ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-33rv-m2gp-mm2r
Prototype pollution in safe-flat
Prototype pollution vulnerability in 'safe-flat' versions 2.0.0 through 2.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25927'}
2021-06-21T17:18:29Z
2021-06-21T17:18:29Z
CRITICAL
9.8
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927', 'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25927', 'https://github.com/advisories/GHSA-33rv-m2gp-mm2r'}
null
GHSA
GHSA-9pp4-8p8v-g78w
Data races in lever
An issue was discovered in the lever crate before 0.1.1 for Rust. AtomicBox<T> implements the Send and Sync traits for all types T. This allows non-Send types such as Rc and non-Sync types such as Cell to be used across thread boundaries which can trigger undefined behavior and memory corruption.
{'CVE-2020-36457'}
2021-08-25T20:57:26Z
2021-08-25T20:57:26Z
HIGH
8.1
{'CWE-362', 'CWE-77'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0137.html', 'https://github.com/advisories/GHSA-9pp4-8p8v-g78w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36457', 'https://github.com/vertexclique/lever/issues/15'}
null
GHSA
GHSA-535v-4x9q-446c
Moderate severity vulnerability that affects org.apache.hbase:hbase
In all previously released Apache HBase 2.x versions (2.0.0-2.0.4, 2.1.0-2.1.3), authorization was incorrectly applied to users of the HBase REST server. Requests sent to the HBase REST server were executed with the permissions of the REST server itself, not with the permissions of the end-user. This issue is only relevant when HBase is configured with Kerberos authentication, HBase authorization is enabled, and the REST server is configured with SPNEGO authentication. This issue does not extend beyond the HBase REST server.
{'CVE-2019-0212'}
2021-09-01T19:25:39Z
2019-04-02T15:47:00Z
HIGH
7.5
{'CWE-285'}
{'https://lists.apache.org/thread.html/66535e15007cda8f9308eec10e12ffe349e0b8b55e56ec6ee02b71d2@%3Cdev.hbase.apache.org%3E', 'https://github.com/advisories/GHSA-535v-4x9q-446c', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0212', 'http://www.securityfocus.com/bid/107624', 'http://www.openwall.com/lists/oss-security/2019/03/27/3'}
null
GHSA
GHSA-w4x5-jqq4-qc8x
SQL Injection in Cloud Native Computing Foundation Harbor
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows SQL Injection via project quotas in the VMware Harbor Container Registry for the Pivotal Platform.
{'CVE-2019-19026'}
2021-05-18T18:27:43Z
2021-05-18T18:27:43Z
MODERATE
4.9
{'CWE-89'}
{'https://github.com/advisories/GHSA-w4x5-jqq4-qc8x', 'https://github.com/goharbor/harbor/security/advisories/GHSA-rh89-vvrg-fg64', 'https://tanzu.vmware.com/security/cve-2019-19026', 'https://github.com/goharbor/harbor/security/advisories', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19026'}
null
GHSA
GHSA-6226-h7ff-ch6c
Widget feature vulnerability allowing to execute JavaScript code using undo functionality
### Affected packages The vulnerability has been discovered in [Widget](https://ckeditor.com/cke4/addon/clipboard) plugin if used alongside [Undo](https://ckeditor.com/cke4/addon/undo) feature. ### Impact A potential vulnerability has been discovered in CKEditor 4 [Widget](https://ckeditor.com/cke4/addon/widget) package. The vulnerability allowed to abuse undo functionality using malformed widget HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version >= 4.13.0. ### Patches The problem has been recognized and patched. The fix will be available in version 4.16.2. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank Anton Subbotin ([skavans](https://github.com/skavans)) for recognizing and reporting this vulnerability.
{'CVE-2021-32808'}
2022-02-08T21:01:57Z
2021-08-23T19:40:48Z
HIGH
7.6
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32808', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c', 'https://github.com/advisories/GHSA-6226-h7ff-ch6c', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/ckeditor/ckeditor4/releases/tag/4.16.2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-8jf2-cq6v-w234
Malicious Package in uglyfi.js
Version 0.17.3 of `uglyfi.js` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-29T20:47:08Z
2020-09-03T21:10:53Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1202', 'https://github.com/advisories/GHSA-8jf2-cq6v-w234'}
null
GHSA
GHSA-f5f7-6478-qm6p
Files or Directories Accessible to External Parties in kubernetes
A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.
{'CVE-2021-25741'}
2021-11-01T17:32:28Z
2021-11-01T17:32:28Z
HIGH
8.1
{'CWE-552', 'CWE-20'}
{'https://github.com/kubernetes/kubernetes/issues/104980', 'https://github.com/advisories/GHSA-f5f7-6478-qm6p', 'https://groups.google.com/g/kubernetes-security-announce/c/nyfdhK24H7s', 'https://github.com/bottlerocket-os/bottlerocket/security/advisories/GHSA-f5f7-6478-qm6p', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25741', 'https://security.netapp.com/advisory/ntap-20211008-0006/'}
null
GHSA
GHSA-g4vj-x7v9-h82m
Overflow in libsecp256k1
An issue was discovered in the libsecp256k1 crate before 0.5.0 for Rust. It can verify an invalid signature because it allows the R or S parameter to be larger than the curve order, aka an overflow.
{'CVE-2021-38195'}
2021-08-25T20:56:03Z
2021-08-25T20:56:03Z
CRITICAL
9.8
{'CWE-347', 'CWE-190'}
{'https://github.com/paritytech/libsecp256k1/pull/67', 'https://rustsec.org/advisories/RUSTSEC-2021-0076.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38195', 'https://github.com/advisories/GHSA-g4vj-x7v9-h82m'}
null
GHSA
GHSA-c9h6-xhg9-xxrv
Low severity vulnerability that affects org.apache.qpid:apache-qpid-broker-j
A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 6.0.0-7.0.6 (inclusive) and 7.1.0 which allows an unauthenticated attacker to crash the broker instance by sending specially crafted commands using AMQP protocol versions below 1.0 (AMQP 0-8, 0-9, 0-91 and 0-10). Users of Apache Qpid Broker-J versions 6.0.0-7.0.6 (inclusive) and 7.1.0 utilizing AMQP protocols 0-8, 0-9, 0-91, 0-10 must upgrade to Qpid Broker-J versions 7.0.7 or 7.1.1 or later.
{'CVE-2019-0200'}
2021-07-27T16:05:21Z
2019-03-07T18:48:08Z
HIGH
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0200', 'https://lists.apache.org/thread.html/ac79d48de37d42b64da50384dbe9c8a329c5f553dd12ef7c28a832de@%3Cusers.qpid.apache.org%3E', 'http://www.securityfocus.com/bid/107215', 'https://github.com/advisories/GHSA-c9h6-xhg9-xxrv'}
null
GHSA
GHSA-hhfg-6hfc-rvxm
Regular Expression Denial of Service in jsoneditor
JSON Editor is a web-based tool to view, edit, format, and validate JSON. It has various modes such as a tree editor, a code editor, and a plain text editor. The jsoneditor package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted element as input to the getInnerText function may cause an application to consume an excessive amount of CPU. Below pinned line using vulnerable regex.
{'CVE-2021-3822'}
2022-05-05T13:49:44Z
2021-09-29T17:15:55Z
MODERATE
5.3
{'CWE-400', 'CWE-697', 'CWE-1333'}
{'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3822', 'https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73', 'https://github.com/advisories/GHSA-hhfg-6hfc-rvxm'}
null
GHSA
GHSA-p9m8-27x8-rg87
Critical vulnerability found in cron-utils
### Impact A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. ### Patches The issue was patched and a new version was released. Please upgrade to version 9.1.6. ### Workarounds There are no known workarounds up to this moment. ### References A description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461) ### For more information If you have any questions or comments about this advisory: Open an issue in the [cron-utils Github repository](https://github.com/jmrozanec/cron-utils)
{'CVE-2021-41269'}
2022-04-19T19:03:15Z
2021-11-15T23:27:11Z
CRITICAL
10
{'CWE-94'}
{'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87', 'https://github.com/jmrozanec/cron-utils/issues/461', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41269', 'https://github.com/advisories/GHSA-p9m8-27x8-rg87', 'https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da', 'https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da'}
null
GHSA
GHSA-f6pc-crhh-cp96
Privilege escalation in Presto
### Affected This affects Presto server installations. This does NOT affect clients such as the CLI or JDBC driver. ### Impact Authenticated users can bypass authorization checks by directly accessing internal APIs. This impacts Presto server installations with secure internal communication configured. This does not affect installations that have not configured secure internal communication, as these installations are inherently insecure. ### Patches This issue has been fixed starting with PrestoSQL version 337. ### Workarounds This issue can be mitigated by blocking network access to internal APIs on the coordinator and workers. ### References See the Presto documentation for [Secure Internal Communication](https://trino.io/docs/current/security/internal-communication.html). ### For more information If you have any questions or comments about this advisory: * Join the **#security** channel on [Slack](https://trino.io/slack.html). * Contact the security team at [security@trino.io](mailto:security@trino.io).
{'CVE-2020-15087'}
2021-04-09T15:48:11Z
2020-06-30T16:33:23Z
HIGH
7.4
{'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15087', 'https://github.com/trinodb/trino/security/advisories/GHSA-f6pc-crhh-cp96', 'https://prestosql.io/docs/current/release/release-337.html#security-changes', 'https://trino.io/docs/current/release/release-337.html#security-changes', 'https://github.com/prestosql/presto/security/advisories/GHSA-f6pc-crhh-cp96', 'https://github.com/advisories/GHSA-f6pc-crhh-cp96'}
null
GHSA
GHSA-hvgc-mggg-pxr2
Malicious Package in js-sha7
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:12:40Z
2020-09-03T23:02:33Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-hvgc-mggg-pxr2', 'https://www.npmjs.com/advisories/1284'}
null
GHSA
GHSA-gjwp-7v3g-99pj
Cross-site Request Forgery (CSRF) in joplin
The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms.
{'CVE-2021-23431'}
2021-09-02T17:09:05Z
2021-09-02T17:09:05Z
MODERATE
5.4
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23431', 'https://github.com/advisories/GHSA-gjwp-7v3g-99pj', 'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e', 'https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537'}
null
GHSA
GHSA-4xg9-g7qj-jhg4
Malicious Package in comander
All versions of `comander` contains malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive. ## Recommendation Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
null
2021-09-29T20:33:41Z
2020-09-03T20:46:36Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-4xg9-g7qj-jhg4', 'https://www.npmjs.com/advisories/1193'}
null
GHSA
GHSA-5qjq-69w6-fg57
XSS vulnerability with translator
Flarum's translation system allowed for string inputs to be converted into HTML DOM nodes when rendered. This change was made after v0.1.0-beta.16 (our last beta before v1.0.0) and was not noticed or documented. This allowed for any user to type malicious HTML markup within certain user input fields and have this execute on client browsers. The example which led to the discovery of this vulnerability was in the forum search box. Entering faux-malicious HTML markup, such as <script>alert('test')</script> resulted in an alert box appearing on the forum. This attack could also be modified to perform AJAX requests on behalf of a user, possibly deleting discussions, modifying their settings or profile, or even modifying settings on the Admin panel if the attack was targetted towards a privileged user. ### Impact All Flarum communities that run flarum v1.0.0 or v1.0.1 are impacted. ### Patches The vulnerability has been fixed and published as flarum/core v1.0.2. All communities running Flarum v1.0 have to upgrade as soon as possible to v1.0.2 using: ``` composer update --prefer-dist --no-dev -a -W ``` You can then confirm you run the latest version using: ``` composer show flarum/core ``` ### Workarounds __None.__ ### For more information For any questions or comments on this vulnerability please visit https://discuss.flarum.org/d/27558. For support questions create a discussion at https://discuss.flarum.org/t/support. A reminder that if you ever become aware of a security issue in Flarum, please report it to us privately by emailing security@flarum.org, and we will address it promptly.
{'CVE-2021-32671'}
2022-04-19T19:02:59Z
2021-06-07T21:48:17Z
CRITICAL
10
{'CWE-79'}
{'https://github.com/advisories/GHSA-5qjq-69w6-fg57', 'https://github.com/flarum/core/security/advisories/GHSA-5qjq-69w6-fg57', 'https://github.com/flarum/core/commit/440bed81b8019dff00642c8f493b4909d505a28a', 'https://packagist.org/packages/flarum/core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32671'}
null
GHSA
GHSA-3837-87vh-xq3w
Data race in v9
v9 is a slim data engine for Data Oriented Design. An issue was discovered in the v9 crate through 2020-12-18 for Rust. There is an unconditional implementation of Sync for SyncRef<T>.
{'CVE-2020-36447'}
2022-05-04T03:17:00Z
2021-08-25T20:57:07Z
HIGH
8.1
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36447', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/v9/RUSTSEC-2020-0127.md', 'https://github.com/advisories/GHSA-3837-87vh-xq3w', 'https://github.com/purpleposeidon/v9/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0127.html'}
null
GHSA
GHSA-mgjw-2wrp-r535
Remote code execution in xwiki-platform
### Impact It's possible for an unprivileged user to perform a remote code execution by injecting a groovy script in her own profile and by calling the Reset password feature since the feature is performing a save of the user profile with programming rights in the impacted versions of XWiki. ### Patches The problem has been patched in XWiki 13.1RC1 with a complete refactoring of the Reset password feature. ### Workarounds There's different possible workarounds, all consisting in modifying the XWiki/ResetPassword page. - the Reset password feature can be entirely disabled by deleting the XWiki/ResetPassword page - the script in XWiki/ResetPassword can also be modified or removed: an administrator can replace it with a simple email contact to ask an administrator to reset the password. ### References https://jira.xwiki.org/browse/XWIKI-16661 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](https://jira.xwiki.org) * Email us at [Security mailing-list](mailto:security@xwiki.org)
{'CVE-2022-23616'}
2022-02-11T15:01:24Z
2022-02-09T21:32:10Z
HIGH
8.8
{'CWE-74'}
{'https://jira.xwiki.org/browse/XWIKI-16661', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23616', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mgjw-2wrp-r535', 'https://github.com/advisories/GHSA-mgjw-2wrp-r535'}
null
GHSA
GHSA-4r62-v4vq-hr96
Regular Expression Denial of Service (REDoS) in Marked
### Impact _What kind of vulnerability is it? Who is impacted?_ [Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) A Denial of Service attack can affect anyone who runs user generated code through `marked`. ### Patches _Has the problem been patched? What versions should users upgrade to?_ patched in v2.0.0 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ None. ### References _Are there any links users can visit to find out more?_ https://github.com/markedjs/marked/issues/1927 https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS ### For more information If you have any questions or comments about this advisory: * Open an issue in [marked](https://github.com/markedjs/marked/issues)
{'CVE-2021-21306'}
2022-04-19T19:02:46Z
2021-02-08T21:17:58Z
MODERATE
5.3
{'CWE-400'}
{'https://www.npmjs.com/package/marked', 'https://github.com/markedjs/marked/issues/1927', 'https://github.com/markedjs/marked/pull/1864', 'https://github.com/advisories/GHSA-4r62-v4vq-hr96', 'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd', 'https://github.com/markedjs/marked/security/advisories/GHSA-4r62-v4vq-hr96', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21306'}
null
GHSA
GHSA-4p55-xj37-fx7g
Improper Authorization in Strapi
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.
{'CVE-2020-27665'}
2021-01-08T21:21:57Z
2020-10-29T18:29:31Z
MODERATE
0
{'CWE-276'}
{'https://snyk.io/vuln/SNYK-JS-STRAPIPLUGINCONTENTTYPEBUILDER-1021616', 'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb', 'https://github.com/advisories/GHSA-4p55-xj37-fx7g', 'https://github.com/strapi/strapi/pull/8439', 'https://github.com/strapi/strapi/releases/tag/v3.2.5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27665'}
null
GHSA
GHSA-28xh-wpgr-7fm8
Command Injection in open
Versions of `open` before 6.0.0 are vulnerable to command injection when unsanitized user input is passed in. The package does come with the following warning in the readme: ``` The same care should be taken when calling open as if you were calling child_process.exec directly. If it is an executable it will run in a new shell. ``` ## Recommendation `open` is now the deprecated `opn` package. Upgrading to the latest version is likely have unwanted effects since it now has a very different API but will prevent this vulnerability.
null
2021-08-17T13:17:37Z
2019-06-20T15:35:49Z
CRITICAL
0
{'CWE-77'}
{'https://github.com/pwnall/node-open/issues/68', 'https://hackerone.com/reports/319473', 'https://github.com/advisories/GHSA-28xh-wpgr-7fm8', 'https://www.npmjs.com/advisories/663', 'https://nodesecurity.io/advisories/663', 'https://github.com/pwnall/node-open/issues/69'}
null
GHSA
GHSA-fvq6-55gv-jx9f
SQL Injection in mysql
Versions of `mysql` prior to 2.0.0-alpha8 are affected by a SQL Injection vulnerability in the `mysql.escape()` function, which does not properly escape object keys. ## Recommendation Update to version 2.0.0-alpha8 or later.
{'CVE-2015-9244'}
2021-01-07T23:35:25Z
2020-09-01T15:21:05Z
MODERATE
0
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-9244', 'https://nodesecurity.io/advisories/66', 'https://github.com/advisories/GHSA-fvq6-55gv-jx9f', 'https://www.npmjs.com/advisories/66', 'https://github.com/felixge/node-mysql/issues/342'}
null
GHSA
GHSA-gc45-j3m5-8qfq
Server-Side Request Forgery in Feehi CMS
Feehi CMS 2.1.1 is affected by a Server-side request forgery (SSRF) vulnerability. When the user modifies the HTTP Referer header to any url, the server can make a request to it.
{'CVE-2021-30108'}
2021-06-08T20:12:32Z
2021-06-08T20:12:32Z
CRITICAL
9.1
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-30108', 'https://github.com/liufee/cms/issues/57', 'https://github.com/advisories/GHSA-gc45-j3m5-8qfq'}
null
GHSA
GHSA-6c3j-c64m-qhgq
XSS in jQuery as used in Drupal, Backdrop CMS, and other products
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
{'CVE-2019-11358'}
2022-04-07T15:12:22Z
2019-04-26T16:29:11Z
MODERATE
6.1
{'CWE-79', 'CWE-1321'}
{'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.securityfocus.com/bid/108023', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLXRX23725JL366CNZGJZ7AQQB7LHQ6F/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UOAZIFCSZ3ENEFOR5IXX6NFAD3HV7FA/', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://security.netapp.com/advisory/ntap-20190919-0001/', 'https://lists.apache.org/thread.html/r38f0d1aa3c923c22977fe7376508f030f22e22c1379fbb155bf29766@%3Cdev.syncope.apache.org%3E', 'https://www.tenable.com/security/tns-2019-08', 'https://lists.apache.org/thread.html/r2041a75d3fc09dec55adfd95d598b38d22715303f65c997c054844c9@%3Cissues.flink.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/88fb0362fd40e5b605ea8149f63241537b8b6fb5bfa315391fc5cbb7@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://github.com/jquery/jquery/pull/4333', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://lists.apache.org/thread.html/rac25da84ecdcd36f6de5ad0d255f4e967209bbbebddb285e231da37d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc@%3Ccommits.airflow.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4434', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://backdropcms.org/security/backdrop-sa-core-2019-009', 'https://access.redhat.com/errata/RHBA-2019:1570', 'http://www.openwall.com/lists/oss-security/2019/06/03/2', 'https://www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jquery/', 'https://github.com/advisories/GHSA-6c3j-c64m-qhgq', 'https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00024.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5IABSKTYZ5JUGL735UKGXL5YPRYOPUYI/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYH3OAGR2RTCHRA5NOKX2TES7SNQMWGO/', 'https://seclists.org/bugtraq/2019/Apr/32', 'https://lists.apache.org/thread.html/r41b5bfe009c845f67d4f68948cc9419ac2d62e287804aafd72892b08@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r7e8ebccb7c022e41295f6fdb7b971209b83702339f872ddd8cf8bf73@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734@%3Cdev.storm.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://lists.apache.org/thread.html/b736d0784cf02f5a30fbb4c5902762a15ad6d47e17e2c5a17b7d6205@%3Ccommits.airflow.apache.org%3E', 'https://seclists.org/bugtraq/2019/Jun/12', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV3PKZC3PQCO3273HAT76PAQZFBEO4KP/', 'https://lists.apache.org/thread.html/6097cdbd6f0a337bedd9bb5cc441b2d525ff002a96531de367e4259f@%3Ccommits.airflow.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-JQUERY-174006', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZW27UCJ5CYFL4KFFFMYMIBNMIU2ALG5/', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00006.html', 'https://www.debian.org/security/2019/dsa-4460', 'https://lists.apache.org/thread.html/5928aa293e39d248266472210c50f176cac1535220f2486e6a7fa844@%3Ccommits.airflow.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3024', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11358', 'https://www.drupal.org/sa-core-2019-006', 'https://www.tenable.com/security/tns-2020-02', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://lists.apache.org/thread.html/r7aac081cbddb6baa24b75e74abf0929bf309b176755a53e3ed810355@%3Cdev.flink.apache.org%3E', 'https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b', 'https://seclists.org/bugtraq/2019/May/18', 'https://access.redhat.com/errata/RHSA-2019:2587', 'https://lists.apache.org/thread.html/r2baacab6e0acb5a2092eb46ae04fd6c3e8277b4fd79b1ffb7f3254fa@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-77rv-6vfw-x4gc
Critical severity vulnerability that affects org.springframework.security.oauth:spring-security-oauth and org.springframework.security.oauth:spring-security-oauth2
Spring Security OAuth, versions 2.3 prior to 2.3.5, and 2.2 prior to 2.2.4, and 2.1 prior to 2.1.4, and 2.0 prior to 2.0.17, and older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the "redirect_uri" parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and uses the DefaultRedirectResolver in the AuthorizationEndpoint. This vulnerability does not expose applications that: Act in the role of an Authorization Server and uses a different RedirectResolver implementation other than DefaultRedirectResolver, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient).
{'CVE-2019-3778'}
2021-01-22T20:49:23Z
2019-03-14T15:39:30Z
CRITICAL
0
{'CWE-601'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3778', 'https://github.com/advisories/GHSA-77rv-6vfw-x4gc', 'https://pivotal.io/security/cve-2019-3778', 'http://www.securityfocus.com/bid/107153', 'http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html'}
null
GHSA
GHSA-43jf-985q-588j
Multiple `CHECK`-fails in `function.cc` in TensowFlow
### Impact A malicious user can cause a denial of service by altering a `SavedModel` such that [assertions in `function.cc`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/function.cc) would be falsified and crash the Python interpreter. ### Patches We have patched the issue in GitHub commits [dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2](https://github.com/tensorflow/tensorflow/commit/dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2) and [3d89911481ba6ebe8c88c1c0b595412121e6c645](https://github.com/tensorflow/tensorflow/commit/3d89911481ba6ebe8c88c1c0b595412121e6c645). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23586'}
2022-02-11T20:31:30Z
2022-02-09T23:27:08Z
MODERATE
6.5
{'CWE-617'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23586', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43jf-985q-588j', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/function.cc', 'https://github.com/tensorflow/tensorflow/commit/3d89911481ba6ebe8c88c1c0b595412121e6c645', 'https://github.com/tensorflow/tensorflow/commit/dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2', 'https://github.com/advisories/GHSA-43jf-985q-588j'}
null
GHSA
GHSA-x5ph-4fr4-g7fw
Downloads Resources over HTTP in galenframework-cli
Affected versions of `galenframework-cli` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `galenframework-cli`. ## Recommendation Update to version 2.3.1 or later.
{'CVE-2016-10560'}
2021-01-08T00:47:47Z
2019-02-18T23:54:21Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/170', 'https://nodesecurity.io/advisories/170', 'https://github.com/advisories/GHSA-x5ph-4fr4-g7fw', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10560'}
null
GHSA
GHSA-x3w4-mrmv-cw2x
Malicious Package in buffev-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:26:20Z
2020-09-03T22:19:44Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1258', 'https://github.com/advisories/GHSA-x3w4-mrmv-cw2x'}
null
GHSA
GHSA-2v5f-23xc-v9qr
Cross-site scripting
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
{'CVE-2021-3377'}
2021-03-11T22:50:39Z
2021-03-11T22:50:39Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3377', 'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27', 'https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf', 'https://github.com/advisories/GHSA-2v5f-23xc-v9qr'}
null
GHSA
GHSA-cqr7-78pj-3g7j
File Descriptor Leak Can Cause DoS Vulnerability in hapi
Versions 2.0.x and 2.1.x of hapi are vulnerable to a denial of service attack via a file descriptor leak. When triggered repeatedly, this leak will cause the server to run out of file descriptors and the node process to die. The effort required to take down a server depends on the process file descriptor limit. No other side effects or exploits have been identified. ## Recommendation - Please upgrade to version 2.2.x or above as soon as possible.
{'CVE-2014-3742'}
2021-09-09T20:31:03Z
2017-10-24T18:33:36Z
HIGH
0
null
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://nodesecurity.io/advisories/hapi_File_descriptor_leak_DoS_vulnerability', 'https://www.npmjs.com/advisories/11', 'https://github.com/spumko/hapi/issues/1427', 'https://github.com/advisories/GHSA-cqr7-78pj-3g7j', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3742', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
null
GHSA
GHSA-r6v3-hpxj-r8rv
Code Injection in PyXDG
A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.
{'CVE-2019-12761'}
2021-08-31T21:17:12Z
2019-06-07T20:56:27Z
HIGH
7.5
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-PYTHON-PYXDG-174562', 'https://lists.debian.org/debian-lts-announce/2019/06/msg00006.html', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00003.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12761', 'https://gist.github.com/dhondta/b45cd41f4186110a354dc7272916feba', 'https://github.com/advisories/GHSA-r6v3-hpxj-r8rv'}
null
GHSA
GHSA-xc6g-ggrc-qq4r
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`. ## Proof of Concept ``` var sanitizeHtml = require('sanitize-html'); var dirty = '!<textarea>&lt;/textarea&gt;<svg/onload=prompt`xs`&gt;</textarea>!'; var clean = sanitizeHtml(dirty, { allowedTags: [ 'textarea' ] }); console.log(clean); // !<textarea></textarea><svg/onload=prompt`xs`></textarea>! ``` ## Recommendation Update to version 1.11.4 or later.
{'CVE-2017-16016'}
2021-01-08T21:15:03Z
2018-11-09T17:47:23Z
MODERATE
0
{'CWE-79'}
{'https://nodesecurity.io/advisories/154', 'https://github.com/punkave/sanitize-html/issues/100', 'https://npmjs.com/package/sanitize-html#discarding-the-entire-contents-of-a-disallowed-tag', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16016', 'https://www.npmjs.com/advisories/154', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))', 'https://github.com/advisories/GHSA-xc6g-ggrc-qq4r', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403'}
null
GHSA
GHSA-5mhv-9qw8-j63g
Hijacked Environment Variables in mssql.js
The `mssql.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16056'}
2021-01-08T19:49:01Z
2018-11-09T17:43:03Z
MODERATE
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-5mhv-9qw8-j63g', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16056', 'https://www.npmjs.com/advisories/485', 'https://nodesecurity.io/advisories/485'}
null
GHSA
GHSA-2h63-qp69-fwvw
Server-side request forgery (SSRF) in Apache Batik
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
{'CVE-2020-11987'}
2022-02-08T21:33:50Z
2022-01-06T20:35:54Z
HIGH
8.2
{'CWE-20', 'CWE-918'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEDID4DAVPECE6O4QQCSIS75BLLBUUAM/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W7EAYO5XIHD6OIEA3HPK64UDDBSLNAC5/', 'https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E', 'https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11987', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-2h63-qp69-fwvw', 'https://xmlgraphics.apache.org/security.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/apache/xmlgraphics-batik/commit/0ef5b661a1f77772d1110877ea9e0287987098f6', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-wj6h-7chw-x4h2
Command injection in get-git-data
get-git-data through 1.3.1 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the arguments provided to get-git-data.
{'CVE-2020-7619'}
2021-07-28T21:53:40Z
2021-05-10T15:59:14Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-wj6h-7chw-x4h2', 'https://github.com/chardos/get-git-data/blob/master/index.js#L7,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7619', 'https://snyk.io/vuln/SNYK-JS-GETGITDATA-564222'}
null
GHSA
GHSA-j6wp-3859-vxfg
OIDC claims not updated from Identity Provider in Pomerium
### Impact Changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using [`allowed_idp_claims`](https://www.pomerium.com/reference/#allowed-idp-claims) as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. ### Patches v0.15.6 ### Workarounds - Clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated ### References https://github.com/pomerium/pomerium/pull/2724 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Pomerium](https://github.com/pomerium/pomerium) * Email us at [security@pomerium.com](mailto:security@pomerium.com)
{'CVE-2021-41230'}
2021-11-10T16:52:24Z
2021-11-10T16:52:24Z
MODERATE
5.3
{'CWE-863'}
{'https://github.com/advisories/GHSA-j6wp-3859-vxfg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41230', 'https://github.com/pomerium/pomerium/pull/2724', 'https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg'}
null
GHSA
GHSA-v89p-5hr2-4rh4
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196.
{'CVE-2019-1197'}
2021-03-29T20:56:15Z
2021-03-29T20:56:15Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1197', 'https://github.com/advisories/GHSA-v89p-5hr2-4rh4', 'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1197'}
null
GHSA
GHSA-46rx-6jg9-4fh8
Cross-site Scripting in LibreNMS
LibreNMS through 21.10.2 allows XSS via a widget title.
{'CVE-2021-43324'}
2021-11-08T17:59:15Z
2021-11-08T17:59:15Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43324', 'https://github.com/advisories/GHSA-46rx-6jg9-4fh8', 'https://github.com/librenms/librenms/commit/99d2462b80435b91a35236639b909eebee432126'}
null
GHSA
GHSA-5wjf-62hw-q78r
Excessive CPU usage
Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. ### Impact This can result in a DoS condition. ### Patches Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched. ### Workarounds N/A ### References [envoy GSA](https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc) [envoy CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32778) [envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ) ### For more information If you have any questions or comments about this advisory: * Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues) * Email us at [security@pomerium.com](mailto:security@pomerium.com)
{'CVE-2021-39204'}
2021-09-13T19:57:44Z
2021-09-10T17:54:13Z
HIGH
7.5
{'CWE-834'}
{'https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39204', 'https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ', 'https://github.com/advisories/GHSA-5wjf-62hw-q78r', 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc'}
null
GHSA
GHSA-rmj8-8hhh-gv5h
Information Exposure when using Puma with Rails
### Impact Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. From Rails: > Under certain circumstances response bodies will not be closed, for example a bug in a webserver[1] or a bug in a Rack middleware. In the event a response is not notified of a close, ActionDispatch::Executor will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests, especially when interacting with ActiveSupport::CurrentAttributes. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. ### Patches This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. See: https://github.com/advisories/GHSA-wh98-p28r-vrc9 for details about the rails vulnerability Upgrading to a patched Rails _or_ Puma version fixes the vulnerability. ### Workarounds Upgrade to Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. The [Rails CVE](https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ?utm_medium=email&utm_source=footer&pli=1) includes a middleware that can be used instead. ### References * Rails CVE: [CVE-2022-23633](https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ?utm_medium=email&utm_source=footer&pli=1) ### For more information If you have any questions or comments about this advisory: * Open an issue in [puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
{'CVE-2022-23634'}
2022-04-19T19:03:23Z
2022-02-11T21:33:23Z
HIGH
8
{'CWE-200'}
{'https://github.com/advisories/GHSA-wh98-p28r-vrc9', 'https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ?utm_medium=email&utm_source=footer&pli=1', 'https://github.com/advisories/GHSA-rmj8-8hhh-gv5h', 'https://github.com/puma/puma/commit/b70f451fe8abc0cff192c065d549778452e155bb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23634', 'https://github.com/puma/puma/security/advisories/GHSA-rmj8-8hhh-gv5h'}
null
GHSA
GHSA-gcx5-3p5f-f8vp
Prototype Pollution in jquery.cookie
jQuery Cookie 1.4.1 is affected by prototype pollution, which can lead to DOM cross-site scripting (XSS).
{'CVE-2022-23395'}
2022-03-29T22:13:34Z
2022-03-03T00:00:51Z
MODERATE
6.1
{'CWE-1321'}
{'https://security.netapp.com/advisory/ntap-20220325-0008/', 'https://github.com/advisories/GHSA-gcx5-3p5f-f8vp', 'https://snyk.io/test/npm/jquery.cookie/1.4.1?tab=issues', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23395'}
null
GHSA
GHSA-gh78-48h3-frjq
Improper exception handling in Aedes
An issue was discovered in MoscaJS Aedes 0.42.0 and fixed in 0.42.1. lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream.
{'CVE-2020-13410'}
2021-05-06T18:10:46Z
2021-05-06T18:10:46Z
HIGH
7.5
{'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13410', 'https://github.com/moscajs/aedes/pull/493', 'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b', 'https://github.com/advisories/GHSA-gh78-48h3-frjq', 'https://payatu.com/advisory/dos-in-aedes-mqtt-broker'}
null
GHSA
GHSA-2r6j-862c-m2v2
Unrestricted File Upload in Form Framework
### Problem Due to the lack of ensuring file extensions belong to configured allowed mime-types, attackers can upload arbitrary data with arbitrary file extensions - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. TYPO3 Extbase extensions, which implement a file upload and do not implement a custom _TypeConverter_ to transform uploaded files into _FileReference_ domain model objects are affected by the vulnerability as well, since the _UploadedFileReferenceConverter_ of _ext:form_ handles the file upload and will accept files of any mime-type which are persisted to the default location. In any way, uploaded files are placed in the default location _/fileadmin/user_upload/_, in most scenarios keeping the submitted filename - which allows attackers to directly reference files, or even correctly guess filenames used by other individuals, disclosing this information. No authentication is required to exploit this vulnerability. ### Solution Update to TYPO3 versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. Type converter _UploadedFileReferenceConverter_ is not registered globally anymore and just handles uploaded files within the scope of the Form Framework. Guessable storage location has changed from _/fileadmin/user_upload/form\_\<random-hash\>/_ to _/fileadmin/form_uploads/<random-40-bit>_. Allowed mime-types must match expected file extensions (e.g. _application/pdf_ must be _.pdf_, and cannot be _.html_). Extbase extensions, who rely on the global availability of the _UploadedFileReferenceConverter_ must now implement a custom _TypeConverter_ to handle file uploads or explicitly implement the ext:form _UploadedFileReferenceConverter_ with appropriate setting for accepted mime-types. ### Credits Thanks to Sebastian Michaelsen, Marc Lindemann, Oliver Eglseder, Markus Volkmer, Jakob Kunzmann, Johannes Regner, Richie Lee who reported this issue, and to TYPO3 core & security team members Oliver Hader & Benni Mack, as well as TYPO3 contributor Ralf Zimmermann who fixed the issue. ### References * [TYPO3-CORE-SA-2021-002](https://typo3.org/security/advisory/typo3-core-sa-2021-002)
{'CVE-2021-21355'}
2022-04-19T19:02:51Z
2021-03-23T01:53:52Z
HIGH
8
{'CWE-552', 'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21355', 'https://typo3.org/security/advisory/typo3-core-sa-2021-002', 'https://github.com/advisories/GHSA-2r6j-862c-m2v2', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2r6j-862c-m2v2', 'https://packagist.org/packages/typo3/cms-form'}
null
GHSA
GHSA-vhgr-gfx3-fg37
Unrestricted Upload of File with Dangerous Type in WPanel 4
Multiple Remote Code Execution (RCE) vulnerabilities exist in WPanel 4 4.3.1 and below via a malicious PHP file upload to (1) Dashboard's Avatar image, (2) Posts Folder image, (3) Pages Folder image and (4) Gallery Folder image.
{'CVE-2021-34257'}
2022-04-12T21:58:09Z
2022-04-01T00:00:41Z
HIGH
8.8
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-34257', 'https://latestpcsolution.wordpress.com/2021/06/05/wpanel4-cms-authenticated-rce/', 'https://github.com/Sentinal920/WPanel4-Authenticated-RCE', 'https://github.com/advisories/GHSA-vhgr-gfx3-fg37'}
null
GHSA
GHSA-4v9q-hm2p-68c4
Spoofing attack due to unvalidated KDC in node-krb5
Affected versions of `node-krb5` do not validate the KDC prior to authenticating, which might allow an attacker with network access and enough time to spoof the KDC and impersonate a valid user without knowing their credentials. ## Recommendation It appears that this will remain unfixed indefinitely, as the Github issue for this vulnerability has been open since 2015, with no work on it since then. At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=kerberos).
{'CVE-2016-1000238'}
2021-09-23T21:35:23Z
2020-09-01T15:57:01Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-4v9q-hm2p-68c4', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000238', 'https://www.npmjs.com/advisories/136', 'https://github.com/qesuto/node-krb5/issues/13', 'http://archive.hack.lu/2010/Bouillon-Stealing-credentials-for-impersonation.pdf'}
null
GHSA
GHSA-8j8c-7jfh-h6hx
Code Injection in js-yaml
Versions of `js-yaml` prior to 3.13.1 are vulnerable to Code Injection. The `load()` function may execute arbitrary code injected through a malicious YAML file. Objects that have `toString` as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the `load()` function. The `safeLoad()` function is unaffected. An example payload is `{ toString: !<tag:yaml.org,2002:js/function> 'function (){return Date.now()}' } : 1` which returns the object { "1553107949161": 1 } ## Recommendation Upgrade to version 3.13.1.
null
2021-08-04T20:51:11Z
2019-06-04T20:14:07Z
HIGH
0
{'CWE-94'}
{'https://www.npmjs.com/advisories/813', 'https://github.com/nodeca/js-yaml/pull/480', 'https://github.com/advisories/GHSA-8j8c-7jfh-h6hx'}
null
GHSA
GHSA-36vm-xw34-x4pj
CHECK-fail in `tf.raw_ops.IRFFT`
### Impact An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.IRFFT`: ```python import tensorflow as tf values = [-10.0] * 130 values[0] = -9.999999999999995 inputs = tf.constant(values, shape=[10, 13], dtype=tf.float32) inputs = tf.cast(inputs, dtype=tf.complex64) fft_length = tf.constant([0], shape=[1], dtype=tf.int32) tf.raw_ops.IRFFT(input=inputs, fft_length=fft_length) ``` The above example causes Eigen code to operate on an empty matrix. This triggers on an assertion and causes program termination. ### Patches We have patched the issue in GitHub commit [1c56f53be0b722ca657cbc7df461ed676c8642a2](https://github.com/tensorflow/tensorflow/commit/1c56f53be0b722ca657cbc7df461ed676c8642a2). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29562'}
2021-05-21T14:25:02Z
2021-05-21T14:25:02Z
LOW
2.5
{'CWE-617'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29562', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-36vm-xw34-x4pj', 'https://github.com/advisories/GHSA-36vm-xw34-x4pj', 'https://github.com/tensorflow/tensorflow/commit/1c56f53be0b722ca657cbc7df461ed676c8642a2'}
null
GHSA
GHSA-g4m3-rpxr-h7vg
Malicious Package in mogodb-core
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:26:34Z
2020-09-03T19:52:25Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1134', 'https://github.com/advisories/GHSA-g4m3-rpxr-h7vg'}
null
GHSA
GHSA-3j5x-7ccf-ppgm
Cross-site scripting in recommender-xblock
Recommender before 1.3.1 allows XSS.
{'CVE-2018-20858'}
2021-08-17T21:16:30Z
2019-08-21T16:15:33Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-3j5x-7ccf-ppgm', 'https://groups.google.com/forum/#!topic/openedx-announce/SF8Sn6MuUTg', 'https://github.com/edx/RecommenderXBlock/pull/2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20858'}
null
GHSA
GHSA-4rmr-c2jx-vx27
Remote code injection in mustache/mustache
In Mustache.php v2.0.0 through v2.14.0, Sections tag can lead to arbitrary php code execution even if strict_callables is true when section value is controllable.
{'CVE-2022-0323'}
2022-01-28T18:22:22Z
2022-01-27T14:51:00Z
HIGH
8.8
{'CWE-1336'}
{'https://github.com/advisories/GHSA-4rmr-c2jx-vx27', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0323', 'https://github.com/bobthecow/mustache.php/commit/579ffa5c96e1d292c060b3dd62811ff01ad8c24e', 'https://huntr.dev/bounties/a5f5a988-aa52-4443-839d-299a63f44fb7'}
null
GHSA
GHSA-jpcm-4485-69p7
Sensitive information disclosure via log in com.bmuschko:gradle-vagrant-plugin
### Impact The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. ### Patches Fixed in version 3.0.0 ### References - https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44 - https://github.com/bmuschko/gradle-vagrant-plugin/issues/19 - https://github.com/bmuschko/gradle-vagrant-plugin/pull/20 ### For more information If you have any questions or comments about this advisory: * Open an issue in [bmuschko/gradle-vagrant-plugin](https://github.com/bmuschko/gradle-vagrant-plugin)
{'CVE-2021-21361'}
2022-04-19T19:02:49Z
2021-03-09T00:38:41Z
HIGH
7.4
{'CWE-532'}
{'https://github.com/advisories/GHSA-jpcm-4485-69p7', 'https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44', 'https://github.com/bmuschko/gradle-vagrant-plugin/issues/19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21361', 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7', 'https://github.com/bmuschko/gradle-vagrant-plugin/pull/20'}
null
GHSA
GHSA-rvgg-f8qm-6h7j
High severity vulnerability that affects io.vertx:vertx-web
In version from 3.0.0 to 3.5.2 of Eclipse Vert.x, the CSRFHandler do not assert that the XSRF Cookie matches the returned XSRF header/form parameter. This allows replay attacks with previously issued tokens which are not expired yet.
{'CVE-2018-12540'}
2021-01-08T01:57:50Z
2018-10-17T16:19:43Z
HIGH
0
{'CWE-352'}
{'https://lists.apache.org/thread.html/r10aef585c521f8ef603f5831f9d97a27d920624025131da950e0c62f@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2371', 'https://lists.apache.org/thread.html/rc5b4ae8a7caae6d3d5b3266cb050823b96dd62b30718b90b778d3d8b@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r3fffda8e947edaa359152c8dc4c4ea9c96fd8ced1999bbce92bc6b25@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r59482ebed302aa49ac7e0c51737499746b0d086fcdeb8f90e705951f@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-rvgg-f8qm-6h7j', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536948', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12540'}
null
GHSA
GHSA-f9fq-vjvh-779p
Improper Input Validation in vault-ssh-helper
HashiCorp vault-ssh-helper up to and including version 0.1.6 incorrectly accepted Vault-issued SSH OTPs for the subnet in which a host's network interface was located, rather than the specific IP address assigned to that interface. Fixed in 0.2.0.
{'CVE-2020-24359'}
2022-04-12T22:11:28Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-f9fq-vjvh-779p', 'https://github.com/hashicorp/vault-ssh-helper/blob/master/CHANGELOG.md#020-august-19-2020', 'https://github.com/hashicorp/vault-ssh-helper/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24359', 'https://github.com/hashicorp/vault-ssh-helper/commit/83effd08cbcbe4b993d776bd9b39465cd9e4603f'}
null
GHSA
GHSA-h2fg-54x9-5qhq
Nil dereference in NATS JWT, DoS of nats-server
## Problem Description The NATS account system has an Operator trusted by the servers, which signs Accounts, and each Account can then create and sign Users within their account. The Operator should be able to safely issue Accounts to other entities which it does not fully trust. A malicious Account could create and sign a User JWT with a state not created by the normal tooling, such that decoding by the NATS JWT library (written in Go) would attempt a nil dereference, aborting execution. The NATS Server is known to be impacted by this. ## Affected versions #### JWT library * all versions prior to 1.1.0 #### NATS Server * Version 2 prior to 2.1.9 ## Impact #### JWT library * Programs would nil dereference and panic, aborting execution by default. #### NATS server * Denial of Service caused by process termination ## Workaround If your NATS servers do not trust any accounts which are managed by untrusted entities, then malformed User credentials are unlikely to be encountered. ## Solution Upgrade the JWT dependency in any application using it. Upgrade the NATS server if using NATS Accounts.
{'CVE-2020-26521'}
2022-02-11T23:43:22Z
2022-02-11T23:43:13Z
LOW
7.5
{'CWE-476'}
{'http://www.openwall.com/lists/oss-security/2020/11/02/2', 'https://advisories.nats.io/CVE/CVE-2020-26521.txt', 'https://github.com/advisories/GHSA-h2fg-54x9-5qhq', 'https://github.com/nats-io/nats-server/commit/9ff8bcde2e46009e98bd9e88f598af355f62c168', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT67XCLIIBYRT762SVFBYFFTQFVSM3SI/', 'https://github.com/nats-io/nats-server/commits/master', 'https://github.com/nats-io/jwt/security/advisories/GHSA-h2fg-54x9-5qhq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26521'}
null
GHSA
GHSA-7r87-cj48-wj45
Potential Captcha Validate Bypass in flask-session-captcha
### Impact flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. The `captcha.validate()` function would return `None` if passed no value (e.g. by submitting a request with an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Sample vulnerable code: ```python if captcha.validate() == False: ... # abort else: ... # do stuff ``` ### Patches A new version (1.2.1) is available that fixes the issue. ### Workarounds Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work. ```python if not captcha.validate(): ... # abort else: ... # do stuff ``` ```python if captcha.validate(): ... # do stuff else: ... # abort ``` ### References https://github.com/Tethik/flask-session-captcha/pull/27 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the github repo](https://github.com/Tethik/flask-session-captcha)
{'CVE-2022-24880'}
2022-04-27T18:18:03Z
2022-04-26T21:19:52Z
MODERATE
5.3
{'CWE-754', 'CWE-394', 'CWE-253'}
{'https://github.com/Tethik/flask-session-captcha/commit/2811ae23a38d33b620fb7a07de8837c6d65c13e4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24880', 'https://github.com/Tethik/flask-session-captcha/releases/tag/v1.2.1', 'https://github.com/advisories/GHSA-7r87-cj48-wj45', 'https://github.com/Tethik/flask-session-captcha/pull/27', 'https://github.com/Tethik/flask-session-captcha/security/advisories/GHSA-7r87-cj48-wj45'}
null
GHSA
GHSA-8jhx-9gf4-hhf5
Improper Access Control in consul
The makandra consul gem through 1.0.2 for Ruby has Incorrect Access Control.
{'CVE-2019-16377'}
2021-08-17T22:33:05Z
2019-09-27T20:01:00Z
CRITICAL
9.8
{'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16377', 'https://github.com/rubysec/ruby-advisory-db/blob/c26fbc13435b8be448ad59131428538049d165e4/gems/consul/CVE-2019-16377.yml', 'https://github.com/makandra/consul/issues/49', 'https://github.com/advisories/GHSA-8jhx-9gf4-hhf5', 'https://rubygems.org/gems/consul'}
null
GHSA
GHSA-vw47-mr44-3jf9
Confused Deputy in Kubernetes
A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack.
{'CVE-2021-25740'}
2021-10-04T14:15:52Z
2021-09-21T18:28:30Z
LOW
3.1
{'CWE-610', 'CWE-441'}
{'https://github.com/advisories/GHSA-vw47-mr44-3jf9', 'https://github.com/kubernetes/kubernetes/issues/103675', 'https://groups.google.com/g/kubernetes-security-announce/c/WYE9ptrhSLE', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25740'}
null
GHSA
GHSA-3xv8-3j54-hgrp
Out-of-bounds read in Pillow
In libImaging/PcxDecode.c in Pillow before 6.2.3 and 7.x before 7.0.1, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer.
{'CVE-2020-10378'}
2021-11-03T18:04:53Z
2021-11-03T18:04:53Z
MODERATE
5.5
{'CWE-125'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/', 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging', 'https://github.com/python-pillow/Pillow/pull/4538', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10378', 'https://usn.ubuntu.com/4430-2/', 'https://github.com/advisories/GHSA-3xv8-3j54-hgrp', 'https://usn.ubuntu.com/4430-1/', 'https://github.com/python-pillow/Pillow/commit/6a83e4324738bb0452fbe8074a995b1c73f08de7#diff-9478f2787e3ae9668a15123b165c23ac', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/', 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-77.yaml', 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}
null
GHSA
GHSA-94g7-hpv8-h9qm
Remote code injection in Log4j
### Impact Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input. More Details: https://github.com/advisories/GHSA-jfh8-c2jp-5v3q ### Patches Version 1.11.1 of the Splunk Logging for Java library. There is also a backport to version 1.6.2 released as a patch: 1.6.2-0-0. ### Workarounds If upgrading is not possible, then ensure the -Dlog4j2.formatMsgNoLookups=true system property is set on both client- and server-side components. ### References https://github.com/advisories/GHSA-jfh8-c2jp-5v3q ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/splunk/splunk-library-javalogging/issues * Email us at [devinfo@splunk.com](mailto:devinfo@splunk.com)
null
2021-12-14T21:46:35Z
2021-12-14T21:46:35Z
CRITICAL
0
null
{'https://github.com/splunk/splunk-library-javalogging/security/advisories/GHSA-94g7-hpv8-h9qm', 'https://github.com/advisories/GHSA-94g7-hpv8-h9qm'}
null
GHSA
GHSA-qxf4-chvg-4r8r
Potential HTTP request smuggling in Apache Tomcat
In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
{'CVE-2020-1935'}
2021-08-19T19:30:38Z
2020-02-28T01:10:48Z
MODERATE
4.8
{'CWE-444'}
{'https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4680', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4673', 'https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html', 'https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E', 'https://usn.ubuntu.com/4448-1/', 'https://github.com/advisories/GHSA-qxf4-chvg-4r8r', 'https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200327-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1935', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
GHSA
GHSA-5q7q-qqw2-hjq7
Cross-Site Scripting in AjaxNetProfessional
### Overview Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary JavaScript objects. ### Description Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it. XSS effects vary in range from petty nuisance to significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner network. ### Releases Releases before version 21.12.22.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions. ### Workarounds A workaround exists that replaces one of the core JavaScript files embedded in the library. Using a XML configuration allows to replace the default JavaScript code to be replaced with the version on GitHub. ```xml <configuration> <configSections> <sectionGroup name="ajaxNet"> <section name="ajaxSettings" type="AjaxPro.AjaxSettingsSectionHandler,AjaxPro.2" requirePermission="false" restartOnExternalChanges="true"/> </sectionGroup> </configSections> <ajaxNet> <ajaxSettings> <coreScript>~/ajaxpro-core-fixed.js</coreScript> </ajaxSettings> </ajaxNet> </configuration> ``` Copy the file core.js from the main project folder to your web server root folder and rename that ajaxpro-core-fixed.js. Clients need to refresh the web page to download the changed JavaScript code. ### References Commit fixing the issue: c89e39b9679fcb8ab6644fe21cc7e652cb615e2b Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/ ### For more information If you have any questions or comments about this advisory: * Open an issue on this GitHub repository
{'CVE-2021-43853'}
2022-04-19T19:03:18Z
2022-01-06T18:32:24Z
HIGH
8.7
{'CWE-79'}
{'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43853', 'https://github.com/advisories/GHSA-5q7q-qqw2-hjq7', 'https://github.com/michaelschwarz/Ajax.NET-Professional/releases/tag/v21.12.22.1', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b'}
null
GHSA
GHSA-4j59-hfw6-6w7h
Downloads Resources over HTTP in cmake
Affected versions of `cmake` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cmake`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available, or installing the cmake binaries via a system package manager, such as `apt-get`. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10642'}
2021-09-16T20:54:43Z
2018-08-15T19:30:48Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10642', 'https://nodesecurity.io/advisories/233', 'https://www.npmjs.com/advisories/233', 'https://github.com/advisories/GHSA-4j59-hfw6-6w7h'}
null
GHSA
GHSA-3vv3-frrq-6486
Use of Uninitialized Resource in alg_ds
An issue was discovered in the alg_ds crate through 2020-08-25 for Rust. `Matrix::new()` internally calls `Matrix::fill_with()` which uses `*ptr = value` pattern to initialize the buffer. This pattern assumes that there is an initialized struct at the address and drops it, which results in dropping of uninitialized struct.
{'CVE-2020-36432'}
2021-08-25T20:59:20Z
2021-08-25T20:59:20Z
CRITICAL
9.8
{'CWE-665', 'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36432', 'https://github.com/advisories/GHSA-3vv3-frrq-6486', 'https://gitlab.com/dvshapkin/alg-ds/-/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0033.html'}
null
GHSA
GHSA-89r3-rcpj-h7w6
Path traversal attack on Windows platforms
Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
{'CVE-2019-0207'}
2021-08-18T22:32:43Z
2019-11-18T17:19:03Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0207', 'https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/765be3606d865de513f6df9288842c3cf58b09a987c617a535f2b99d@%3Cusers.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E', 'https://github.com/advisories/GHSA-89r3-rcpj-h7w6'}
null
GHSA
GHSA-jpv3-g4cc-6vfx
Moderate severity vulnerability that affects org.apache.activemq:activemq-client
In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.
{'CVE-2019-0222'}
2021-07-27T20:32:02Z
2019-04-02T15:46:42Z
HIGH
7.5
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0222', 'https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00004.html', 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'http://activemq.apache.org/security-advisories.data/CVE-2019-0222-announcement.txt', 'http://www.openwall.com/lists/oss-security/2019/03/27/2', 'https://lists.apache.org/thread.html/71640324661c1b6d0b6708bd4fb20170e1b979370a4b8cddc4f8d485@%3Cdev.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/7da9636557118178b1690ba0af49c8a7b7b97d925218b5774622f488@%3Cusers.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-jpv3-g4cc-6vfx', 'http://www.securityfocus.com/bid/107622', 'https://lists.apache.org/thread.html/d1e334bd71d6e68462c62c726fe6db565c7a6283302f9c1feed087fa@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190502-0006/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html'}
null
GHSA
GHSA-pmpr-55fj-r229
Division by zero in TFLite's implementation of `SVDF`
### Impact The implementation of the `SVDF` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/7f283ff806b2031f407db64c4d3edcda8fb9f9f5/tensorflow/lite/kernels/svdf.cc#L99-L102): ```cc const int rank = params->rank; ... TF_LITE_ENSURE_EQ(context, num_filters % rank, 0); ``` An attacker can craft a model such that `params->rank` would be 0. ### Patches We have patched the issue in GitHub commit [6841e522a3e7d48706a02e8819836e809f738682](https://github.com/tensorflow/tensorflow/commit/6841e522a3e7d48706a02e8819836e809f738682). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29598'}
2021-05-21T14:27:58Z
2021-05-21T14:27:58Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pmpr-55fj-r229', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29598', 'https://github.com/tensorflow/tensorflow/commit/6841e522a3e7d48706a02e8819836e809f738682', 'https://github.com/advisories/GHSA-pmpr-55fj-r229'}
null
GHSA
GHSA-4fc7-hc63-7fjg
Exposure of repository credentials to external third-party sources in Rancher
### Impact This issue only happens when the user configures access credentials to a private repository in Rancher inside `Apps & Marketplace > Repositories`. It affects Rancher versions 2.5.0 up to and including 2.5.11 and from 2.6.0 up to and including 2.6.2. An insufficient check of the same-origin policy when downloading Helm charts from a configured private repository can lead to exposure of the repository credentials to a third-party provider. This exposure happens when the private repository: 1. Does an HTTP redirect to a third-party repository or external storage provider. 2. Downloads an icon resource for the chart hosted on a third-party provider. The address of the private repository is not leaked, only the credentials are leaked in the HTTP `Authorization` header in base64 format. With the patched versions, the default behavior now is to only send the private repository credentials when subdomain or domain hostname match when following the redirect or downloading external resources. ### Patches Patched versions include releases 2.5.12, 2.6.3 and later versions. ### Workarounds 1. Update Rancher to a patched version. 2. Check the Helm charts in your configured private repository for possible redirects to third-party storage, and for Helm chart icons from third-party sources. 3. Evaluate any Helm chart that might lead to the mentioned scenario and change affected credentials if deemed necessary. ### References Information about the same-origin check and how to disable it is available in Rancher [documentation](https://rancher.com/docs/rancher/v2.6/en/helm-charts/#repositories). ### For more information If you have any questions or comments about this advisory: * Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. * Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. * Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
{'CVE-2021-36778'}
2022-05-02T19:33:35Z
2022-05-02T19:33:34Z
HIGH
8.3
{'CWE-200'}
{'https://github.com/rancher/rancher/security/advisories/GHSA-4fc7-hc63-7fjg', 'https://github.com/advisories/GHSA-4fc7-hc63-7fjg'}
null
GHSA
GHSA-q4h8-7qff-gh6c
Server-side request forgery in Ghost CMS
Server-side request forgery (SSRF) vulnerability in Ghost CMS < 3.10.0 allows an attacker to scan local or external network or otherwise interact with internal systems.
{'CVE-2020-8134'}
2021-05-06T18:28:08Z
2021-05-06T18:28:08Z
MODERATE
8.1
{'CWE-918'}
{'https://hackerone.com/reports/793704', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8134', 'https://github.com/advisories/GHSA-q4h8-7qff-gh6c'}
null
GHSA
GHSA-c9c5-9fpr-m882
Moderate severity vulnerability that affects sentry-raven
The numtok function in lib/raven/okjson.rb in the raven-ruby gem before 0.12.2 for Ruby allows remote attackers to cause a denial of service via a large exponent value in a scientific number.
{'CVE-2014-9490'}
2021-09-08T21:58:29Z
2017-10-24T18:33:36Z
MODERATE
0
null
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/99687', 'https://github.com/getsentry/raven-ruby/commit/477ee93a3f735be33bc1e726820654cdf6e22d8f', 'https://github.com/advisories/GHSA-c9c5-9fpr-m882', 'https://groups.google.com/forum/#!topic/getsentry/Cz5bih0ZY1U', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9490', 'http://seclists.org/oss-sec/2015/q1/26'}
null
GHSA
GHSA-5q58-x5h2-v5rx
Authenticated Privilege Escalation
### Impact Authenticated Privilege Escalation ### Patches We recommend to update to the current version 6.3.4.1. You can get the update to 6.3.4.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-12-2020
null
2020-12-21T18:01:08Z
2020-12-21T18:01:08Z
LOW
0
{'CWE-863'}
{'https://github.com/advisories/GHSA-5q58-x5h2-v5rx', 'https://github.com/shopware/platform/security/advisories/GHSA-5q58-x5h2-v5rx'}
null
GHSA
GHSA-4rgj-8mq3-hggj
Denial of Service in @hapi/subtext
Versions of `@hapi/subtext` prior to 6.1.2 are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service. ## Recommendation Upgrade to version 6.1.2 or later.
null
2020-09-03T20:32:11Z
2020-09-03T20:32:11Z
HIGH
0
null
{'https://github.com/advisories/GHSA-4rgj-8mq3-hggj', 'https://www.npmjs.com/advisories/1165', 'https://github.com/hapijs/subtext/issues/72'}
null
GHSA
GHSA-m7rg-8wvq-846v
Prototype pollution
Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25947'}
2021-06-14T21:47:45Z
2021-06-07T21:49:14Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25947', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947', 'https://github.com/advisories/GHSA-m7rg-8wvq-846v'}
null
GHSA
GHSA-fmr4-w67p-vh8x
Moderate severity vulnerability that affects org.wildfly:wildfly-undertow
A flaw was found in Wildfly 9.x. A path traversal vulnerability through the org.wildfly.extension.undertow.deployment.ServletResourceManager.getResource method could lead to information disclosure of arbitrary local files.
{'CVE-2018-1047'}
2021-01-08T20:10:58Z
2018-10-19T16:55:35Z
MODERATE
0
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1047', 'https://access.redhat.com/errata/RHSA-2018:1248', 'https://bugzilla.redhat.com/show_bug.cgi?id=1528361', 'https://access.redhat.com/errata/RHSA-2018:2938', 'https://github.com/advisories/GHSA-fmr4-w67p-vh8x', 'https://access.redhat.com/errata/RHSA-2018:1249', 'https://access.redhat.com/errata/RHSA-2018:1251', 'https://access.redhat.com/errata/RHSA-2018:1247', 'https://issues.jboss.org/browse/WFLY-9620'}
null
GHSA
GHSA-657m-v5vm-f6rw
Cross-Site-Request-Forgery in Backend
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2) ### Problem It has been discovered that the new TYPO3 v11 feature that allows users to create and share [deep links in the backend user interface](https://typo3.org/article/typo3-version-112-escape-the-orbit#c12178) is vulnerable to cross-site-request-forgery. The impact is the same as described in [TYPO3-CORE-SA-2020-006 (CVE-2020-11069)](https://typo3.org/security/advisory/typo3-core-sa-2020-006). However, it is not limited to the same site context and does not require the attacker to be authenticated. In a worst case scenario, the attacker could create a new admin user account to compromise the system. To successfully carry out an attack, an attacker must trick his victim to access a compromised system. The victim must have an active session in the TYPO3 backend at that time. The following [Same-Site cookie settings](https://docs.typo3.org/c/typo3/cms-core/master/en-us/Changelog/8.7.x/Feature-90351-ConfigureTYPO3-shippedCookiesWithSameSiteFlag.html) in _$GLOBALS[TYPO3_CONF_VARS][BE][cookieSameSite]_ are required for an attack to be successful: * _SameSite=_***strict***: malicious evil.**example.org** invoking TYPO3 application at good.**example.org** * _SameSite=_***lax*** or ***none***: malicious **evil.com** invoking TYPO3 application at **example.org** ### Solution Update your instance to TYPO3 version 11.5.0 which addresses the problem described. ### Credits Thanks to Richie Lee who reported this issue and to TYPO3 core & security team members Benni Mack and Oliver Hader who fixed the issue. ### References * [TYPO3-CORE-SA-2021-014](https://typo3.org/security/advisory/typo3-core-sa-2021-014) * [CVE-2020-11069](https://nvd.nist.gov/vuln/detail/CVE-2020-11069) reintroduced in TYPO3 v11.2.0
{'CVE-2021-41113'}
2022-04-19T19:03:11Z
2021-10-05T20:23:47Z
MODERATE
8.8
{'CWE-352', 'CWE-309'}
{'https://github.com/TYPO3/typo3/security/advisories/GHSA-657m-v5vm-f6rw', 'https://typo3.org/security/advisory/typo3-core-sa-2020-006', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11069', 'https://github.com/TYPO3/typo3/commit/fa51999203c5e5d913ecae5ea843ccb2b95fa33f', 'https://github.com/advisories/GHSA-657m-v5vm-f6rw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41113'}
null
GHSA
GHSA-q76j-58cx-wp5v
Vulnerability in RPKI manifest validation
A vulnerability in RPKI manifest validation exists when objects on the manifest are hidden, or expired objects are replayed. An attacker successfully exploiting this vulnerability could prevent new ROAs from being received or selectively hide ROAs, causing routes to become INVALID. To exploit this vulnerability, an attacker would need to perform a man in the middle attack on the TLS connection between the validator and an RRDP repository or perform a man in the middle attack against a rsync-only repository. The update addresses the vulnerability by implementing validation methods from [RFC 6486bis](https://datatracker.ietf.org/doc/draft-ietf-sidrops-6486bis/00/) and enabling strict validation by default.
null
2020-11-13T17:28:49Z
2020-11-13T17:28:49Z
HIGH
0
{'CWE-20'}
{'https://github.com/RIPE-NCC/rpki-validator-3/security/advisories/GHSA-q76j-58cx-wp5v', 'https://github.com/advisories/GHSA-q76j-58cx-wp5v'}
null
GHSA
GHSA-6jqj-f58p-mrw3
Denial of Service in TenderMint
### Description **Denial of Service** Tendermint 0.33.0 and above allow block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it without changing the chainID. (It is a [misconfiguration](https://docs.tendermint.com/master/tendermint-core/using-tendermint.html) to reuse chainIDs.) Correct block proposers will accidentally include signatures for the wrong block if they see these signatures, and then commits won't validate, making all proposed blocks invalid. A malicious validator (even with a minimal amount of stake) can use this vulnerability to completely halt the network. Tendermint 0.33.6 checks all the signatures are for the block with +2/3 majority before creating a commit. **False Witness** Tendermint 0.33.1 and above are no longer fully verifying commit signatures during block execution - they stop after +2/3. This means proposers can propose blocks that contain valid +2/3 signatures and then the rest of the signatures can be whatever they want. They can claim that all the other validators signed just by including a CommitSig with arbitrary signature data. While this doesn't seem to impact safety of Tendermint per se, it means that Commits may contain a lot of invalid data **. _** This was already true of blocks, since they could include invalid txs filled with garbage, but in that case the application knew that they are invalid and could punish the proposer. But since applications didn't--and don't-- verify commit signatures directly (they trust Tendermint to do that), they won't be able to detect it._ This can impact incentivization logic in the application that depends on the LastCommitInfo sent in BeginBlock, which includes which validators signed. For instance, Gaia incentivizes proposers with a bonus for including more than +2/3 of the signatures. But a proposer can now claim that bonus just by including arbitrary data for the final -1/3 of validators without actually waiting for their signatures. There may be other tricks that can be played because of this. Tendermint 0.33.6 verifies all the signatures during block execution ***. _*** Please note that the light client does not check nil votes and exits as soon as 2/3+ of the signatures are checked._ ### Impact - All nodes - The network stops due to having a commit with a wrong signature. ### Patches - v0.33.6 ### Workarounds No workarounds. ### References - https://github.com/tendermint/tendermint/issues/4926 ### For more information If you have any questions or comments about this advisory: * Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint) * Email us at [security@tendermint.com](mailto:security@tendermint.com) More information can be found [here](https://tendermint.com/security/).
{'CVE-2020-15091'}
2022-04-19T19:02:29Z
2021-12-20T18:17:33Z
MODERATE
6.5
{'CWE-347'}
{'https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15091', 'https://github.com/tendermint/tendermint/issues/4926', 'https://github.com/advisories/GHSA-6jqj-f58p-mrw3', 'https://github.com/tendermint/tendermint/security/advisories/GHSA-6jqj-f58p-mrw3'}
null
GHSA
GHSA-whc7-5p35-4ww2
Use after free in actix-service
An issue was discovered in the actix-service crate before 1.0.6 for Rust. The Cell implementation allows obtaining more than one mutable reference to the same data.
{'CVE-2020-35899'}
2021-08-25T20:49:06Z
2021-08-25T20:49:06Z
MODERATE
5.5
{'CWE-416'}
{'https://github.com/advisories/GHSA-whc7-5p35-4ww2', 'https://github.com/actix/actix-net/pull/158', 'https://rustsec.org/advisories/RUSTSEC-2020-0046.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35899'}
null
GHSA
GHSA-fqpx-cq8x-9wp4
Unaligned references in sized-chunks
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the InlineArray implementation, an unaligned reference may be generated for a type that has a large alignment requirement.
{'CVE-2020-25796'}
2021-08-25T20:46:03Z
2021-08-25T20:46:03Z
HIGH
7.5
{'CWE-129'}
{'https://github.com/bodil/sized-chunks/issues/11', 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25796', 'https://github.com/advisories/GHSA-fqpx-cq8x-9wp4'}
null
GHSA
GHSA-w4rc-rx25-8m86
Improper Input Validation in Symfony
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
{'CVE-2019-11325'}
2021-08-19T17:13:33Z
2020-02-12T18:44:16Z
CRITICAL
9.8
{'CWE-116'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-11325.yaml', 'https://symfony.com/blog/cve-2019-11325-fix-escaping-of-strings-in-varexporter', 'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11325', 'https://symfony.com/cve-2019-11325', 'https://github.com/advisories/GHSA-w4rc-rx25-8m86', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/var-exporter/CVE-2019-11325.yaml', 'https://github.com/symfony/var-exporter/compare/d8bf442...57e00f3', 'https://symfony.com/blog/symfony-4-3-8-released'}
null
GHSA
GHSA-4p3x-8qw9-24w9
Authenticated Stored XSS in shopware/shopware
### Impact Authenticated Stored XSS in Administration ### Patches Use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### Workarounds If you cannot use the security plugin, add the following config to your `.htaccess` file ``` <IfModule mod_headers.c> <FilesMatch "\.(?i:svg)$"> Header set Content-Security-Policy "script-src 'none'" </FilesMatch> </IfModule> ``` If you are using nginx as server config, you can add the following to your configuration: ``` server { # ... location ~* ^.+\.svg$ { add_header Content-Security-Policy "script-src 'none'"; } } ``` ### References https://docs.shopware.com/en/shopware-5-en/sicherheitsupdates/security-update-10-2021
{'CVE-2021-41188'}
2021-10-29T13:49:23Z
2021-10-27T18:53:18Z
MODERATE
5.7
{'CWE-79'}
{'https://github.com/shopware/shopware/releases/tag/v5.7.6', 'https://docs.shopware.com/en/shopware-5-en/sicherheitsupdates/security-update-10-2021', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41188', 'https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html', 'https://github.com/advisories/GHSA-4p3x-8qw9-24w9', 'https://github.com/shopware/shopware/commit/37213e91d525c95df262712cba80d1497e395a58', 'https://github.com/shopware/shopware/security/advisories/GHSA-4p3x-8qw9-24w9'}
null
GHSA
GHSA-7wv8-g97r-432h
Exposure of Sensitive Information to an Unauthorized Actor in microweber
Exposure of Sensitive Information to an Unauthorized Actor in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0281'}
2022-01-27T18:32:04Z
2022-01-21T18:06:47Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6', 'https://huntr.dev/bounties/315f5ac6-1b5e-4444-ad8f-802371da3505', 'https://github.com/advisories/GHSA-7wv8-g97r-432h', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0281'}
null
GHSA
GHSA-wrxc-mr2w-cjpv
Open Redirect in Grav
Common/Grav.php in Grav before 1.6.23 has an Open Redirect.
{'CVE-2020-11529'}
2022-01-07T00:20:50Z
2022-01-07T00:20:50Z
MODERATE
6.1
{'CWE-601'}
{'https://getgrav.org/#changelog', 'https://github.com/advisories/GHSA-wrxc-mr2w-cjpv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11529', 'https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7', 'https://github.com/getgrav/grav/issues/3134'}
null
GHSA
GHSA-6h3m-36w8-hv68
Arbitrary file write in nats-server
(This document is canonically: <https://advisories.nats.io/CVE/CVE-2022-26652.txt>) ## Background NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. JetStream is the optional RAFT-based resilient persistent feature of NATS. ## Problem Description The JetStream streams can be backed up and restored via NATS. The backup format is a tar archive file. Inadequate checks on the filenames within the archive file permit a so-called "Zip Slip" attack in the stream restore. NATS nats-server through 2022-03-09 (fixed in release 2.7.4) did not correctly sanitize elements of the archive file, thus a user of NATS could cause the NATS server to write arbitrary content to an attacker-controlled filename. ## Affected versions NATS Server: * 2.2.0 up to and including 2.7.3. + Introduced with JetStream Restore functionality * Fixed with nats-io/nats-server: 2.7.4 * Docker image: nats <https://hub.docker.com/_/nats> * NB users of OS package files from our releases: a change in goreleaser defaults, discovered late in the release process, moved the install directory from /usr/local/bin to /usr/bin; we are evaluating the correct solution for subsequent releases, but not recutting this release. NATS Streaming Server * 0.15.0 up to and including 0.24.2 * Fixed with nats-io/nats-streaming-server: 0.24.3 * Embeds a nats-server, but this server is the old approach which JetStream replaces, so unlikely (but not impossible) to be configured with JS support ## Workarounds * Disable JetStream for untrusted users. * If only one NATS account uses JetStream, such that cross-user attacks are not an issue, and any user in that account with access to the JetStream API is fully trusted anyway, then appropriate sandboxing techniques will prevent exploit. + Eg, with systemd, the supplied util/nats-server-hardened.service example configuration demonstrates that NATS runs fine as an unprivileged user under ProtectSystem=strict and PrivateTmp=true restrictions; by only opening a ReadWritePaths hole for the JetStream storage area, the impact of this vulnerability is limited. ## Solution Upgrade the NATS server to at least 2.7.4. We fully support the util/nats-server-hardened.service configuration for running a NATS server and encourage this approach. ## Credits This issue was reported (on 2022-03-07) to the NATS Maintainers by Yiming Xiang, TIANJI LAB of NSFOCUS. Thank you / 谢谢你!
{'CVE-2022-26652'}
2022-03-24T00:21:11Z
2022-03-10T22:07:30Z
HIGH
6.5
{'CWE-22'}
{'https://github.com/nats-io/nats-server/releases/tag/v2.7.4', 'https://github.com/nats-io/nats-server/security/advisories/GHSA-6h3m-36w8-hv68', 'https://github.com/nats-io/nats-server/releases', 'http://www.openwall.com/lists/oss-security/2022/03/10/1', 'https://github.com/nats-io/nats-streaming-server/releases/tag/v0.24.3', 'https://advisories.nats.io/CVE/CVE-2022-26652.txt', 'https://github.com/advisories/GHSA-6h3m-36w8-hv68', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26652', 'https://github.com/nats-io/nats-server/pull/2917'}
null
GHSA
GHSA-3pqg-4rqg-pg9g
Cross-site Scripting in OWASP AntiSamy
OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.
{'CVE-2022-28367'}
2022-05-04T04:00:41Z
2022-04-23T00:03:04Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-28367', 'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae', 'https://github.com/advisories/GHSA-3pqg-4rqg-pg9g', 'https://github.com/nahsra/antisamy/releases/tag/v1.6.6'}
null
GHSA
GHSA-hj9h-wrgg-hgmx
Data races in lock_api
An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockReadGuard unsoundness.
{'CVE-2020-35913'}
2021-08-25T20:50:02Z
2021-08-25T20:50:02Z
MODERATE
4.7
{'CWE-362'}
{'https://github.com/Amanieu/parking_lot/pull/262', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35913', 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html', 'https://github.com/advisories/GHSA-hj9h-wrgg-hgmx'}
null
GHSA
GHSA-chh2-rvhg-wqwr
Malicious Package in json-serializer
Version 2.0.10 of `json-serializer` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T21:02:10Z
2020-09-03T21:02:10Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/1194', 'https://github.com/advisories/GHSA-chh2-rvhg-wqwr'}
null
GHSA
GHSA-c6c4-7x48-4cqp
Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18
Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack. - https://vaadin.com/security/cve-2021-31404
null
2022-04-19T19:02:54Z
2021-04-19T14:47:47Z
MODERATE
4
{'CWE-208'}
{'https://github.com/advisories/GHSA-c6c4-7x48-4cqp', 'https://vaadin.com/security/cve-2021-31404', 'https://github.com/vaadin/platform/security/advisories/GHSA-c6c4-7x48-4cqp'}
null
GHSA
GHSA-qf76-pr7x-h7r4
Incorrect Access Control in Nacos
Nacos 1.1.4 is affected by: Incorrect Access Control. An environment can be set up locally to get the service details interface. Then other Nacos service names can be accessed through the service list interface. Service details can then be accessed when not logged in. (detail:https://github.com/alibaba/nacos/issues/2284)
{'CVE-2020-19676'}
2021-08-02T16:38:01Z
2021-08-02T16:38:01Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/advisories/GHSA-qf76-pr7x-h7r4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19676', 'https://github.com/alibaba/nacos/issues/2284', 'https://github.com/alibaba/nacos/releases/tag/1.2.0', 'https://github.com/alibaba/nacos/issues/1105'}
null
GHSA
GHSA-8gvg-8vhf-h26g
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933.
{'CVE-2019-0937'}
2021-03-29T20:59:03Z
2021-03-29T20:59:03Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0937', 'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0937', 'https://github.com/advisories/GHSA-8gvg-8vhf-h26g'}
null
GHSA
GHSA-93j5-g845-9wqp
Unsafe HTTP Redirect in Puppet Agent and Puppet Server
A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-1000007
{'CVE-2021-27023'}
2021-12-02T17:54:05Z
2021-12-02T17:52:45Z
MODERATE
6.5
null
{'https://github.com/advisories/GHSA-93j5-g845-9wqp', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/', 'https://puppet.com/security/cve/CVE-2021-27023', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27023'}
null
GHSA
GHSA-7qfm-6m33-rgg9
XML External Entity Reference
An issue was discovered in service-api before 4.3.12 and 5.x before 5.1.1 for Report Portal. It allows XXE, with resultant secrets disclosure and SSRF, via JUnit XML launch import.
null
2021-08-13T15:21:59Z
2021-08-13T15:21:59Z
HIGH
7.5
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-12642', 'https://github.com/reportportal/reportportal/blob/master/SECURITY_ADVISORIES.md', 'https://github.com/advisories/GHSA-7qfm-6m33-rgg9'}
null
GHSA
GHSA-8rh6-h94m-vj54
Incorrect Comparison in cvxopt
Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects.
{'CVE-2021-41500'}
2022-01-18T22:48:48Z
2022-01-07T00:01:11Z
HIGH
7.5
{'CWE-697'}
{'https://github.com/cvxopt/cvxopt/issues/193', 'https://github.com/advisories/GHSA-8rh6-h94m-vj54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41500', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CXTPM3DGVYTYQ54OFCMXZVWVOMR7JM2D/', 'https://github.com/cvxopt/cvxopt/commit/d5a21cf1da62e4269176384b1ff62edac5579f94'}
null
GHSA
GHSA-x823-j7c4-vpc5
Cross-site scripting in sickrage
In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.
{'CVE-2021-25926'}
2021-04-23T18:45:59Z
2021-04-20T16:31:43Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25926,', 'https://github.com/advisories/GHSA-x823-j7c4-vpc5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25926'}
null
GHSA
GHSA-j9q7-3rhf-4ppv
Downloads Resources over HTTP in windows-selenium-chromedriver
Affected versions of `windows-selenium-chromedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-selenium-chromedriver`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10687'}
2021-01-14T15:57:22Z
2020-09-01T16:11:08Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10687', 'https://www.npmjs.com/advisories/285', 'https://github.com/advisories/GHSA-j9q7-3rhf-4ppv', 'https://nodesecurity.io/advisories/285'}
null
GHSA
GHSA-5x32-c9mf-49cc
Directory traversal in RubyGems
A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.
{'CVE-2019-8320'}
2021-08-17T13:42:36Z
2019-06-20T16:06:15Z
HIGH
7.4
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-8320', 'https://access.redhat.com/errata/RHSA-2019:1429', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html', 'https://hackerone.com/reports/317321', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://github.com/advisories/GHSA-5x32-c9mf-49cc'}
null
GHSA
GHSA-m8p2-495h-ccmh
The SafeHtml annotation in Hibernate-Validator does not properly guard against XSS attacks
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
{'CVE-2019-10219'}
2022-02-11T21:13:08Z
2020-01-08T17:01:52Z
MODERATE
6.5
{'CWE-79'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219', 'https://security.netapp.com/advisory/ntap-20220210-0024/', 'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10219', 'https://github.com/advisories/GHSA-m8p2-495h-ccmh', 'https://lists.apache.org/thread.html/r4f8b4e2541be4234946e40d55859273a7eec0f4901e8080ce2406fe6@%3Cnotifications.accumulo.apache.org%3E', 'https://lists.apache.org/thread.html/rf9c17c3efc4a376a96e9e2777eee6acf0bec28e2200e4b35da62de4a@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r87b7e2d22982b4ca9f88f5f4f22a19b394d2662415b233582ed22ebf@%3Cnotifications.accumulo.apache.org%3E', 'https://lists.apache.org/thread.html/r4f92d7f7682dcff92722fa947f9e6f8ba2227c5dc3e11ba09114897d@%3Cnotifications.accumulo.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://lists.apache.org/thread.html/rd418deda6f0ebe658c2015f43a14d03acb8b8c2c093c5bf6b880cd7c@%3Cpluto-dev.portals.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-8vj2-vxx3-667w
Arbitrary expression injection in Pillow
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method `ImageMath.eval("exec(exit())")`. While Pillow 9.0.0 restricted top-level builtins available to PIL.ImageMath.eval(), it did not prevent builtins available to lambda expressions. These are now also restricted in 9.0.1.
{'CVE-2022-22817'}
2022-04-19T19:03:27Z
2022-01-12T20:07:33Z
CRITICAL
9.8
{'CWE-74'}
{'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11', 'https://github.com/advisories/GHSA-8vj2-vxx3-667w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22817', 'https://www.debian.org/security/2022/dsa-5053', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval'}
null
GHSA
GHSA-9wjh-jr2j-6r4x
Remote Code Execution in pi_video_recording
All versions of `pi_video_recording` are vulnerable to Remote Code Execution. Due to insufficient input validation the server executes arbitrary code through the /api/record/start endpoint. After running the server, `curl -POST -H "Content-Type: application/json" -d '{"filename": " || touch /tmp/worked;"}' http://localhost:5000/api/record/start`creates a file in the /tmp/ directory ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-27T15:54:11Z
2020-09-02T15:55:58Z
HIGH
0
{'CWE-20'}
{'https://github.com/advisories/GHSA-9wjh-jr2j-6r4x', 'https://www.npmjs.com/advisories/773'}
null
GHSA
GHSA-9xjr-m6f3-v5wm
HTTPS MitM vulnerability due to lack of hostname verification
An issue was discovered in the hyper crate before 0.9.4 for Rust on Windows. There is an HTTPS man-in-the-middle vulnerability because hostname verification was omitted.
{'CVE-2016-10932'}
2021-08-25T20:43:06Z
2021-08-25T20:43:06Z
MODERATE
4.8
{'CWE-347'}
{'https://github.com/hyperium/hyper/blob/master/CHANGELOG.md#v094-2016-05-09', 'https://github.com/advisories/GHSA-9xjr-m6f3-v5wm', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10932', 'https://rustsec.org/advisories/RUSTSEC-2016-0002.html'}
null
GHSA
GHSA-5h46-h7hh-c6x9
Integer Overflow in Chunked Transfer-Encoding
### Summary hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in "request smuggling" or "desync attacks". ### Vulnerability Example: ``` GET / HTTP/1.1 Host: example.com Transfer-Encoding: chunked f0000000000000003 abc 0 ``` hyper only reads the rightmost 64-bit integer as the chunk size. So it reads `f0000000000000003` as `3`. A loss of data can occur since hyper would then read only 3 bytes of the body. Additionally, an HTTP request smuggling vulnerability would occur if using a proxy which instead has prefix truncation in the chunk size, or that understands larger than 64-bit chunk sizes. Read more about desync attacks: https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn ### Impact To determine if vulnerable to _data loss_, these things must be true: - **Using HTTP/1.1.** Since HTTP/2 does not use chunked encoding, it is not vulnerable. - **Using hyper as a server or client.** The body would be improperly truncated in either case. - **Users send requests or responses with chunk sizes greater than 18 exabytes**. To determine if vulnerable to _desync attacks_, these things must be true: - **Using an upstream proxy that allows chunks sizes larger than 64-bit.** If the proxy rejects chunk sizes that are too large, that request won't be forwarded to hyper. ### Patches We have released the following patch versions: - v0.14.10 (to be released when this advisory is published) ### Workarounds Besides upgrading hyper, you can take the following options: - Reject requests manually that contain a `Transfer-Encoding` header. - Ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers. ### Credits This issue was initially reported by [Mattias Grenfeldt](https://grenfeldt.dev/) and Asta Olofsson.
{'CVE-2021-32714'}
2022-04-19T19:03:01Z
2021-07-12T16:55:37Z
MODERATE
5.9
{'CWE-190'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0079.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32714', 'https://github.com/advisories/GHSA-5h46-h7hh-c6x9', 'https://github.com/hyperium/hyper/security/advisories/GHSA-5h46-h7hh-c6x9'}
null