ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-mw6q-98mp-g8g8
Cross-site Scripting in bootstrap-table
This affects all versions of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
{'CVE-2021-23472'}
2021-11-30T14:51:27Z
2021-11-08T17:54:46Z
LOW
3.1
{'CWE-79', 'CWE-843'}
{'https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23472', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690', 'https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597', 'https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688', 'https://github.com/advisories/GHSA-mw6q-98mp-g8g8'}
null
GHSA
GHSA-gff3-739c-gxfq
Reflected cross-site scripting issue in Datasette
Datasette is an open source multi-tool for exploring and publishing data. The `?_trace=1` debugging feature in Datasette does not correctly escape generated HTML, resulting in a [reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) vulnerability. This vulnerability is particularly relevant if your Datasette installation includes authenticated features using plugins such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords) as an attacker could use the vulnerability to access protected data. Datasette 0.57 and 0.56.1 both include patches for this issue. If you run Datasette behind a proxy you can workaround this issue by rejecting any incoming requests with `?_trace=` or `&_trace=` in their query string parameters.
{'CVE-2021-32670'}
2021-06-10T17:22:59Z
2021-06-10T17:22:59Z
HIGH
7.2
{'CWE-79'}
{'https://github.com/advisories/GHSA-gff3-739c-gxfq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32670', 'https://datasette.io/plugins/datasette-auth-passwords', 'https://github.com/simonw/datasette/issues/1360', 'https://github.com/simonw/datasette/security/advisories/GHSA-xw7c-jx9m-xh5g', 'https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks', 'https://pypi.org/project/datasette/'}
null
GHSA
GHSA-2frx-j9hj-6c65
User enumeration in authentication mechanisms
Description ----------- The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. Resolution ---------- We now ensure that a generic message is returned whether the user exists or not if the password is invalid or if the user does not exist. The patch for this issue is available [here](https://github.com/lexik/LexikJWTAuthenticationBundle/commit/a175d6dab968d93e96a3e4f80c495435f71d5eb7) for branch 2.10.x and 2.x. Credits ------- I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue.
null
2022-04-19T19:02:57Z
2021-05-17T20:52:21Z
LOW
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-2frx-j9hj-6c65', 'https://github.com/lexik/LexikJWTAuthenticationBundle/commit/a175d6dab968d93e96a3e4f80c495435f71d5eb7', 'https://github.com/lexik/LexikJWTAuthenticationBundle/security/advisories/GHSA-2frx-j9hj-6c65'}
null
GHSA
GHSA-xcqr-9h24-vrgw
Improper Restriction of Excessive Authentication Attempts in Argo API
As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.
{'CVE-2020-8827'}
2021-07-26T21:19:37Z
2021-07-26T21:19:37Z
HIGH
7.5
{'CWE-307'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8827', 'https://github.com/argoproj/argo-cd/pull/3404', 'https://argoproj.github.io/argo-cd/security_considerations/', 'https://github.com/advisories/GHSA-xcqr-9h24-vrgw', 'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1', 'https://github.com/argoproj/argo-cd/pull/3369', 'https://www.soluble.ai/blog/argo-cves-2020', 'https://github.com/argoproj/argo/releases', 'https://argoproj.github.io/argo-cd/operator-manual/user-management/#disable-admin-user'}
null
GHSA
GHSA-qvxv-pmq9-4q7g
High severity vulnerability that affects org.scala-lang:scala-compiler
The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges.
{'CVE-2017-15288'}
2021-09-16T21:08:27Z
2018-10-19T16:51:11Z
HIGH
7.8
{'CWE-732'}
{'http://scala-lang.org/news/security-update-nov17.html', 'https://lists.apache.org/thread.html/r10dd8e5b3bbe3bb531aa4a65472ce56f91efbb77ea9fe04bb8272e2c@%3Cjira.kafka.apache.org%3E', 'https://github.com/scala/scala/pull/6128', 'https://lists.apache.org/thread.html/r18a05115cfa078c0f4e5c1ea2e8d64804f63e0095aa2174a3afecc0f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r32e0b1d5ff43ac3ed4b179a4e663022d1c5ccac77884a99ea149e633@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r628ea3ea2fed4d9c1c5232a0b1ed108a15abc9fd2f0aaca1e8cc9164@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r33665e9213cc6df1e48c3d99d1b0c7a3203e9bd0ef4fc4ba838bcb04@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re72f4d04dfc398aae0e38dbfeccf44780df2782623a610cbfcec6f3a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15288', 'https://security.gentoo.org/glsa/201812-08', 'https://github.com/scala/scala/pull/6108', 'https://github.com/scala/scala/pull/6120', 'https://lists.apache.org/thread.html/r5a1418a4f5101f5af3fc14bf358c54f2c7200e6a3701de2e2f581e1b@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3f10022ec972c8df29a950d1a591c16562eeddd9194d3010e46b9b76@%3Cjira.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-qvxv-pmq9-4q7g', 'https://lists.apache.org/thread.html/r1d51eae81ceb7bfd1780936a48b460ab31d53ff2ed526a88a7f60fe4@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf57e4d7211b30e51803911304f3b7b54393f7a4bd60bb0784c31eec1@%3Cjira.kafka.apache.org%3E'}
null
GHSA
GHSA-9j2c-x8qm-qmjq
SQL injection in Tortoise ORM
### Impact Various forms of SQL injection has been found, for MySQL and when filtering or doing mass-updates on char/text fields. SQLite & PostgreSQL was only affected when filtering with ``contains``, ``starts_with`` or ``ends_with`` filters (and their case-insensitive counterparts) ### Patches Please upgrade to 0.15.23+ or 0.16.6+ ### For more information If you have any questions or comments about this advisory: * Open an issue in [Github](https://github.com/tortoise/tortoise-orm/issues) * Chat to us on [Gitter](https://gitter.im/tortoise/community)
{'CVE-2020-11010'}
2021-01-08T20:21:41Z
2020-04-20T21:31:23Z
MODERATE
6.3
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11010', 'https://github.com/tortoise/tortoise-orm/commit/91c364053e0ddf77edc5442914c6f049512678b3', 'https://github.com/advisories/GHSA-9j2c-x8qm-qmjq', 'https://github.com/tortoise/tortoise-orm/security/advisories/GHSA-9j2c-x8qm-qmjq'}
null
GHSA
GHSA-vcw4-8ph6-7vw8
Use after free in Rocket
An issue was discovered in the rocket crate before 0.4.7 for Rust. uri::Formatter can have a use-after-free if a user-provided function panics.
{'CVE-2021-29935'}
2021-08-25T20:54:20Z
2021-08-25T20:54:20Z
HIGH
7.3
{'CWE-416'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0044.html', 'https://github.com/advisories/GHSA-vcw4-8ph6-7vw8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29935', 'https://github.com/SergioBenitez/Rocket/issues/1534'}
null
GHSA
GHSA-4whq-r978-2x68
Arbitrary code execution in ExifTool
### Impact Arbitrary code execution can occur when running `exiftool` against files with hostile metadata payloads. ### Patches ExifTool has already been patched in version 12.24. exiftool-vendored, which vendors ExifTool, includes this patch in v14.3.0. ### Workarounds No. ### References https://twitter.com/wcbowling/status/1385803927321415687 https://nvd.nist.gov/vuln/detail/CVE-2021-22204 ### For more information If you have any questions or comments about this advisory: * Open an issue in [exiftool-vendored](https://github.com/photostructure/exiftool-vendored.js)
null
2022-04-19T19:02:56Z
2021-05-04T17:43:52Z
HIGH
7.8
{'CWE-74'}
{'https://github.com/advisories/GHSA-4whq-r978-2x68', 'https://github.com/photostructure/exiftool-vendored.js/security/advisories/GHSA-4whq-r978-2x68'}
null
GHSA
GHSA-v6wh-2wvh-c8x5
Regular Expression Denial of Service in djvalidator
All versions of package djvalidator are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails - for example, --@------------------------------------------------------------------------------------------------------------------------!.
{'CVE-2020-7779'}
2022-02-09T23:15:52Z
2022-02-09T23:15:46Z
HIGH
7.5
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-DJVALIDATOR-1018709', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7779', 'https://github.com/advisories/GHSA-v6wh-2wvh-c8x5'}
null
GHSA
GHSA-8q5c-93vg-c747
WITHDRAWN
WITHDRAWN
null
2021-08-25T21:00:30Z
2021-08-25T21:00:30Z
MODERATE
0
{'CWE-362'}
{'https://github.com/ratel-rust/toolshed/issues/12', 'https://github.com/advisories/GHSA-8q5c-93vg-c747', 'https://rustsec.org/advisories/RUSTSEC-2020-0136.html'}
null
GHSA
GHSA-vc5r-xfc4-4x22
Cross-site Scripting in Pimcore Datahub
Pimcore Datahub prior to 1.2.4 is vulnerable to stored cross-site scripting. An admin user accessing Datahub triggers the attack, which may result in the user's cookie being stolen.
{'CVE-2022-0955'}
2022-04-05T20:53:20Z
2022-03-25T00:00:33Z
MODERATE
4.8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0955', 'https://github.com/advisories/GHSA-vc5r-xfc4-4x22', 'https://github.com/pimcore/data-hub/commit/15d5b57af2466eebd3bbc531ead5dafa35d0a36e', 'https://huntr.dev/bounties/708971a6-1e6c-4c51-a411-255caeba51df'}
null
GHSA
GHSA-xp5m-4c9f-498q
Moderate severity vulnerability that affects django-epiceditor
There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field.
{'CVE-2017-6591'}
2021-09-22T14:59:43Z
2018-07-13T15:17:18Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-xp5m-4c9f-498q', 'https://nvd.nist.gov/vuln/detail/CVE-2017-6591', 'http://morningchen.com/2017/03/09/Cross-site-scripting-vulnerability-in-django-epiceditor/', 'http://www.securityfocus.com/bid/96946'}
null
GHSA
GHSA-pwfw-mgfj-7g3g
Low severity vulnerability that affects ecdsa
## possible DoS in signature verification and signature malleability ### Impact Code using `VerifyingKey.verify()` and `VerifyingKey.verify_digest()` may receive exceptions other than the documented `BadSignatureError` when signatures are malformed. If those other exceptions are not caught, they may lead to program termination and thus Denial of Service Code using `VerifyingKey.verify()` and `VerifyingKey.verify_digest()` with `sigdecode` option using `ecdsa.util.sigdecode_der` will accept signatures even if they are not properly formatted DER. This makes the signatures malleable. It impacts only applications that later sign the signatures or verify signatures of signatures, e.g. Bitcoin. All versions between 0.5 and 0.13.2 (inclusive) are thought to be vulnerable. Code before 0.5 may be vulnerable but didn't receive extended analysis to rule this issue out. ### Patches The patches have been merged to `master` branch in https://github.com/warner/python-ecdsa/pull/115. The backported patches for a release in the 0.13 branch are in https://github.com/warner/python-ecdsa/pull/124 They are part of the 0.13.3 release. There are no plans to backport them to earlier releases. ### Workarounds It may be possible to prevent the Denial of Service by catching also `UnexpectedDER`, `IndexError` and `AssertionError` exceptions. That list hasn't been verified to be complete though. If those exceptions are raised, the signature verification process should consider the signature to be invalid. To remediate signature malleability and the Denial of Service vulnerability, it may be possible to first verify that the signature is properly DER formatted ECDSA-Sig-Value, as defined in [RFC3279](https://tools.ietf.org/html/rfc3279), before passing it to `verify()` or `verify_digest()` methods. If the signature is determined to not follow the DER or encode a different structure, the signature verification process should consider the signature to be invalid. ### References https://en.bitcoinwiki.org/wiki/Transaction_Malleability ### For more information If you have any questions or comments about this advisory please open an issue in [python-ecdsa](https://github.com/warner/python-ecdsa/issues) project.
{'CVE-2019-14853'}
2021-08-30T14:39:55Z
2019-10-08T16:30:17Z
HIGH
7.5
{'CWE-391', 'CWE-755'}
{'https://github.com/advisories/GHSA-pwfw-mgfj-7g3g', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14853', 'https://github.com/warner/python-ecdsa/security/advisories/GHSA-pwfw-mgfj-7g3g'}
null
GHSA
GHSA-5phf-pp7p-vc2r
Using default SSLContext for HTTPS requests in an HTTPS proxy doesn't verify certificate hostname for proxy connection
### Impact Users who are using an HTTPS proxy to issue HTTPS requests and haven't configured their own SSLContext via `proxy_config`. Only the default SSLContext is impacted. ### Patches [urllib3 >=1.26.4 has the issue resolved](https://github.com/urllib3/urllib3/releases/tag/1.26.4). urllib3<1.26 is not impacted due to not supporting HTTPS requests via HTTPS proxies. ### Workarounds Upgrading is recommended as this is a minor release and not likely to break current usage. Configuring an `SSLContext` with `check_hostname=True` and passing via `proxy_config` instead of relying on the default `SSLContext` ### For more information If you have any questions or comments about this advisory: * Email us at [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)
{'CVE-2021-28363'}
2022-04-19T19:02:50Z
2021-03-19T19:42:11Z
MODERATE
6.5
{'CWE-295'}
{'https://security.gentoo.org/glsa/202107-36', 'https://pypi.org/project/urllib3/1.26.4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4S65ZQVZ2ODGB52IC7VJDBUK4M5INCXL/', 'https://github.com/urllib3/urllib3/commit/8d65ea1ecf6e2cdc27d42124e587c1b83a3118b0', 'https://github.com/advisories/GHSA-5phf-pp7p-vc2r', 'https://github.com/urllib3/urllib3/releases/tag/1.26.4', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/urllib3/urllib3/commits/main', 'https://github.com/urllib3/urllib3/blob/main/CHANGES.rst#1264-2021-03-15', 'https://github.com/pypa/advisory-db/tree/main/vulns/urllib3/PYSEC-2021-59.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28363', 'https://github.com/urllib3/urllib3/security/advisories/GHSA-5phf-pp7p-vc2r'}
null
GHSA
GHSA-vpmw-77vm-4mjg
Cross-site Scripting in Cipi
Cipi 3.1.15 allows Add Server stored cross-site scripting via the /api/servers name field.
{'CVE-2022-26332'}
2022-03-11T23:24:35Z
2022-03-02T00:00:21Z
MODERATE
5.4
{'CWE-79'}
{'https://www.exploit-db.com/exploits/50788', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26332', 'https://github.com/andreapollastri/cipi/releases', 'https://github.com/advisories/GHSA-vpmw-77vm-4mjg'}
null
GHSA
GHSA-5rrq-pxf6-6jx5
Prototype Pollution in node-forge debug API.
### Impact The `forge.debug` API had a potential prototype pollution issue if called with untrusted input. The API was only used for internal debug purposes in a safe way and never documented or advertised. It is suspected that uses of this API, if any exist, would likely not have used untrusted inputs in a vulnerable way. ### Patches The `forge.debug` API and related functions were removed in 1.0.0. ### Workarounds Don't use the `forge.debug` API directly or indirectly with untrusted input. ### References - https://www.huntr.dev/bounties/1-npm-node-forge/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge). * Email us at support@digitalbazaar.com.
null
2022-01-08T00:22:42Z
2022-01-08T00:22:42Z
LOW
0
{'CWE-1321'}
{'https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5', 'https://github.com/advisories/GHSA-5rrq-pxf6-6jx5'}
null
GHSA
GHSA-xpxm-pf7g-2534
Cross-site scripting in media2click
The media2click (aka 2 Clicks for External Media) extension 1.x before 1.3.3 for TYPO3 allows XSS by a backend user account.
{'CVE-2021-31778'}
2021-06-08T20:11:52Z
2021-06-08T20:11:52Z
MODERATE
6.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-xpxm-pf7g-2534', 'https://github.com/ghermens/media2click/commit/3c4e413fbc7d35c47212e754c24d5070637a11a3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31778', 'https://packagist.org/packages/amazing/media2click', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-004'}
null
GHSA
GHSA-cfh5-3ghh-wfjx
Moderate severity vulnerability that affects org.apache.httpcomponents:httpclient
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
{'CVE-2014-3577'}
2021-10-08T20:35:21Z
2018-10-17T00:05:06Z
MODERATE
0
{'CWE-347'}
{'http://www.osvdb.org/110143', 'https://github.com/advisories/GHSA-cfh5-3ghh-wfjx', 'http://rhn.redhat.com/errata/RHSA-2015-0675.html', 'http://www.securitytracker.com/id/1030812', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/95327', 'http://rhn.redhat.com/errata/RHSA-2014-1834.html', 'http://rhn.redhat.com/errata/RHSA-2014-1892.html', 'http://rhn.redhat.com/errata/RHSA-2015-0125.html', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'http://secunia.com/advisories/60589', 'http://rhn.redhat.com/errata/RHSA-2014-1146.html', 'http://seclists.org/fulldisclosure/2014/Aug/48', 'http://rhn.redhat.com/errata/RHSA-2015-0720.html', 'http://rhn.redhat.com/errata/RHSA-2015-0850.html', 'http://rhn.redhat.com/errata/RHSA-2015-1177.html', 'http://rhn.redhat.com/errata/RHSA-2014-1166.html', 'http://rhn.redhat.com/errata/RHSA-2015-0851.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3577', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://secunia.com/advisories/60466', 'http://www.ubuntu.com/usn/USN-2769-1', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'http://www.securityfocus.com/bid/69258', 'http://rhn.redhat.com/errata/RHSA-2014-1891.html', 'http://rhn.redhat.com/errata/RHSA-2014-1835.html', 'http://rhn.redhat.com/errata/RHSA-2016-1773.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05363782', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2014-1833.html', 'http://rhn.redhat.com/errata/RHSA-2014-1836.html', 'http://rhn.redhat.com/errata/RHSA-2016-1931.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html', 'http://rhn.redhat.com/errata/RHSA-2015-1888.html', 'http://packetstormsecurity.com/files/127913/Apache-HttpComponents-Man-In-The-Middle.html', 'http://rhn.redhat.com/errata/RHSA-2015-0765.html', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'http://secunia.com/advisories/60713', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564', 'http://rhn.redhat.com/errata/RHSA-2015-1176.html', 'http://www.openwall.com/lists/oss-security/2021/10/06/1', 'http://rhn.redhat.com/errata/RHSA-2015-0158.html', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://access.redhat.com/solutions/1165533', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}
null
GHSA
GHSA-8v38-pw62-9cw2
Incorrect returned href via an '@' sign but no user info and hostname
A specially crafted URL with an '@' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular, ````` parse(\"http://@/127.0.0.1\") ````` Will return: ````` { slashes: true, protocol: 'http:', hash: '', query: '', pathname: '/127.0.0.1', auth: '', host: '', port: '', hostname: '', password: '', username: '', origin: 'null', href: 'http:///127.0.0.1' } ````` If the 'hostname' or 'origin' attributes of the output from url-parse are used in security decisions and the final 'href' attribute of the output is then used to make a request, the decision may be incorrect.
{'CVE-2022-0639'}
2022-04-19T19:03:27Z
2022-02-18T00:00:33Z
MODERATE
6.5
{'CWE-639'}
{'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788', 'https://github.com/advisories/GHSA-8v38-pw62-9cw2', 'https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0639'}
null
GHSA
GHSA-7257-96vg-qf6x
Remote Code Execution in Red Discord Bot
### Impact A RCE exploit has been discovered in the Streams module: this exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. ### Patches This critical exploit has been fixed on version ``3.3.12`` & ``3.4``. ### Workarounds Unloading the Streams module with ``unload streams`` can render this exploit not accessible. We still highly recommend updating to ``3.3.12`` or ``3.4`` to completely patch this issue. ### References * https://github.com/Cog-Creators/Red-DiscordBot/pull/4183 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot) * Over on our [Discord server](https://discord.gg/red)
{'CVE-2020-15147'}
2022-04-19T19:02:33Z
2020-08-21T17:03:24Z
HIGH
8.5
{'CWE-94', 'CWE-74'}
{'https://github.com/advisories/GHSA-7257-96vg-qf6x', 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-7257-96vg-qf6x', 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4183/commits/e269ea0d3bc88417163c18431b1df38a9be92bfc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15147', 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4183'}
null
GHSA
GHSA-mx9v-gmh4-mgqw
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.
{'CVE-2018-19361'}
2021-06-10T22:10:26Z
2019-01-04T19:07:01Z
CRITICAL
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4452', 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://github.com/FasterXML/jackson-databind/issues/2186', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://github.com/advisories/GHSA-mx9v-gmh4-mgqw', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://issues.apache.org/jira/browse/TINKERPOP-2121', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1782', 'http://www.securityfocus.com/bid/107985', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19361'}
null
GHSA
GHSA-48hw-37g6-3gw4
Malicious Package in mx-nested-menu
Version 0.1.30 of `mx-nested-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T02:35:41Z
2020-09-03T02:35:41Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-48hw-37g6-3gw4', 'https://www.npmjs.com/advisories/947'}
null
GHSA
GHSA-4cww-f7w5-x525
Stack consumption in trust-dns-server
An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption.
{'CVE-2020-35857'}
2021-08-25T20:46:13Z
2021-08-25T20:46:13Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35857', 'https://github.com/bluejekyll/trust-dns/issues/980', 'https://github.com/advisories/GHSA-4cww-f7w5-x525', 'https://rustsec.org/advisories/RUSTSEC-2020-0001.html'}
null
GHSA
GHSA-fhpf-pp6p-55qc
Unsafe handling of user-specified cookies in treq
### Impact Treq's request methods (`treq.get`, `treq.post`, `HTTPClient.request`, `HTTPClient.get`, etc.) accept cookies as a dictionary, for example: ```py treq.get('https://example.com/', cookies={'session': '1234'}) ``` Such cookies are not bound to a single domain, and are therefore sent to *every* domain ("supercookies"). This can potentially cause sensitive information to leak upon an HTTP redirect to a different domain., e.g. should `https://example.com` redirect to `http://cloudstorageprovider.com` the latter will receive the cookie `session`. ### Patches Treq 2021.1.0 and later bind cookies given to request methods (`treq.request`, `treq.get`, `HTTPClient.request`, `HTTPClient.get`, etc.) to the origin of the *url* parameter. ### Workarounds Instead of passing a dictionary as the *cookies* argument, pass a `http.cookiejar.CookieJar` instance with properly domain- and scheme-scoped cookies in it: ```py from http.cookiejar import CookieJar from requests.cookies import create_cookie jar = CookieJar() jar.add_cookie( create_cookie( name='session', value='1234', domain='example.com', secure=True, ), ) client = HTTPClient(cookies=jar) client.get('https://example.com/') ``` ### References * Originally reported at [huntr.dev](https://huntr.dev/bounties/3c9204fc-a3d1-4441-8599-924c5f57e7ae/?token=06d930e37046c914bcb037e85cc227dc7b510b475989fc69837566562ba899277d46b0fb4b1e21cdcb6ddc1b7d9b1ded632cf3a3551ecb89afca16a63b34641284b50479d5195bba2ac09b116f3dd4fad27f54404c2de922c05c8c8b744aec27bb4d4d198cb8b3abf479af0c2d5fbaa10412da7922594ac3eb39) * A related issue in the handling of HTTP basic authentication was addressed in Twisted 22.1 ([GHSA-92x2-jw7w-xvvx](https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx), CVE-2022-21712).
{'CVE-2022-23607'}
2022-03-25T19:28:28Z
2022-02-01T00:43:38Z
MODERATE
6.5
{'CWE-200', 'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23607', 'https://huntr.dev/bounties/3c9204fc-a3d1-4441-8599-924c5f57e7ae/?token=06d930e37046c914bcb037e85cc227dc7b510b475989fc69837566562ba899277d46b0fb4b1e21cdcb6ddc1b7d9b1ded632cf3a3551ecb89afca16a63b34641284b50479d5195bba2ac09b116f3dd4fad27f54404c2de922c05c8c8b744aec27bb4d4d198cb8b3abf479af0c2d5fbaa10412da7922594ac3eb39', 'https://github.com/twisted/treq/releases/tag/release-22.1.0', 'https://github.com/advisories/GHSA-fhpf-pp6p-55qc', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00025.html', 'https://github.com/twisted/treq/commit/1da6022cc880bbcff59321abe02bf8498b89efb2', 'https://github.com/twisted/treq/security/advisories/GHSA-fhpf-pp6p-55qc'}
null
GHSA
GHSA-7wpw-2hjm-89gp
Prototype Pollution in merge
All versions of package merge <2.1.1 are vulnerable to Prototype Pollution via _recursiveMerge .
{'CVE-2020-28499'}
2021-05-18T21:54:59Z
2021-05-04T20:18:47Z
HIGH
7.3
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-MERGE-1042987', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049', 'https://vuldb.com/?id.170146', 'https://github.com/yeikos/js.merge/blob/master/src/index.ts%23L64', 'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4', 'https://github.com/advisories/GHSA-7wpw-2hjm-89gp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28499', 'https://github.com/yeikos/js.merge/blob/56ca75b2dd0f2820f1e08a49f62f04bbfb8c5f8f/src/index.ts#L64'}
null
GHSA
GHSA-wjm3-fq3r-5x46
Denial of service
GJSON <1.6.5 allows attackers to cause a denial of service (remote) via crafted JSON.
{'CVE-2020-36066'}
2021-05-18T21:07:54Z
2021-05-18T21:07:54Z
MODERATE
7.5
{'CWE-400'}
{'https://github.com/tidwall/match/commit/c2f534168b739a7ec1821a33839fb2f029f26bbc', 'https://github.com/advisories/GHSA-wjm3-fq3r-5x46', 'https://github.com/tidwall/gjson/issues/195', 'https://github.com/tidwall/gjson/issues/195#issuecomment-755303148', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36066'}
null
GHSA
GHSA-wjpc-cgvw-xx23
Prototype Pollution in sey
All versions of package `sey` are vulnerable to Prototype Pollution via the deepmerge() function.
{'CVE-2021-23663'}
2021-12-16T14:29:34Z
2021-12-16T14:29:34Z
MODERATE
6.5
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23663', 'https://snyk.io/vuln/SNYK-JS-SEY-1727592', 'https://github.com/advisories/GHSA-wjpc-cgvw-xx23'}
null
GHSA
GHSA-772p-x54p-hjrv
Division by zero in `Conv3D`
### Impact A malicious user could trigger a division by 0 in `Conv3D` implementation: ```python import tensorflow as tf input_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) filter_tensor = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 56, 56, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 23, 1]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/42033603003965bffac51ae171b51801565e002d/tensorflow/core/kernels/conv_ops_3d.cc#L143-L145) does a modulo operation based on user controlled input: ```cc const int64 out_depth = filter.dim_size(4); OP_REQUIRES(context, in_depth % filter_depth == 0, ...); ``` Thus, when `filter` has a 0 as the fifth element, this results in a division by 0. Additionally, if the shape of the two tensors is not valid, an Eigen assertion can be triggered, resulting in a program crash: ```python import tensorflow as tf input_tensor = tf.constant([], shape=[2, 2, 2, 2, 0], dtype=tf.float32) filter_tensor = tf.constant([], shape=[0, 0, 2, 6, 2], dtype=tf.float32) tf.raw_ops.Conv3D(input=input_tensor, filter=filter_tensor, strides=[1, 56, 39, 34, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) ``` The shape of the two tensors must follow the constraints specified in the [op description](https://www.tensorflow.org/api_docs/python/tf/raw_ops/Conv3D). ### Patches We have patched the issue in GitHub commit [799f835a3dfa00a4d852defa29b15841eea9d64f](https://github.com/tensorflow/tensorflow/commit/799f835a3dfa00a4d852defa29b15841eea9d64f). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29517'}
2021-05-21T14:21:01Z
2021-05-21T14:21:01Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/799f835a3dfa00a4d852defa29b15841eea9d64f', 'https://github.com/advisories/GHSA-772p-x54p-hjrv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29517', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772p-x54p-hjrv'}
null
GHSA
GHSA-pv55-r6j3-wp94
Malicious Package in eslint-config-eslint
Version 5.0.2 of `eslint-config-eslint` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to a remote server. ## Recommendation The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
null
2020-09-01T20:45:57Z
2020-09-01T20:45:57Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-pv55-r6j3-wp94', 'https://www.npmjs.com/advisories/674'}
null
GHSA
GHSA-p463-639r-q9g9
High severity vulnerability that affects dragonfly
The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request.
{'CVE-2013-1756'}
2021-09-15T21:29:21Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-94'}
{'http://secunia.com/advisories/52380', 'https://groups.google.com/forum/?fromgroups=#!topic/dragonfly-users/3c3WIU3VQTo', 'https://github.com/advisories/GHSA-p463-639r-q9g9', 'http://www.securityfocus.com/bid/58225', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1756', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82476', 'https://github.com/markevans/dragonfly/commit/a8775aacf9e5c81cf11bec34b7afa7f27ddfe277'}
null
GHSA
GHSA-6956-83fg-5wc5
Prototype Pollution in set-in
The package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)
{'CVE-2022-25354'}
2022-03-29T21:05:16Z
2022-03-18T00:01:11Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24', 'https://github.com/ahdinosaur/set-in/blob/dfc226d95cce8129de6708661e06e0c2c06f3490/index.js%23L5', 'https://github.com/advisories/GHSA-6956-83fg-5wc5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25354', 'https://snyk.io/vuln/SNYK-JS-SETIN-2388571'}
null
GHSA
GHSA-p63h-7hw8-5cw4
Cross-Site Request Forgery in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection, and since there is no validation of an existing user name while renaming a user. As a result, privileges of the renamed user are being overwritten by the old user and the old user is being deleted from the user list.
{'CVE-2021-25930'}
2021-05-28T22:25:42Z
2021-05-25T18:46:49Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-p63h-7hw8-5cw4', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25930', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25930'}
null
GHSA
GHSA-p9f8-gqjf-m75j
Uncontrolled Resource Consumption in fastify-multipart
Prototype pollution vulnerability in `fastify-multipart` < 1.0.5 allows an attacker to crash fastify applications parsing multipart requests by sending a specially crafted request.
{'CVE-2020-8136'}
2021-05-26T20:05:48Z
2021-05-06T17:28:36Z
MODERATE
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-p9f8-gqjf-m75j', 'https://hackerone.com/reports/804772', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8136'}
null
GHSA
GHSA-3rx2-x6mx-grj3
Cross-site scripting in Apache JSPWiki
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
{'CVE-2019-10089'}
2021-08-17T22:35:56Z
2019-10-11T18:41:54Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-3rx2-x6mx-grj3', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10089'}
null
GHSA
GHSA-3r9x-mjrm-2725
Prototype pollution vulnerability in 'libnested'
Prototype pollution vulnerability in 'libnested' versions 0.0.0 through 1.5.0 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28283'}
2021-10-12T16:27:02Z
2021-10-12T16:27:02Z
CRITICAL
9.8
null
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28284', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28283', 'https://github.com/advisories/GHSA-3r9x-mjrm-2725', 'https://github.com/dominictarr/libnested/blob/d028a1b0f2e5f16fc28e568f52b936ae0bca0647/index.js#L27'}
null
GHSA
GHSA-w9mp-p2wp-2xf7
Improper file downloads in Apache Tapestry
In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run.
{'CVE-2020-13953'}
2022-02-10T20:35:42Z
2022-02-10T20:35:42Z
MODERATE
5.3
{'CWE-552'}
{'https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb@%3Cusers.tapestry.apache.org%3E', 'https://github.com/advisories/GHSA-w9mp-p2wp-2xf7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13953', 'https://lists.apache.org/thread.html/r50eb12e8a12074a9b7ed63cbab91d180d19cc23dc1da3ed5b6e1280f%40%3Cusers.tapestry.apache.org%3E'}
null
GHSA
GHSA-cxmj-qjv6-vx9p
Low severity vulnerability that affects mcstatic
A server directory traversal vulnerability was found on node module mcstatic <=0.0.20 that would allow an attack to access sensitive information in the file system by appending slashes in the URL path.
{'CVE-2018-16482'}
2021-01-08T18:55:25Z
2019-02-07T18:15:44Z
LOW
0
{'CWE-22'}
{'https://hackerone.com/reports/330285', 'https://github.com/advisories/GHSA-cxmj-qjv6-vx9p', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16482'}
null
GHSA
GHSA-9gp7-jvm2-r4mx
Moderate severity vulnerability that affects org.apache.struts:struts2-core
If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12.
{'CVE-2017-7672'}
2021-09-07T21:36:01Z
2018-10-16T19:36:43Z
MODERATE
5.9
{'CWE-20'}
{'http://www.securityfocus.com/bid/99563', 'https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d@%3Cannouncements.struts.apache.org%3E', 'http://struts.apache.org/docs/s2-047.html', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7672', 'https://security.netapp.com/advisory/ntap-20180706-0002/', 'https://github.com/advisories/GHSA-9gp7-jvm2-r4mx', 'http://www.securitytracker.com/id/1039114'}
null
GHSA
GHSA-rqp5-pg7w-832p
Code Injection in datagrid
The datagrid gem 1.0.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party.
{'CVE-2019-14281'}
2021-08-17T20:22:55Z
2019-07-31T04:21:27Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-14281', 'https://rubygems.org/gems/datagrid/versions', 'https://github.com/rubygems/rubygems.org/issues/2072', 'https://github.com/advisories/GHSA-rqp5-pg7w-832p'}
null
GHSA
GHSA-j39c-c8hj-x4j3
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
{'CVE-2021-25122'}
2022-02-08T21:34:10Z
2021-06-16T17:45:29Z
HIGH
7.5
{'CWE-200'}
{'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25122', 'http://www.openwall.com/lists/oss-security/2021/03/01/1', 'https://security.netapp.com/advisory/ntap-20210409-0002/', 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4891', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-j39c-c8hj-x4j3', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-mrq4-7ch7-2465
Server Side Twig Template Injection
PrestaShop is an Open Source e-commerce platform. Starting with version 1.7.0.0 and ending with version 1.7.8.3, an attacker is able to inject twig code inside the back office when using the legacy layout. The problem is fixed in version 1.7.8.3. There are no known workarounds.
{'CVE-2022-21686'}
2022-04-19T19:03:20Z
2022-01-27T18:32:47Z
CRITICAL
9
{'CWE-94'}
{'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21686', 'https://github.com/PrestaShop/PrestaShop/commit/d02b469ec365822e6a9f017e57f588966248bf21', 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-mrq4-7ch7-2465', 'https://github.com/advisories/GHSA-mrq4-7ch7-2465'}
null
GHSA
GHSA-wgfq-7857-4jcc
Uncontrolled Resource Consumption in json-bigint
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
{'CVE-2020-8237'}
2021-05-07T16:47:19Z
2021-05-07T16:47:19Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-wgfq-7857-4jcc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8237', 'https://hackerone.com/reports/916430'}
null
GHSA
GHSA-rw98-5846-pqhx
Open redirect in microweber
Open Redirect in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0597'}
2022-02-24T13:56:27Z
2022-02-16T00:01:45Z
MODERATE
6.1
{'CWE-601'}
{'https://huntr.dev/bounties/68c22eab-cc69-4e9f-bcb6-2df3db626813', 'https://github.com/microweber/microweber/commit/acfc6a581d1ea86096d1b0ecd8a0eec927c0e9b2', 'https://github.com/advisories/GHSA-rw98-5846-pqhx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0597'}
null
GHSA
GHSA-cr3x-7m39-c6jq
Potential remote code execution of user-provided local names in ActionView
The is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.
{'CVE-2020-8163'}
2021-01-07T23:47:59Z
2020-07-07T16:34:27Z
MODERATE
0
{'CWE-94'}
{'https://github.com/advisories/GHSA-cr3x-7m39-c6jq', 'https://hackerone.com/reports/304805', 'https://groups.google.com/forum/#!topic/rubyonrails-security/hWuKcHyoKh0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8163', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8163.yml', 'https://groups.google.com/g/rubyonrails-security/c/hWuKcHyoKh0', 'http://packetstormsecurity.com/files/158604/Ruby-On-Rails-5.0.1-Remote-Code-Execution.html'}
null
GHSA
GHSA-8v99-48m9-c8pm
Incorrect Authorization in imgcrypt
Imgcrypt implements a function `CheckAuthorization()` that is supposed to check whether a user is authorized to access an encrypted image given the keys that the user has provided on the command line that would enable decryption of the image. The check is to prevent that a user can start a container from an image that has previously been decrypted by another user on the same system and therefore a decrypted version of the image layers may be already available in the cache locally. The failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. In the version prior to the fix, only the first architecture in the list was tested, which may not have its layers available locally (were not pulled) since it cannot be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run lead to other architectures in the ManifestList be able to run an image without providing keys if that image had previously been decrypted. The fixed version now skips over irrelevant architectures and tests the Manifest of the local architecture, if available. Known projects that use the `CheckAuthorization()` of imgcrypt is for example the ctr-enc client tool provided by imgcrypt. In this implementation, the call to `CheckAuthorization()` is used on the client side and could therefore also be easily circumvented by a modified client tool not calling this function. In relation to the vulnerability in ctr-enc, affected environments would have to allow different users to invoke ctr-enc indirectly using some sort of management stack that gives user indirect access to ctr-enc. The patch has been applied to imgcrypt v1.1.4. Workarounds may include usage of different namespaces for each remote user.
{'CVE-2022-24778'}
2022-04-13T03:57:34Z
2022-03-28T19:33:44Z
HIGH
7.5
{'CWE-863'}
{'https://github.com/containerd/imgcrypt/releases/tag/v1.1.4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24778', 'https://github.com/containerd/imgcrypt/security/advisories/GHSA-8v99-48m9-c8pm', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFTJR5CR5EOYDVOSBZEMLBHLJRTPJPUA/', 'https://github.com/containerd/imgcrypt/issues/69', 'https://github.com/containerd/imgcrypt/commit/6fdd9818a4d8142107b7ecd767d839c9707700d9', 'https://github.com/advisories/GHSA-8v99-48m9-c8pm', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAHAAOOA3KZJC2I5WHCR3XVBJBNWTWUE/'}
null
GHSA
GHSA-qm58-cvvm-c5qr
Unsafe upload filtering leading to remote code execution
### Impact Before elFinder 2.1.58, the upload filter did not disallow the upload of `.phar` files. As several Linux distributions are now shipping Apache configured in a way it will process these files as PHP scripts, attackers could gain arbitrary code execution on the server hosting the PHP connector (even in minimal configuration). ### Patches The issue has been addressed with https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1, associating `.phar` files to the right MIME type. Unless explicitly allowed in the configuration, such files cannot be uploaded anymore. This patch is part of the last release of elFinder, 2.1.58. ### Workarounds If you can't update to 2.1.58, make sure your connector is not exposed without authentication. ### Important tips Server-side scripts can often be created as text files. Currently, elFinder has an appropriate MIME type set for file extensions that are generally runnable on a web server. However, the server has various settings. In some cases, the executable file may be judged as "text/plain". Therefore, elFinder installers should understand the extensions that can be executed on the web server where elFinder is installed, and check if there are any missing items in the elFinder settings. The elFinder PHP connector has an option "additionalMimeMap" that specifies the MIME type for each extension. See [#3295(comment)](https://github.com/Studio-42/elFinder/issues/3295#issuecomment-853042139) for more information. ### References - https://snyk.io/vuln/composer:studio-42%2Felfinder - https://github.com/Studio-42/elFinder/issues/3295 - Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time. ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to support [at] snyk.io or vulnerability.research [at] sonarsource.com; - The maintainers, by opening an issue on this repository.
{'CVE-2021-23394'}
2022-04-19T19:02:59Z
2021-06-15T15:51:02Z
HIGH
8.1
{'CWE-434'}
{'https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23394', 'https://github.com/advisories/GHSA-qm58-cvvm-c5qr', 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr', 'https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1', 'https://github.com/Studio-42/elFinder', 'https://github.com/Studio-42/elFinder/issues/3295'}
null
GHSA
GHSA-qx2f-477c-35rq
Regular Expression Denial of Service in method-override
Affected versions of `method-override` are vulnerable to a regular expression denial of service vulnerability when untrusted user input is passed into the `X-HTTP-Method-Override` header. ## Recommendation Update to version 2.3.10 or later
{'CVE-2017-16136'}
2021-01-08T01:58:18Z
2018-07-24T20:06:04Z
HIGH
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-qx2f-477c-35rq', 'https://www.npmjs.com/advisories/538', 'https://nodesecurity.io/advisories/538', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16136'}
null
GHSA
GHSA-hwh3-fhf6-73x9
Malicious Package in bictoinjs-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:38:21Z
2020-09-04T15:36:09Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-hwh3-fhf6-73x9', 'https://www.npmjs.com/advisories/1356'}
null
GHSA
GHSA-4xcv-9jjx-gfj3
Denial of Service in mem
Versions of `mem` prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its `maxAge` property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging. ## Recommendation Upgrade to version 4.0.0 or later.
null
2021-08-17T15:44:45Z
2019-07-05T21:07:58Z
MODERATE
5.1
{'CWE-400'}
{'https://www.npmjs.com/advisories/1084', 'https://github.com/advisories/GHSA-4xcv-9jjx-gfj3', 'https://bugzilla.redhat.com/show_bug.cgi?id=1623744', 'https://snyk.io/vuln/npm:mem:20180117', 'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'}
null
GHSA
GHSA-j8f4-2w4p-mhjc
Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc
A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.
{'CVE-2017-0256'}
2021-07-01T21:44:55Z
2018-10-16T19:57:48Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/aspnet/Announcements/issues/239', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0256', 'https://github.com/advisories/GHSA-j8f4-2w4p-mhjc'}
null
GHSA
GHSA-9pv8-q5rx-c8gq
Critical severity vulnerability that affects django_make_app
An exploitable vulnerability exists in the YAML parsing functionality in the read_yaml_file method in io_utils.py in django_make_app 0.1.3. A YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.
{'CVE-2017-16764'}
2021-09-08T20:21:23Z
2018-07-13T15:16:59Z
CRITICAL
9.8
null
{'https://github.com/advisories/GHSA-9pv8-q5rx-c8gq', 'https://github.com/illagrenan/django-make-app/issues/5', 'https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16764-vulnerability-in-django-make-app/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16764'}
null
GHSA
GHSA-qvrv-2x7x-78x2
Reflected XSS in SilverStripe
SilverStripe through 4.4.x before 4.4.5 and 4.5.x before 4.5.2 allows Reflected XSS on the login form and custom forms. Silverstripe Forms allow malicious HTML or JavaScript to be inserted through non-scalar FormField attributes, which allows performing XSS (Cross-Site Scripting) on some forms built with user input (Request data). This can lead to phishing attempts to obtain a user&amp;#39;s credentials or other sensitive user input.
{'CVE-2019-19325'}
2021-08-19T17:22:37Z
2020-02-24T17:33:31Z
MODERATE
6.1
{'CWE-78'}
{'https://github.com/advisories/GHSA-qvrv-2x7x-78x2', 'https://www.silverstripe.org/download/security-releases/cve-2019-19325', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19325', 'https://github.com/silverstripe/silverstripe-framework/commit/49fda52b12ba59f0a04bcabf78425586a8779e89'}
null
GHSA
GHSA-8gc6-65mm-xr6r
Malicious Package in bp66
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:44:27Z
2020-09-04T16:46:28Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-8gc6-65mm-xr6r', 'https://www.npmjs.com/advisories/1372'}
null
GHSA
GHSA-c6fh-56w7-fvjw
Integer overflow in Tensorflow
### Impact The [implementation of shape inference for `Dequantize`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034) is vulnerable to an integer overflow weakness: ```python import tensorflow as tf input = tf.constant([1,1],dtype=tf.qint32) @tf.function def test(): y = tf.raw_ops.Dequantize( input=input, min_range=[1.0], max_range=[10.0], mode='MIN_COMBINED', narrow_range=False, axis=2**31-1, dtype=tf.bfloat16) return y test() ``` The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked, and, since the code computes `axis + 1`, an attacker can trigger an integer overflow: ```cc int axis = -1; Status s = c->GetAttr("axis", &axis); // ... if (axis < -1) { return errors::InvalidArgument("axis should be at least -1, got ", axis); } // ... if (axis != -1) { ShapeHandle input; TF_RETURN_IF_ERROR(c->WithRankAtLeast(c->input(0), axis + 1, &input)); // ... } ``` ### Patches We have patched the issue in GitHub commit [b64638ec5ccaa77b7c1eb90958e3d85ce381f91b](https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
{'CVE-2022-21727'}
2022-02-10T00:16:34Z
2022-02-09T18:29:13Z
HIGH
7.6
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c6fh-56w7-fvjw', 'https://github.com/advisories/GHSA-c6fh-56w7-fvjw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21727'}
null
GHSA
GHSA-grh7-935j-hg6w
Cross-site Scripting in Sidekiq
Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used.
{'CVE-2021-30151'}
2022-03-11T21:27:31Z
2021-10-06T17:47:17Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-grh7-935j-hg6w', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30151', 'https://github.com/mperham/sidekiq/commit/64f70339d1dcf50a55c00d36bfdb61d97ec63ed8', 'https://github.com/mperham/sidekiq/issues/4852'}
null
GHSA
GHSA-rc4q-9m69-gqp8
Lack of protection against cookie tossing attacks in fastify-csrf
### Impact Users that used fastify-csrf with the "double submit" mechanism using cookies with an application deployed across multiple subdomains, e.g. "heroku"-style platform as a service. ### Patches Version 3.1.0 of the fastify-csrf fixes it. See https://github.com/fastify/fastify-csrf/pull/51 and https://github.com/fastify/csrf/pull/2. The user of the module would need to supply a `userInfo` when generating the CSRF token to fully implement the protection on their end. This is needed only for applications hosted on different subdomains. ### Workarounds None available. ### References 1. https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html 2. https://owasp.org/www-pdf-archive/David_Johansson-Double_Defeat_of_Double-Submit_Cookie.pdf ### Credits This vulnerability was found by Xhelal Likaj <xhelallikaj20@gmail.com>. ### For more information If you have any questions or comments about this advisory: * Open an issue in [fastify-csrf](https://github.com/fastify/fastify-csrf) * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
{'CVE-2021-29624'}
2021-05-28T22:03:58Z
2021-05-17T20:53:30Z
MODERATE
6.5
{'CWE-352', 'CWE-565'}
{'https://github.com/fastify/fastify-csrf/pull/51', 'https://github.com/fastify/csrf/pull/2', 'https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29624', 'https://github.com/advisories/GHSA-rc4q-9m69-gqp8', 'https://github.com/fastify/fastify-csrf/security/advisories/GHSA-rc4q-9m69-gqp8', 'https://github.com/fastify/fastify-csrf/releases/tag/v3.1.0', 'https://owasp.org/www-pdf-archive/David_Johansson-Double_Defeat_of_Double-Submit_Cookie.pdf'}
null
GHSA
GHSA-29gp-2c3m-3j6m
Sandbox Escape by math function in smarty
### Impact Template authors could run arbitrary PHP code by crafting a malicious math string. If a math string is passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. ### Patches Please upgrade to 4.0.2 or 3.1.42 or higher. ### References See [documentation on Math function](https://www.smarty.net/docs/en/language.function.math.tpl). ### For more information If you have any questions or comments about this advisory please open an issue in [the Smarty repo](https://github.com/smarty-php/smarty)
{'CVE-2021-29454'}
2022-01-20T15:34:11Z
2022-01-12T22:43:00Z
HIGH
8.1
{'CWE-74'}
{'https://github.com/smarty-php/smarty/releases/tag/v3.1.42', 'https://www.smarty.net/docs/en/language.function.math.tpl', 'https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71', 'https://github.com/advisories/GHSA-29gp-2c3m-3j6m', 'https://github.com/smarty-php/smarty/releases/tag/v4.0.2', 'https://packagist.org/packages/smarty/smarty', 'https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29454'}
null
GHSA
GHSA-f7ph-p5rv-phw2
Cross-Site Scripting in nunjucks
Affected versions of `nunjucks` do not properly escape specially structured user input in template vars when in auto-escape mode, resulting in a cross-site scripting vulnerability. ## Proof of Concept By using an array for the keys in a template var, escaping is bypassed. ```javascript name[]=<script>alert(1)</script> ``` A full PoC is available in the references section. ## Recommendation Update to version 2.4.3 or later.
{'CVE-2016-10547'}
2021-01-08T18:53:55Z
2018-11-06T23:13:37Z
MODERATE
0
{'CWE-79'}
{'https://github.com/matt-/nunjucks_test', 'https://github.com/mozilla/nunjucks/issues/835', 'https://github.com/advisories/GHSA-f7ph-p5rv-phw2', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10547', 'https://nodesecurity.io/advisories/147', 'https://www.npmjs.com/advisories/147'}
null
GHSA
GHSA-6vwx-mwp8-fh44
Cross-site Scripting in reveal.js
Insufficient validation in cross-origin communication (postMessage) in reveal.js version 3.9.1 and earlier allow attackers to perform cross-site scripting attacks.
{'CVE-2020-8127'}
2021-05-10T18:47:10Z
2021-05-10T18:47:10Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8127', 'https://github.com/advisories/GHSA-6vwx-mwp8-fh44', 'https://hackerone.com/reports/691977'}
null
GHSA
GHSA-p9w3-gwc2-cr49
HTTP Request Smuggling in Undertow
A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own.
{'CVE-2020-10687'}
2022-02-11T21:12:07Z
2021-04-30T17:28:52Z
MODERATE
4.8
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-10687', 'https://bugzilla.redhat.com/show_bug.cgi?id=1785049', 'https://lists.apache.org/thread.html/r6603513ea8afbf6857fd77ca5888ec8385d0af493baa4250e28c351c@%3Cdev.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-p9w3-gwc2-cr49', 'https://security.netapp.com/advisory/ntap-20220210-0015/'}
null
GHSA
GHSA-qg8p-v9q4-gh34
Potential Command Injection in shell-quote
Affected versions of `shell-quote` do not properly escape command line arguments, which may result in command injection if the library is used to escape user input destined for use as command line arguments. ## Proof of Concept: The following characters are not escaped properly: `>`,`;`,`{`,`}` Bash has a neat but not well known feature known as "Bash Brace Expansion", wherein a sub-command can be executed without spaces by running it between a set of `{}` and using the `,` instead of ` ` to seperate arguments. Because of this, full command injection is possible even though it was initially thought to be impossible. ``` const quote = require('shell-quote').quote; console.log(quote(['a;{echo,test,123,234}'])); // Actual "a;{echo,test,123,234}" // Expected "a\;\{echo,test,123,234\}" // Functional Equivalent "a; echo 'test' '123' '1234'" ``` ## Recommendation Update to version 1.6.1 or later.
{'CVE-2016-10541'}
2021-01-08T01:58:43Z
2019-02-18T23:58:29Z
CRITICAL
0
{'CWE-78'}
{'https://nodesecurity.io/advisories/117', 'https://www.npmjs.com/advisories/117', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10541', 'https://github.com/advisories/GHSA-qg8p-v9q4-gh34'}
null
GHSA
GHSA-9jjr-qqfp-ppwx
remote code execution via git repo provider
### Impact A remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the BinderHub context, with the potential to egress credentials of the BinderHub deployment, including JupyterHub API tokens, kubernetes service accounts, and docker registry credentials. This may provide the ability to manipulate images and other user created pods in the deployment, with the potential to escalate to the host depending on the underlying kubernetes configuration. ### Patches Patch below, or [on GitHub](https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch) ```diff From 9f4043d9dddc1174920e687773f27b7933f48ab6 Mon Sep 17 00:00:00 2001 From: Riccardo Castellotti <rcastell@cern.ch> Date: Thu, 19 Aug 2021 15:49:43 +0200 Subject: [PATCH] Explicitly separate git-ls-remote options from positional arguments --- binderhub/repoproviders.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/binderhub/repoproviders.py b/binderhub/repoproviders.py index f33347b..5d4b87c 100755 --- a/binderhub/repoproviders.py +++ b/binderhub/repoproviders.py @@ -484,7 +484,7 @@ class GitRepoProvider(RepoProvider): self.sha1_validate(self.unresolved_ref) except ValueError: # The ref is a head/tag and we resolve it using `git ls-remote` - command = ["git", "ls-remote", self.repo, self.unresolved_ref] + command = ["git", "ls-remote", "--", self.repo, self.unresolved_ref] result = subprocess.run(command, universal_newlines=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE) if result.returncode: raise RuntimeError("Unable to run git ls-remote to get the `resolved_ref`: {}".format(result.stderr)) -- 2.25.1 ``` ### Workarounds Disable the git repo provider by specifying the `BinderHub.repo_providers` config, e.g.: ```python from binderhub.repoproviders import (GitHubRepoProvider, GitLabRepoProvider, GistRepoProvider, ZenodoProvider, FigshareProvider, HydroshareProvider, DataverseProvider) c.BinderHub.repo_providers = { 'gh': GitHubRepoProvider, 'gist': GistRepoProvider, 'gl': GitLabRepoProvider, 'zenodo': ZenodoProvider, 'figshare': FigshareProvider, 'hydroshare': HydroshareProvider, 'dataverse': DataverseProvider, } ``` ### References Credit: Jose Carlos Luna Duran (CERN) and Riccardo Castellotti (CERN). ### For more information If you have any questions or comments about this advisory: * Email us at [security@ipython.org](mailto:security@ipython.org)
{'CVE-2021-39159'}
2022-04-19T19:03:06Z
2021-08-30T16:16:58Z
CRITICAL
9.6
{'CWE-94'}
{'https://github.com/jupyterhub/binderhub/security/advisories/GHSA-9jjr-qqfp-ppwx', 'https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39159', 'https://github.com/advisories/GHSA-9jjr-qqfp-ppwx'}
null
GHSA
GHSA-wqxc-qrq4-w5v4
Update unsound DrainFilter and RString::retain
An issue was discovered in the abi_stable crate before 0.9.1 for Rust. A retain call can create an invalid UTF-8 string, violating soundness.
{'CVE-2020-36213'}
2021-08-25T21:01:33Z
2021-08-25T21:01:33Z
HIGH
0
{'CWE-172'}
{'https://github.com/rodrimati1992/abi_stable_crates/issues/44', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36213', 'https://github.com/advisories/GHSA-wqxc-qrq4-w5v4', 'https://rustsec.org/advisories/RUSTSEC-2020-0105.html'}
null
GHSA
GHSA-grj5-8x6q-hc9q
Path traversal in Grafana Loki
An issue was discovered in Grafana Loki through 2.2.1. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Loki will attempt to parse a rules file at that location and include some of the contents in the error message.
{'CVE-2021-36156'}
2022-04-19T19:03:25Z
2021-09-02T22:00:40Z
MODERATE
5.3
{'CWE-22'}
{'https://github.com/grafana/loki/pull/4020', 'https://github.com/advisories/GHSA-grj5-8x6q-hc9q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36156', 'https://github.com/grafana/loki/pull/4020#issue-694377133', 'https://github.com/grafana/loki/releases/tag/v2.3.0'}
null
GHSA
GHSA-8gmx-cpcg-f8h5
Double-free in id-map
An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in IdMap::clone_from upon a .clone panic.
{'CVE-2021-30455'}
2021-08-25T20:55:11Z
2021-08-25T20:55:11Z
CRITICAL
9.8
{'CWE-415'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-30455', 'https://github.com/andrewhickman/id-map/issues/3', 'https://github.com/advisories/GHSA-8gmx-cpcg-f8h5', 'https://rustsec.org/advisories/RUSTSEC-2021-0052.html'}
null
GHSA
GHSA-9jq9-c2cv-pcrj
Cross-site Scripting by SVG upload in xwiki-platform
### Impact When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file. ### Patches This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser. ### Workarounds This issue can be fixed without the patch by setting properly the configuration to download or display files, see: https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload ### References https://jira.xwiki.org/browse/XWIKI-18368 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)
{'CVE-2021-43841'}
2022-02-11T21:08:44Z
2022-02-10T22:42:48Z
MODERATE
4.1
{'CWE-79'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9jq9-c2cv-pcrj', 'https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43841', 'https://jira.xwiki.org/browse/XWIKI-18368', 'https://github.com/advisories/GHSA-9jq9-c2cv-pcrj', 'https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62'}
null
GHSA
GHSA-9mgm-gcq8-86wq
Improper Authentication in Apache ActiveMQ and Apache Artemis
The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password.
{'CVE-2021-26117'}
2021-10-21T18:14:58Z
2021-06-16T17:39:35Z
HIGH
7.5
{'CWE-287'}
{'https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3cCAH+vQmMeUEiKN4wYX9nLBbqmFZFPXqajNvBKmzb2V8QZANcSTA@mail.gmail.com%3e', 'https://lists.apache.org/thread.html/r5899ece90bcae5805ad6142fdb05c58595cff19cb2e98cc58a91f55b@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r110cacfa754471361234965ffe851a046e302ff2693b055f49f47b02@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/raea451de09baed76950d6a60cc4bb1b74476c505e03205a3c68c9808@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r70389648227317bdadcdecbd9f238571a6047469d156bd72bb0ca2f7@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r22cdc0fb45e223ac92bc2ceff7af92f1193dfc614c8b248534456229@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3341d96d8f956e878fb7b463b08d57ca1d58fec9c970aee929b58e0d@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rd05b1c9d61dbd220664d559aa0e2b55e5830f006a09e82057f3f7863@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rec93794f8aeddf8a5f1a643d264b4e66b933f06fd72a38f31448f0ac@%3Cgitbox.activemq.apache.org%3E', 'https://issues.apache.org/jira/browse/ARTEMIS-2895', 'https://issues.apache.org/jira/browse/AMQ-8035', 'https://lists.apache.org/thread.html/rd75600cee29cb248d548edcf6338fe296466d63a69e2ed0afc439ec7@%3Cissues.activemq.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210304-0008/', 'https://lists.apache.org/thread.html/ra255ddfc8b613b80e9fa22ff3e106168b245f38a22316bfb54d21159@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rffa5cd05d01c4c9853b17f3004d80ea6eb8856c422a8545c5f79b1a6@%3Ccommits.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-9mgm-gcq8-86wq', 'https://lists.apache.org/thread.html/re1b98da90a5f2e1c2e2d50e31c12e2578d61fe01c0737f9d0bd8de99@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26117', 'https://lists.apache.org/thread.html/r519bfafd67091d0b91243efcb1c49b1eea27321355ba5594f679277d@%3Cissues.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-qqc5-rgcc-cjqh
Information Disclosure in go.elastic.co/apm
The Elastic APM agent for Go versions before 1.11.0 can leak sensitive HTTP header information when logging the details during an application panic. Normally, the APM agent will sanitize sensitive HTTP header details before sending the information to the APM server. During an application panic it is possible the headers will not be sanitized before being sent.
{'CVE-2021-22133'}
2021-05-18T18:34:18Z
2021-05-18T18:34:18Z
LOW
2.4
{'CWE-532'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22133', 'https://github.com/elastic/apm-agent-go/compare/v1.10.0...v1.11.0', 'https://discuss.elastic.co/t/elastic-apm-agent-for-go-1-11-0-security-update/263252', 'https://github.com/elastic/apm-agent-go/commit/c5c7e21aa26a6def7790f74fbceed792ad47ef35', 'https://github.com/advisories/GHSA-qqc5-rgcc-cjqh'}
null
GHSA
GHSA-9hx2-hgq2-2g4f
Regular Expression Denial of Service (ReDoS) in Pillow
An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.
{'CVE-2021-25292'}
2021-12-02T17:47:59Z
2021-03-29T16:35:46Z
MODERATE
6.5
{'CWE-400'}
{'https://security.gentoo.org/glsa/202107-33', 'https://github.com/advisories/GHSA-9hx2-hgq2-2g4f', 'https://github.com/python-pillow/Pillow/commit/3bce145966374dd39ce58a6fc0083f8d1890719c', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25292', 'https://github.com/python-pillow/Pillow/commit/6207b44ab1ff4a91d8ddc7579619876d0bb191a4'}
null
GHSA
GHSA-5327-gfq5-8f4m
Malicious Package in buffer-xmr
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:04:18Z
2020-09-03T21:56:23Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1246', 'https://github.com/advisories/GHSA-5327-gfq5-8f4m'}
null
GHSA
GHSA-4p6w-m9wc-c9c9
Sensitive Data Exposure in Apache Ant
Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.
{'CVE-2020-1945'}
2022-02-08T22:06:03Z
2020-09-14T18:13:29Z
MODERATE
6.3
{'CWE-200', 'CWE-668'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00053.html', 'https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r6970d196cd73863dafdbc3a7052562deedd338e3bd7d73d8171d92d6@%3Ccommits.groovy.apache.org%3E', 'https://usn.ubuntu.com/4380-1/', 'https://lists.apache.org/thread.html/r815f88d1044760176f30a4913b4baacd06f3eae4eb662de7388e46d8@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r1863b9ce4c3e4b1e5b0c671ad05545ba3eb8399616aa746af5dfe1b1@%3Cdev.creadur.apache.org%3E', 'https://github.com/advisories/GHSA-4p6w-m9wc-c9c9', 'https://lists.apache.org/thread.html/r1a9c992d7c8219dc15b4ad448649f0ffdaa88d76ef6a0035c49455f5@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cusers.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r4b2904d64affd4266cd72ccb2fc3927c1c2f22009f183095aa46bf90@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r6e295d792032ec02b32be3846c21a58857fba4a077d22c5842d69ba2@%3Ctorque-dev.db.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/09/30/6', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r8e592bbfc016a5dbe2a8c0e81ff99682b9c78c453621b82c14e7b75e%40%3Cdev.ant.apache.org%3E', 'https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cdev.groovy.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rda80ac59119558eaec452e58ddfac2ccc9211da1c65f7927682c78b1@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rce099751721c26a8166d8b6578293820832831a0b2cb8d93b8efa081@%3Cnotifications.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/rd7dda48ff835f4d0293949837d55541bfde3683bd35bd8431e324538@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rc89e491b5b270fb40f1210b70554527b737c217ad2e831b643ead6bc@%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r95dc943e47a211d29df605e14f86c280fc9fa8d828b2b53bd07673c9@%3Cdev.creadur.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rdaa9c51d5dc6560c9d2b3f3d742c768ad0705e154041e574a0fae45c@%3Cnotifications.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/r8e24abb7dd77cda14c6df90a377c94f0a413bbfcec90a29540ff8adf@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r2704fb14ce068c64759a986f81d5b5e42ab434fa13d0f444ad52816b@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rfd346609527a79662c48b1da3ac500ec30f29f7ddaa3575051e81890@%3Ccommits.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRVAWTCVXJMRYKQKEXYSNBF7NLSR6OEI/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQBR65TINSJRN7PTPIVNYS33P535WM74/', 'https://lists.apache.org/thread.html/r6edd3e2cb79ee635630d891b54a4f1a9cd8c7f639d6ee34e75fbe830@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea@%3Cdev.ant.apache.org%3E', 'https://lists.apache.org/thread.html/rb860063819b9c0990e1fbce29d83f4554766fe5a05e3b3939736bf2b@%3Ccommits.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r0d08a96ba9de8aa435f32944e8b2867c368a518d4ff57782e3637335@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r6030d34ceacd0098538425c5dac8251ffc7fd90b886942bc7ef87858@%3Cnotifications.groovy.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/06/1', 'https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r3cea0f3da4f6d06d7afb6c0804da8e01773a0f50a09b8d9beb2cda65@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r5dfc77048b1f9db26622dce91a6edf083d499397256594952fad5f35@%3Ccommits.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/re1ce84518d773a94a613d988771daf9252c9cf7375a9a477009f9735@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1945', 'https://lists.apache.org/thread.html/rb8ec556f176c83547b959150e2108e2ddf1d61224295941908b0a81f@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rf07feaf78afc8f701e21948a06ef92565d3dff1242d710f4fbf900b2@%3Cdev.creadur.apache.org%3E', 'https://security.gentoo.org/glsa/202007-34', 'https://lists.apache.org/thread.html/r1b32c76afffcf676e13ed635a3332f3e46e6aaa7722eb3fc7a28f58e@%3Cdev.hive.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-qh9q-34h6-hcv9
Directory traversal in mkdocs
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information.
{'CVE-2021-40978'}
2021-11-15T15:04:24Z
2021-10-12T18:48:24Z
HIGH
7.5
{'CWE-12', 'CWE-22'}
{'https://github.com/mkdocs/mkdocs/pull/2604/commits/cddc453c9d49298e60e7d56fb71130c151cbcbe5', 'https://github.com/mkdocs/mkdocs/issues/2601', 'https://github.com/nisdn/CVE-2021-40978', 'https://github.com/nisdn/CVE-2021-40978/issues/1', 'https://github.com/mkdocs/mkdocs/releases/tag/1.2.3', 'https://github.com/mkdocs/mkdocs', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40978', 'https://github.com/mkdocs/mkdocs/pull/2604', 'https://github.com/advisories/GHSA-qh9q-34h6-hcv9'}
null
GHSA
GHSA-55w9-c3g2-4rrh
Man-in-the-middle attack in Apache Axis
Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
{'CVE-2012-5784'}
2021-10-04T21:24:43Z
2020-10-07T17:51:02Z
MODERATE
0
{'CWE-20'}
{'https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2014-0037.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/79829', 'http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf', 'https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2013-0269.html', 'http://secunia.com/advisories/51219', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html', 'https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E', 'https://github.com/advisories/GHSA-55w9-c3g2-4rrh', 'https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5784', 'http://rhn.redhat.com/errata/RHSA-2013-0683.html', 'http://www.securityfocus.com/bid/56408'}
null
GHSA
GHSA-27gm-ghr9-4v95
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in: the core parser, `paste` and `visualchars` plugins. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.6 or lower and TinyMCE 5.1.3 or lower. ### Patches This vulnerability has been patched in TinyMCE 4.9.7 and 5.1.4 by improved parser logic and HTML sanitization. ### Workarounds The workarounds available are: - disable the impacted plugins - manually sanitize the content using the `BeforeSetContent` event (see below) - upgrade to either TinyMCE 4.9.7 or TinyMCE 5.1.4 #### Example: Manually sanitize content ```js editor.on('BeforeSetContent', function(e) { var sanitizedContent = ...; // Manually sanitize content here e.content = sanitizedContent; }); ``` ### Acknowledgements Tiny Technologies would like to thank Michał Bentkowski for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes514/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
null
2021-10-08T21:26:39Z
2020-01-30T21:22:15Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-27gm-ghr9-4v95', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-27gm-ghr9-4v95'}
null
GHSA
GHSA-fqx8-v33p-4qcc
Cross-site Scripting in enshrined/svg-sanitize
### Impact SVG sanitizer library before version `0.15.0` did not remove HTML elements wrapped in a CDATA section. As a result, SVG content embedded in HTML (fetched as `text/html`) was susceptible to cross-site scripting. Plain SVG files (fetched as `image/svg+xml`) were not affected. ### Patches This issue is fixed in `0.15.0` and higher. ### Workarounds There is currently no workaround available without upgrading. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Github](https://github.com/darylldoyle/svg-sanitizer/issues) * Email us at [daryll@enshrined.co.uk](mailto:daryll@enshrined.co.uk)
{'CVE-2022-23638'}
2022-05-09T22:10:34Z
2022-02-14T22:54:18Z
MODERATE
6.2
{'CWE-79'}
{'https://github.com/darylldoyle/svg-sanitizer/commit/17e12ba9c2881caa6b167d0fbea555c11207fbb0', 'https://github.com/darylldoyle/svg-sanitizer/issues/71', 'https://github.com/darylldoyle/svg-sanitizer/security/advisories/GHSA-fqx8-v33p-4qcc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23638', 'https://github.com/advisories/GHSA-fqx8-v33p-4qcc'}
null
GHSA
GHSA-6xp6-fmc8-pmmr
Temporary Directory Hijacking Vulnerability in Keycloak
A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
{'CVE-2021-20202'}
2022-05-03T19:13:08Z
2022-03-18T17:50:45Z
HIGH
7.3
{'CWE-377'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1922128', 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-7gf3-89f6-823j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20202', 'https://github.com/advisories/GHSA-6xp6-fmc8-pmmr', 'https://issues.redhat.com/browse/KEYCLOAK-17000'}
null
GHSA
GHSA-cr56-66mx-293v
Cross-Site Scripting in @toast-ui/editor
Versions of `@toast-ui/editor` prior to 2.2.0 are vulnerable to Cross-Site Scripting (XSS). There are multiple bypasses to the package's built-in XSS sanitization. This may allow attackers to execute arbitrary JavaScript on a victim's browser. ## Recommendation Upgrade to version 2.2.0 or later.
null
2021-10-04T21:12:15Z
2020-09-03T15:53:50Z
HIGH
0
{'CWE-79'}
{'https://github.com/nhn/tui.editor/issues/733', 'https://www.npmjs.com/advisories/1521', 'https://github.com/advisories/GHSA-cr56-66mx-293v', 'https://github.com/nhn/tui.editor/pull/1010'}
null
GHSA
GHSA-333x-9vgq-v2j4
Directory Traversal in geddy
Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors. ### Proof of Concept ``` http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd ``` ## Recommendation Update geddy to version >= 13.0.8
{'CVE-2015-5688'}
2021-08-31T20:33:52Z
2017-10-24T18:33:36Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-333x-9vgq-v2j4', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5688', 'https://nodesecurity.io/advisories/geddy-directory-traversal', 'https://github.com/geddy/geddy/pull/699', 'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231', 'https://github.com/geddy/geddy/releases/tag/v13.0.8', 'https://github.com/geddy/geddy/issues/697', 'https://www.npmjs.com/advisories/10'}
null
GHSA
GHSA-32x6-qvw6-mxj4
Forwarding of confidentials headers to third parties in fluture-node
### Impact Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over unencrypted HTTP, the headers would be included in the follow-up request and be exposed to the third party, or potential http traffic sniffing. ### Patches The redirection strategies made available in version 4.0.2 automatically redact confidential headers when a redirect is followed across to another origin. ### Workarounds Use a custom redirection strategy via the `followRedirectsWith` function. The custom strategy can be based on the new strategies available in fluture-node@4.0.2. ### References - This vulnerability was discovered after the announcement of similar vulnerabilities in the `follow-redirects` package. There is more information there: https://github.com/advisories/GHSA-74fj-2j2h-c42q and https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db/ - Fixed in 125e4474f910c1507f8ec3232848626fbc0f55c4 and 0c99bc511533d48be17dc6bfe641f7d0aeb34d77
{'CVE-2022-24719'}
2022-03-15T18:05:24Z
2022-03-01T22:14:57Z
LOW
2.6
{'CWE-200', 'CWE-359', 'CWE-601'}
{'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4', 'https://github.com/psf/requests/pull/4718', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24719', 'https://github.com/advisories/GHSA-32x6-qvw6-mxj4', 'https://github.com/fluture-js/fluture-node/security/advisories/GHSA-32x6-qvw6-mxj4', 'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77'}
null
GHSA
GHSA-6chw-6frg-f759
Regular Expression Denial of Service in Acorn
Affected versions of acorn are vulnerable to Regular Expression Denial of Service. A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop. The string is not valid UTF16 which usually results in it being sanitized before reaching the parser. If an application processes untrusted input and passes it directly to acorn, attackers may leverage the vulnerability leading to Denial of Service.
null
2021-08-23T15:10:33Z
2020-04-03T21:48:38Z
HIGH
7.5
{'CWE-400'}
{'https://www.npmjs.com/advisories/1488', 'https://github.com/advisories/GHSA-6chw-6frg-f759', 'https://snyk.io/vuln/SNYK-JS-ACORN-559469', 'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802', 'https://github.com/acornjs/acorn/issues/929'}
null
GHSA
GHSA-2p82-v77v-mppr
Airbrake
The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected).
{'CVE-2019-16060'}
2021-08-17T22:26:28Z
2019-09-11T23:05:57Z
CRITICAL
9.8
{'CWE-200'}
{'https://github.com/airbrake/airbrake-ruby/issues/468', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16060', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/airbrake-ruby/CVE-2019-16060.yml', 'https://github.com/advisories/GHSA-2p82-v77v-mppr'}
null
GHSA
GHSA-gv3v-92v6-m48j
Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting)
### Impact - Cross Site Scripting - Cache Poisoning - Page Hijacking ### Patches This was fixed in version `2.2.1`. ### Workarounds If you are unable to update, ensure that user supplied data isn't able to flow to HTTP headers. If it does, pre-sanitize for CRLF characters. ### References ##### [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html) I've been poking at libraries to see if they are vulnerable to HTTP Response Splitting and Jooby is my third case of finding this vulnerability. ### Root Cause This roots cause back to this line in the Jooby codebase: https://github.com/jooby-project/jooby/blob/93cfc80aa20c188f71a442ea7a1827da380e1c27/modules/jooby-netty/src/main/java/io/jooby/internal/netty/NettyContext.java#L102 The `DefaultHttpHeaders` takes a parameter `validate` which, when `true` (as it is for the no-arg constructor) validates that the header isn't being abused to do HTTP Response Splitting. ### Reported By This vulnerability was reported by @JLLeitschuh ([Twitter](https://twitter.com/JLLeitschuh)) ### For more information If you have any questions or comments about this advisory: * Open an issue in [jooby-project/jooby](https://github.com/jooby-project/jooby/issues)
{'CVE-2020-7622'}
2022-04-19T19:02:27Z
2020-04-03T15:23:30Z
CRITICAL
9.8
{'CWE-444'}
{'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249', 'https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j', 'https://github.com/advisories/GHSA-gv3v-92v6-m48j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7622', 'https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4'}
null
GHSA
GHSA-fp4w-jxhp-m23p
Dependency Confusion in Bundler
Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.17 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application.
{'CVE-2020-36327'}
2022-04-07T15:49:53Z
2021-05-24T18:12:33Z
HIGH
8.8
null
{'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24105', 'https://github.com/rubygems/rubygems/blob/master/bundler/CHANGELOG.md#2218-may-25-2021', 'https://github.com/rubygems/rubygems/issues/3982', 'https://mensfeld.pl/2021/02/rubygems-dependency-confusion-attack-side-of-things/', 'https://github.com/advisories/GHSA-fp4w-jxhp-m23p', 'https://www.zofrex.com/blog/2021/04/29/bundler-still-vulnerable-dependency-confusion-cve-2020-36327/', 'https://bundler.io/blog/2021/02/15/a-more-secure-bundler-we-fixed-our-source-priorities.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36327', 'https://github.com/rubygems/rubygems/commit/078bf682ac40017b309b5fc69f283ff640e7c129', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bundler/CVE-2020-36327.yml', 'https://github.com/rubygems/rubygems/pull/4609'}
null
GHSA
GHSA-rwgm-f83r-v3qj
Improper Certificate Validation in WP-CLI framework
### Impact An improper error handling in HTTPS requests management in WP-CLI version 0.12.0 and later allows remote attackers able to intercept the communication to remotely disable the certificate verification on WP-CLI side, gaining full control over the communication content, including the ability to impersonate update servers and push malicious updates towards WordPress instances controlled by the vulnerable WP-CLI agent, or push malicious updates toward WP-CLI itself. ### Patches The vulnerability stems from the fact that the default behavior of `WP_CLI\Utils\http_request()` when encountering a TLS handshake error is to disable certificate validation and retry the same request. The default behavior has been changed with version 2.5.0 of WP-CLI and the `wp-cli/wp-cli` framework (via https://github.com/wp-cli/wp-cli/pull/5523) so that the `WP_CLI\Utils\http_request()` method accepts an `$insecure` option that is `false` by default and consequently that a TLS handshake failure is a hard error by default. This new default is a breaking change and ripples through to all consumers of `WP_CLI\Utils\http_request()`, including those in separate WP-CLI bundled or third-party packages. https://github.com/wp-cli/wp-cli/pull/5523 has also added an `--insecure` flag to the `cli update` command to counter this breaking change. Subsequent PRs on the command repositories have added an `--insecure` flag to the appropriate commands on the following repositories to counter the breaking change: * https://github.com/wp-cli/config-command/pull/128 * https://github.com/wp-cli/core-command/pull/186 * https://github.com/wp-cli/extension-command/pull/287 * https://github.com/wp-cli/checksum-command/pull/86 * https://github.com/wp-cli/package-command/pull/138 ### Workarounds There is no direct workaround for the default insecure behavior of `wp-cli/wp-cli` versions before 2.5.0. The workaround for dealing with the breaking change in the commands directly affected by the new secure default behavior is to add the `--insecure` flag to manually opt-in to the previous insecure behavior. ### References * [CWE: Improper Certificate Validation](https://cwe.mitre.org/data/definitions/295.html) ### For more information If you have any questions or comments about this advisory: * Join the `#cli` channel in the [WordPress.org Slack](https://make.wordpress.org/chat/) to ask questions or provide feedback.
{'CVE-2021-29504'}
2022-04-19T19:02:56Z
2021-05-19T23:03:11Z
CRITICAL
9.1
{'CWE-295'}
{'https://github.com/advisories/GHSA-rwgm-f83r-v3qj', 'https://github.com/wp-cli/core-command/pull/186', 'https://github.com/wp-cli/extension-command/pull/287', 'https://github.com/wp-cli/config-command/pull/128', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29504', 'https://github.com/wp-cli/package-command/pull/138', 'https://github.com/wp-cli/checksum-command/pull/86', 'https://github.com/wp-cli/wp-cli/security/advisories/GHSA-rwgm-f83r-v3qj', 'https://github.com/wp-cli/wp-cli/pull/5523'}
null
GHSA
GHSA-8xwg-wv7v-4vqp
Code Execution by Re-enabling Node.js integration in electron
Versions of electron A vulnerability has been discovered which allows Node.js integration to be re-enabled in some Electron applications that disable it. For the application to be impacted by this vulnerability it must meet all of these conditions - Runs on Electron 1.7, 1.8, or a 2.0.0-beta - Allows execution of arbitrary remote code - Disables Node.js integration - Does not explicitly declare webviewTag: false in its webPreferences - Does not enable the nativeWindowOption option - Does not intercept new-window events and manually override event.newGuest without using the supplied options tag ## Recommendation Update to `electron` version 1.7.13, 1.8.4, or 2.0.0.beta.5 or later If you are unable to update your Electron version can mitigate the vulnerability with the following code. ``` app.on('web-contents-created', (event, win) => { win.on('new-window', (event, newURL, frameName, disposition, options, additionalFeatures) => { if (!options.webPreferences) options.webPreferences = {}; options.webPreferences.nodeIntegration = false; options.webPreferences.nodeIntegrationInWorker = false; options.webPreferences.webviewTag = false; delete options.webPreferences.preload; }) }) // and *IF* you don't use WebViews at all, // you might also want app.on('web-contents-created', (event, win) => { win.on('will-attach-webview', (event, webPreferences, params) => { event.preventDefault(); }) }) ```
{'CVE-2018-1000136'}
2021-06-11T15:17:24Z
2018-03-26T16:41:17Z
HIGH
8.1
{'CWE-20'}
{'https://github.com/advisories/GHSA-8xwg-wv7v-4vqp', 'https://electronjs.org/blog/webview-fix', 'https://www.electronjs.org/blog/webview-fix', 'https://www.npmjs.com/advisories/574', 'https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000136'}
null
GHSA
GHSA-mgh8-hcwj-h57v
Improper Restriction of XML External Entity Reference in Apache Olingo
The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks.
{'CVE-2019-17554'}
2021-08-19T16:53:27Z
2020-02-04T22:37:43Z
MODERATE
5.5
{'CWE-611'}
{'https://seclists.org/bugtraq/2019/Dec/11', 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d7Ty%3DL-n_iAzT6vcQp65BY29XZDS5tMoM8MdDrb1moM7A%40mail.gmail.com%3E', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://issues.apache.org/jira/browse/OLINGO-1409', 'https://github.com/advisories/GHSA-mgh8-hcwj-h57v', 'http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html', 'https://github.com/apache/olingo-odata4/commit/5948974ad28271818e2afe747c71cde56a7f2c63', 'https://github.com/apache/olingo-odata4/commit/c3f982db3d97e395d313ae8f231202bb2139882c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17554'}
null
GHSA
GHSA-574q-fxfj-wv6h
High severity vulnerability that affects puppet
Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."
{'CVE-2013-1655'}
2021-09-01T19:29:35Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-20'}
{'https://puppetlabs.com/security/cve/cve-2013-1655/', 'http://www.debian.org/security/2013/dsa-2643', 'http://www.securityfocus.com/bid/58442', 'http://secunia.com/advisories/52596', 'https://github.com/advisories/GHSA-574q-fxfj-wv6h', 'http://ubuntu.com/usn/usn-1759-1', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1655', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html'}
null
GHSA
GHSA-75qf-wgfj-v652
Arbitrary File Write via Archive Extraction (Zip Slip)
This affects all versions up to and including version 7.0.0 of package github.com/u-root/u-root/pkg/tarutil. It is vulnerable to both leading and non-leading relative path traversal attacks in tar file extraction.
{'CVE-2020-7669'}
2021-05-18T18:28:03Z
2021-05-18T18:28:03Z
HIGH
7.5
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGTARUTIL-570428', 'https://github.com/u-root/u-root/pull/1817', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7669', 'https://github.com/advisories/GHSA-75qf-wgfj-v652'}
null
GHSA
GHSA-7v35-qwwj-p98g
Improper Restriction of XML External Entity Reference in DiffPlug Spotless
In DiffPlug Spotless before 1.20.0 (library and Maven plugin) and before 3.20.0 (Gradle plugin), the XML parser would resolve external entities over both HTTP and HTTPS and didn't respect the resolveExternalEntities setting. For example, this allows disclosure of file contents to a MITM attacker if a victim performs a spotlessApply operation on an untrusted XML file.
{'CVE-2019-9843'}
2021-07-06T15:11:16Z
2019-07-05T21:07:40Z
HIGH
7.5
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9843', 'https://github.com/advisories/GHSA-7v35-qwwj-p98g', 'https://github.com/diffplug/spotless/issues/358', 'https://github.com/diffplug/spotless/blob/master/plugin-maven/CHANGES.md#version-1200---march-14th-2018-javadoc-jcenter', 'https://github.com/diffplug/spotless/pull/369', 'https://github.com/diffplug/spotless/blob/master/plugin-gradle/CHANGES.md#version-3200---march-11th-2018-javadoc-jcenter'}
null
GHSA
GHSA-qh32-6jjc-qprm
Null pointer dereference in tensorflow-lite
### Impact A crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/core/subgraph.cc#L1224-L1227 However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference. ### Patches We have patched the issue in 0b5662bc and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360 but was also discovered through variant analysis of [GHSA-cvpc-8phh-8f45](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45).
{'CVE-2020-15209'}
2021-08-26T15:19:20Z
2020-09-25T18:28:46Z
MODERATE
5.9
{'CWE-476'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8', 'https://github.com/advisories/GHSA-qh32-6jjc-qprm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15209'}
null
GHSA
GHSA-3qh4-r86r-grvm
Arbitrary JavaScript Execution in typed-function
Versions of `typed-function` prior to 0.10.6 are vulnerable to Arbitrary JavaScript Execution. Function names are not properly sanitized and may allow an attacker to execute arbitrary code. ## Recommendation Upgrade to version 0.10.6 or later.
{'CVE-2017-1001004'}
2021-01-07T23:31:27Z
2020-09-02T18:24:39Z
HIGH
0
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-TYPEDFUNCTION-174139', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe', 'https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-version-0106', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001004', 'https://github.com/advisories/GHSA-3qh4-r86r-grvm', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://www.npmjs.com/advisories/819'}
null
GHSA
GHSA-3r7g-wrpr-j5g4
Improper Authentication in django-mfa3
### Impact django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed. You are affected if you have activated both django-mfa3 (< 0.5.0) and django.contrib.admin and have not taken any other measures to prevent users from accessing the admin login view. ### Patches The issue has been fixed in django-mfa3 0.5.0. ### Workarounds It is possible to work around the issue by overwriting the admin login route, e.g. by adding the following URL definition *before* the admin routes: url('admin/login/', lambda request: redirect(settings.LOGIN_URL) ### References - [django-mfa3 changelog](https://github.com/xi/django-mfa3/blob/main/CHANGES.md#050-2022-04-15)
{'CVE-2022-24857'}
2022-04-22T20:48:29Z
2022-04-22T20:48:28Z
HIGH
7.3
{'CWE-287'}
{'https://github.com/xi/django-mfa3/security/advisories/GHSA-3r7g-wrpr-j5g4', 'https://github.com/xi/django-mfa3/commit/32f656e22df120b84bdf010e014bb19bd97971de', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24857', 'https://github.com/xi/django-mfa3/blob/main/CHANGES.md#050-2022-04-15', 'https://github.com/advisories/GHSA-3r7g-wrpr-j5g4'}
null
GHSA
GHSA-gx8x-g87m-h5q6
Denial of Service (DoS) in Nokogiri on JRuby
## Summary Nokogiri `v1.13.4` updates the vendored `org.cyberneko.html` library to `1.9.22.noko2` which addresses [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv). That CVE is rated 7.5 (High Severity). See [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) for more information. Please note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`. ## Mitigation Upgrade to Nokogiri `>= 1.13.4`. ## Impact ### [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) in nekohtml - **Severity**: High 7.5 - **Type**: [CWE-400](https://cwe.mitre.org/data/definitions/400.html) Uncontrolled Resource Consumption - **Description**: The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. - **See also**: [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv)
null
2022-04-11T21:38:21Z
2022-04-11T21:38:11Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-gx8x-g87m-h5q6', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-gx8x-g87m-h5q6', 'https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer', 'https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24839'}
null
GHSA
GHSA-368f-29c3-4f2r
Data race in conqueue
Affected versions of this crate unconditionally implemented `Send`/`Sync` for `QueueSender<T>`, allowing to send non-Send `T` to other threads by invoking `(&QueueSender<T>).send()`. This fails to prevent users from creating data races by sending types like `Rc<T>` or `Arc<Cell<T>>` to other threads, which can lead to memory corruption. The flaw was corrected in commit 1e462c3 by imposing `T: Send` to both `Send`/`Sync` impls for `QueueSender<T>`/`QueueReceiver<T>`.
{'CVE-2020-36437'}
2021-08-25T20:58:50Z
2021-08-25T20:58:50Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36437', 'https://rustsec.org/advisories/RUSTSEC-2020-0117.html', 'https://github.com/advisories/GHSA-368f-29c3-4f2r'}
null
GHSA
GHSA-77rc-x84q-pv4f
Low severity vulnerability that affects apache-airflow
The LDAP auth backend (airflow.contrib.auth.backends.ldap_auth) prior to Apache Airflow 1.10.1 was misconfigured and contained improper checking of exceptions which disabled server certificate checking.
{'CVE-2018-20245'}
2021-09-02T20:57:55Z
2019-01-25T16:19:19Z
HIGH
7.5
{'CWE-295'}
{'https://github.com/advisories/GHSA-77rc-x84q-pv4f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20245', 'https://lists.apache.org/thread.html/b549c7573b342a6e457e5a3225c33054244343927bbfb2a4cdc4cf73@%3Cdev.airflow.apache.org%3E'}
null
GHSA
GHSA-9g2w-5f3v-mfmm
Insecure default config of Celery worker in Apache Airflow
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker.
{'CVE-2020-11982'}
2021-09-22T21:19:03Z
2020-07-27T16:57:33Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11982', 'https://github.com/advisories/GHSA-9g2w-5f3v-mfmm', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}
null
GHSA
GHSA-vrcf-g539-x6h3
Uncontrolled deserialization of a pickled object in rediswrapper allows attackers to execute arbitrary scripts
Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts.
{'CVE-2019-17206'}
2022-03-23T20:24:50Z
2019-11-20T01:37:13Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/frostming/rediswrapper/pull/1', 'https://github.com/frostming/rediswrapper/commit/748f60bafd857c24f65683426f665350e2c3f91b', 'https://github.com/frostming/rediswrapper/releases/tag/v0.3.0', 'https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17206', 'https://github.com/advisories/GHSA-vrcf-g539-x6h3'}
null
GHSA
GHSA-59g4-hpg3-3gcp
Files Accessible to External Parties in Opencast
Opencast before version 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast's host machines and making them available via the web interface. ### Impact Before Opencast 10.6, Opencast would [open and include local files during ingests](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587). Attackers could exploit this to include most local files the process has read access to, extracting secrets from the host machine. For example, to expose the `custom.properties` of develop.opencast.org via the asset manager, an attacker could have run: ``` curl -f -i -u admin:opencast \ https://develop.opencast.org/ingest/addMediaPackage/fast \ -F 'flavor=presenter/source'\ -F mediaUri=file:///srv/opencast/opencast-dist-allinone/etc/custom.properties\ -F title="custom.properties" ``` An attacker would need to have the privileges required to add new media to exploit this. But these are often widely given. ### Patches The issue has been fixed in Opencast 10.6 and 11.0. ### Workarounds You can mitigate this issue by narrowing down the read access Opencast has to files on the file system using UNIX permissions or mandatory access control systems like SELinux. This cannot prevent access to files Opencast needs to read though and we highly recommend updating. ### References - [Example of problematic code](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587). - [Patch fixing the issue](https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764) ### For more information If you have any questions or comments about this advisory: * Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) * Email us at [security@opencast.org](mailto:security@opencast.org)
{'CVE-2021-43821'}
2022-04-19T19:03:13Z
2021-12-14T21:44:03Z
CRITICAL
9.9
{'CWE-552'}
{'https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764', 'https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp', 'https://mvnrepository.com/artifact/org.opencastproject/opencast-ingest-service-impl', 'https://github.com/advisories/GHSA-59g4-hpg3-3gcp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43821', 'https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587'}
null
GHSA
GHSA-9r3m-mhfm-39cm
Incorrect Calculation in bigint-money
Versions of `bigint-money` prior to 0.6.2 are vulnerable to an Incorrect Calculation. The package incorrectly rounded certain numbers, which could have drastic consequences due to its usage in financial systems. ## Recommendation Upgrade to version 0.6.2 or later.
null
2021-09-28T16:51:46Z
2020-09-11T21:10:29Z
LOW
0
{'CWE-682'}
{'https://www.npmjs.com/advisories/962', 'https://github.com/advisories/GHSA-9r3m-mhfm-39cm'}
null
GHSA
GHSA-vmf7-hmh6-vv57
Denial of Service in Go-Ethereum
A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory pool to prevent new transactions from entering the pool, resulting in a denial of service (DoS).
{'CVE-2022-23328'}
2022-03-18T20:07:00Z
2022-03-05T00:00:46Z
HIGH
7.5
{'CWE-400'}
{'http://ethereum.com', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23328', 'https://github.com/advisories/GHSA-vmf7-hmh6-vv57', 'https://tristartom.github.io/docs/ccs21.pdf', 'http://go-ethereum.com', 'https://dl.acm.org/doi/pdf/10.1145/3460120.3485369'}
null