ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-j44m-qm6p-hp7m
Arbitrary File Overwrite in tar
Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. ## Recommendation For tar 4.x, upgrade to version 4.4.2 or later. For tar 2.x, upgrade to version 2.2.2 or later.
{'CVE-2018-20834'}
2021-08-03T21:28:27Z
2019-05-01T18:37:31Z
HIGH
7.5
{'CWE-59'}
{'https://github.com/npm/node-tar/commits/v2.2.2', 'https://www.npmjs.com/advisories/803', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20834', 'https://hackerone.com/reports/344595', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://access.redhat.com/errata/RHSA-2019:1821', 'https://github.com/advisories/GHSA-j44m-qm6p-hp7m', 'https://github.com/npm/node-tar/compare/58a8d43...a5f7779', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8'}
null
GHSA
GHSA-6r7c-6w96-8pvw
Remote Code Execution in AjaxNetProfessional
### Overview Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. ### Description Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc. Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution. Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products. An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed. Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands). ### Releases Releases before version 21.11.29.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions. ### Workarounds There is no workaround available that addresses all issues except updating to latest version from GitHub. ### References Find original CVE posting here: https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971 Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/ ### For more information If you have any questions or comments about this advisory: * Open an issue on this GitHub repository
null
2022-04-19T19:03:17Z
2021-12-07T21:21:49Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw', 'https://github.com/advisories/GHSA-6r7c-6w96-8pvw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971'}
null
GHSA
GHSA-2w3f-9w3q-qw77
Prototype Pollution in config-handler
All versions of package config-handler are vulnerable to Prototype Pollution when loading config files.
{'CVE-2021-23448'}
2021-10-20T17:12:25Z
2021-10-12T18:30:37Z
CRITICAL
9.8
{'CWE-913'}
{'https://github.com/jarradseers/config-handler/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23448', 'https://github.com/advisories/GHSA-2w3f-9w3q-qw77', 'https://snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947'}
null
GHSA
GHSA-g9wh-3vrx-r7hg
OctoRPKI crashes when processing GZIP bomb returned via malicious repository
OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash). ## Patches ## For more information If you have any questions or comments about this advisory email us at security@cloudflare.com
{'CVE-2021-3912'}
2022-01-13T18:27:12Z
2021-11-10T20:39:23Z
MODERATE
4.2
{'CWE-400'}
{'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g9wh-3vrx-r7hg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3912', 'https://github.com/advisories/GHSA-g9wh-3vrx-r7hg', 'https://www.debian.org/security/2022/dsa-5041'}
null
GHSA
GHSA-xfqh-7356-vqjj
Exposure of Sensitive Information to an Unauthorized Actor in Keycloak
It was found that keycloak before version 8.0.0 exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.
{'CVE-2019-14820'}
2021-11-01T14:08:17Z
2020-04-15T21:08:21Z
MODERATE
4.3
{'CWE-200'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14820', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14820', 'https://github.com/advisories/GHSA-xfqh-7356-vqjj'}
null
GHSA
GHSA-hqq7-2q2v-82xq
Cross-site Scripting in sanitize-url
The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function.
{'CVE-2021-23648'}
2022-04-22T14:58:23Z
2022-03-17T00:00:24Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/braintree/sanitize-url/pull/40', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23648', 'https://github.com/braintree/sanitize-url/blob/main/src/index.ts%23L11', 'https://github.com/advisories/GHSA-hqq7-2q2v-82xq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/', 'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'}
null
GHSA
GHSA-7x48-7466-3g33
Command injection in guake
Guake is a drop-down terminal for GNOME. The package guake before 3.8.5 is vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.
{'CVE-2021-23556'}
2022-04-05T18:49:12Z
2022-03-18T00:01:11Z
MODERATE
6.4
null
{'https://github.com/advisories/GHSA-7x48-7466-3g33', 'https://github.com/Guake/guake/issues/1796', 'https://github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e8a629781b888', 'https://github.com/Guake/guake/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23556', 'https://github.com/Guake/guake/pull/2017', 'https://github.com/pypa/advisory-database/tree/main/vulns/guake/PYSEC-2022-165.yaml', 'https://snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334'}
null
GHSA
GHSA-f99r-jjgr-f373
SQL injection in ImpressCMS
SQL Injection in ImpressCMS 1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire system.
{'CVE-2022-26986'}
2022-04-18T22:23:05Z
2022-04-06T00:01:30Z
HIGH
7.2
{'CWE-89'}
{'https://github.com/sartlabs/0days/blob/main/ImpressCMS1.4.3/Exploit.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26986', 'https://github.com/advisories/GHSA-f99r-jjgr-f373'}
null
GHSA
GHSA-36p7-xjw8-h6f2
Ruby-saml allows attackers to perform XML signature wrapping attacks via unspecified vectors
Ruby-saml before 1.3.0 allows attackers to perform XML signature wrapping attacks via unspecified vectors.
{'CVE-2016-5697'}
2022-04-26T18:25:15Z
2018-08-21T17:08:30Z
HIGH
7.5
{'CWE-91'}
{'http://www.openwall.com/lists/oss-security/2016/06/24/3', 'https://github.com/advisories/GHSA-36p7-xjw8-h6f2', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5697'}
null
GHSA
GHSA-5wg4-74h6-q47v
Integer Overflow or Wraparound and Use of a Broken or Risky Cryptographic Algorithm in bcrypt
In bcrypt (npm package) before version 5.0.0, data is truncated wrong when its length is greater than 255 bytes.
{'CVE-2020-7689'}
2021-07-29T20:49:31Z
2020-08-20T14:38:49Z
MODERATE
5.9
{'CWE-327', 'CWE-190'}
{'https://github.com/kelektiv/node.bcrypt.js/issues/776', 'https://github.com/kelektiv/node.bcrypt.js/pull/806', 'https://github.com/advisories/GHSA-5wg4-74h6-q47v', 'https://snyk.io/vuln/SNYK-JS-BCRYPT-572911', 'https://github.com/kelektiv/node.bcrypt.js/pull/807', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7689'}
null
GHSA
GHSA-xwv6-v7qx-f5jc
Code injection in ezsystems/ezpublish-kernel
When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible attack vectors are removed from the original file name. The second issue is that direct access to the images is not access controlled. This is by design, for performance reasons, and documented as such. But it does mean that images not meant to be publicly accessible can be accessed, provided that the image path and filename is correctly deduced and/or guessed, through dictionary attacks and similar.
{'CVE-2022-25337'}
2022-03-08T21:24:54Z
2022-02-19T00:01:25Z
CRITICAL
9.8
{'CWE-74'}
{'https://github.com/advisories/GHSA-xwv6-v7qx-f5jc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25337', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}
null
GHSA
GHSA-9mxf-g3x6-wv74
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
{'CVE-2018-14721'}
2021-06-10T23:55:51Z
2019-01-04T19:07:06Z
CRITICAL
10
{'CWE-918'}
{'https://www.debian.org/security/2019/dsa-4452', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/68', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:1107', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14721', 'https://github.com/advisories/GHSA-9mxf-g3x6-wv74', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1106'}
null
GHSA
GHSA-g5m7-57ph-j6p8
OS Command Injection in Nexus Yum Repository Plugin
The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.
{'CVE-2019-5475'}
2021-08-17T22:25:21Z
2019-09-11T23:04:57Z
HIGH
8.8
{'CWE-78'}
{'https://hackerone.com/reports/654888', 'https://github.com/advisories/GHSA-g5m7-57ph-j6p8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5475'}
null
GHSA
GHSA-x4g7-fvjj-prg8
Division by 0 in `QuantizedConv2D`
### Impact An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`: ```python import tensorflow as tf input = tf.zeros([1, 1, 1, 1], dtype=tf.quint8) filter = tf.constant([], shape=[1, 0, 1, 1], dtype=tf.quint8) min_input = tf.constant(0.0) max_input = tf.constant(0.0001) min_filter = tf.constant(0.0) max_filter = tf.constant(0.0001) strides = [1, 1, 1, 1] padding = "SAME" tf.raw_ops.QuantizedConv2D(input=input, filter=filter, min_input=min_input, max_input=max_input, min_filter=min_filter, max_filter=max_filter, strides=strides, padding=padding) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L259) does a division by a quantity that is controlled by the caller: ```cc const int filter_value_count = filter_width * filter_height * input_depth; const int64 patches_per_chunk = kMaxChunkSize / (filter_value_count * sizeof(T1)); ``` ### Patches We have patched the issue in GitHub commit [cfa91be9863a91d5105a3b4941096044ab32036b](https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29527'}
2021-05-21T14:21:59Z
2021-05-21T14:21:59Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4g7-fvjj-prg8', 'https://github.com/advisories/GHSA-x4g7-fvjj-prg8', 'https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29527'}
null
GHSA
GHSA-5f5c-687x-g5qm
Classic Buffer Overflow in pyo
Buffer Overflow Vulnerability exists in ajaxsoundstudio.com in Pyo < 1.03 in the Server_debug function, which allows remote attackers to conduct DoS attacks by deliberately passing on an overlong audio file name.
{'CVE-2021-41499'}
2022-01-07T00:10:33Z
2022-01-07T00:10:33Z
HIGH
7.5
{'CWE-120'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41499', 'https://github.com/advisories/GHSA-5f5c-687x-g5qm', 'https://github.com/belangeo/pyo/issues/222'}
null
GHSA
GHSA-qj3f-9gmq-fwv5
Cross-Site Scripting in simple-markdown
Versions of `simple-markdown` prior to 0.4.4 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing `data` or VBScript URIs and a base64-encoded payload. ## Recommendation Upgrade to version 0.4.4 or later.
{'CVE-2019-9844'}
2021-09-16T20:02:37Z
2019-04-09T19:47:29Z
MODERATE
6.1
{'CWE-79'}
{'https://www.npmjs.com/package/simple-markdown/v/0.4.4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9844', 'https://github.com/Khan/simple-markdown/pull/63', 'https://github.com/advisories/GHSA-qj3f-9gmq-fwv5', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFLP3KJVSV5VWMNEBRXLGRVYFXOV5KOG/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5EFW655O3BXZYAPB65XEREXB2DSNSOT/', 'https://www.npmjs.com/advisories/815', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZG2I7VH7WLSEUQ77KYP5CRAVFT2RK2U/'}
null
GHSA
GHSA-jxf5-7x3j-8j9m
Malicious Package in load-from-cwd-or-npm
Version 3.0.2 of `load-from-cwd-or-npm` contains malicious code. The malware breaks functionality of the `purescript-installer` package by injecting targeted code. ## Recommendation Upgrade to version 3.0.4 or later. There is no indication of further compromise.
null
2021-09-30T20:05:12Z
2020-09-03T18:19:14Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1082', 'https://github.com/advisories/GHSA-jxf5-7x3j-8j9m'}
null
GHSA
GHSA-887w-45rq-vxgf
Moderate severity vulnerability that affects SQLAlchemy
SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
{'CVE-2019-7164'}
2022-03-23T21:45:00Z
2019-04-16T15:50:41Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/sqlalchemy/sqlalchemy/commit/30307c4616ad67c01ddae2e1e8e34fabf6028414', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html', 'https://github.com/advisories/GHSA-887w-45rq-vxgf', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html', 'https://access.redhat.com/errata/RHSA-2019:0984', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html', 'https://github.com/sqlalchemy/sqlalchemy/issues/4481', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7164', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html', 'https://access.redhat.com/errata/RHSA-2019:0981'}
null
GHSA
GHSA-2589-w6xf-983r
Cross-site scripting in react-bootstrap-table
All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.
{'CVE-2021-23398'}
2021-12-10T18:58:49Z
2021-12-10T18:58:49Z
MODERATE
6.1
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286', 'https://github.com/AllenFang/react-bootstrap-table/blob/26d07defab759e4f9bce22d1d568690830b8d9d7/src/TableBody.js%23L114-L118', 'https://github.com/advisories/GHSA-2589-w6xf-983r', 'https://github.com/AllenFang/react-bootstrap-table/issues/2071', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23398'}
null
GHSA
GHSA-82mg-x548-gq3j
LDAP Injection in ldapauth
Versions 2.2.4 and earlier of `ldapauth-fork` are affected by an LDAP injection vulnerability. This allows an attacker to inject and run arbitrary LDAP commands via the username parameter. ## Recommendation ldapauth is not actively maintained, having not seen a publish since 2014. As a result, there is no patch available. Consider updating to use [ldapauth-fork](https://www.npmjs.com/package/ldapauth-fork) 2.3.3 or greater.
{'CVE-2015-7294'}
2021-09-23T19:58:04Z
2020-08-31T22:49:46Z
HIGH
7.5
{'CWE-90'}
{'https://www.npmjs.com/advisories/18', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7294', 'https://github.com/advisories/GHSA-82mg-x548-gq3j', 'http://www.openwall.com/lists/oss-security/2015/09/18/8', 'https://www.npmjs.com/advisories/19', 'https://github.com/vesse/node-ldapauth-fork/issues/21', 'http://www.openwall.com/lists/oss-security/2015/09/21/2', 'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4', 'http://www.openwall.com/lists/oss-security/2015/09/18/4'}
null
GHSA
GHSA-9c78-vcq7-7vxq
Out of bounds write in TFLite
### Impact An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions. ### Patches We have patched the issue in GitHub commit [6c0b2b70eeee588591680f5b7d5d38175fd7cdf6](https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
{'CVE-2022-23561'}
2022-02-11T15:07:45Z
2022-02-09T23:53:47Z
HIGH
8.8
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c78-vcq7-7vxq', 'https://github.com/advisories/GHSA-9c78-vcq7-7vxq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23561'}
null
GHSA
GHSA-fj2w-wfgv-mwq6
Denial of service in CBOR library
### Impact Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library. Affected versions _include_ versions 4.0.0 through 4.5.0. This vulnerability was privately reported to me. ### Patches This issue has been fixed in version 4.5.1. Users should use the latest version of this library. (The latest version is not necessarily 4.5.1. Check the README for [this library's repository](https://github.com/peteroupc/CBOR-Java) to see the latest version's version number.) ### Workarounds Again, users should use the latest version of this library. In the meantime, note that the inputs affected by this issue are all CBOR maps or contain CBOR maps. An input that decodes to a single CBOR object is not capable of containing a CBOR map if&mdash; - it begins with a byte other than 0x80 through 0xDF, or - it does not contain a byte in the range 0xa0 through 0xBF. Such an input is not affected by this vulnerability and an application can choose to perform this check before passing it to a CBOR decoding mechanism. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR-Java).
null
2022-01-24T22:05:39Z
2022-01-21T23:21:48Z
HIGH
0
{'CWE-407'}
{'https://github.com/advisories/GHSA-fj2w-wfgv-mwq6', 'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6'}
null
GHSA
GHSA-xmc8-26q4-qjhx
Denial of Service (DoS) in Jackson Dataformat CBOR
This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.
{'CVE-2020-28491'}
2022-02-09T18:27:40Z
2021-12-09T19:17:21Z
HIGH
7.5
{'CWE-770'}
{'https://github.com/FasterXML/jackson-dataformats-binary/issues/186', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28491', 'https://github.com/advisories/GHSA-xmc8-26q4-qjhx', 'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}
null
GHSA
GHSA-88h9-fc6v-jcw7
Unintended Require in larvitbase-www
All versions of `larvitbase-www` are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-09-03T20:28:51Z
2020-09-03T20:28:51Z
MODERATE
0
null
{'https://hackerone.com/reports/526258', 'https://github.com/advisories/GHSA-88h9-fc6v-jcw7', 'https://www.npmjs.com/advisories/1156'}
null
GHSA
GHSA-867q-77cc-98mv
Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI Generator Maven plugin
### Impact Using `File.createTempFile` in JDK will result in creating and using insecure temporary files that can leave application and system data vulnerable to attacks. This vulnerability only impacts unix-like systems where the local system temporary directory is shared between all users. This vulnerability does not impact Windows or modern versions of MacOS. OpenAPI Generator Maven plug-in creates insecure temporary files during the code generation process. It creates insecure temporary files to store the OpenAPI specification files provided by the users and these temporary files can be read by any users in the system. The impact of this vulnerability is information disclosure of the contents of the specification file to other local users. ### Patches The issue has been patched with `Files.createTempFile` and released in the v5.1.0 stable version. ### For more information If you have any questions or comments about this advisory: * Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/) * Email us at [security@openapitools.org](mailto:security@openapitools.org)
{'CVE-2021-21429'}
2022-04-19T19:02:52Z
2021-04-29T21:51:37Z
MODERATE
4
{'CWE-552', 'CWE-379', 'CWE-378', 'CWE-377'}
{'https://github.com/advisories/GHSA-867q-77cc-98mv', 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-867q-77cc-98mv', 'https://github.com/OpenAPITools/openapi-generator/pull/8795', 'https://github.com/OpenAPITools/openapi-generator/blob/06ad7a51eff04393203cfa715e54e1fb59d984fe/modules/openapi-generator-maven-plugin/src/main/java/org/openapitools/codegen/plugin/CodeGenMojo.java#L782-L799', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21429'}
null
GHSA
GHSA-5c6c-w4c4-vgvx
Cross-site scripting in Jenkins Scriptler Plugin
Jenkins Scriptler Plugin 3.1 and earlier does not escape script content, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission.
{'CVE-2021-21668'}
2022-01-06T18:45:09Z
2022-01-06T18:45:09Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-5c6c-w4c4-vgvx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21668', 'https://www.jenkins.io/security/advisory/2021-06-16/#SECURITY-2390', 'http://www.openwall.com/lists/oss-security/2021/06/16/3'}
null
GHSA
GHSA-4662-j96g-mv46
Arbitrary Code Injection in reduce-css-calc
Affected versions of `reduce-css-calc` pass input directly to `eval`. If user input is passed into the calc function, this may result in cross-site scripting on the browser, or remote code execution on the server. ## Proof of Concept ``` const reduceCSSCalc = require('reduce-css-calc'); console.log(reduceCSSCalc(`calc( (Buffer(10000)))`)); console.log(reduceCSSCalc(`calc( (global['fs'] = require('fs')))`)); console.log(reduceCSSCalc(`calc( (fs['readFileSync']("/etc/passwd", "utf-8")))`)); ``` ## Recommendation Update to version 1.2.5 or later.
{'CVE-2016-10548'}
2021-01-08T21:15:11Z
2018-06-07T19:43:06Z
CRITICAL
0
{'CWE-94'}
{'https://www.npmjs.com/advisories/144', 'https://github.com/advisories/GHSA-4662-j96g-mv46', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10548', 'https://nodesecurity.io/advisories/144', 'https://gist.github.com/ChALkeR/415a41b561ebea9b341efbb40b802fc9'}
null
GHSA
GHSA-rp42-c45j-g46x
yetiforcecrm is vulnerable to Cross-site Scripting
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-4107'}
2021-12-16T14:12:23Z
2021-12-16T14:12:23Z
MODERATE
5.3
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4107', 'https://github.com/advisories/GHSA-rp42-c45j-g46x', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89', 'https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8'}
null
GHSA
GHSA-hr3c-6mmp-6m39
Memory corruption slice-deque
An issue was discovered in the slice-deque crate before 0.1.16 for Rust. move_head_unchecked allows memory corruption because deque updates are mishandled.
{'CVE-2018-20995'}
2021-08-25T20:42:57Z
2021-08-25T20:42:57Z
CRITICAL
9.8
{'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20995', 'https://rustsec.org/advisories/RUSTSEC-2018-0008.html', 'https://github.com/advisories/GHSA-hr3c-6mmp-6m39'}
null
GHSA
GHSA-9c5c-5j4h-8q2c
bookstack is vulnerable to Improper Access Control.
bookstack prior to version 21.11.3 is vulnerable to Improper Access Control.
{'CVE-2021-4119'}
2022-01-04T19:34:01Z
2021-12-16T19:40:26Z
MODERATE
5.3
{'CWE-284'}
{'https://github.com/bookstackapp/bookstack/commit/e765e618547c92f4e0b46caca6fb91f0174efd99', 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4119', 'https://huntr.dev/bounties/135f2d7d-ab0b-4351-99b9-889efac46fca', 'https://github.com/advisories/GHSA-9c5c-5j4h-8q2c'}
null
GHSA
GHSA-pm3h-mm62-pwm8
XML Entity Expansion in trytond and proteus
An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.
{'CVE-2022-26662'}
2022-03-29T21:07:32Z
2022-03-11T00:02:04Z
HIGH
7.5
{'CWE-776'}
{'https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059', 'https://github.com/advisories/GHSA-pm3h-mm62-pwm8', 'https://www.debian.org/security/2022/dsa-5099', 'https://www.debian.org/security/2022/dsa-5098', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26662', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00016.html', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00017.html', 'https://bugs.tryton.org/issue11244'}
null
GHSA
GHSA-477x-w7m6-c6ph
Improper input validation in Apache Olingo
The AsyncResponseWrapperImpl class in Apache Olingo versions 4.0.0 to 4.6.0 reads the Retry-After header and passes it to the Thread.sleep() method without any check. If a malicious server returns a huge value in the header, then it can help to implement a DoS attack.
{'CVE-2019-17555'}
2021-08-19T16:52:56Z
2020-02-04T22:37:15Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-477x-w7m6-c6ph', 'https://github.com/apache/olingo-odata4/pull/61', 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d65UmudJ_MQkFXEv9YY_wwZbRA3sgtNDzMoLM51Qh%3DRCA%40mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17555', 'https://issues.apache.org/jira/browse/OLINGO-1411'}
null
GHSA
GHSA-m8h8-v6jh-c762
Incorrect buffer size in crossbeam-channel
An issue was discovered in the crossbeam-channel crate before 0.4.4 for Rust. It has incorrect expectations about the relationship between the memory allocation and how many iterator elements there are.
{'CVE-2020-35904'}
2021-08-25T20:49:43Z
2021-08-25T20:49:43Z
MODERATE
5.5
{'CWE-131'}
{'https://github.com/advisories/GHSA-m8h8-v6jh-c762', 'https://github.com/crossbeam-rs/crossbeam/pull/533', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35904', 'https://rustsec.org/advisories/RUSTSEC-2020-0052.html'}
null
GHSA
GHSA-5wq6-v5cw-jvfr
Malicious Package in js-shas
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:12:56Z
2020-09-03T23:03:36Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1285', 'https://github.com/advisories/GHSA-5wq6-v5cw-jvfr'}
null
GHSA
GHSA-w6v2-qchm-grj7
Insecure permissions on user namespace / fakeroot temporary rootfs in Singularity
### Impact Insecure permissions on temporary directories used in fakeroot or user namespace container execution. When a Singularity action command (run, shell, exec) is run with the fakeroot or user namespace option, Singularity will extract a container image to a temporary sandbox directory. Due to insecure permissions on the temporary directory it is possible for any user with access to the system to read the contents of the image. Additionally, if the image contains a world-writable file or directory, it is possible for a user to inject arbitrary content into the running container. ### Patches This issue is addressed in Singularity 3.6.3. All users are advised to upgrade to 3.6.3. ### Workarounds The issue is mitigated if `TMPDIR` is set to a location that is only accessible to the user, as any subdirectories directly under `TMPDIR` cannot then be accessed by others. However, this is difficult to enforce so it is not recommended to rely on this as a mitigation. ### For more information General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the: * [Singularity Slack Channel](https://bit.ly/2m0g3lX) * [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity) Any sensitive security concerns should be directed to: security@sylabs.io See our Security Policy here: https://sylabs.io/security-policy
{'CVE-2020-25039'}
2022-04-19T19:02:34Z
2021-12-20T18:25:46Z
HIGH
8.1
{'CWE-668', 'CWE-732'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html', 'https://github.com/advisories/GHSA-w6v2-qchm-grj7', 'https://github.com/hpcng/singularity/security/advisories/GHSA-w6v2-qchm-grj7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25039', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html', 'https://medium.com/sylabs'}
null
GHSA
GHSA-w5q7-3pr9-x44w
Denial of Service in serialize-to-js
Versions of `serialize-to-js` prior to 2.0.0 are vulnerable to Denial of Service. User input is not properly validated, allowing attackers to provide inputs that lead the execution to loop indefinitely. ## Recommendation Upgrade to version 2.0.0 or later.
null
2020-09-02T15:59:19Z
2020-09-02T15:59:19Z
HIGH
0
null
{'https://github.com/advisories/GHSA-w5q7-3pr9-x44w', 'https://www.npmjs.com/advisories/790'}
null
GHSA
GHSA-crfh-jmv2-2f9v
Malicious Package in singale
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T15:43:44Z
2020-09-03T17:03:11Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-crfh-jmv2-2f9v', 'https://www.npmjs.com/advisories/1411'}
null
GHSA
GHSA-7frv-9phw-vrvr
Authorization bypass in Strapi
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.
{'CVE-2020-27664'}
2021-05-10T18:43:59Z
2021-05-10T18:43:59Z
CRITICAL
9.8
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-27664', 'https://github.com/advisories/GHSA-7frv-9phw-vrvr', 'https://github.com/strapi/strapi/releases/tag/v3.2.5', 'https://github.com/strapi/strapi/pull/8442'}
null
GHSA
GHSA-24r8-fm9r-cpj2
Low severity vulnerability that affects com.linecorp.armeria:armeria
## Multiple timing attack vulnerabilities leading to the recovery of secrets based on the use of non-constant time compare function ### Impact String comparison method in multiple authentication validation in Armeria were known to be vulnerable to timing attacks. This vulnerability is caused by the insecure implementation of `equals` method from `java.lang.String`. While this attack is not practically possible, an attacker still has a potential to attack if the victim's server validates user by using `equals` method. We would like to thank @chrsow for pointing out the issue. ## Potentially vulnerable codes https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/OAuth2Token.java#L54 https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/BasicToken.java#L64 ### Patches There are two options to patch this issue. 1. Remove `equals` method; it has been exclusively used for test cases and was never used in any OSS projects that are using Armeria. (But it is worth noting that there are possibilities of closed projects authenticating users by utilizing `equals` method) 2. Use `MessageDigest.isEqual` to compare the credential instead. ### Workarounds 1. Update to the latest version (TBD) 2-1. Users can prevent these vulnerabilities by modifying and implementing timing attack preventions by themselves. 2-2. Precisely speaking, it is possible to compare credentials by securely comparing them after calling methods to directly return the input (namely `Object. accessToken()`, `Object.username()` and `Object.password()`). ### References - https://cwe.mitre.org/data/definitions/208.html - https://security.stackexchange.com/questions/111040/should-i-worry-about-remote-timing-attacks-on-string-comparison ### Side Note Since it is a theoretical attack, there is no PoC available from neither the vendor nor the security team.
{'CVE-2019-16771'}
2022-04-19T19:02:23Z
2019-12-05T18:40:51Z
LOW
4.8
{'CWE-113'}
{'https://github.com/advisories/GHSA-24r8-fm9r-cpj2', 'https://github.com/line/armeria/security/advisories/GHSA-24r8-fm9r-cpj2', 'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16771', 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'}
null
GHSA
GHSA-p2j7-6g9h-32xh
Cross site scripting in Shopizer
A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions v2.0.2 through v2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.
{'CVE-2022-23059'}
2022-04-12T21:59:09Z
2022-03-30T00:00:27Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23059', 'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059', 'https://github.com/advisories/GHSA-p2j7-6g9h-32xh'}
null
GHSA
GHSA-6768-mcjc-8223
Command injection leading to Remote Code Execution in Apache Storm
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.
{'CVE-2021-38294'}
2021-11-24T19:39:08Z
2021-10-27T18:51:22Z
CRITICAL
9.8
{'CWE-74', 'CWE-77'}
{'https://github.com/advisories/GHSA-6768-mcjc-8223', 'https://seclists.org/oss-sec/2021/q4/44', 'http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html', 'https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38294'}
null
GHSA
GHSA-q6j3-c4wc-63vw
CSRF tokens leaked in URL by canned query form
### Impact The HTML form for a read-only canned query includes the hidden CSRF token field added in #798 for writable canned queries (#698). This means that submitting those read-only forms exposes the CSRF token in the URL - for example on https://latest.datasette.io/fixtures/neighborhood_search submitting the form took me to: https://latest.datasette.io/fixtures/neighborhood_search?text=down&csrftoken=CSRFTOKEN-HERE This token could potentially leak to an attacker if the resulting page has a link to an external site on it and the user clicks the link, since the token would be exposed in the referral logs. ### Patches A fix for this issue has been released in Datasette 0.46. ### Workarounds You can fix this issue in a Datasette instance without upgrading by copying the [0.46 query.html template](https://raw.githubusercontent.com/simonw/datasette/0.46/datasette/templates/query.html) into a custom `templates/` directory and running Datasette with the `--template-dir=templates/` option. ### References Issue 918 discusses this in details: https://github.com/simonw/datasette/issues/918 ### For more information Contact swillison at gmail with any questions.
null
2021-09-23T18:50:16Z
2020-08-11T14:54:40Z
MODERATE
4.3
{'CWE-200'}
{'https://github.com/simonw/datasette/issues/918', 'https://github.com/simonw/datasette/security/advisories/GHSA-q6j3-c4wc-63vw', 'https://github.com/simonw/datasette/commit/7f10f0f7664d474c1be82bf668829e3b736a3d2b', 'https://github.com/advisories/GHSA-q6j3-c4wc-63vw', 'https://snyk.io/vuln/SNYK-PYTHON-DATASETTE-598229'}
null
GHSA
GHSA-hpm9-fx8v-w45v
Plaintext storage in Jenkins instant-messaging Plugin
Jenkins instant-messaging Plugin 1.41 and earlier stores passwords for group chats unencrypted in the global configuration file of plugins based on Jenkins instant-messaging Plugin on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
{'CVE-2022-28135'}
2022-04-12T21:59:29Z
2022-03-30T00:00:25Z
MODERATE
6.5
{'CWE-256'}
{'https://github.com/advisories/GHSA-hpm9-fx8v-w45v', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2161', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28135'}
null
GHSA
GHSA-wx77-rp39-c6vg
Regular Expression Denial of Service in markdown
All versions of `markdown` are vulnerable to Regular Expression Denial of Service (ReDoS). The `markdown.toHTML()` function has significantly degraded performance when parsing long strings containing underscores. This may lead to Denial of Service if the parser accepts user input. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2022-03-24T22:10:14Z
2020-09-04T15:11:03Z
LOW
0
{'CWE-400'}
{'https://www.npmjs.com/advisories/1330', 'https://github.com/advisories/GHSA-wx77-rp39-c6vg'}
null
GHSA
GHSA-284f-f2hw-j2gx
Server-Side Request Forgery vulnerability in concrete5
A Server-Side Request Forgery vulnerability was found in concrete5 < 8.5.5 that allowed a decimal notation encoded IP address to bypass the limitations in place for localhost allowing interaction with local services. Impact can vary depending on services exposed.
{'CVE-2021-22958'}
2021-10-18T18:15:51Z
2021-10-12T18:41:59Z
HIGH
8.2
{'CWE-918'}
{'https://hackerone.com/reports/863221', 'https://github.com/advisories/GHSA-284f-f2hw-j2gx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22958', 'https://github.com/concrete5/concrete5/pull/8826', 'https://documentation.concretecms.org/developers/introduction/version-history/855-release-notes'}
null
GHSA
GHSA-f8xq-q7px-wg8c
Improper Neutralization of Formula Elements in a CSV File in Gradio Flagging
### Impact The `gradio` library has a flagging functionality which saves input/output data into a CSV file on the developer's computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a file, then it automatically runs these commands, which could lead to arbitrary commands running on the user's computer. ### Patches The problem has been patched as of `2.8.11`, which escapes the data saved to the csv with single quotes. ### Workarounds If you are using an older version of `gradio`, don't open csv files generated by `gradio` with Excel or similar spreadsheet programs.
{'CVE-2022-24770'}
2022-03-22T12:44:43Z
2022-03-18T23:11:43Z
HIGH
8.8
{'CWE-1236'}
{'https://github.com/advisories/GHSA-f8xq-q7px-wg8c', 'https://github.com/gradio-app/gradio/security/advisories/GHSA-f8xq-q7px-wg8c', 'https://github.com/gradio-app/gradio/pull/817', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24770', 'https://github.com/gradio-app/gradio/commit/80fea89117358ee105973453fdc402398ae20239'}
null
GHSA
GHSA-fqr5-qphf-vfr8
Cross Site Scripting (XSS) in Simiki
Cross Site Scripting (XSS) in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary code via line 54 of the component 'simiki/blob/master/simiki/generators.py'.
{'CVE-2020-19000'}
2021-09-02T18:52:59Z
2021-09-01T18:37:01Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-19000', 'https://github.com/advisories/GHSA-fqr5-qphf-vfr8', 'https://github.com/tankywoo/simiki/issues/123'}
null
GHSA
GHSA-3pcq-34w5-p4g2
forEachSeries and forEachLimit do not limit the number of requests
### Impact This is a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects. ### Patches The problem has been patched in 1.0.4. ### Workarounds There is no workaround aside from upgrading to 1.0.4.
{'CVE-2021-41167'}
2021-10-27T17:05:59Z
2021-10-21T17:49:30Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/nicolas-van/modern-async/issues/5', 'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436', 'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167', 'https://github.com/advisories/GHSA-3pcq-34w5-p4g2'}
null
GHSA
GHSA-pm77-c4q7-3fwj
Improper Certificate Validation in Heartland & Global Payments PHP SDK
Gateways/Gateway.php in Heartland & Global Payments PHP SDK before 2.0.0 does not enforce SSL certificate validations.
{'CVE-2019-20455'}
2021-11-18T15:27:11Z
2021-10-12T16:31:12Z
MODERATE
5.9
{'CWE-295'}
{'https://github.com/globalpayments/php-sdk/compare/1.3.3...2.0.0', 'https://github.com/globalpayments/php-sdk/pull/8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20455', 'https://github.com/advisories/GHSA-pm77-c4q7-3fwj', 'https://github.com/globalpayments/php-sdk/pull/8/commits/c86e18f28c5eba0d6ede7d557756d978ea83d3c9', 'https://github.com/globalpayments/php-sdk/releases/tag/2.0.0', 'https://winterdragon.ca/global-payments-vulnerability/'}
null
GHSA
GHSA-4mf2-f3wh-gvf2
Subdomain checking of whitelisted domains could allow unintended redirects in oauth2-proxy
### Impact _What kind of vulnerability is it? Who is impacted?_ For users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect. For example, if a whitelist domain was configured for `.example.com`, the intention is that subdomains of `example.com` are allowed. Instead, `example.com` and `badexample.com` could also match. ### Patches _Has the problem been patched? What versions should users upgrade to?_ This is fixed in version 7.0.0 onwards. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain. # Original Issue Posted by @semoac: Whitelist Domain feature is not working as expected because is not matching a dot to ensure the redirect is a subdomain. ## Expected Behavior If whitelist domain is set to `.example.com` , then `hack.alienexample.com` should be rejected as a valid redirect. ## Current Behavior The code is removing the `dot` from `.example.com` and only checking if the redirect string end with `example.com` ## Possible Solution Here https://github.com/oauth2-proxy/oauth2-proxy/blob/c377466411f2aee180a732187edb638f2f7e57fb/oauthproxy.go#L661 Include the dot when checking the string: ``` strings.HasSuffix(redirectHostname, "." + domainHostname) ``` ## Steps to Reproduce (for bugs) ``` package main import ( "fmt" "strings" ) func validOptionalPort(port string) bool { if port == "" || port == ":*" { return true } if port[0] != ':' { return false } for _, b := range port[1:] { if b < '0' || b > '9' { return false } } return true } func splitHostPort(hostport string) (host, port string) { host = hostport colon := strings.LastIndexByte(host, ':') if colon != -1 && validOptionalPort(host[colon:]) { host, port = host[:colon], host[colon+1:] } if strings.HasPrefix(host, "[") && strings.HasSuffix(host, "]") { host = host[1 : len(host)-1] } return } func main() { domain := ".example.com" domainHostname, _ := splitHostPort(strings.TrimLeft(domain, ".")) redirectHostname := "https://hack.alienexample.com" if (strings.HasPrefix(domain, ".") && strings.HasSuffix(redirectHostname, domainHostname)) { fmt.Println("This should not have happen.")} } ``` Users of `github.com/oauth2-proxy/oauth2-proxy` are advised to update to `github.com/oauth2-proxy/oauth2-proxy/v7`
{'CVE-2021-21291'}
2022-04-19T19:02:40Z
2021-05-25T18:42:20Z
LOW
5.4
{'CWE-601'}
{'https://github.com/advisories/GHSA-4mf2-f3wh-gvf2', 'https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7', 'https://github.com/oauth2-proxy/oauth2-proxy/commit/780ae4f3c99b579cb2ea9845121caebb6192f725', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21291', 'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.0.0', 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-4mf2-f3wh-gvf2'}
null
GHSA
GHSA-c8x3-rg72-fwwg
Privilege escalation in Hashicorp Nomad
HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4.
{'CVE-2021-37218'}
2021-09-14T18:46:55Z
2021-09-08T20:14:38Z
HIGH
8.8
{'CWE-295'}
{'https://github.com/advisories/GHSA-c8x3-rg72-fwwg', 'https://www.hashicorp.com/blog/category/nomad', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37218', 'https://discuss.hashicorp.com/t/hcsec-2021-21-nomad-raft-rpc-privilege-escalation/29023'}
null
GHSA
GHSA-5c6f-jpx7-cwq6
Directory Traversal in enserver
Affected versions of `enserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16209'}
2021-01-14T15:42:35Z
2020-09-01T18:13:11Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-5c6f-jpx7-cwq6', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/enserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16209', 'https://nodesecurity.io/advisories/425', 'https://www.npmjs.com/advisories/425'}
null
GHSA
GHSA-vx9g-377x-xwxq
Server side request forgery in gibbon
Gibbon v3.4.3 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL. This issue has been resolved in version 3.4.4
{'CVE-2022-27311'}
2022-05-02T22:31:39Z
2022-04-26T00:00:41Z
HIGH
0
{'CWE-918'}
{'https://github.com/amro/gibbon/pull/321', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27311', 'https://github.com/advisories/GHSA-vx9g-377x-xwxq', 'https://github.com/amro/gibbon/pull/321#issuecomment-1113147155'}
null
GHSA
GHSA-jp99-5h8w-gmxc
Sandbox Breakout / Arbitrary Code Execution in @zhaoyao91/eval-in-vm
All versions of `@zhaoyao91/eval-in-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-09-04T15:03:13Z
2020-09-04T15:03:13Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/1320', 'https://github.com/advisories/GHSA-jp99-5h8w-gmxc'}
null
GHSA
GHSA-cvmr-6428-87w9
Cross-Site Scripting in Grav
### Impact Privileged users (with the ability to edit pages) have a mechanism to perform remote code execution via XSS. At a minimum, the vulnerability represents a bypass of security controls put in place to mitigate this form of attack. The remote code execution can be performed because XSS would allow an attacker to execute functionality on behalf of a stolen administrative account - the facility to install custom plugins would then allow said attacker to install a plugin containing a web shell and thus garner access to the underlying system. ### References https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS) https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html https://cwe.mitre.org/data/definitions/79.html ### For more information Please contact contact@pentest.co.uk
null
2022-04-19T19:02:39Z
2020-12-10T23:13:08Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-cvmr-6428-87w9', 'https://github.com/getgrav/grav/security/advisories/GHSA-cvmr-6428-87w9'}
null
GHSA
GHSA-6x8c-mvpv-5366
Directory Traversal in shit-server
Affected versions of `shit-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16147'}
2021-01-14T15:41:23Z
2020-09-01T18:18:32Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/shit-server', 'https://www.npmjs.com/advisories/430', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16147', 'https://github.com/advisories/GHSA-6x8c-mvpv-5366', 'https://nodesecurity.io/advisories/430'}
null
GHSA
GHSA-2c83-wfv3-q25f
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ZMarkdown
### Impact A Remote Command Execution vulnerability was found in the rebber module, which allowed execution of arbitrary commands. The reported problem came from CodeBlocks, which could be escaped to insert malicious LaTeX. Anyone using `rebber` without sanitation of code content or a custom macro is impacted by this vulnerability. Here is an example of a Markdown content that will exploit the vulnerability: ````markdown ``` \end{CodeBlock} \immediate\write18{COMMAND > outputrce} \input{outputrce} \begin{CodeBlock}{text} ``` ```` Will insert into the generated LaTeX the result of executing `COMMAND` on the system. ### Patches The vulnerability has been patched in version 5.2.1. If impacted, you should update to this version as soon as possible. ### Workarounds It is possible to mitigate the vulnerability without upgrading by using a custom code macro. Please make sure this custom macro escapes your closing LaTeX sequence. For the example above, use: ```javascript const escaped = content.replace(new RegExp('\\\\end\\s*{CodeBlock}', 'g'), '') ``` ### For more information If you have any questions or comments about this advisory, open an issue in [ZMarkdown](https://github.com/zestedesavoir/zmarkdown/issues).
null
2022-04-19T19:03:07Z
2021-09-07T23:07:56Z
CRITICAL
0
{'CWE-78'}
{'https://github.com/zestedesavoir/zmarkdown/security/advisories/GHSA-2c83-wfv3-q25f', 'https://github.com/advisories/GHSA-2c83-wfv3-q25f'}
null
GHSA
GHSA-j8fq-86c5-5v2r
Remote code execution in dask
An issue was discovered in Dask (aka python-dask) through 2021.09.1. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.
{'CVE-2021-42343'}
2022-03-21T19:58:45Z
2021-10-27T18:53:48Z
CRITICAL
9.8
{'CWE-668'}
{'https://github.com/dask/distributed/pull/5427', 'https://docs.dask.org/en/latest/changelog.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42343', 'https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr', 'https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b', 'https://github.com/advisories/GHSA-j8fq-86c5-5v2r'}
null
GHSA
GHSA-h595-8pw6-5q6v
Inadequate Encryption Strength in DotNetNuke
DNN (aka DotNetNuke) 9.2 through 9.2.1 uses a weak encryption algorithm to protect input parameters.
{'CVE-2018-15811'}
2021-08-17T17:50:15Z
2019-07-05T21:08:36Z
HIGH
7.5
{'CWE-326'}
{'https://www.dnnsoftware.com/community/security/security-center', 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15811', 'https://github.com/dnnsoftware/Dnn.Platform/releases', 'https://github.com/advisories/GHSA-h595-8pw6-5q6v'}
null
GHSA
GHSA-8r4g-cg4m-x23c
Denial of Service in node-static
All versions of node-static are vulnerable to a Denial of Service. The package fails to catch an exception when user input includes null bytes. This allows attackers to access `http://host/%00` and crash the server.
null
2021-09-22T18:24:27Z
2021-09-22T18:22:02Z
MODERATE
0
{'CWE-248', 'CWE-400'}
{'https://www.npmjs.com/advisories/1208', 'https://github.com/advisories/GHSA-8r4g-cg4m-x23c', 'https://github.com/cloudhead/node-static/blob/643a528ec7bbd05a59c4030655d94810570afb3f/CHANGES.md#-unreleased', 'https://github.com/cloudhead/node-static/pull/213', 'https://www.npmjs.com/package/node-static'}
null
GHSA
GHSA-gc25-3vc5-2jf9
Sandbox Breakout / Arbitrary Code Execution in sandbox
All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-09-04T15:00:58Z
2020-09-04T15:00:58Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/1318', 'https://github.com/advisories/GHSA-gc25-3vc5-2jf9'}
null
GHSA
GHSA-7p7h-4mm5-852v
Regular Expression Denial of Service in trim-newlines
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
{'CVE-2021-33623'}
2022-05-04T03:06:55Z
2021-06-07T22:10:39Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-7p7h-4mm5-852v', 'https://www.npmjs.com/package/trim-newlines', 'https://security.netapp.com/advisory/ntap-20210702-0007/', 'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33623', 'https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1'}
null
GHSA
GHSA-72mh-269x-7mh5
Improper Certificate Validation in xmlhttprequest-ssl
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
{'CVE-2021-31597'}
2021-06-21T22:10:22Z
2021-05-24T19:52:55Z
CRITICAL
9.4
{'CWE-295'}
{'https://github.com/mjwwit/node-XMLHttpRequest/compare/v1.6.0...1.6.1', 'https://security.netapp.com/advisory/ntap-20210618-0004/', 'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31597', 'https://people.kingsds.network/wesgarland/xmlhttprequest-ssl-vuln.txt', 'https://github.com/advisories/GHSA-72mh-269x-7mh5'}
null
GHSA
GHSA-3r8f-gphx-9m2c
Path Traversal in mcstatic
All versions of `mcstatic` are vulnerable to path traversal. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
{'CVE-2018-3730'}
2021-01-08T20:00:20Z
2018-07-27T17:04:16Z
HIGH
0
{'CWE-22'}
{'https://hackerone.com/reports/312907', 'https://github.com/advisories/GHSA-3r8f-gphx-9m2c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3730', 'https://www.npmjs.com/advisories/641'}
null
GHSA
GHSA-r74q-wqx8-2pr3
Downloads Resources over HTTP in nodeschnaps
Affected versions of `nodeschnaps` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nodeschnaps`. ## Recommendation Update to version 1.0.3 or later.
{'CVE-2016-10622'}
2021-01-08T01:58:09Z
2019-02-18T23:47:31Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/212', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10622', 'https://www.npmjs.com/advisories/212', 'https://github.com/advisories/GHSA-r74q-wqx8-2pr3'}
null
GHSA
GHSA-4284-x26r-4hhc
Cross Site Request Forgery in Apache JSPWiki
Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later.
{'CVE-2022-24947'}
2022-03-07T13:37:11Z
2022-02-26T00:00:44Z
HIGH
8.8
{'CWE-352'}
{'https://lists.apache.org/thread/txrgykjkpt80t57kzpbjo8kfrv8ss02c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24947', 'http://www.openwall.com/lists/oss-security/2022/02/25/1', 'https://github.com/advisories/GHSA-4284-x26r-4hhc'}
null
GHSA
GHSA-h45p-w933-jxh3
Improper Verification of Cryptographic Signature in aws-encryption-sdk-javascript
### Impact This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. ### Patches Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x ### Workarounds None ### For more information https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
null
2021-06-01T21:20:22Z
2021-06-01T21:20:22Z
MODERATE
0
{'CWE-347'}
{'https://github.com/aws/aws-encryption-sdk-javascript/security/advisories/GHSA-h45p-w933-jxh3', 'https://github.com/advisories/GHSA-h45p-w933-jxh3'}
null
GHSA
GHSA-wfm4-pq59-wg6r
Reset Password / Login vulnerability in Sulu
### Impact _What kind of vulnerability is it? Who is impacted?_ This vulnerability consists of a few related issues: #### Forget password leaks information if the user exists When the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist: ```json { "code": 0, "message": "Entity with the type \u0022Sulu\\Bundle\\SecurityBundle\\Entity\\User\u0022 and the id \u0022asdf\u0022 not found." } ``` This enables attackers to retrieve valid usernames. #### Forgot password leaks user email if user exists The response of the "Forgot Password" request returns the email address to which the email was sent, if the operation was successful: ```json {"email":"admin@localhost.local"} ``` This information should not be exposed, as it can be used to gather email addresses. #### Response time of login gives hint if the username exists If the username the user enters in the login screen does not exists, the request responds much faster than if the username exists. This again allows attackers to retrieve valid usernames. #### Reset Token for Forgot Password feature is not hashed The reset token in the user database table is not hashed. That means that somebody could try to request a new password using the Forgot Password feature, and look that up in the database, if the attacker somehow got access to the database. Hashing the reset token would fix that problem. ### Patches This problem was fixed in Release 1.6.34, 2.0.10 and 2.1.1. ### Workarounds Override the files manually in your project and change them accordingly.
{'CVE-2020-15132'}
2022-04-19T19:02:32Z
2020-08-05T21:27:44Z
MODERATE
5.3
{'CWE-209'}
{'https://github.com/sulu/sulu/commit/0fbb6009eb6a8efe63b7e3f3b4b886dc54bb2326', 'https://github.com/advisories/GHSA-wfm4-pq59-wg6r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15132', 'https://github.com/sulu/sulu/security/advisories/GHSA-wfm4-pq59-wg6r'}
null
GHSA
GHSA-q4m3-2j7h-f7xw
Cross-Site Scripting in jquery
Versions of `jquery` prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 1.9.0 or later.
{'CVE-2020-7656'}
2021-08-25T21:11:29Z
2020-05-20T16:18:01Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-q4m3-2j7h-f7xw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7656', 'https://www.npmjs.com/advisories/1524', 'https://security.netapp.com/advisory/ntap-20200528-0001/', 'https://snyk.io/vuln/SNYK-JS-JQUERY-569619'}
null
GHSA
GHSA-p75j-wc34-527c
Exposure of Sensitive Information to an Unauthorized Actor in ansible
A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.
{'CVE-2019-10217'}
2021-10-12T16:31:59Z
2021-10-12T16:31:59Z
MODERATE
6.5
{'CWE-200'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10217', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10217', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html', 'https://github.com/advisories/GHSA-p75j-wc34-527c', 'https://github.com/ansible/ansible/issues/56269', 'https://github.com/ansible/ansible/pull/59427'}
null
GHSA
GHSA-434h-p4gx-jm89
Observable Response Discrepancy in Flask-AppBuilder
### Impact User enumeration in database authentication in Flask-AppBuilder <= 3.2.3. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in. ### Patches Upgrade to 3.3.0 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Flask-AppBuilder](https://github.com/dpgaspar/Flask-AppBuilder)
{'CVE-2021-29621'}
2022-04-19T19:02:56Z
2021-05-27T18:38:36Z
MODERATE
5.3
{'CWE-203'}
{'https://lists.apache.org/thread.html/r5b754118ba4e996adf03863705d34168bffec202da5c6bdc9bf3add5@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r466759f377651f0a690475d5a52564d0e786e82c08d5a5730a4f8352@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-434h-p4gx-jm89', 'https://lists.apache.org/thread.html/r91067f953906d93aaa1c69fe2b5472754019cc6bd4f1ba81349d62a0@%3Ccommits.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29621', 'https://github.com/dpgaspar/Flask-AppBuilder/commit/780bd0e8fbf2d36ada52edb769477e0a4edae580', 'https://pypi.org/project/Flask-AppBuilder/', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-434h-p4gx-jm89'}
null
GHSA
GHSA-6qpr-9mc5-7gch
Command Injection in async-git
The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb')
{'CVE-2020-28490'}
2021-07-28T18:03:47Z
2021-04-12T19:50:20Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28490', 'https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877', 'https://github.com/advisories/GHSA-6qpr-9mc5-7gch', 'https://www.npmjs.com/package/async-git', 'https://github.com/omrilotan/async-git/pull/14', 'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'}
null
GHSA
GHSA-cfc5-x58f-869w
Malicious Package in conistring
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:59:52Z
2020-09-03T19:40:55Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1389', 'https://github.com/advisories/GHSA-cfc5-x58f-869w'}
null
GHSA
GHSA-p826-8vhq-h439
Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19
Insecure temporary directory usage in frontend build functionality of `com.vaadin:flow-server` versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds. - https://vaadin.com/security/cve-2021-31411
{'CVE-2021-31411'}
2021-05-19T17:41:46Z
2021-05-06T15:27:12Z
HIGH
6.3
{'CWE-379'}
{'https://vaadin.com/security/cve-2021-31411', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31411', 'https://github.com/advisories/GHSA-p826-8vhq-h439', 'https://github.com/vaadin/platform/security/advisories/GHSA-p826-8vhq-h439', 'https://github.com/vaadin/flow/pull/10640'}
null
GHSA
GHSA-fx5p-f64h-93xc
Opened exploitable ports in default docker-compose.yaml in go-ipfs
### Impact Allows admin API access to the IPFS node. ### Who ? This affects people running the [docker-compose.yaml](https://github.com/ipfs/go-ipfs/blob/master/docker-compose.yaml) service in an environment where the docker host is directly attached to a public or untrusted IP. In the vulnerable version, the private API endpoint is publicly forwarded by exposing it as `0.0.0.0:5001` on the host machine. If the host machine is hidden behind a firewall or NAT (and the LAN is trusted for NAT), this is not an immediate issue because of the protection from the firewall or NAT. That said, we still recommend users update to follow security best practices of not putting unnecessary dependency on a working firewall. ### Patches This issue is in [docker-compose.yaml](https://github.com/ipfs/go-ipfs/blob/master/docker-compose.yaml). Users need to replace their current `docker-compose.yaml` file with a version `0.12.1` or later. There is no need to update any of the binaries. Users running previous versions like `0.12.0` or earlier can download the `0.12.1` `docker-compose.yaml` file. You can replace a vulnerable `docker-compose.yaml` file with a the new one with: ``` curl https://raw.githubusercontent.com/ipfs/go-ipfs/v0.12.1/docker-compose.yaml > docker-compose.yaml ``` ### How to test if you are vulnerable #### Binding check on the host On the host machine, while IPFS is running, run as root: ```bash netstat -lnp | grep ":5001" ``` The output will be a list of listeners bound to `:5001`. You then need to check that those listeners are private and preferably even localhost IPs. ⚠️ If this listener is on `0.0.0.0` or a public IP you are very likely vulnerable. #### Remote hailing While IPFS is running, you can try to contact the API from a remote machine. (Replace `1.2.3.4` with your node public IP. Or if you want to test in an untrusted NAT, then substitute the LAN IP instead.) ```bash curl -X POST http://1.2.3.4:5001/api/v0/version ``` ⚠️ If you see any json outputted (e.g., `{"Commit": "<string>","Golang": "<string>","Repo": "<string>","System": "<string>","Version": "<string>"}`), then you are vulnerable. If it **fails**, then you are safe. ### For more information If you have any questions or comments about this advisory: * Please first read https://docs.ipfs.io/reference/http/api/ about best practices * Ask in [IPFS Discord #ipfs-chatter](https://discord.gg/ipfs) * Open an issue in [go-ipfs](https://github.com/ipfs/go-ipfs)
null
2022-04-22T17:29:19Z
2022-04-04T21:23:55Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-fx5p-f64h-93xc', 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-fx5p-f64h-93xc', 'https://github.com/ipfs/go-ipfs/releases/tag/v0.12.1', 'https://github.com/ipfs/go-ipfs/commit/816a128aaf963d72c4930852ce32b9a4e31924a1', 'https://github.com/ipfs/go-ipfs/pull/8773'}
null
GHSA
GHSA-65j7-66p7-9xgf
Malicious Package in font-scrubber
Version 1.2.2 of `font-scrubber` contains malicious code as a postinstall script. The package attempts to upload sensitive files from the system to a remote server. The files include configuration files, command history logs, SSH keys and /etc/passwd. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:59:50Z
2020-09-02T21:51:55Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-65j7-66p7-9xgf', 'https://www.npmjs.com/advisories/919'}
null
GHSA
GHSA-rv7p-mmwq-x674
Improper Input Validation and Code Injection in pdf-image
Lack of input validation in pdf-image npm package version &lt;= 2.0.0 may allow an attacker to run arbitrary code if PDF file path is constructed based on untrusted user input.
{'CVE-2020-8132'}
2021-05-10T18:46:58Z
2021-05-10T18:46:58Z
HIGH
9.8
{'CWE-94', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8132', 'https://github.com/advisories/GHSA-rv7p-mmwq-x674', 'https://hackerone.com/reports/781664'}
null
GHSA
GHSA-7x22-pmw5-66mq
Cross-site Scripting in showdoc
Stored XSS via upload attachment with format .svg in File Library.
{'CVE-2021-4172'}
2022-02-01T00:44:14Z
2022-02-01T00:44:14Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/star7th/showdoc/commit/409c8a1208bbb847046a9496303192980f2e6219', 'https://huntr.dev/bounties/c041b693-877b-4456-b463-19e4c9456eee', 'https://github.com/advisories/GHSA-7x22-pmw5-66mq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4172'}
null
GHSA
GHSA-2mxr-89gf-rc4v
Read permissions not enforced for client provided filter expressions in Elide.
### Impact It is possible for an adversary to "guess and check" the value of a model field they do not have access to assuming they can read at least one other field in the model. The adversary can construct filter expressions for an inaccessible field to filter a collection. The presence or absence of models in the returned collection can be used to reconstruct the value of the inaccessible field. For example, a User model has two fields: _name_ and _role_. The adversary has read permissions to see the _name_ field of the User collection but not the _role_. By constructing a filter like the one below, the adversary can determine which users have admin role by presence or absence in the returned collection: `filter=role=="Admin"` ### Patches Resolved in Elide 4.5.14 and greater. ### Workarounds The adversary can only access the fields if a model includes fields with different read permission levels (some less secure and some more secure). Model security can be adjusted by restricting read permissions on existing models. ### References Fixed in https://github.com/yahoo/elide/pull/1236 ### For more information If you have any questions or comments about this advisory: * Open an issue in [elide](https://github.com/yahoo/elide) * Contact us at [spectrum](https://spectrum.chat/elide?tab=posts)
{'CVE-2020-5289'}
2021-01-08T20:25:20Z
2020-03-30T20:09:58Z
HIGH
6.8
{'CWE-285'}
{'https://github.com/advisories/GHSA-2mxr-89gf-rc4v', 'https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5289', 'https://github.com/yahoo/elide/security/advisories/GHSA-2mxr-89gf-rc4v', 'https://github.com/yahoo/elide/pull/1236'}
null
GHSA
GHSA-6xm4-p6r2-mwrc
Malicious Package in cuffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:14:13Z
2020-09-03T22:47:30Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1270', 'https://github.com/advisories/GHSA-6xm4-p6r2-mwrc'}
null
GHSA
GHSA-5796-p3m6-9qj4
Denial of Service (DoS) in Cloud Foundry Routing
Cloud Foundry Routing, all versions before 0.193.0, does not properly validate nonce input. A remote unauthorized malicious user could forge a route service request using an invalid nonce that will cause the Gorouter to crash.
{'CVE-2019-11289'}
2021-05-18T15:31:39Z
2021-05-18T15:31:39Z
HIGH
7.5
{'CWE-20'}
{'https://www.cloudfoundry.org/blog/cve-2019-11289', 'https://github.com/advisories/GHSA-5796-p3m6-9qj4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11289'}
null
GHSA
GHSA-3jfq-g458-7qm9
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. ### Patches 3.2.2 || 4.4.14 || 5.0.6 || 6.1.1 NOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case. ### Workarounds Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. ```js const path = require('path') const tar = require('tar') tar.x({ file: 'archive.tgz', // either add this function... onentry: (entry) => { if (path.isAbsolute(entry.path)) { entry.path = sanitizeAbsolutePathSomehow(entry.path) entry.absolute = path.resolve(entry.path) } }, // or this one filter: (file, entry) => { if (path.isAbsolute(entry.path)) { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.
{'CVE-2021-32804'}
2022-03-11T20:21:31Z
2021-08-03T19:06:36Z
HIGH
8.2
{'CWE-22'}
{'https://www.npmjs.com/package/tar', 'https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9', 'https://www.npmjs.com/advisories/1770', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32804', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4', 'https://github.com/advisories/GHSA-3jfq-g458-7qm9'}
null
GHSA
GHSA-hf44-3mx6-vhhw
Navigate endpoint is vulnerable to regex injection that may lead to Denial of Service.
### Impact The regex injection that may lead to Denial of Service. ### Patches Will be patched in 2.4 and 3.0 ### Workarounds Versions lower than 2.x are only affected if the navigation module is added ### References See this pull request for the fix: https://github.com/graphhopper/graphhopper/pull/2304 If you have any questions or comments about this advisory please [send us an Email](https://www.graphhopper.com/contact-form/) or create a topic [here](https://discuss.graphhopper.com/).
{'CVE-2021-29506'}
2022-04-19T19:02:56Z
2021-05-19T23:02:57Z
MODERATE
6.5
{'CWE-400'}
{'https://github.com/graphhopper/graphhopper/pull/2304', 'https://github.com/graphhopper/graphhopper/commit/eb189be1fa7443ebf4ae881e737a18f818c95f41', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29506', 'https://github.com/graphhopper/graphhopper/security/advisories/GHSA-hf44-3mx6-vhhw', 'https://github.com/advisories/GHSA-hf44-3mx6-vhhw'}
null
GHSA
GHSA-gc6c-5v9w-xmhw
Downloads Resources over HTTP in nodewebkit
Affected versions of `nodewebkit` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nodewebkit`. ## Recommendation No patch is currently available, and the package author has deprecated this package. The best path forward in mitigating this vulnerability is to use the [official installer](https://www.npmjs.com/nw) instead of this package, as per the package author's instructions.
{'CVE-2016-10580'}
2021-01-08T18:48:14Z
2019-02-18T23:51:27Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10580', 'https://nodesecurity.io/advisories/173', 'https://www.npmjs.com/advisories/173', 'https://github.com/advisories/GHSA-gc6c-5v9w-xmhw'}
null
GHSA
GHSA-xwqw-rf2q-xmhf
Cross-Site Scripting in buefy
Versions of buefy prior to 0.7.2 are vulnerable to Cross-Site Scripting, allowing attackers to manipulate the DOM and execute remote code. The autocomplete list renders user input as HTML without encoding. ## Recommendation Upgrade to version 0.7.2 or later.
null
2021-09-24T22:00:39Z
2020-09-01T21:23:38Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-xwqw-rf2q-xmhf', 'https://www.npmjs.com/advisories/747', 'https://github.com/buefy/buefy/issues/1097'}
null
GHSA
GHSA-xgr2-v94m-rc9g
High severity vulnerability that affects activesupport
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
{'CVE-2013-0333'}
2021-09-21T22:32:53Z
2017-10-24T18:33:37Z
HIGH
0
null
{'http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0333', 'https://puppet.com/security/cve/cve-2013-0333', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source&output=gplain', 'http://www.kb.cert.org/vuls/id/628463', 'http://rhn.redhat.com/errata/RHSA-2013-0203.html', 'http://www.debian.org/security/2013/dsa-2613', 'http://rhn.redhat.com/errata/RHSA-2013-0202.html', 'http://support.apple.com/kb/HT5784', 'http://rhn.redhat.com/errata/RHSA-2013-0201.html', 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/', 'https://github.com/advisories/GHSA-xgr2-v94m-rc9g'}
null
GHSA
GHSA-4pmg-jgm5-3jg6
Malicious Package in erquest
All versions of `erquest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-09-30T21:14:54Z
2020-09-02T21:16:26Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-4pmg-jgm5-3jg6', 'https://www.npmjs.com/advisories/871'}
null
GHSA
GHSA-fm87-46vv-jqrr
Path Traversal in html-pages
Versions of `html-pages` before 2.1.0 are vulnerable to path traversal. ## Recommendation Update to version 2.1.0 or later.
{'CVE-2018-3744'}
2021-01-08T18:52:20Z
2018-09-18T13:45:07Z
HIGH
0
{'CWE-35'}
{'https://hackerone.com/reports/306607', 'https://github.com/advisories/GHSA-fm87-46vv-jqrr', 'https://www.npmjs.com/advisories/665', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3744', 'https://github.com/danielcardoso/html-pages/issues/2'}
null
GHSA
GHSA-4wj3-p7hj-cvx8
Double free in ordnung
An issue was discovered in the ordnung crate through 2020-09-03 for Rust. compact::Vec violates memory safety via a remove() double free.
{'CVE-2020-35891'}
2021-08-25T20:48:47Z
2021-08-25T20:48:47Z
HIGH
7.5
{'CWE-415'}
{'https://github.com/maciejhirsz/ordnung/issues/8', 'https://github.com/advisories/GHSA-4wj3-p7hj-cvx8', 'https://rustsec.org/advisories/RUSTSEC-2020-0038.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35891'}
null
GHSA
GHSA-xcf7-q56x-78gh
Connection descriptor exhaustion in proxyproto
The package `github.com/pires/go-proxyproto` before 0.6.0 are vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header.
{'CVE-2021-23409'}
2021-07-26T21:23:49Z
2021-07-26T21:23:49Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/pires/go-proxyproto/releases/tag/v0.6.0', 'https://github.com/pires/go-proxyproto/pull/74', 'https://github.com/pires/go-proxyproto/issues/65', 'https://github.com/advisories/GHSA-xcf7-q56x-78gh', 'https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23409'}
null
GHSA
GHSA-3fvf-2gp4-89wq
Possibility for Denial of Service by overwriting PHP files with language exports
### Impact Laravel Translation Manager didn't check the locale name, which allowed directory traversal when exporting files. The content would be a PHP file returning an array of translations, but this could lead to unexpected results, like denial of service. Access to the Laravel Translation Manager is required, because a new locale would have to be added and published. ### Patches Version 0.6.2 fixes this issue. ### Workarounds Only allow trusted admins to publish/edit translations. ### References https://github.com/barryvdh/laravel-translation-manager/pull/417 ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/barryvdh/laravel-translation-manager * Email me (see Github profile) ### Credits Found and reported by [Natalia Trojanowska](https://www.linkedin.com/in/trojanowskanatalia/)
null
2022-03-22T12:48:38Z
2022-03-18T23:17:15Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-3fvf-2gp4-89wq', 'https://github.com/barryvdh/laravel-translation-manager/security/advisories/GHSA-3fvf-2gp4-89wq'}
null
GHSA
GHSA-xfhh-rx56-rxcr
Path Traversal vulnerability that affects yard
## Possible arbitrary path traversal and file access via `yard server` ### Impact A path traversal vulnerability was discovered in YARD <= 0.9.19 when using `yard server` to serve documentation. This bug would allow unsanitized HTTP requests to access arbitrary files on the machine of a yard server host under certain conditions. Thanks to CuongMX from Viettel Cyber Security for discovering this vulnerability. ### Patches Please upgrade to YARD v0.9.20 immediately if you are relying on yard server to host documentation in any untrusted environments. ### Workarounds For users who cannot upgrade, it is possible to perform path sanitization of HTTP requests at your webserver level. WEBrick, for example, can perform such sanitization by default (which you can use via `yard server -s webrick`), as can certain rules in your webserver configuration.
{'CVE-2019-1020001'}
2022-04-19T19:02:23Z
2019-07-02T15:28:38Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-xfhh-rx56-rxcr', 'https://github.com/lsegal/yard/security/advisories/GHSA-xfhh-rx56-rxcr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020001'}
null
GHSA
GHSA-2jc8-4r6g-282j
Moderate severity vulnerability that affects python-gnupg
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
{'CVE-2014-1928'}
2021-08-30T22:22:11Z
2018-11-06T23:13:02Z
MODERATE
0
{'CWE-20'}
{'http://secunia.com/advisories/59031', 'https://code.google.com/p/python-gnupg/', 'http://seclists.org/oss-sec/2014/q1/294', 'https://github.com/advisories/GHSA-2jc8-4r6g-282j', 'http://secunia.com/advisories/56616', 'http://www.debian.org/security/2014/dsa-2946', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1928', 'https://code.google.com/p/python-gnupg/issues/detail?id=98', 'http://seclists.org/oss-sec/2014/q1/246'}
null
GHSA
GHSA-gpch-h32j-gx6x
Insufficiently Protected Credentials in Reactor Netty
The HttpClient from Reactor Netty, versions 0.9.x prior to 0.9.5, and versions 0.8.x prior to 0.8.16, may be used incorrectly, leading to a credentials leak during a redirect to a different domain. In order for this to happen, the HttpClient must have been explicitly configured to follow redirects.
{'CVE-2020-5404'}
2022-02-10T20:24:17Z
2022-02-10T20:24:17Z
MODERATE
5.9
{'CWE-522'}
{'https://pivotal.io/security/cve-2020-5404', 'https://github.com/advisories/GHSA-gpch-h32j-gx6x', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5404'}
null
GHSA
GHSA-m6cp-vxjx-65j6
SessionListener can prevent a session from being invalidated breaking logout
### Impact If an exception is thrown from the `SessionListener#sessionDestroyed()` method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in. There is no known path for an attacker to induce such an exception to be thrown, thus they must rely on an application to throw such an exception. The OP has also identified that during the call to `sessionDestroyed`, the `getLastAccessedTime()` throws an `IllegalStateException`, which potentially contrary to the servlet spec, so applications calling this method may always throw and fail to log out. If such an application was only tested on a non clustered test environment, then it may be deployed on a clustered environment with multiple contexts and fail to log out. ### Workarounds The application should catch all Throwables within their `SessionListener#sessionDestroyed()` implementations.
{'CVE-2021-34428'}
2022-04-22T15:46:47Z
2021-06-23T20:23:04Z
LOW
3.5
{'CWE-613'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20210813-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34428', 'https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.debian.org/security/2021/dsa-4949', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-m6cp-vxjx-65j6', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-pgwj-prpq-jpc2
Check service IDs are valid
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, when service ids allow user input, this could allow for SQL Injection and remote code execution. This is related to symfony/dependency-injection.
{'CVE-2019-10910'}
2021-09-30T18:39:00Z
2019-11-18T17:27:31Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10910', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10910.yaml', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid', 'https://symfony.com/cve-2019-10910', 'https://github.com/advisories/GHSA-pgwj-prpq-jpc2', 'https://github.com/symfony/symfony/commit/d2fb5893923292a1da7985f0b56960b5bb10737b', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/dependency-injection/CVE-2019-10910.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/proxy-manager-bridge/CVE-2019-10910.yaml'}
null
GHSA
GHSA-p8xr-4v2c-rvgp
High severity vulnerability that affects org.apache.hbase:hbase
Apache HBase 0.98 before 0.98.12.1, 1.0 before 1.0.1.1, and 1.1 before 1.1.0.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, uses incorrect ACLs for ZooKeeper coordination state, which allows remote attackers to cause a denial of service (daemon outage), obtain sensitive information, or modify data via unspecified client traffic.
{'CVE-2015-1836'}
2021-06-10T22:06:23Z
2018-10-18T18:04:50Z
HIGH
7.3
{'CWE-284'}
{'https://github.com/advisories/GHSA-p8xr-4v2c-rvgp', 'http://www-01.ibm.com/support/docview.wss?uid=swg21969546', 'http://www.securitytracker.com/id/1034365', 'http://mail-archives.apache.org/mod_mbox/www-announce/201505.mbox/%3CCA+RK=_CFiTfQ2d0V+kuJx_y5izmYccaKjXaJ3V72KK7tbOhbkg@mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1836', 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html'}
null
GHSA
GHSA-v95x-h953-x7fg
Malicious Package in k0a_multer
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:19:28Z
2020-09-03T19:47:55Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1130', 'https://github.com/advisories/GHSA-v95x-h953-x7fg'}
null
GHSA
GHSA-2xwp-m7mq-7q3r
CLI does not correctly implement strict mode
In the affected versions, the AWS Encryption CLI operated in "discovery mode" even when "strict mode" was specified. Although decryption only succeeded if the user had permission to decrypt with at least one of the CMKs, decryption could be successful using a CMK that was not included in the user-defined set when the CLI was operating in "strict mode." Affected users should upgrade to Encryption CLI v1.8.x or v2.1.x as soon as possible.
null
2021-09-27T20:50:17Z
2020-10-28T17:05:38Z
LOW
0
{'CWE-326'}
{'https://github.com/aws/aws-encryption-sdk-cli/commit/7d21b8051cab9e52e056fe427d2bff19cf146460', 'https://github.com/aws/aws-encryption-sdk-cli/security/advisories/GHSA-2xwp-m7mq-7q3r', 'https://github.com/advisories/GHSA-2xwp-m7mq-7q3r'}
null
GHSA
GHSA-hx46-vwmx-wx95
High severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
null
2021-12-02T23:15:02Z
2018-08-13T20:48:25Z
HIGH
0
null
{'https://github.com/advisories/GHSA-hx46-vwmx-wx95', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098'}
null