross-site Scripting in reveal.js
|
Insufficient validation in cross-origin communication (postMessage) in reveal.js version 3.9.1 and earlier allow attackers to perform cross-site scripting attacks.
|
{'CVE-2020-8127'}
|
2021-05-10T18:47:10Z
|
2021-05-10T18:47:10Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8127', 'https://github.com/advisories/GHSA-6vwx-mwp8-fh44', 'https://hackerone.com/reports/691977'}
| null |
GHSA
|
GHSA-p9w3-gwc2-cr49
|
HTTP Request Smuggling in Undertow
|
A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own.
|
{'CVE-2020-10687'}
|
2022-02-11T21:12:07Z
|
2021-04-30T17:28:52Z
|
MODERATE
| 4.8
|
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-10687', 'https://bugzilla.redhat.com/show_bug.cgi?id=1785049', 'https://lists.apache.org/thread.html/r6603513ea8afbf6857fd77ca5888ec8385d0af493baa4250e28c351c@%3Cdev.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-p9w3-gwc2-cr49', 'https://security.netapp.com/advisory/ntap-20220210-0015/'}
| null |
GHSA
|
GHSA-qg8p-v9q4-gh34
|
Potential Command Injection in shell-quote
|
Affected versions of `shell-quote` do not properly escape command line arguments, which may result in command injection if the library is used to escape user input destined for use as command line arguments.
## Proof of Concept:
The following characters are not escaped properly: `>`,`;`,`{`,`}`
Bash has a neat but not well known feature known as "Bash Brace Expansion", wherein a sub-command can be executed without spaces by running it between a set of `{}` and using the `,` instead of ` ` to seperate arguments. Because of this, full command injection is possible even though it was initially thought to be impossible.
```
const quote = require('shell-quote').quote;
console.log(quote(['a;{echo,test,123,234}']));
// Actual "a;{echo,test,123,234}"
// Expected "a\;\{echo,test,123,234\}"
// Functional Equivalent "a; echo 'test' '123' '1234'"
```
## Recommendation
Update to version 1.6.1 or later.
|
{'CVE-2016-10541'}
|
2021-01-08T01:58:43Z
|
2019-02-18T23:58:29Z
|
CRITICAL
| 0
|
{'CWE-78'}
|
{'https://nodesecurity.io/advisories/117', 'https://www.npmjs.com/advisories/117', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10541', 'https://github.com/advisories/GHSA-qg8p-v9q4-gh34'}
| null |
GHSA
|
GHSA-9jjr-qqfp-ppwx
|
remote code execution via git repo provider
|
### Impact
A remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the BinderHub context, with the potential to egress credentials of the BinderHub deployment, including JupyterHub API tokens, kubernetes service accounts, and docker registry credentials. This may provide the ability to manipulate images and other user created pods in the deployment, with the potential to escalate to the host depending on the underlying kubernetes configuration.
### Patches
Patch below, or [on GitHub](https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch)
```diff
From 9f4043d9dddc1174920e687773f27b7933f48ab6 Mon Sep 17 00:00:00 2001
From: Riccardo Castellotti <rcastell@cern.ch>
Date: Thu, 19 Aug 2021 15:49:43 +0200
Subject: [PATCH] Explicitly separate git-ls-remote options from positional
arguments
---
binderhub/repoproviders.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/binderhub/repoproviders.py b/binderhub/repoproviders.py
index f33347b..5d4b87c 100755
--- a/binderhub/repoproviders.py
+++ b/binderhub/repoproviders.py
@@ -484,7 +484,7 @@ class GitRepoProvider(RepoProvider):
self.sha1_validate(self.unresolved_ref)
except ValueError:
# The ref is a head/tag and we resolve it using `git ls-remote`
- command = ["git", "ls-remote", self.repo, self.unresolved_ref]
+ command = ["git", "ls-remote", "--", self.repo, self.unresolved_ref]
result = subprocess.run(command, universal_newlines=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
if result.returncode:
raise RuntimeError("Unable to run git ls-remote to get the `resolved_ref`: {}".format(result.stderr))
--
2.25.1
```
### Workarounds
Disable the git repo provider by specifying the `BinderHub.repo_providers` config, e.g.:
```python
from binderhub.repoproviders import (GitHubRepoProvider,
GitLabRepoProvider, GistRepoProvider,
ZenodoProvider, FigshareProvider, HydroshareProvider,
DataverseProvider)
c.BinderHub.repo_providers = {
'gh': GitHubRepoProvider,
'gist': GistRepoProvider,
'gl': GitLabRepoProvider,
'zenodo': ZenodoProvider,
'figshare': FigshareProvider,
'hydroshare': HydroshareProvider,
'dataverse': DataverseProvider,
}
```
### References
Credit: Jose Carlos Luna Duran (CERN) and Riccardo Castellotti (CERN).
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@ipython.org](mailto:security@ipython.org)
|
{'CVE-2021-39159'}
|
2022-04-19T19:03:06Z
|
2021-08-30T16:16:58Z
|
CRITICAL
| 9.6
|
{'CWE-94'}
|
{'https://github.com/jupyterhub/binderhub/security/advisories/GHSA-9jjr-qqfp-ppwx', 'https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39159', 'https://github.com/advisories/GHSA-9jjr-qqfp-ppwx'}
| null |
GHSA
|
GHSA-wqxc-qrq4-w5v4
|
Update unsound DrainFilter and RString::retain
|
An issue was discovered in the abi_stable crate before 0.9.1 for Rust. A retain call can create an invalid UTF-8 string, violating soundness.
|
{'CVE-2020-36213'}
|
2021-08-25T21:01:33Z
|
2021-08-25T21:01:33Z
|
HIGH
| 0
|
{'CWE-172'}
|
{'https://github.com/rodrimati1992/abi_stable_crates/issues/44', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36213', 'https://github.com/advisories/GHSA-wqxc-qrq4-w5v4', 'https://rustsec.org/advisories/RUSTSEC-2020-0105.html'}
| null |
GHSA
|
GHSA-grj5-8x6q-hc9q
|
Path traversal in Grafana Loki
|
An issue was discovered in Grafana Loki through 2.2.1. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Loki will attempt to parse a rules file at that location and include some of the contents in the error message.
|
{'CVE-2021-36156'}
|
2022-04-19T19:03:25Z
|
2021-09-02T22:00:40Z
|
MODERATE
| 5.3
|
{'CWE-22'}
|
{'https://github.com/grafana/loki/pull/4020', 'https://github.com/advisories/GHSA-grj5-8x6q-hc9q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36156', 'https://github.com/grafana/loki/pull/4020#issue-694377133', 'https://github.com/grafana/loki/releases/tag/v2.3.0'}
| null |
GHSA
|
GHSA-8gmx-cpcg-f8h5
|
Double-free in id-map
|
An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in IdMap::clone_from upon a .clone panic.
|
{'CVE-2021-30455'}
|
2021-08-25T20:55:11Z
|
2021-08-25T20:55:11Z
|
CRITICAL
| 9.8
|
{'CWE-415'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-30455', 'https://github.com/andrewhickman/id-map/issues/3', 'https://github.com/advisories/GHSA-8gmx-cpcg-f8h5', 'https://rustsec.org/advisories/RUSTSEC-2021-0052.html'}
| null |
GHSA
|
GHSA-9jq9-c2cv-pcrj
|
Cross-site Scripting by SVG upload in xwiki-platform
|
### Impact
When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file.
### Patches
This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser.
### Workarounds
This issue can be fixed without the patch by setting properly the configuration to download or display files, see: https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload
### References
https://jira.xwiki.org/browse/XWIKI-18368
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](http://jira.xwiki.org)
* Email us at [security ML](mailto:security@xwiki.org)
|
{'CVE-2021-43841'}
|
2022-02-11T21:08:44Z
|
2022-02-10T22:42:48Z
|
MODERATE
| 4.1
|
{'CWE-79'}
|
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9jq9-c2cv-pcrj', 'https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43841', 'https://jira.xwiki.org/browse/XWIKI-18368', 'https://github.com/advisories/GHSA-9jq9-c2cv-pcrj', 'https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62'}
| null |
GHSA
|
GHSA-9mgm-gcq8-86wq
|
Improper Authentication in Apache ActiveMQ and Apache Artemis
|
The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password.
|
{'CVE-2021-26117'}
|
2021-10-21T18:14:58Z
|
2021-06-16T17:39:35Z
|
HIGH
| 7.5
|
{'CWE-287'}
|
{'https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3cCAH+vQmMeUEiKN4wYX9nLBbqmFZFPXqajNvBKmzb2V8QZANcSTA@mail.gmail.com%3e', 'https://lists.apache.org/thread.html/r5899ece90bcae5805ad6142fdb05c58595cff19cb2e98cc58a91f55b@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r110cacfa754471361234965ffe851a046e302ff2693b055f49f47b02@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/raea451de09baed76950d6a60cc4bb1b74476c505e03205a3c68c9808@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r70389648227317bdadcdecbd9f238571a6047469d156bd72bb0ca2f7@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r22cdc0fb45e223ac92bc2ceff7af92f1193dfc614c8b248534456229@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3341d96d8f956e878fb7b463b08d57ca1d58fec9c970aee929b58e0d@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rd05b1c9d61dbd220664d559aa0e2b55e5830f006a09e82057f3f7863@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rec93794f8aeddf8a5f1a643d264b4e66b933f06fd72a38f31448f0ac@%3Cgitbox.activemq.apache.org%3E', 'https://issues.apache.org/jira/browse/ARTEMIS-2895', 'https://issues.apache.org/jira/browse/AMQ-8035', 'https://lists.apache.org/thread.html/rd75600cee29cb248d548edcf6338fe296466d63a69e2ed0afc439ec7@%3Cissues.activemq.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210304-0008/', 'https://lists.apache.org/thread.html/ra255ddfc8b613b80e9fa22ff3e106168b245f38a22316bfb54d21159@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rffa5cd05d01c4c9853b17f3004d80ea6eb8856c422a8545c5f79b1a6@%3Ccommits.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-9mgm-gcq8-86wq', 'https://lists.apache.org/thread.html/re1b98da90a5f2e1c2e2d50e31c12e2578d61fe01c0737f9d0bd8de99@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26117', 'https://lists.apache.org/thread.html/r519bfafd67091d0b91243efcb1c49b1eea27321355ba5594f679277d@%3Cissues.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-qqc5-rgcc-cjqh
|
Information Disclosure in go.elastic.co/apm
|
The Elastic APM agent for Go versions before 1.11.0 can leak sensitive HTTP header information when logging the details during an application panic. Normally, the APM agent will sanitize sensitive HTTP header details before sending the information to the APM server. During an application panic it is possible the headers will not be sanitized before being sent.
|
{'CVE-2021-22133'}
|
2021-05-18T18:34:18Z
|
2021-05-18T18:34:18Z
|
LOW
| 2.4
|
{'CWE-532'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22133', 'https://github.com/elastic/apm-agent-go/compare/v1.10.0...v1.11.0', 'https://discuss.elastic.co/t/elastic-apm-agent-for-go-1-11-0-security-update/263252', 'https://github.com/elastic/apm-agent-go/commit/c5c7e21aa26a6def7790f74fbceed792ad47ef35', 'https://github.com/advisories/GHSA-qqc5-rgcc-cjqh'}
| null |
GHSA
|
GHSA-9hx2-hgq2-2g4f
|
Regular Expression Denial of Service (ReDoS) in Pillow
|
An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.
|
{'CVE-2021-25292'}
|
2021-12-02T17:47:59Z
|
2021-03-29T16:35:46Z
|
MODERATE
| 6.5
|
{'CWE-400'}
|
{'https://security.gentoo.org/glsa/202107-33', 'https://github.com/advisories/GHSA-9hx2-hgq2-2g4f', 'https://github.com/python-pillow/Pillow/commit/3bce145966374dd39ce58a6fc0083f8d1890719c', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25292', 'https://github.com/python-pillow/Pillow/commit/6207b44ab1ff4a91d8ddc7579619876d0bb191a4'}
| null |
GHSA
|
GHSA-5327-gfq5-8f4m
|
Malicious Package in buffer-xmr
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:04:18Z
|
2020-09-03T21:56:23Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1246', 'https://github.com/advisories/GHSA-5327-gfq5-8f4m'}
| null |
GHSA
|
GHSA-4p6w-m9wc-c9c9
|
Sensitive Data Exposure in Apache Ant
|
Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.
|
{'CVE-2020-1945'}
|
2022-02-08T22:06:03Z
|
2020-09-14T18:13:29Z
|
MODERATE
| 6.3
|
{'CWE-200', 'CWE-668'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00053.html', 'https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r6970d196cd73863dafdbc3a7052562deedd338e3bd7d73d8171d92d6@%3Ccommits.groovy.apache.org%3E', 'https://usn.ubuntu.com/4380-1/', 'https://lists.apache.org/thread.html/r815f88d1044760176f30a4913b4baacd06f3eae4eb662de7388e46d8@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r1863b9ce4c3e4b1e5b0c671ad05545ba3eb8399616aa746af5dfe1b1@%3Cdev.creadur.apache.org%3E', 'https://github.com/advisories/GHSA-4p6w-m9wc-c9c9', 'https://lists.apache.org/thread.html/r1a9c992d7c8219dc15b4ad448649f0ffdaa88d76ef6a0035c49455f5@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cusers.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r4b2904d64affd4266cd72ccb2fc3927c1c2f22009f183095aa46bf90@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r6e295d792032ec02b32be3846c21a58857fba4a077d22c5842d69ba2@%3Ctorque-dev.db.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/09/30/6', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r8e592bbfc016a5dbe2a8c0e81ff99682b9c78c453621b82c14e7b75e%40%3Cdev.ant.apache.org%3E', 'https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cdev.groovy.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rda80ac59119558eaec452e58ddfac2ccc9211da1c65f7927682c78b1@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rce099751721c26a8166d8b6578293820832831a0b2cb8d93b8efa081@%3Cnotifications.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/rd7dda48ff835f4d0293949837d55541bfde3683bd35bd8431e324538@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rc89e491b5b270fb40f1210b70554527b737c217ad2e831b643ead6bc@%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r95dc943e47a211d29df605e14f86c280fc9fa8d828b2b53bd07673c9@%3Cdev.creadur.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rdaa9c51d5dc6560c9d2b3f3d742c768ad0705e154041e574a0fae45c@%3Cnotifications.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/r8e24abb7dd77cda14c6df90a377c94f0a413bbfcec90a29540ff8adf@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r2704fb14ce068c64759a986f81d5b5e42ab434fa13d0f444ad52816b@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rfd346609527a79662c48b1da3ac500ec30f29f7ddaa3575051e81890@%3Ccommits.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRVAWTCVXJMRYKQKEXYSNBF7NLSR6OEI/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQBR65TINSJRN7PTPIVNYS33P535WM74/', 'https://lists.apache.org/thread.html/r6edd3e2cb79ee635630d891b54a4f1a9cd8c7f639d6ee34e75fbe830@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea@%3Cdev.ant.apache.org%3E', 'https://lists.apache.org/thread.html/rb860063819b9c0990e1fbce29d83f4554766fe5a05e3b3939736bf2b@%3Ccommits.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r0d08a96ba9de8aa435f32944e8b2867c368a518d4ff57782e3637335@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r6030d34ceacd0098538425c5dac8251ffc7fd90b886942bc7ef87858@%3Cnotifications.groovy.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/06/1', 'https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r3cea0f3da4f6d06d7afb6c0804da8e01773a0f50a09b8d9beb2cda65@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r5dfc77048b1f9db26622dce91a6edf083d499397256594952fad5f35@%3Ccommits.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/re1ce84518d773a94a613d988771daf9252c9cf7375a9a477009f9735@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1945', 'https://lists.apache.org/thread.html/rb8ec556f176c83547b959150e2108e2ddf1d61224295941908b0a81f@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rf07feaf78afc8f701e21948a06ef92565d3dff1242d710f4fbf900b2@%3Cdev.creadur.apache.org%3E', 'https://security.gentoo.org/glsa/202007-34', 'https://lists.apache.org/thread.html/r1b32c76afffcf676e13ed635a3332f3e46e6aaa7722eb3fc7a28f58e@%3Cdev.hive.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-qh9q-34h6-hcv9
|
Directory traversal in mkdocs
|
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information.
|
{'CVE-2021-40978'}
|
2021-11-15T15:04:24Z
|
2021-10-12T18:48:24Z
|
HIGH
| 7.5
|
{'CWE-12', 'CWE-22'}
|
{'https://github.com/mkdocs/mkdocs/pull/2604/commits/cddc453c9d49298e60e7d56fb71130c151cbcbe5', 'https://github.com/mkdocs/mkdocs/issues/2601', 'https://github.com/nisdn/CVE-2021-40978', 'https://github.com/nisdn/CVE-2021-40978/issues/1', 'https://github.com/mkdocs/mkdocs/releases/tag/1.2.3', 'https://github.com/mkdocs/mkdocs', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40978', 'https://github.com/mkdocs/mkdocs/pull/2604', 'https://github.com/advisories/GHSA-qh9q-34h6-hcv9'}
| null |
GHSA
|
GHSA-55w9-c3g2-4rrh
|
Man-in-the-middle attack in Apache Axis
|
Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
{'CVE-2012-5784'}
|
2021-10-04T21:24:43Z
|
2020-10-07T17:51:02Z
|
MODERATE
| 0
|
{'CWE-20'}
|
{'https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2014-0037.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/79829', 'http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf', 'https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2013-0269.html', 'http://secunia.com/advisories/51219', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html', 'https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E', 'https://github.com/advisories/GHSA-55w9-c3g2-4rrh', 'https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5784', 'http://rhn.redhat.com/errata/RHSA-2013-0683.html', 'http://www.securityfocus.com/bid/56408'}
| null |
GHSA
|
GHSA-27gm-ghr9-4v95
|
Cross-site scripting vulnerability in TinyMCE
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in: the core parser, `paste` and `visualchars` plugins. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.6 or lower and TinyMCE 5.1.3 or lower.
### Patches
This vulnerability has been patched in TinyMCE 4.9.7 and 5.1.4 by improved parser logic and HTML sanitization.
### Workarounds
The workarounds available are:
- disable the impacted plugins
- manually sanitize the content using the `BeforeSetContent` event (see below)
- upgrade to either TinyMCE 4.9.7 or TinyMCE 5.1.4
#### Example: Manually sanitize content
```js
editor.on('BeforeSetContent', function(e) {
var sanitizedContent = ...; // Manually sanitize content here
e.content = sanitizedContent;
});
```
### Acknowledgements
Tiny Technologies would like to thank Michał Bentkowski for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes514/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
| null |
2021-10-08T21:26:39Z
|
2020-01-30T21:22:15Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-27gm-ghr9-4v95', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-27gm-ghr9-4v95'}
| null |
GHSA
|
GHSA-fqx8-v33p-4qcc
|
Cross-site Scripting in enshrined/svg-sanitize
|
### Impact
SVG sanitizer library before version `0.15.0` did not remove HTML elements wrapped in a CDATA section. As a result, SVG content embedded in HTML (fetched as `text/html`) was susceptible to cross-site scripting. Plain SVG files (fetched as `image/svg+xml`) were not affected.
### Patches
This issue is fixed in `0.15.0` and higher.
### Workarounds
There is currently no workaround available without upgrading.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Github](https://github.com/darylldoyle/svg-sanitizer/issues)
* Email us at [daryll@enshrined.co.uk](mailto:daryll@enshrined.co.uk)
|
{'CVE-2022-23638'}
|
2022-05-09T22:10:34Z
|
2022-02-14T22:54:18Z
|
MODERATE
| 6.2
|
{'CWE-79'}
|
{'https://github.com/darylldoyle/svg-sanitizer/commit/17e12ba9c2881caa6b167d0fbea555c11207fbb0', 'https://github.com/darylldoyle/svg-sanitizer/issues/71', 'https://github.com/darylldoyle/svg-sanitizer/security/advisories/GHSA-fqx8-v33p-4qcc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23638', 'https://github.com/advisories/GHSA-fqx8-v33p-4qcc'}
| null |
GHSA
|
GHSA-6xp6-fmc8-pmmr
|
Temporary Directory Hijacking Vulnerability in Keycloak
|
A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
|
{'CVE-2021-20202'}
|
2022-05-03T19:13:08Z
|
2022-03-18T17:50:45Z
|
HIGH
| 7.3
|
{'CWE-377'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=1922128', 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-7gf3-89f6-823j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20202', 'https://github.com/advisories/GHSA-6xp6-fmc8-pmmr', 'https://issues.redhat.com/browse/KEYCLOAK-17000'}
| null |
GHSA
|
GHSA-cr56-66mx-293v
|
Cross-Site Scripting in @toast-ui/editor
|
Versions of `@toast-ui/editor` prior to 2.2.0 are vulnerable to Cross-Site Scripting (XSS). There are multiple bypasses to the package's built-in XSS sanitization. This may allow attackers to execute arbitrary JavaScript on a victim's browser.
## Recommendation
Upgrade to version 2.2.0 or later.
| null |
2021-10-04T21:12:15Z
|
2020-09-03T15:53:50Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/nhn/tui.editor/issues/733', 'https://www.npmjs.com/advisories/1521', 'https://github.com/advisories/GHSA-cr56-66mx-293v', 'https://github.com/nhn/tui.editor/pull/1010'}
| null |
GHSA
|
GHSA-333x-9vgq-v2j4
|
Directory Traversal in geddy
|
Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors.
### Proof of Concept
```
http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd
```
## Recommendation
Update geddy to version >= 13.0.8
|
{'CVE-2015-5688'}
|
2021-08-31T20:33:52Z
|
2017-10-24T18:33:36Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-333x-9vgq-v2j4', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5688', 'https://nodesecurity.io/advisories/geddy-directory-traversal', 'https://github.com/geddy/geddy/pull/699', 'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231', 'https://github.com/geddy/geddy/releases/tag/v13.0.8', 'https://github.com/geddy/geddy/issues/697', 'https://www.npmjs.com/advisories/10'}
| null |
GHSA
|
GHSA-32x6-qvw6-mxj4
|
Forwarding of confidentials headers to third parties in fluture-node
|
### Impact
Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over unencrypted HTTP, the headers would be included in the follow-up request and be exposed to the third party, or potential http traffic sniffing.
### Patches
The redirection strategies made available in version 4.0.2 automatically redact confidential headers when a redirect is followed across to another origin.
### Workarounds
Use a custom redirection strategy via the `followRedirectsWith` function. The custom strategy can be based on the new strategies available in fluture-node@4.0.2.
### References
- This vulnerability was discovered after the announcement of similar vulnerabilities in the `follow-redirects` package. There is more information there: https://github.com/advisories/GHSA-74fj-2j2h-c42q and https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db/
- Fixed in 125e4474f910c1507f8ec3232848626fbc0f55c4 and 0c99bc511533d48be17dc6bfe641f7d0aeb34d77
|
{'CVE-2022-24719'}
|
2022-03-15T18:05:24Z
|
2022-03-01T22:14:57Z
|
LOW
| 2.6
|
{'CWE-200', 'CWE-359', 'CWE-601'}
|
{'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4', 'https://github.com/psf/requests/pull/4718', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24719', 'https://github.com/advisories/GHSA-32x6-qvw6-mxj4', 'https://github.com/fluture-js/fluture-node/security/advisories/GHSA-32x6-qvw6-mxj4', 'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77'}
| null |
GHSA
|
GHSA-6chw-6frg-f759
|
Regular Expression Denial of Service in Acorn
|
Affected versions of acorn are vulnerable to Regular Expression Denial of Service.
A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop.
The string is not valid UTF16 which usually results in it being sanitized before reaching the parser.
If an application processes untrusted input and passes it directly to acorn,
attackers may leverage the vulnerability leading to Denial of Service.
| null |
2021-08-23T15:10:33Z
|
2020-04-03T21:48:38Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/1488', 'https://github.com/advisories/GHSA-6chw-6frg-f759', 'https://snyk.io/vuln/SNYK-JS-ACORN-559469', 'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802', 'https://github.com/acornjs/acorn/issues/929'}
| null |
GHSA
|
GHSA-2p82-v77v-mppr
|
Airbrake
|
The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected).
|
{'CVE-2019-16060'}
|
2021-08-17T22:26:28Z
|
2019-09-11T23:05:57Z
|
CRITICAL
| 9.8
|
{'CWE-200'}
|
{'https://github.com/airbrake/airbrake-ruby/issues/468', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16060', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/airbrake-ruby/CVE-2019-16060.yml', 'https://github.com/advisories/GHSA-2p82-v77v-mppr'}
| null |
GHSA
|
GHSA-gv3v-92v6-m48j
|
Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting)
|
### Impact
- Cross Site Scripting
- Cache Poisoning
- Page Hijacking
### Patches
This was fixed in version `2.2.1`.
### Workarounds
If you are unable to update, ensure that user supplied data isn't able to flow to HTTP headers. If it does, pre-sanitize for CRLF characters.
### References
##### [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html)
I've been poking at libraries to see if they are vulnerable to HTTP Response Splitting and Jooby is my third case of finding this vulnerability.
### Root Cause
This roots cause back to this line in the Jooby codebase:
https://github.com/jooby-project/jooby/blob/93cfc80aa20c188f71a442ea7a1827da380e1c27/modules/jooby-netty/src/main/java/io/jooby/internal/netty/NettyContext.java#L102
The `DefaultHttpHeaders` takes a parameter `validate` which, when `true` (as it is for the no-arg constructor) validates that the header isn't being abused to do HTTP Response Splitting.
### Reported By
This vulnerability was reported by @JLLeitschuh ([Twitter](https://twitter.com/JLLeitschuh))
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [jooby-project/jooby](https://github.com/jooby-project/jooby/issues)
|
{'CVE-2020-7622'}
|
2022-04-19T19:02:27Z
|
2020-04-03T15:23:30Z
|
CRITICAL
| 9.8
|
{'CWE-444'}
|
{'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249', 'https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j', 'https://github.com/advisories/GHSA-gv3v-92v6-m48j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7622', 'https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4'}
| null |
GHSA
|
GHSA-fp4w-jxhp-m23p
|
Dependency Confusion in Bundler
|
Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.17 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application.
|
{'CVE-2020-36327'}
|
2022-04-07T15:49:53Z
|
2021-05-24T18:12:33Z
|
HIGH
| 8.8
| null |
{'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24105', 'https://github.com/rubygems/rubygems/blob/master/bundler/CHANGELOG.md#2218-may-25-2021', 'https://github.com/rubygems/rubygems/issues/3982', 'https://mensfeld.pl/2021/02/rubygems-dependency-confusion-attack-side-of-things/', 'https://github.com/advisories/GHSA-fp4w-jxhp-m23p', 'https://www.zofrex.com/blog/2021/04/29/bundler-still-vulnerable-dependency-confusion-cve-2020-36327/', 'https://bundler.io/blog/2021/02/15/a-more-secure-bundler-we-fixed-our-source-priorities.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36327', 'https://github.com/rubygems/rubygems/commit/078bf682ac40017b309b5fc69f283ff640e7c129', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bundler/CVE-2020-36327.yml', 'https://github.com/rubygems/rubygems/pull/4609'}
| null |
GHSA
|
GHSA-rwgm-f83r-v3qj
|
Improper Certificate Validation in WP-CLI framework
|
### Impact
An improper error handling in HTTPS requests management in WP-CLI version 0.12.0 and later allows remote attackers able to intercept the communication to remotely disable the certificate verification on WP-CLI side, gaining full control over the communication content, including the ability to impersonate update servers and push malicious updates towards WordPress instances controlled by the vulnerable WP-CLI agent, or push malicious updates toward WP-CLI itself.
### Patches
The vulnerability stems from the fact that the default behavior of `WP_CLI\Utils\http_request()` when encountering a TLS handshake error is to disable certificate validation and retry the same request.
The default behavior has been changed with version 2.5.0 of WP-CLI and the `wp-cli/wp-cli` framework (via https://github.com/wp-cli/wp-cli/pull/5523) so that the `WP_CLI\Utils\http_request()` method accepts an `$insecure` option that is `false` by default and consequently that a TLS handshake failure is a hard error by default. This new default is a breaking change and ripples through to all consumers of `WP_CLI\Utils\http_request()`, including those in separate WP-CLI bundled or third-party packages.
https://github.com/wp-cli/wp-cli/pull/5523 has also added an `--insecure` flag to the `cli update` command to counter this breaking change.
Subsequent PRs on the command repositories have added an `--insecure` flag to the appropriate commands on the following repositories to counter the breaking change:
* https://github.com/wp-cli/config-command/pull/128
* https://github.com/wp-cli/core-command/pull/186
* https://github.com/wp-cli/extension-command/pull/287
* https://github.com/wp-cli/checksum-command/pull/86
* https://github.com/wp-cli/package-command/pull/138
### Workarounds
There is no direct workaround for the default insecure behavior of `wp-cli/wp-cli` versions before 2.5.0.
The workaround for dealing with the breaking change in the commands directly affected by the new secure default behavior is to add the `--insecure` flag to manually opt-in to the previous insecure behavior.
### References
* [CWE: Improper Certificate Validation](https://cwe.mitre.org/data/definitions/295.html)
### For more information
If you have any questions or comments about this advisory:
* Join the `#cli` channel in the [WordPress.org Slack](https://make.wordpress.org/chat/) to ask questions or provide feedback.
|
{'CVE-2021-29504'}
|
2022-04-19T19:02:56Z
|
2021-05-19T23:03:11Z
|
CRITICAL
| 9.1
|
{'CWE-295'}
|
{'https://github.com/advisories/GHSA-rwgm-f83r-v3qj', 'https://github.com/wp-cli/core-command/pull/186', 'https://github.com/wp-cli/extension-command/pull/287', 'https://github.com/wp-cli/config-command/pull/128', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29504', 'https://github.com/wp-cli/package-command/pull/138', 'https://github.com/wp-cli/checksum-command/pull/86', 'https://github.com/wp-cli/wp-cli/security/advisories/GHSA-rwgm-f83r-v3qj', 'https://github.com/wp-cli/wp-cli/pull/5523'}
| null |
GHSA
|
GHSA-8xwg-wv7v-4vqp
|
Code Execution by Re-enabling Node.js integration in electron
|
Versions of electron
A vulnerability has been discovered which allows Node.js integration to be re-enabled in some Electron applications that disable it.
For the application to be impacted by this vulnerability it must meet all of these conditions
- Runs on Electron 1.7, 1.8, or a 2.0.0-beta
- Allows execution of arbitrary remote code
- Disables Node.js integration
- Does not explicitly declare webviewTag: false in its webPreferences
- Does not enable the nativeWindowOption option
- Does not intercept new-window events and manually override event.newGuest without using the supplied options tag
## Recommendation
Update to `electron` version 1.7.13, 1.8.4, or 2.0.0.beta.5 or later
If you are unable to update your Electron version can mitigate the vulnerability with the following code.
```
app.on('web-contents-created', (event, win) => {
win.on('new-window', (event, newURL, frameName, disposition,
options, additionalFeatures) => {
if (!options.webPreferences) options.webPreferences = {};
options.webPreferences.nodeIntegration = false;
options.webPreferences.nodeIntegrationInWorker = false;
options.webPreferences.webviewTag = false;
delete options.webPreferences.preload;
})
})
// and *IF* you don't use WebViews at all,
// you might also want
app.on('web-contents-created', (event, win) => {
win.on('will-attach-webview', (event, webPreferences, params) => {
event.preventDefault();
})
})
```
|
{'CVE-2018-1000136'}
|
2021-06-11T15:17:24Z
|
2018-03-26T16:41:17Z
|
HIGH
| 8.1
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-8xwg-wv7v-4vqp', 'https://electronjs.org/blog/webview-fix', 'https://www.electronjs.org/blog/webview-fix', 'https://www.npmjs.com/advisories/574', 'https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000136'}
| null |
GHSA
|
GHSA-mgh8-hcwj-h57v
|
Improper Restriction of XML External Entity Reference in Apache Olingo
|
The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks.
|
{'CVE-2019-17554'}
|
2021-08-19T16:53:27Z
|
2020-02-04T22:37:43Z
|
MODERATE
| 5.5
|
{'CWE-611'}
|
{'https://seclists.org/bugtraq/2019/Dec/11', 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d7Ty%3DL-n_iAzT6vcQp65BY29XZDS5tMoM8MdDrb1moM7A%40mail.gmail.com%3E', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://issues.apache.org/jira/browse/OLINGO-1409', 'https://github.com/advisories/GHSA-mgh8-hcwj-h57v', 'http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html', 'https://github.com/apache/olingo-odata4/commit/5948974ad28271818e2afe747c71cde56a7f2c63', 'https://github.com/apache/olingo-odata4/commit/c3f982db3d97e395d313ae8f231202bb2139882c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17554'}
| null |
GHSA
|
GHSA-574q-fxfj-wv6h
|
High severity vulnerability that affects puppet
|
Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."
|
{'CVE-2013-1655'}
|
2021-09-01T19:29:35Z
|
2017-10-24T18:33:37Z
|
HIGH
| 0
|
{'CWE-20'}
|
{'https://puppetlabs.com/security/cve/cve-2013-1655/', 'http://www.debian.org/security/2013/dsa-2643', 'http://www.securityfocus.com/bid/58442', 'http://secunia.com/advisories/52596', 'https://github.com/advisories/GHSA-574q-fxfj-wv6h', 'http://ubuntu.com/usn/usn-1759-1', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1655', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html'}
| null |
GHSA
|
GHSA-75qf-wgfj-v652
|
Arbitrary File Write via Archive Extraction (Zip Slip)
|
This affects all versions up to and including version 7.0.0 of package github.com/u-root/u-root/pkg/tarutil. It is vulnerable to both leading and non-leading relative path traversal attacks in tar file extraction.
|
{'CVE-2020-7669'}
|
2021-05-18T18:28:03Z
|
2021-05-18T18:28:03Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGTARUTIL-570428', 'https://github.com/u-root/u-root/pull/1817', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7669', 'https://github.com/advisories/GHSA-75qf-wgfj-v652'}
| null |
GHSA
|
GHSA-7v35-qwwj-p98g
|
Improper Restriction of XML External Entity Reference in DiffPlug Spotless
|
In DiffPlug Spotless before 1.20.0 (library and Maven plugin) and before 3.20.0 (Gradle plugin), the XML parser would resolve external entities over both HTTP and HTTPS and didn't respect the resolveExternalEntities setting. For example, this allows disclosure of file contents to a MITM attacker if a victim performs a spotlessApply operation on an untrusted XML file.
|
{'CVE-2019-9843'}
|
2021-07-06T15:11:16Z
|
2019-07-05T21:07:40Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9843', 'https://github.com/advisories/GHSA-7v35-qwwj-p98g', 'https://github.com/diffplug/spotless/issues/358', 'https://github.com/diffplug/spotless/blob/master/plugin-maven/CHANGES.md#version-1200---march-14th-2018-javadoc-jcenter', 'https://github.com/diffplug/spotless/pull/369', 'https://github.com/diffplug/spotless/blob/master/plugin-gradle/CHANGES.md#version-3200---march-11th-2018-javadoc-jcenter'}
| null |
GHSA
|
GHSA-qh32-6jjc-qprm
|
Null pointer dereference in tensorflow-lite
|
### Impact
A crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/core/subgraph.cc#L1224-L1227
However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference.
### Patches
We have patched the issue in 0b5662bc and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360 but was also discovered through variant analysis of [GHSA-cvpc-8phh-8f45](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45).
|
{'CVE-2020-15209'}
|
2021-08-26T15:19:20Z
|
2020-09-25T18:28:46Z
|
MODERATE
| 5.9
|
{'CWE-476'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8', 'https://github.com/advisories/GHSA-qh32-6jjc-qprm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15209'}
| null |
GHSA
|
GHSA-3qh4-r86r-grvm
|
Arbitrary JavaScript Execution in typed-function
|
Versions of `typed-function` prior to 0.10.6 are vulnerable to Arbitrary JavaScript Execution. Function names are not properly sanitized and may allow an attacker to execute arbitrary code.
## Recommendation
Upgrade to version 0.10.6 or later.
|
{'CVE-2017-1001004'}
|
2021-01-07T23:31:27Z
|
2020-09-02T18:24:39Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JS-TYPEDFUNCTION-174139', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe', 'https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-version-0106', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001004', 'https://github.com/advisories/GHSA-3qh4-r86r-grvm', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://www.npmjs.com/advisories/819'}
| null |
GHSA
|
GHSA-3r7g-wrpr-j5g4
|
Improper Authentication in django-mfa3
|
### Impact
django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed.
You are affected if you have activated both django-mfa3 (< 0.5.0) and django.contrib.admin and have not taken any other measures to prevent users from accessing the admin login view.
### Patches
The issue has been fixed in django-mfa3 0.5.0.
### Workarounds
It is possible to work around the issue by overwriting the admin login route, e.g. by adding the following URL definition *before* the admin routes:
url('admin/login/', lambda request: redirect(settings.LOGIN_URL)
### References
- [django-mfa3 changelog](https://github.com/xi/django-mfa3/blob/main/CHANGES.md#050-2022-04-15)
|
{'CVE-2022-24857'}
|
2022-04-22T20:48:29Z
|
2022-04-22T20:48:28Z
|
HIGH
| 7.3
|
{'CWE-287'}
|
{'https://github.com/xi/django-mfa3/security/advisories/GHSA-3r7g-wrpr-j5g4', 'https://github.com/xi/django-mfa3/commit/32f656e22df120b84bdf010e014bb19bd97971de', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24857', 'https://github.com/xi/django-mfa3/blob/main/CHANGES.md#050-2022-04-15', 'https://github.com/advisories/GHSA-3r7g-wrpr-j5g4'}
| null |
GHSA
|
GHSA-gx8x-g87m-h5q6
|
Denial of Service (DoS) in Nokogiri on JRuby
|
## Summary
Nokogiri `v1.13.4` updates the vendored `org.cyberneko.html` library to `1.9.22.noko2` which addresses [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv). That CVE is rated 7.5 (High Severity).
See [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) for more information.
Please note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`.
## Mitigation
Upgrade to Nokogiri `>= 1.13.4`.
## Impact
### [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) in nekohtml
- **Severity**: High 7.5
- **Type**: [CWE-400](https://cwe.mitre.org/data/definitions/400.html) Uncontrolled Resource Consumption
- **Description**: The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup.
- **See also**: [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv)
| null |
2022-04-11T21:38:21Z
|
2022-04-11T21:38:11Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-gx8x-g87m-h5q6', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-gx8x-g87m-h5q6', 'https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer', 'https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24839'}
| null |
GHSA
|
GHSA-368f-29c3-4f2r
|
Data race in conqueue
|
Affected versions of this crate unconditionally implemented `Send`/`Sync` for `QueueSender<T>`,
allowing to send non-Send `T` to other threads by invoking `(&QueueSender<T>).send()`.
This fails to prevent users from creating data races by sending types like `Rc<T>` or `Arc<Cell<T>>` to other threads, which can lead to memory corruption.
The flaw was corrected in commit 1e462c3 by imposing `T: Send` to both `Send`/`Sync` impls for `QueueSender<T>`/`QueueReceiver<T>`.
|
{'CVE-2020-36437'}
|
2021-08-25T20:58:50Z
|
2021-08-25T20:58:50Z
|
HIGH
| 8.1
|
{'CWE-119', 'CWE-362'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36437', 'https://rustsec.org/advisories/RUSTSEC-2020-0117.html', 'https://github.com/advisories/GHSA-368f-29c3-4f2r'}
| null |
GHSA
|
GHSA-77rc-x84q-pv4f
|
Low severity vulnerability that affects apache-airflow
|
The LDAP auth backend (airflow.contrib.auth.backends.ldap_auth) prior to Apache Airflow 1.10.1 was misconfigured and contained improper checking of exceptions which disabled server certificate checking.
|
{'CVE-2018-20245'}
|
2021-09-02T20:57:55Z
|
2019-01-25T16:19:19Z
|
HIGH
| 7.5
|
{'CWE-295'}
|
{'https://github.com/advisories/GHSA-77rc-x84q-pv4f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20245', 'https://lists.apache.org/thread.html/b549c7573b342a6e457e5a3225c33054244343927bbfb2a4cdc4cf73@%3Cdev.airflow.apache.org%3E'}
| null |
GHSA
|
GHSA-9g2w-5f3v-mfmm
|
Insecure default config of Celery worker in Apache Airflow
|
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker.
|
{'CVE-2020-11982'}
|
2021-09-22T21:19:03Z
|
2020-07-27T16:57:33Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11982', 'https://github.com/advisories/GHSA-9g2w-5f3v-mfmm', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}
| null |
GHSA
|
GHSA-vrcf-g539-x6h3
|
Uncontrolled deserialization of a pickled object in rediswrapper allows attackers to execute arbitrary scripts
|
Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts.
|
{'CVE-2019-17206'}
|
2022-03-23T20:24:50Z
|
2019-11-20T01:37:13Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://github.com/frostming/rediswrapper/pull/1', 'https://github.com/frostming/rediswrapper/commit/748f60bafd857c24f65683426f665350e2c3f91b', 'https://github.com/frostming/rediswrapper/releases/tag/v0.3.0', 'https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17206', 'https://github.com/advisories/GHSA-vrcf-g539-x6h3'}
| null |
GHSA
|
GHSA-59g4-hpg3-3gcp
|
Files Accessible to External Parties in Opencast
|
Opencast before version 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast's host machines and making them available via the web interface.
### Impact
Before Opencast 10.6, Opencast would [open and include local files during ingests](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587). Attackers could exploit this to include most local files the process has read access to, extracting secrets from the host machine.
For example, to expose the `custom.properties` of develop.opencast.org via the asset manager, an attacker could have run:
```
curl -f -i -u admin:opencast \
https://develop.opencast.org/ingest/addMediaPackage/fast \
-F 'flavor=presenter/source'\
-F mediaUri=file:///srv/opencast/opencast-dist-allinone/etc/custom.properties\
-F title="custom.properties"
```
An attacker would need to have the privileges required to add new media to exploit this. But these are often widely given.
### Patches
The issue has been fixed in Opencast 10.6 and 11.0.
### Workarounds
You can mitigate this issue by narrowing down the read access Opencast has to files on the file system using UNIX permissions or mandatory access control systems like SELinux. This cannot prevent access to files Opencast needs to read though and we highly recommend updating.
### References
- [Example of problematic code](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587).
- [Patch fixing the issue](https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
* Email us at [security@opencast.org](mailto:security@opencast.org)
|
{'CVE-2021-43821'}
|
2022-04-19T19:03:13Z
|
2021-12-14T21:44:03Z
|
CRITICAL
| 9.9
|
{'CWE-552'}
|
{'https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764', 'https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp', 'https://mvnrepository.com/artifact/org.opencastproject/opencast-ingest-service-impl', 'https://github.com/advisories/GHSA-59g4-hpg3-3gcp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43821', 'https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587'}
| null |
GHSA
|
GHSA-9r3m-mhfm-39cm
|
Incorrect Calculation in bigint-money
|
Versions of `bigint-money` prior to 0.6.2 are vulnerable to an Incorrect Calculation. The package incorrectly rounded certain numbers, which could have drastic consequences due to its usage in financial systems.
## Recommendation
Upgrade to version 0.6.2 or later.
| null |
2021-09-28T16:51:46Z
|
2020-09-11T21:10:29Z
|
LOW
| 0
|
{'CWE-682'}
|
{'https://www.npmjs.com/advisories/962', 'https://github.com/advisories/GHSA-9r3m-mhfm-39cm'}
| null |
GHSA
|
GHSA-vmf7-hmh6-vv57
|
Denial of Service in Go-Ethereum
|
A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory pool to prevent new transactions from entering the pool, resulting in a denial of service (DoS).
|
{'CVE-2022-23328'}
|
2022-03-18T20:07:00Z
|
2022-03-05T00:00:46Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'http://ethereum.com', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23328', 'https://github.com/advisories/GHSA-vmf7-hmh6-vv57', 'https://tristartom.github.io/docs/ccs21.pdf', 'http://go-ethereum.com', 'https://dl.acm.org/doi/pdf/10.1145/3460120.3485369'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.