ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-j44m-qm6p-hp7m
|
Arbitrary File Overwrite in tar
|
Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file.
## Recommendation
For tar 4.x, upgrade to version 4.4.2 or later.
For tar 2.x, upgrade to version 2.2.2 or later.
|
{'CVE-2018-20834'}
|
2021-08-03T21:28:27Z
|
2019-05-01T18:37:31Z
|
HIGH
| 7.5
|
{'CWE-59'}
|
{'https://github.com/npm/node-tar/commits/v2.2.2', 'https://www.npmjs.com/advisories/803', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20834', 'https://hackerone.com/reports/344595', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://access.redhat.com/errata/RHSA-2019:1821', 'https://github.com/advisories/GHSA-j44m-qm6p-hp7m', 'https://github.com/npm/node-tar/compare/58a8d43...a5f7779', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8'}
| null |
GHSA
|
GHSA-6r7c-6w96-8pvw
|
Remote Code Execution in AjaxNetProfessional
|
### Overview
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
### Description
Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.
Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution.
Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products.
An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed.
Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands).
### Releases
Releases before version 21.11.29.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions.
### Workarounds
There is no workaround available that addresses all issues except updating to latest version from GitHub.
### References
Find original CVE posting here: https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971
Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/
### For more information
If you have any questions or comments about this advisory:
* Open an issue on this GitHub repository
| null |
2022-04-19T19:03:17Z
|
2021-12-07T21:21:49Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw', 'https://github.com/advisories/GHSA-6r7c-6w96-8pvw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971'}
| null |
GHSA
|
GHSA-2w3f-9w3q-qw77
|
Prototype Pollution in config-handler
|
All versions of package config-handler are vulnerable to Prototype Pollution when loading config files.
|
{'CVE-2021-23448'}
|
2021-10-20T17:12:25Z
|
2021-10-12T18:30:37Z
|
CRITICAL
| 9.8
|
{'CWE-913'}
|
{'https://github.com/jarradseers/config-handler/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23448', 'https://github.com/advisories/GHSA-2w3f-9w3q-qw77', 'https://snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947'}
| null |
GHSA
|
GHSA-g9wh-3vrx-r7hg
|
OctoRPKI crashes when processing GZIP bomb returned via malicious repository
|
OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash).
## Patches
## For more information
If you have any questions or comments about this advisory email us at security@cloudflare.com
|
{'CVE-2021-3912'}
|
2022-01-13T18:27:12Z
|
2021-11-10T20:39:23Z
|
MODERATE
| 4.2
|
{'CWE-400'}
|
{'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g9wh-3vrx-r7hg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3912', 'https://github.com/advisories/GHSA-g9wh-3vrx-r7hg', 'https://www.debian.org/security/2022/dsa-5041'}
| null |
GHSA
|
GHSA-xfqh-7356-vqjj
|
Exposure of Sensitive Information to an Unauthorized Actor in Keycloak
|
It was found that keycloak before version 8.0.0 exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.
|
{'CVE-2019-14820'}
|
2021-11-01T14:08:17Z
|
2020-04-15T21:08:21Z
|
MODERATE
| 4.3
|
{'CWE-200'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14820', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14820', 'https://github.com/advisories/GHSA-xfqh-7356-vqjj'}
| null |
GHSA
|
GHSA-hqq7-2q2v-82xq
|
Cross-site Scripting in sanitize-url
|
The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function.
|
{'CVE-2021-23648'}
|
2022-04-22T14:58:23Z
|
2022-03-17T00:00:24Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/braintree/sanitize-url/pull/40', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23648', 'https://github.com/braintree/sanitize-url/blob/main/src/index.ts%23L11', 'https://github.com/advisories/GHSA-hqq7-2q2v-82xq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/', 'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'}
| null |
GHSA
|
GHSA-7x48-7466-3g33
|
Command injection in guake
|
Guake is a drop-down terminal for GNOME. The package guake before 3.8.5 is vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.
|
{'CVE-2021-23556'}
|
2022-04-05T18:49:12Z
|
2022-03-18T00:01:11Z
|
MODERATE
| 6.4
| null |
{'https://github.com/advisories/GHSA-7x48-7466-3g33', 'https://github.com/Guake/guake/issues/1796', 'https://github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e8a629781b888', 'https://github.com/Guake/guake/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23556', 'https://github.com/Guake/guake/pull/2017', 'https://github.com/pypa/advisory-database/tree/main/vulns/guake/PYSEC-2022-165.yaml', 'https://snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334'}
| null |
GHSA
|
GHSA-f99r-jjgr-f373
|
SQL injection in ImpressCMS
|
SQL Injection in ImpressCMS 1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire system.
|
{'CVE-2022-26986'}
|
2022-04-18T22:23:05Z
|
2022-04-06T00:01:30Z
|
HIGH
| 7.2
|
{'CWE-89'}
|
{'https://github.com/sartlabs/0days/blob/main/ImpressCMS1.4.3/Exploit.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26986', 'https://github.com/advisories/GHSA-f99r-jjgr-f373'}
| null |
GHSA
|
GHSA-36p7-xjw8-h6f2
|
Ruby-saml allows attackers to perform XML signature wrapping attacks via unspecified vectors
|
Ruby-saml before 1.3.0 allows attackers to perform XML signature wrapping attacks via unspecified vectors.
|
{'CVE-2016-5697'}
|
2022-04-26T18:25:15Z
|
2018-08-21T17:08:30Z
|
HIGH
| 7.5
|
{'CWE-91'}
|
{'http://www.openwall.com/lists/oss-security/2016/06/24/3', 'https://github.com/advisories/GHSA-36p7-xjw8-h6f2', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5697'}
| null |
GHSA
|
GHSA-5wg4-74h6-q47v
|
Integer Overflow or Wraparound and Use of a Broken or Risky Cryptographic Algorithm in bcrypt
|
In bcrypt (npm package) before version 5.0.0, data is truncated wrong when its length is greater than 255 bytes.
|
{'CVE-2020-7689'}
|
2021-07-29T20:49:31Z
|
2020-08-20T14:38:49Z
|
MODERATE
| 5.9
|
{'CWE-327', 'CWE-190'}
|
{'https://github.com/kelektiv/node.bcrypt.js/issues/776', 'https://github.com/kelektiv/node.bcrypt.js/pull/806', 'https://github.com/advisories/GHSA-5wg4-74h6-q47v', 'https://snyk.io/vuln/SNYK-JS-BCRYPT-572911', 'https://github.com/kelektiv/node.bcrypt.js/pull/807', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7689'}
| null |
GHSA
|
GHSA-xwv6-v7qx-f5jc
|
Code injection in ezsystems/ezpublish-kernel
|
When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible attack vectors are removed from the original file name.
The second issue is that direct access to the images is not access controlled. This is by design, for performance reasons, and documented as such. But it does mean that images not meant to be publicly accessible can be accessed, provided that the image path and filename is correctly deduced and/or guessed, through dictionary attacks and similar.
|
{'CVE-2022-25337'}
|
2022-03-08T21:24:54Z
|
2022-02-19T00:01:25Z
|
CRITICAL
| 9.8
|
{'CWE-74'}
|
{'https://github.com/advisories/GHSA-xwv6-v7qx-f5jc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25337', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}
| null |
GHSA
|
GHSA-9mxf-g3x6-wv74
|
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
|
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
|
{'CVE-2018-14721'}
|
2021-06-10T23:55:51Z
|
2019-01-04T19:07:06Z
|
CRITICAL
| 10
|
{'CWE-918'}
|
{'https://www.debian.org/security/2019/dsa-4452', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/68', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:1107', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14721', 'https://github.com/advisories/GHSA-9mxf-g3x6-wv74', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1106'}
| null |
GHSA
|
GHSA-g5m7-57ph-j6p8
|
OS Command Injection in Nexus Yum Repository Plugin
|
The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.
|
{'CVE-2019-5475'}
|
2021-08-17T22:25:21Z
|
2019-09-11T23:04:57Z
|
HIGH
| 8.8
|
{'CWE-78'}
|
{'https://hackerone.com/reports/654888', 'https://github.com/advisories/GHSA-g5m7-57ph-j6p8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5475'}
| null |
GHSA
|
GHSA-x4g7-fvjj-prg8
|
Division by 0 in `QuantizedConv2D`
|
### Impact
An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`:
```python
import tensorflow as tf
input = tf.zeros([1, 1, 1, 1], dtype=tf.quint8)
filter = tf.constant([], shape=[1, 0, 1, 1], dtype=tf.quint8)
min_input = tf.constant(0.0)
max_input = tf.constant(0.0001)
min_filter = tf.constant(0.0)
max_filter = tf.constant(0.0001)
strides = [1, 1, 1, 1]
padding = "SAME"
tf.raw_ops.QuantizedConv2D(input=input, filter=filter, min_input=min_input, max_input=max_input, min_filter=min_filter, max_filter=max_filter, strides=strides, padding=padding)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L259) does a division by a quantity that is controlled by the caller:
```cc
const int filter_value_count = filter_width * filter_height * input_depth;
const int64 patches_per_chunk = kMaxChunkSize / (filter_value_count * sizeof(T1));
```
### Patches
We have patched the issue in GitHub commit [cfa91be9863a91d5105a3b4941096044ab32036b](https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29527'}
|
2021-05-21T14:21:59Z
|
2021-05-21T14:21:59Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4g7-fvjj-prg8', 'https://github.com/advisories/GHSA-x4g7-fvjj-prg8', 'https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29527'}
| null |
GHSA
|
GHSA-5f5c-687x-g5qm
|
Classic Buffer Overflow in pyo
|
Buffer Overflow Vulnerability exists in ajaxsoundstudio.com in Pyo < 1.03 in the Server_debug function, which allows remote attackers to conduct DoS attacks by deliberately passing on an overlong audio file name.
|
{'CVE-2021-41499'}
|
2022-01-07T00:10:33Z
|
2022-01-07T00:10:33Z
|
HIGH
| 7.5
|
{'CWE-120'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41499', 'https://github.com/advisories/GHSA-5f5c-687x-g5qm', 'https://github.com/belangeo/pyo/issues/222'}
| null |
GHSA
|
GHSA-qj3f-9gmq-fwv5
|
Cross-Site Scripting in simple-markdown
|
Versions of `simple-markdown` prior to 0.4.4 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing `data` or VBScript URIs and a base64-encoded payload.
## Recommendation
Upgrade to version 0.4.4 or later.
|
{'CVE-2019-9844'}
|
2021-09-16T20:02:37Z
|
2019-04-09T19:47:29Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://www.npmjs.com/package/simple-markdown/v/0.4.4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9844', 'https://github.com/Khan/simple-markdown/pull/63', 'https://github.com/advisories/GHSA-qj3f-9gmq-fwv5', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFLP3KJVSV5VWMNEBRXLGRVYFXOV5KOG/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5EFW655O3BXZYAPB65XEREXB2DSNSOT/', 'https://www.npmjs.com/advisories/815', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZG2I7VH7WLSEUQ77KYP5CRAVFT2RK2U/'}
| null |
GHSA
|
GHSA-jxf5-7x3j-8j9m
|
Malicious Package in load-from-cwd-or-npm
|
Version 3.0.2 of `load-from-cwd-or-npm` contains malicious code. The malware breaks functionality of the `purescript-installer` package by injecting targeted code.
## Recommendation
Upgrade to version 3.0.4 or later. There is no indication of further compromise.
| null |
2021-09-30T20:05:12Z
|
2020-09-03T18:19:14Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1082', 'https://github.com/advisories/GHSA-jxf5-7x3j-8j9m'}
| null |
GHSA
|
GHSA-887w-45rq-vxgf
|
Moderate severity vulnerability that affects SQLAlchemy
|
SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
|
{'CVE-2019-7164'}
|
2022-03-23T21:45:00Z
|
2019-04-16T15:50:41Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://github.com/sqlalchemy/sqlalchemy/commit/30307c4616ad67c01ddae2e1e8e34fabf6028414', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html', 'https://github.com/advisories/GHSA-887w-45rq-vxgf', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html', 'https://access.redhat.com/errata/RHSA-2019:0984', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html', 'https://github.com/sqlalchemy/sqlalchemy/issues/4481', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7164', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html', 'https://access.redhat.com/errata/RHSA-2019:0981'}
| null |
GHSA
|
GHSA-2589-w6xf-983r
|
Cross-site scripting in react-bootstrap-table
|
All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.
|
{'CVE-2021-23398'}
|
2021-12-10T18:58:49Z
|
2021-12-10T18:58:49Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286', 'https://github.com/AllenFang/react-bootstrap-table/blob/26d07defab759e4f9bce22d1d568690830b8d9d7/src/TableBody.js%23L114-L118', 'https://github.com/advisories/GHSA-2589-w6xf-983r', 'https://github.com/AllenFang/react-bootstrap-table/issues/2071', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23398'}
| null |
GHSA
|
GHSA-82mg-x548-gq3j
|
LDAP Injection in ldapauth
|
Versions 2.2.4 and earlier of `ldapauth-fork` are affected by an LDAP injection vulnerability. This allows an attacker to inject and run arbitrary LDAP commands via the username parameter.
## Recommendation
ldapauth is not actively maintained, having not seen a publish since 2014. As a result, there is no patch available. Consider updating to use [ldapauth-fork](https://www.npmjs.com/package/ldapauth-fork) 2.3.3 or greater.
|
{'CVE-2015-7294'}
|
2021-09-23T19:58:04Z
|
2020-08-31T22:49:46Z
|
HIGH
| 7.5
|
{'CWE-90'}
|
{'https://www.npmjs.com/advisories/18', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7294', 'https://github.com/advisories/GHSA-82mg-x548-gq3j', 'http://www.openwall.com/lists/oss-security/2015/09/18/8', 'https://www.npmjs.com/advisories/19', 'https://github.com/vesse/node-ldapauth-fork/issues/21', 'http://www.openwall.com/lists/oss-security/2015/09/21/2', 'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4', 'http://www.openwall.com/lists/oss-security/2015/09/18/4'}
| null |
GHSA
|
GHSA-9c78-vcq7-7vxq
|
Out of bounds write in TFLite
|
### Impact
An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions.
### Patches
We have patched the issue in GitHub commit [6c0b2b70eeee588591680f5b7d5d38175fd7cdf6](https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
|
{'CVE-2022-23561'}
|
2022-02-11T15:07:45Z
|
2022-02-09T23:53:47Z
|
HIGH
| 8.8
|
{'CWE-787'}
|
{'https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c78-vcq7-7vxq', 'https://github.com/advisories/GHSA-9c78-vcq7-7vxq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23561'}
| null |
GHSA
|
GHSA-fj2w-wfgv-mwq6
|
Denial of service in CBOR library
|
### Impact
Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library.
Affected versions _include_ versions 4.0.0 through 4.5.0.
This vulnerability was privately reported to me.
### Patches
This issue has been fixed in version 4.5.1. Users should use the latest version of this library. (The latest version is not necessarily 4.5.1. Check the README for [this library's repository](https://github.com/peteroupc/CBOR-Java) to see the latest version's version number.)
### Workarounds
Again, users should use the latest version of this library.
In the meantime, note that the inputs affected by this issue are all CBOR maps or contain CBOR maps. An input that decodes to a single CBOR object is not capable of containing a CBOR map if—
- it begins with a byte other than 0x80 through 0xDF, or
- it does not contain a byte in the range 0xa0 through 0xBF.
Such an input is not affected by this vulnerability and an application can choose to perform this check before passing it to a CBOR decoding mechanism.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR-Java).
| null |
2022-01-24T22:05:39Z
|
2022-01-21T23:21:48Z
|
HIGH
| 0
|
{'CWE-407'}
|
{'https://github.com/advisories/GHSA-fj2w-wfgv-mwq6', 'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6'}
| null |
GHSA
|
GHSA-xmc8-26q4-qjhx
|
Denial of Service (DoS) in Jackson Dataformat CBOR
|
This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.
|
{'CVE-2020-28491'}
|
2022-02-09T18:27:40Z
|
2021-12-09T19:17:21Z
|
HIGH
| 7.5
|
{'CWE-770'}
|
{'https://github.com/FasterXML/jackson-dataformats-binary/issues/186', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28491', 'https://github.com/advisories/GHSA-xmc8-26q4-qjhx', 'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}
| null |
GHSA
|
GHSA-88h9-fc6v-jcw7
|
Unintended Require in larvitbase-www
|
All versions of `larvitbase-www` are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-09-03T20:28:51Z
|
2020-09-03T20:28:51Z
|
MODERATE
| 0
| null |
{'https://hackerone.com/reports/526258', 'https://github.com/advisories/GHSA-88h9-fc6v-jcw7', 'https://www.npmjs.com/advisories/1156'}
| null |
GHSA
|
GHSA-867q-77cc-98mv
|
Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI Generator Maven plugin
|
### Impact
Using `File.createTempFile` in JDK will result in creating and using insecure temporary files that can leave application and system data vulnerable to attacks. This vulnerability only impacts unix-like systems where the local system temporary directory is shared between all users. This vulnerability does not impact Windows or modern versions of MacOS.
OpenAPI Generator Maven plug-in creates insecure temporary files during the code generation process. It creates insecure temporary files to store the OpenAPI specification files provided by the users and these temporary files can be read by any users in the system.
The impact of this vulnerability is information disclosure of the contents of the specification file to other local users.
### Patches
The issue has been patched with `Files.createTempFile` and released in the v5.1.0 stable version.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/)
* Email us at [security@openapitools.org](mailto:security@openapitools.org)
|
{'CVE-2021-21429'}
|
2022-04-19T19:02:52Z
|
2021-04-29T21:51:37Z
|
MODERATE
| 4
|
{'CWE-552', 'CWE-379', 'CWE-378', 'CWE-377'}
|
{'https://github.com/advisories/GHSA-867q-77cc-98mv', 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-867q-77cc-98mv', 'https://github.com/OpenAPITools/openapi-generator/pull/8795', 'https://github.com/OpenAPITools/openapi-generator/blob/06ad7a51eff04393203cfa715e54e1fb59d984fe/modules/openapi-generator-maven-plugin/src/main/java/org/openapitools/codegen/plugin/CodeGenMojo.java#L782-L799', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21429'}
| null |
GHSA
|
GHSA-5c6c-w4c4-vgvx
|
Cross-site scripting in Jenkins Scriptler Plugin
|
Jenkins Scriptler Plugin 3.1 and earlier does not escape script content, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission.
|
{'CVE-2021-21668'}
|
2022-01-06T18:45:09Z
|
2022-01-06T18:45:09Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-5c6c-w4c4-vgvx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21668', 'https://www.jenkins.io/security/advisory/2021-06-16/#SECURITY-2390', 'http://www.openwall.com/lists/oss-security/2021/06/16/3'}
| null |
GHSA
|
GHSA-4662-j96g-mv46
|
Arbitrary Code Injection in reduce-css-calc
|
Affected versions of `reduce-css-calc` pass input directly to `eval`. If user input is passed into the calc function, this may result in cross-site scripting on the browser, or remote code execution on the server.
## Proof of Concept
```
const reduceCSSCalc = require('reduce-css-calc');
console.log(reduceCSSCalc(`calc( (Buffer(10000)))`));
console.log(reduceCSSCalc(`calc( (global['fs'] = require('fs')))`));
console.log(reduceCSSCalc(`calc( (fs['readFileSync']("/etc/passwd", "utf-8")))`));
```
## Recommendation
Update to version 1.2.5 or later.
|
{'CVE-2016-10548'}
|
2021-01-08T21:15:11Z
|
2018-06-07T19:43:06Z
|
CRITICAL
| 0
|
{'CWE-94'}
|
{'https://www.npmjs.com/advisories/144', 'https://github.com/advisories/GHSA-4662-j96g-mv46', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10548', 'https://nodesecurity.io/advisories/144', 'https://gist.github.com/ChALkeR/415a41b561ebea9b341efbb40b802fc9'}
| null |
GHSA
|
GHSA-rp42-c45j-g46x
|
yetiforcecrm is vulnerable to Cross-site Scripting
|
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
|
{'CVE-2021-4107'}
|
2021-12-16T14:12:23Z
|
2021-12-16T14:12:23Z
|
MODERATE
| 5.3
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4107', 'https://github.com/advisories/GHSA-rp42-c45j-g46x', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89', 'https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8'}
| null |
GHSA
|
GHSA-hr3c-6mmp-6m39
|
Memory corruption slice-deque
|
An issue was discovered in the slice-deque crate before 0.1.16 for Rust. move_head_unchecked allows memory corruption because deque updates are mishandled.
|
{'CVE-2018-20995'}
|
2021-08-25T20:42:57Z
|
2021-08-25T20:42:57Z
|
CRITICAL
| 9.8
|
{'CWE-119'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20995', 'https://rustsec.org/advisories/RUSTSEC-2018-0008.html', 'https://github.com/advisories/GHSA-hr3c-6mmp-6m39'}
| null |
GHSA
|
GHSA-9c5c-5j4h-8q2c
|
bookstack is vulnerable to Improper Access Control.
|
bookstack prior to version 21.11.3 is vulnerable to Improper Access Control.
|
{'CVE-2021-4119'}
|
2022-01-04T19:34:01Z
|
2021-12-16T19:40:26Z
|
MODERATE
| 5.3
|
{'CWE-284'}
|
{'https://github.com/bookstackapp/bookstack/commit/e765e618547c92f4e0b46caca6fb91f0174efd99', 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4119', 'https://huntr.dev/bounties/135f2d7d-ab0b-4351-99b9-889efac46fca', 'https://github.com/advisories/GHSA-9c5c-5j4h-8q2c'}
| null |
GHSA
|
GHSA-pm3h-mm62-pwm8
|
XML Entity Expansion in trytond and proteus
|
An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.
|
{'CVE-2022-26662'}
|
2022-03-29T21:07:32Z
|
2022-03-11T00:02:04Z
|
HIGH
| 7.5
|
{'CWE-776'}
|
{'https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059', 'https://github.com/advisories/GHSA-pm3h-mm62-pwm8', 'https://www.debian.org/security/2022/dsa-5099', 'https://www.debian.org/security/2022/dsa-5098', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26662', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00016.html', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00017.html', 'https://bugs.tryton.org/issue11244'}
| null |
GHSA
|
GHSA-477x-w7m6-c6ph
|
Improper input validation in Apache Olingo
|
The AsyncResponseWrapperImpl class in Apache Olingo versions 4.0.0 to 4.6.0 reads the Retry-After header and passes it to the Thread.sleep() method without any check. If a malicious server returns a huge value in the header, then it can help to implement a DoS attack.
|
{'CVE-2019-17555'}
|
2021-08-19T16:52:56Z
|
2020-02-04T22:37:15Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-477x-w7m6-c6ph', 'https://github.com/apache/olingo-odata4/pull/61', 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d65UmudJ_MQkFXEv9YY_wwZbRA3sgtNDzMoLM51Qh%3DRCA%40mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17555', 'https://issues.apache.org/jira/browse/OLINGO-1411'}
| null |
GHSA
|
GHSA-m8h8-v6jh-c762
|
Incorrect buffer size in crossbeam-channel
|
An issue was discovered in the crossbeam-channel crate before 0.4.4 for Rust. It has incorrect expectations about the relationship between the memory allocation and how many iterator elements there are.
|
{'CVE-2020-35904'}
|
2021-08-25T20:49:43Z
|
2021-08-25T20:49:43Z
|
MODERATE
| 5.5
|
{'CWE-131'}
|
{'https://github.com/advisories/GHSA-m8h8-v6jh-c762', 'https://github.com/crossbeam-rs/crossbeam/pull/533', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35904', 'https://rustsec.org/advisories/RUSTSEC-2020-0052.html'}
| null |
GHSA
|
GHSA-5wq6-v5cw-jvfr
|
Malicious Package in js-shas
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:12:56Z
|
2020-09-03T23:03:36Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1285', 'https://github.com/advisories/GHSA-5wq6-v5cw-jvfr'}
| null |
GHSA
|
GHSA-w6v2-qchm-grj7
|
Insecure permissions on user namespace / fakeroot temporary rootfs in Singularity
|
### Impact
Insecure permissions on temporary directories used in fakeroot or user namespace container execution.
When a Singularity action command (run, shell, exec) is run with the fakeroot or user namespace option, Singularity will extract a container image to a temporary sandbox directory. Due to insecure permissions on the temporary directory it is possible for any user with access to the system to read the contents of the image. Additionally, if the image contains a world-writable file or directory, it is possible for a user to inject arbitrary content into the running container.
### Patches
This issue is addressed in Singularity 3.6.3.
All users are advised to upgrade to 3.6.3.
### Workarounds
The issue is mitigated if `TMPDIR` is set to a location that is only accessible to the user, as any subdirectories directly under `TMPDIR` cannot then be accessed by others. However, this is difficult to enforce so it is not recommended to rely on this as a mitigation.
### For more information
General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:
* [Singularity Slack Channel](https://bit.ly/2m0g3lX)
* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)
Any sensitive security concerns should be directed to: security@sylabs.io
See our Security Policy here: https://sylabs.io/security-policy
|
{'CVE-2020-25039'}
|
2022-04-19T19:02:34Z
|
2021-12-20T18:25:46Z
|
HIGH
| 8.1
|
{'CWE-668', 'CWE-732'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html', 'https://github.com/advisories/GHSA-w6v2-qchm-grj7', 'https://github.com/hpcng/singularity/security/advisories/GHSA-w6v2-qchm-grj7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25039', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html', 'https://medium.com/sylabs'}
| null |
GHSA
|
GHSA-w5q7-3pr9-x44w
|
Denial of Service in serialize-to-js
|
Versions of `serialize-to-js` prior to 2.0.0 are vulnerable to Denial of Service. User input is not properly validated, allowing attackers to provide inputs that lead the execution to loop indefinitely.
## Recommendation
Upgrade to version 2.0.0 or later.
| null |
2020-09-02T15:59:19Z
|
2020-09-02T15:59:19Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-w5q7-3pr9-x44w', 'https://www.npmjs.com/advisories/790'}
| null |
GHSA
|
GHSA-crfh-jmv2-2f9v
|
Malicious Package in singale
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T15:43:44Z
|
2020-09-03T17:03:11Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-crfh-jmv2-2f9v', 'https://www.npmjs.com/advisories/1411'}
| null |
GHSA
|
GHSA-7frv-9phw-vrvr
|
Authorization bypass in Strapi
|
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.
|
{'CVE-2020-27664'}
|
2021-05-10T18:43:59Z
|
2021-05-10T18:43:59Z
|
CRITICAL
| 9.8
|
{'CWE-862'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-27664', 'https://github.com/advisories/GHSA-7frv-9phw-vrvr', 'https://github.com/strapi/strapi/releases/tag/v3.2.5', 'https://github.com/strapi/strapi/pull/8442'}
| null |
GHSA
|
GHSA-24r8-fm9r-cpj2
|
Low severity vulnerability that affects com.linecorp.armeria:armeria
|
## Multiple timing attack vulnerabilities leading to the recovery of secrets based on the use of non-constant time compare function
### Impact
String comparison method in multiple authentication validation in Armeria were known to be vulnerable to timing attacks. This vulnerability is caused by the insecure implementation of `equals` method from `java.lang.String`. While this attack is not practically possible, an attacker still has a potential to attack if the victim's server validates user by using `equals` method.
We would like to thank @chrsow for pointing out the issue.
## Potentially vulnerable codes
https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/OAuth2Token.java#L54
https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/BasicToken.java#L64
### Patches
There are two options to patch this issue.
1. Remove `equals` method; it has been exclusively used for test cases and was never used in any OSS projects that are using Armeria. (But it is worth noting that there are possibilities of closed projects authenticating users by utilizing `equals` method)
2. Use `MessageDigest.isEqual` to compare the credential instead.
### Workarounds
1. Update to the latest version (TBD)
2-1. Users can prevent these vulnerabilities by modifying and implementing timing attack preventions by themselves.
2-2. Precisely speaking, it is possible to compare credentials by securely comparing them after calling methods to directly return the input (namely `Object. accessToken()`, `Object.username()` and `Object.password()`).
### References
- https://cwe.mitre.org/data/definitions/208.html
- https://security.stackexchange.com/questions/111040/should-i-worry-about-remote-timing-attacks-on-string-comparison
### Side Note
Since it is a theoretical attack, there is no PoC available from neither the vendor nor the security team.
|
{'CVE-2019-16771'}
|
2022-04-19T19:02:23Z
|
2019-12-05T18:40:51Z
|
LOW
| 4.8
|
{'CWE-113'}
|
{'https://github.com/advisories/GHSA-24r8-fm9r-cpj2', 'https://github.com/line/armeria/security/advisories/GHSA-24r8-fm9r-cpj2', 'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16771', 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'}
| null |
GHSA
|
GHSA-p2j7-6g9h-32xh
|
Cross site scripting in Shopizer
|
A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions v2.0.2 through v2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.
|
{'CVE-2022-23059'}
|
2022-04-12T21:59:09Z
|
2022-03-30T00:00:27Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23059', 'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059', 'https://github.com/advisories/GHSA-p2j7-6g9h-32xh'}
| null |
GHSA
|
GHSA-6768-mcjc-8223
|
Command injection leading to Remote Code Execution in Apache Storm
|
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.
|
{'CVE-2021-38294'}
|
2021-11-24T19:39:08Z
|
2021-10-27T18:51:22Z
|
CRITICAL
| 9.8
|
{'CWE-74', 'CWE-77'}
|
{'https://github.com/advisories/GHSA-6768-mcjc-8223', 'https://seclists.org/oss-sec/2021/q4/44', 'http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html', 'https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38294'}
| null |
GHSA
|
GHSA-q6j3-c4wc-63vw
|
CSRF tokens leaked in URL by canned query form
|
### Impact
The HTML form for a read-only canned query includes the hidden CSRF token field added in #798 for writable canned queries (#698).
This means that submitting those read-only forms exposes the CSRF token in the URL - for example on https://latest.datasette.io/fixtures/neighborhood_search submitting the form took me to:
https://latest.datasette.io/fixtures/neighborhood_search?text=down&csrftoken=CSRFTOKEN-HERE
This token could potentially leak to an attacker if the resulting page has a link to an external site on it and the user clicks the link, since the token would be exposed in the referral logs.
### Patches
A fix for this issue has been released in Datasette 0.46.
### Workarounds
You can fix this issue in a Datasette instance without upgrading by copying the [0.46 query.html template](https://raw.githubusercontent.com/simonw/datasette/0.46/datasette/templates/query.html) into a custom `templates/` directory and running Datasette with the `--template-dir=templates/` option.
### References
Issue 918 discusses this in details: https://github.com/simonw/datasette/issues/918
### For more information
Contact swillison at gmail with any questions.
| null |
2021-09-23T18:50:16Z
|
2020-08-11T14:54:40Z
|
MODERATE
| 4.3
|
{'CWE-200'}
|
{'https://github.com/simonw/datasette/issues/918', 'https://github.com/simonw/datasette/security/advisories/GHSA-q6j3-c4wc-63vw', 'https://github.com/simonw/datasette/commit/7f10f0f7664d474c1be82bf668829e3b736a3d2b', 'https://github.com/advisories/GHSA-q6j3-c4wc-63vw', 'https://snyk.io/vuln/SNYK-PYTHON-DATASETTE-598229'}
| null |
GHSA
|
GHSA-hpm9-fx8v-w45v
|
Plaintext storage in Jenkins instant-messaging Plugin
|
Jenkins instant-messaging Plugin 1.41 and earlier stores passwords for group chats unencrypted in the global configuration file of plugins based on Jenkins instant-messaging Plugin on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
|
{'CVE-2022-28135'}
|
2022-04-12T21:59:29Z
|
2022-03-30T00:00:25Z
|
MODERATE
| 6.5
|
{'CWE-256'}
|
{'https://github.com/advisories/GHSA-hpm9-fx8v-w45v', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2161', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28135'}
| null |
GHSA
|
GHSA-wx77-rp39-c6vg
|
Regular Expression Denial of Service in markdown
|
All versions of `markdown` are vulnerable to Regular Expression Denial of Service (ReDoS). The `markdown.toHTML()` function has significantly degraded performance when parsing long strings containing underscores. This may lead to Denial of Service if the parser accepts user input.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2022-03-24T22:10:14Z
|
2020-09-04T15:11:03Z
|
LOW
| 0
|
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/1330', 'https://github.com/advisories/GHSA-wx77-rp39-c6vg'}
| null |
GHSA
|
GHSA-284f-f2hw-j2gx
|
Server-Side Request Forgery vulnerability in concrete5
|
A Server-Side Request Forgery vulnerability was found in concrete5 < 8.5.5 that allowed a decimal notation encoded IP address to bypass the limitations in place for localhost allowing interaction with local services. Impact can vary depending on services exposed.
|
{'CVE-2021-22958'}
|
2021-10-18T18:15:51Z
|
2021-10-12T18:41:59Z
|
HIGH
| 8.2
|
{'CWE-918'}
|
{'https://hackerone.com/reports/863221', 'https://github.com/advisories/GHSA-284f-f2hw-j2gx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22958', 'https://github.com/concrete5/concrete5/pull/8826', 'https://documentation.concretecms.org/developers/introduction/version-history/855-release-notes'}
| null |
GHSA
|
GHSA-f8xq-q7px-wg8c
|
Improper Neutralization of Formula Elements in a CSV File in Gradio Flagging
|
### Impact
The `gradio` library has a flagging functionality which saves input/output data into a CSV file on the developer's computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a file, then it automatically runs these commands, which could lead to arbitrary commands running on the user's computer.
### Patches
The problem has been patched as of `2.8.11`, which escapes the data saved to the csv with single quotes.
### Workarounds
If you are using an older version of `gradio`, don't open csv files generated by `gradio` with Excel or similar spreadsheet programs.
|
{'CVE-2022-24770'}
|
2022-03-22T12:44:43Z
|
2022-03-18T23:11:43Z
|
HIGH
| 8.8
|
{'CWE-1236'}
|
{'https://github.com/advisories/GHSA-f8xq-q7px-wg8c', 'https://github.com/gradio-app/gradio/security/advisories/GHSA-f8xq-q7px-wg8c', 'https://github.com/gradio-app/gradio/pull/817', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24770', 'https://github.com/gradio-app/gradio/commit/80fea89117358ee105973453fdc402398ae20239'}
| null |
GHSA
|
GHSA-fqr5-qphf-vfr8
|
Cross Site Scripting (XSS) in Simiki
|
Cross Site Scripting (XSS) in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary code via line 54 of the component 'simiki/blob/master/simiki/generators.py'.
|
{'CVE-2020-19000'}
|
2021-09-02T18:52:59Z
|
2021-09-01T18:37:01Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-19000', 'https://github.com/advisories/GHSA-fqr5-qphf-vfr8', 'https://github.com/tankywoo/simiki/issues/123'}
| null |
GHSA
|
GHSA-3pcq-34w5-p4g2
|
forEachSeries and forEachLimit do not limit the number of requests
|
### Impact
This is a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects.
### Patches
The problem has been patched in 1.0.4.
### Workarounds
There is no workaround aside from upgrading to 1.0.4.
|
{'CVE-2021-41167'}
|
2021-10-27T17:05:59Z
|
2021-10-21T17:49:30Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/nicolas-van/modern-async/issues/5', 'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436', 'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167', 'https://github.com/advisories/GHSA-3pcq-34w5-p4g2'}
| null |
GHSA
|
GHSA-pm77-c4q7-3fwj
|
Improper Certificate Validation in Heartland & Global Payments PHP SDK
|
Gateways/Gateway.php in Heartland & Global Payments PHP SDK before 2.0.0 does not enforce SSL certificate validations.
|
{'CVE-2019-20455'}
|
2021-11-18T15:27:11Z
|
2021-10-12T16:31:12Z
|
MODERATE
| 5.9
|
{'CWE-295'}
|
{'https://github.com/globalpayments/php-sdk/compare/1.3.3...2.0.0', 'https://github.com/globalpayments/php-sdk/pull/8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20455', 'https://github.com/advisories/GHSA-pm77-c4q7-3fwj', 'https://github.com/globalpayments/php-sdk/pull/8/commits/c86e18f28c5eba0d6ede7d557756d978ea83d3c9', 'https://github.com/globalpayments/php-sdk/releases/tag/2.0.0', 'https://winterdragon.ca/global-payments-vulnerability/'}
| null |
GHSA
|
GHSA-4mf2-f3wh-gvf2
|
Subdomain checking of whitelisted domains could allow unintended redirects in oauth2-proxy
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
For users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect.
For example, if a whitelist domain was configured for `.example.com`, the intention is that subdomains of `example.com` are allowed.
Instead, `example.com` and `badexample.com` could also match.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
This is fixed in version 7.0.0 onwards.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain.
# Original Issue Posted by @semoac:
Whitelist Domain feature is not working as expected because is not matching a dot to ensure the redirect is a subdomain.
## Expected Behavior
If whitelist domain is set to `.example.com` , then `hack.alienexample.com` should be rejected as a valid redirect.
## Current Behavior
The code is removing the `dot` from `.example.com` and only checking if the redirect string end with `example.com`
## Possible Solution
Here
https://github.com/oauth2-proxy/oauth2-proxy/blob/c377466411f2aee180a732187edb638f2f7e57fb/oauthproxy.go#L661
Include the dot when checking the string:
```
strings.HasSuffix(redirectHostname, "." + domainHostname)
```
## Steps to Reproduce (for bugs)
```
package main
import (
"fmt"
"strings"
)
func validOptionalPort(port string) bool {
if port == "" || port == ":*" {
return true
}
if port[0] != ':' {
return false
}
for _, b := range port[1:] {
if b < '0' || b > '9' {
return false
}
}
return true
}
func splitHostPort(hostport string) (host, port string) {
host = hostport
colon := strings.LastIndexByte(host, ':')
if colon != -1 && validOptionalPort(host[colon:]) {
host, port = host[:colon], host[colon+1:]
}
if strings.HasPrefix(host, "[") && strings.HasSuffix(host, "]") {
host = host[1 : len(host)-1]
}
return
}
func main() {
domain := ".example.com"
domainHostname, _ := splitHostPort(strings.TrimLeft(domain, "."))
redirectHostname := "https://hack.alienexample.com"
if (strings.HasPrefix(domain, ".") && strings.HasSuffix(redirectHostname, domainHostname)) { fmt.Println("This should not have happen.")}
}
```
Users of `github.com/oauth2-proxy/oauth2-proxy` are advised to update to `github.com/oauth2-proxy/oauth2-proxy/v7`
|
{'CVE-2021-21291'}
|
2022-04-19T19:02:40Z
|
2021-05-25T18:42:20Z
|
LOW
| 5.4
|
{'CWE-601'}
|
{'https://github.com/advisories/GHSA-4mf2-f3wh-gvf2', 'https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7', 'https://github.com/oauth2-proxy/oauth2-proxy/commit/780ae4f3c99b579cb2ea9845121caebb6192f725', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21291', 'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.0.0', 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-4mf2-f3wh-gvf2'}
| null |
GHSA
|
GHSA-c8x3-rg72-fwwg
|
Privilege escalation in Hashicorp Nomad
|
HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4.
|
{'CVE-2021-37218'}
|
2021-09-14T18:46:55Z
|
2021-09-08T20:14:38Z
|
HIGH
| 8.8
|
{'CWE-295'}
|
{'https://github.com/advisories/GHSA-c8x3-rg72-fwwg', 'https://www.hashicorp.com/blog/category/nomad', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37218', 'https://discuss.hashicorp.com/t/hcsec-2021-21-nomad-raft-rpc-privilege-escalation/29023'}
| null |
GHSA
|
GHSA-5c6f-jpx7-cwq6
|
Directory Traversal in enserver
|
Affected versions of `enserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16209'}
|
2021-01-14T15:42:35Z
|
2020-09-01T18:13:11Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-5c6f-jpx7-cwq6', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/enserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16209', 'https://nodesecurity.io/advisories/425', 'https://www.npmjs.com/advisories/425'}
| null |
GHSA
|
GHSA-vx9g-377x-xwxq
|
Server side request forgery in gibbon
|
Gibbon v3.4.3 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL. This issue has been resolved in version 3.4.4
|
{'CVE-2022-27311'}
|
2022-05-02T22:31:39Z
|
2022-04-26T00:00:41Z
|
HIGH
| 0
|
{'CWE-918'}
|
{'https://github.com/amro/gibbon/pull/321', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27311', 'https://github.com/advisories/GHSA-vx9g-377x-xwxq', 'https://github.com/amro/gibbon/pull/321#issuecomment-1113147155'}
| null |
GHSA
|
GHSA-jp99-5h8w-gmxc
|
Sandbox Breakout / Arbitrary Code Execution in @zhaoyao91/eval-in-vm
|
All versions of `@zhaoyao91/eval-in-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-09-04T15:03:13Z
|
2020-09-04T15:03:13Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/1320', 'https://github.com/advisories/GHSA-jp99-5h8w-gmxc'}
| null |
GHSA
|
GHSA-cvmr-6428-87w9
|
Cross-Site Scripting in Grav
|
### Impact
Privileged users (with the ability to edit pages) have a mechanism to perform remote code execution via XSS. At a minimum, the vulnerability represents a bypass of security controls put in place to mitigate this form of attack.
The remote code execution can be performed because XSS would allow an attacker to execute functionality on behalf of a stolen administrative account - the facility to install custom plugins would then allow said attacker to install a plugin containing a web shell and thus garner access to the underlying system.
### References
https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)
https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html
https://cwe.mitre.org/data/definitions/79.html
### For more information
Please contact contact@pentest.co.uk
| null |
2022-04-19T19:02:39Z
|
2020-12-10T23:13:08Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-cvmr-6428-87w9', 'https://github.com/getgrav/grav/security/advisories/GHSA-cvmr-6428-87w9'}
| null |
GHSA
|
GHSA-6x8c-mvpv-5366
|
Directory Traversal in shit-server
|
Affected versions of `shit-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16147'}
|
2021-01-14T15:41:23Z
|
2020-09-01T18:18:32Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/shit-server', 'https://www.npmjs.com/advisories/430', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16147', 'https://github.com/advisories/GHSA-6x8c-mvpv-5366', 'https://nodesecurity.io/advisories/430'}
| null |
GHSA
|
GHSA-2c83-wfv3-q25f
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ZMarkdown
|
### Impact
A Remote Command Execution vulnerability was found in the rebber module,
which allowed execution of arbitrary commands. The reported problem came
from CodeBlocks, which could be escaped to insert malicious LaTeX.
Anyone using `rebber` without sanitation of code content or a custom
macro is impacted by this vulnerability. Here is an example of a Markdown
content that will exploit the vulnerability:
````markdown
```
\end{CodeBlock}
\immediate\write18{COMMAND > outputrce}
\input{outputrce}
\begin{CodeBlock}{text}
```
````
Will insert into the generated LaTeX the result of executing
`COMMAND` on the system.
### Patches
The vulnerability has been patched in version 5.2.1.
If impacted, you should update to this version as soon as possible.
### Workarounds
It is possible to mitigate the vulnerability without upgrading by using a
custom code macro. Please make sure this custom macro escapes your
closing LaTeX sequence. For the example above, use:
```javascript
const escaped = content.replace(new RegExp('\\\\end\\s*{CodeBlock}', 'g'), '')
```
### For more information
If you have any questions or comments about this advisory, open an issue in [ZMarkdown](https://github.com/zestedesavoir/zmarkdown/issues).
| null |
2022-04-19T19:03:07Z
|
2021-09-07T23:07:56Z
|
CRITICAL
| 0
|
{'CWE-78'}
|
{'https://github.com/zestedesavoir/zmarkdown/security/advisories/GHSA-2c83-wfv3-q25f', 'https://github.com/advisories/GHSA-2c83-wfv3-q25f'}
| null |
GHSA
|
GHSA-j8fq-86c5-5v2r
|
Remote code execution in dask
|
An issue was discovered in Dask (aka python-dask) through 2021.09.1. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.
|
{'CVE-2021-42343'}
|
2022-03-21T19:58:45Z
|
2021-10-27T18:53:48Z
|
CRITICAL
| 9.8
|
{'CWE-668'}
|
{'https://github.com/dask/distributed/pull/5427', 'https://docs.dask.org/en/latest/changelog.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42343', 'https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr', 'https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b', 'https://github.com/advisories/GHSA-j8fq-86c5-5v2r'}
| null |
GHSA
|
GHSA-h595-8pw6-5q6v
|
Inadequate Encryption Strength in DotNetNuke
|
DNN (aka DotNetNuke) 9.2 through 9.2.1 uses a weak encryption algorithm to protect input parameters.
|
{'CVE-2018-15811'}
|
2021-08-17T17:50:15Z
|
2019-07-05T21:08:36Z
|
HIGH
| 7.5
|
{'CWE-326'}
|
{'https://www.dnnsoftware.com/community/security/security-center', 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15811', 'https://github.com/dnnsoftware/Dnn.Platform/releases', 'https://github.com/advisories/GHSA-h595-8pw6-5q6v'}
| null |
GHSA
|
GHSA-8r4g-cg4m-x23c
|
Denial of Service in node-static
|
All versions of node-static are vulnerable to a Denial of Service. The package fails to catch an exception when user input includes null bytes. This allows attackers to access `http://host/%00` and crash the server.
| null |
2021-09-22T18:24:27Z
|
2021-09-22T18:22:02Z
|
MODERATE
| 0
|
{'CWE-248', 'CWE-400'}
|
{'https://www.npmjs.com/advisories/1208', 'https://github.com/advisories/GHSA-8r4g-cg4m-x23c', 'https://github.com/cloudhead/node-static/blob/643a528ec7bbd05a59c4030655d94810570afb3f/CHANGES.md#-unreleased', 'https://github.com/cloudhead/node-static/pull/213', 'https://www.npmjs.com/package/node-static'}
| null |
GHSA
|
GHSA-gc25-3vc5-2jf9
|
Sandbox Breakout / Arbitrary Code Execution in sandbox
|
All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-09-04T15:00:58Z
|
2020-09-04T15:00:58Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/1318', 'https://github.com/advisories/GHSA-gc25-3vc5-2jf9'}
| null |
GHSA
|
GHSA-7p7h-4mm5-852v
|
Regular Expression Denial of Service in trim-newlines
|
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
|
{'CVE-2021-33623'}
|
2022-05-04T03:06:55Z
|
2021-06-07T22:10:39Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-7p7h-4mm5-852v', 'https://www.npmjs.com/package/trim-newlines', 'https://security.netapp.com/advisory/ntap-20210702-0007/', 'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33623', 'https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1'}
| null |
GHSA
|
GHSA-72mh-269x-7mh5
|
Improper Certificate Validation in xmlhttprequest-ssl
|
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
|
{'CVE-2021-31597'}
|
2021-06-21T22:10:22Z
|
2021-05-24T19:52:55Z
|
CRITICAL
| 9.4
|
{'CWE-295'}
|
{'https://github.com/mjwwit/node-XMLHttpRequest/compare/v1.6.0...1.6.1', 'https://security.netapp.com/advisory/ntap-20210618-0004/', 'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31597', 'https://people.kingsds.network/wesgarland/xmlhttprequest-ssl-vuln.txt', 'https://github.com/advisories/GHSA-72mh-269x-7mh5'}
| null |
GHSA
|
GHSA-3r8f-gphx-9m2c
|
Path Traversal in mcstatic
|
All versions of `mcstatic` are vulnerable to path traversal.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
|
{'CVE-2018-3730'}
|
2021-01-08T20:00:20Z
|
2018-07-27T17:04:16Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://hackerone.com/reports/312907', 'https://github.com/advisories/GHSA-3r8f-gphx-9m2c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3730', 'https://www.npmjs.com/advisories/641'}
| null |
GHSA
|
GHSA-r74q-wqx8-2pr3
|
Downloads Resources over HTTP in nodeschnaps
|
Affected versions of `nodeschnaps` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nodeschnaps`.
## Recommendation
Update to version 1.0.3 or later.
|
{'CVE-2016-10622'}
|
2021-01-08T01:58:09Z
|
2019-02-18T23:47:31Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/212', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10622', 'https://www.npmjs.com/advisories/212', 'https://github.com/advisories/GHSA-r74q-wqx8-2pr3'}
| null |
GHSA
|
GHSA-4284-x26r-4hhc
|
Cross Site Request Forgery in Apache JSPWiki
|
Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later.
|
{'CVE-2022-24947'}
|
2022-03-07T13:37:11Z
|
2022-02-26T00:00:44Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://lists.apache.org/thread/txrgykjkpt80t57kzpbjo8kfrv8ss02c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24947', 'http://www.openwall.com/lists/oss-security/2022/02/25/1', 'https://github.com/advisories/GHSA-4284-x26r-4hhc'}
| null |
GHSA
|
GHSA-h45p-w933-jxh3
|
Improper Verification of Cryptographic Signature in aws-encryption-sdk-javascript
|
### Impact
This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages.
This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages.
For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit.
Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data.
### Patches
Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues.
Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
### Workarounds
None
### For more information
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
| null |
2021-06-01T21:20:22Z
|
2021-06-01T21:20:22Z
|
MODERATE
| 0
|
{'CWE-347'}
|
{'https://github.com/aws/aws-encryption-sdk-javascript/security/advisories/GHSA-h45p-w933-jxh3', 'https://github.com/advisories/GHSA-h45p-w933-jxh3'}
| null |
GHSA
|
GHSA-wfm4-pq59-wg6r
|
Reset Password / Login vulnerability in Sulu
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
This vulnerability consists of a few related issues:
#### Forget password leaks information if the user exists
When the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist:
```json
{
"code": 0,
"message": "Entity with the type \u0022Sulu\\Bundle\\SecurityBundle\\Entity\\User\u0022 and the id \u0022asdf\u0022 not found."
}
```
This enables attackers to retrieve valid usernames.
#### Forgot password leaks user email if user exists
The response of the "Forgot Password" request returns the email address to which the email was sent, if the operation was successful:
```json
{"email":"admin@localhost.local"}
```
This information should not be exposed, as it can be used to gather email addresses.
#### Response time of login gives hint if the username exists
If the username the user enters in the login screen does not exists, the request responds much faster than if the username exists. This again allows attackers to retrieve valid usernames.
#### Reset Token for Forgot Password feature is not hashed
The reset token in the user database table is not hashed. That means that somebody could try to request a new password using the Forgot Password feature, and look that up in the database, if the attacker somehow got access to the database. Hashing the reset token would fix that problem.
### Patches
This problem was fixed in Release 1.6.34, 2.0.10 and 2.1.1.
### Workarounds
Override the files manually in your project and change them accordingly.
|
{'CVE-2020-15132'}
|
2022-04-19T19:02:32Z
|
2020-08-05T21:27:44Z
|
MODERATE
| 5.3
|
{'CWE-209'}
|
{'https://github.com/sulu/sulu/commit/0fbb6009eb6a8efe63b7e3f3b4b886dc54bb2326', 'https://github.com/advisories/GHSA-wfm4-pq59-wg6r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15132', 'https://github.com/sulu/sulu/security/advisories/GHSA-wfm4-pq59-wg6r'}
| null |
GHSA
|
GHSA-q4m3-2j7h-f7xw
|
Cross-Site Scripting in jquery
|
Versions of `jquery` prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 1.9.0 or later.
|
{'CVE-2020-7656'}
|
2021-08-25T21:11:29Z
|
2020-05-20T16:18:01Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-q4m3-2j7h-f7xw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7656', 'https://www.npmjs.com/advisories/1524', 'https://security.netapp.com/advisory/ntap-20200528-0001/', 'https://snyk.io/vuln/SNYK-JS-JQUERY-569619'}
| null |
GHSA
|
GHSA-p75j-wc34-527c
|
Exposure of Sensitive Information to an Unauthorized Actor in ansible
|
A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.
|
{'CVE-2019-10217'}
|
2021-10-12T16:31:59Z
|
2021-10-12T16:31:59Z
|
MODERATE
| 6.5
|
{'CWE-200'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10217', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10217', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html', 'https://github.com/advisories/GHSA-p75j-wc34-527c', 'https://github.com/ansible/ansible/issues/56269', 'https://github.com/ansible/ansible/pull/59427'}
| null |
GHSA
|
GHSA-434h-p4gx-jm89
|
Observable Response Discrepancy in Flask-AppBuilder
|
### Impact
User enumeration in database authentication in Flask-AppBuilder <= 3.2.3. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in.
### Patches
Upgrade to 3.3.0
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Flask-AppBuilder](https://github.com/dpgaspar/Flask-AppBuilder)
|
{'CVE-2021-29621'}
|
2022-04-19T19:02:56Z
|
2021-05-27T18:38:36Z
|
MODERATE
| 5.3
|
{'CWE-203'}
|
{'https://lists.apache.org/thread.html/r5b754118ba4e996adf03863705d34168bffec202da5c6bdc9bf3add5@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r466759f377651f0a690475d5a52564d0e786e82c08d5a5730a4f8352@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-434h-p4gx-jm89', 'https://lists.apache.org/thread.html/r91067f953906d93aaa1c69fe2b5472754019cc6bd4f1ba81349d62a0@%3Ccommits.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29621', 'https://github.com/dpgaspar/Flask-AppBuilder/commit/780bd0e8fbf2d36ada52edb769477e0a4edae580', 'https://pypi.org/project/Flask-AppBuilder/', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-434h-p4gx-jm89'}
| null |
GHSA
|
GHSA-6qpr-9mc5-7gch
|
Command Injection in async-git
|
The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb')
|
{'CVE-2020-28490'}
|
2021-07-28T18:03:47Z
|
2021-04-12T19:50:20Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28490', 'https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877', 'https://github.com/advisories/GHSA-6qpr-9mc5-7gch', 'https://www.npmjs.com/package/async-git', 'https://github.com/omrilotan/async-git/pull/14', 'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'}
| null |
GHSA
|
GHSA-cfc5-x58f-869w
|
Malicious Package in conistring
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:59:52Z
|
2020-09-03T19:40:55Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1389', 'https://github.com/advisories/GHSA-cfc5-x58f-869w'}
| null |
GHSA
|
GHSA-p826-8vhq-h439
|
Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19
|
Insecure temporary directory usage in frontend build functionality of `com.vaadin:flow-server` versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds.
- https://vaadin.com/security/cve-2021-31411
|
{'CVE-2021-31411'}
|
2021-05-19T17:41:46Z
|
2021-05-06T15:27:12Z
|
HIGH
| 6.3
|
{'CWE-379'}
|
{'https://vaadin.com/security/cve-2021-31411', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31411', 'https://github.com/advisories/GHSA-p826-8vhq-h439', 'https://github.com/vaadin/platform/security/advisories/GHSA-p826-8vhq-h439', 'https://github.com/vaadin/flow/pull/10640'}
| null |
GHSA
|
GHSA-fx5p-f64h-93xc
|
Opened exploitable ports in default docker-compose.yaml in go-ipfs
|
### Impact
Allows admin API access to the IPFS node.
### Who ?
This affects people running the [docker-compose.yaml](https://github.com/ipfs/go-ipfs/blob/master/docker-compose.yaml) service in an environment where the docker host is directly attached to a public or untrusted IP. In the vulnerable version, the private API endpoint is publicly forwarded by exposing it as `0.0.0.0:5001` on the host machine.
If the host machine is hidden behind a firewall or NAT (and the LAN is trusted for NAT), this is not an immediate issue because of the protection from the firewall or NAT. That said, we still recommend users update to follow security best practices of not putting unnecessary dependency on a working firewall.
### Patches
This issue is in [docker-compose.yaml](https://github.com/ipfs/go-ipfs/blob/master/docker-compose.yaml). Users need to replace their current `docker-compose.yaml` file with a version `0.12.1` or later.
There is no need to update any of the binaries. Users running previous versions like `0.12.0` or earlier can download the `0.12.1` `docker-compose.yaml` file. You can replace a vulnerable `docker-compose.yaml` file with a the new one with:
```
curl https://raw.githubusercontent.com/ipfs/go-ipfs/v0.12.1/docker-compose.yaml > docker-compose.yaml
```
### How to test if you are vulnerable
#### Binding check on the host
On the host machine, while IPFS is running, run as root:
```bash
netstat -lnp | grep ":5001"
```
The output will be a list of listeners bound to `:5001`.
You then need to check that those listeners are private and preferably even localhost IPs.
⚠️ If this listener is on `0.0.0.0` or a public IP you are very likely vulnerable.
#### Remote hailing
While IPFS is running, you can try to contact the API from a remote machine. (Replace `1.2.3.4` with your node public IP. Or if you want to test in an untrusted NAT, then substitute the LAN IP instead.)
```bash
curl -X POST http://1.2.3.4:5001/api/v0/version
```
⚠️ If you see any json outputted (e.g., `{"Commit": "<string>","Golang": "<string>","Repo": "<string>","System": "<string>","Version": "<string>"}`), then you are vulnerable.
If it **fails**, then you are safe.
### For more information
If you have any questions or comments about this advisory:
* Please first read https://docs.ipfs.io/reference/http/api/ about best practices
* Ask in [IPFS Discord #ipfs-chatter](https://discord.gg/ipfs)
* Open an issue in [go-ipfs](https://github.com/ipfs/go-ipfs)
| null |
2022-04-22T17:29:19Z
|
2022-04-04T21:23:55Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-fx5p-f64h-93xc', 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-fx5p-f64h-93xc', 'https://github.com/ipfs/go-ipfs/releases/tag/v0.12.1', 'https://github.com/ipfs/go-ipfs/commit/816a128aaf963d72c4930852ce32b9a4e31924a1', 'https://github.com/ipfs/go-ipfs/pull/8773'}
| null |
GHSA
|
GHSA-65j7-66p7-9xgf
|
Malicious Package in font-scrubber
|
Version 1.2.2 of `font-scrubber` contains malicious code as a postinstall script. The package attempts to upload sensitive files from the system to a remote server. The files include configuration files, command history logs, SSH keys and /etc/passwd.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:59:50Z
|
2020-09-02T21:51:55Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-65j7-66p7-9xgf', 'https://www.npmjs.com/advisories/919'}
| null |
GHSA
|
GHSA-rv7p-mmwq-x674
|
Improper Input Validation and Code Injection in pdf-image
|
Lack of input validation in pdf-image npm package version <= 2.0.0 may allow an attacker to run arbitrary code if PDF file path is constructed based on untrusted user input.
|
{'CVE-2020-8132'}
|
2021-05-10T18:46:58Z
|
2021-05-10T18:46:58Z
|
HIGH
| 9.8
|
{'CWE-94', 'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8132', 'https://github.com/advisories/GHSA-rv7p-mmwq-x674', 'https://hackerone.com/reports/781664'}
| null |
GHSA
|
GHSA-7x22-pmw5-66mq
|
Cross-site Scripting in showdoc
|
Stored XSS via upload attachment with format .svg in File Library.
|
{'CVE-2021-4172'}
|
2022-02-01T00:44:14Z
|
2022-02-01T00:44:14Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/star7th/showdoc/commit/409c8a1208bbb847046a9496303192980f2e6219', 'https://huntr.dev/bounties/c041b693-877b-4456-b463-19e4c9456eee', 'https://github.com/advisories/GHSA-7x22-pmw5-66mq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4172'}
| null |
GHSA
|
GHSA-2mxr-89gf-rc4v
|
Read permissions not enforced for client provided filter expressions in Elide.
|
### Impact
It is possible for an adversary to "guess and check" the value of a model field they do not have access to assuming they can read at least one other field in the model. The adversary can construct filter expressions for an inaccessible field to filter a collection. The presence or absence of models in the returned collection can be used to reconstruct the value of the inaccessible field.
For example, a User model has two fields: _name_ and _role_. The adversary has read permissions to see the _name_ field of the User collection but not the _role_. By constructing a filter like the one below, the adversary can determine which users have admin role by presence or absence in the returned collection:
`filter=role=="Admin"`
### Patches
Resolved in Elide 4.5.14 and greater.
### Workarounds
The adversary can only access the fields if a model includes fields with different read permission levels (some less secure and some more secure). Model security can be adjusted by restricting read permissions on existing models.
### References
Fixed in https://github.com/yahoo/elide/pull/1236
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [elide](https://github.com/yahoo/elide)
* Contact us at [spectrum](https://spectrum.chat/elide?tab=posts)
|
{'CVE-2020-5289'}
|
2021-01-08T20:25:20Z
|
2020-03-30T20:09:58Z
|
HIGH
| 6.8
|
{'CWE-285'}
|
{'https://github.com/advisories/GHSA-2mxr-89gf-rc4v', 'https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5289', 'https://github.com/yahoo/elide/security/advisories/GHSA-2mxr-89gf-rc4v', 'https://github.com/yahoo/elide/pull/1236'}
| null |
GHSA
|
GHSA-6xm4-p6r2-mwrc
|
Malicious Package in cuffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:14:13Z
|
2020-09-03T22:47:30Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1270', 'https://github.com/advisories/GHSA-6xm4-p6r2-mwrc'}
| null |
GHSA
|
GHSA-5796-p3m6-9qj4
|
Denial of Service (DoS) in Cloud Foundry Routing
|
Cloud Foundry Routing, all versions before 0.193.0, does not properly validate nonce input. A remote unauthorized malicious user could forge a route service request using an invalid nonce that will cause the Gorouter to crash.
|
{'CVE-2019-11289'}
|
2021-05-18T15:31:39Z
|
2021-05-18T15:31:39Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://www.cloudfoundry.org/blog/cve-2019-11289', 'https://github.com/advisories/GHSA-5796-p3m6-9qj4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11289'}
| null |
GHSA
|
GHSA-3jfq-g458-7qm9
|
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization
|
### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`.
This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite.
### Patches
3.2.2 || 4.4.14 || 5.0.6 || 6.1.1
NOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case.
### Workarounds
Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths.
```js
const path = require('path')
const tar = require('tar')
tar.x({
file: 'archive.tgz',
// either add this function...
onentry: (entry) => {
if (path.isAbsolute(entry.path)) {
entry.path = sanitizeAbsolutePathSomehow(entry.path)
entry.absolute = path.resolve(entry.path)
}
},
// or this one
filter: (file, entry) => {
if (path.isAbsolute(entry.path)) {
return false
} else {
return true
}
}
})
```
Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.
|
{'CVE-2021-32804'}
|
2022-03-11T20:21:31Z
|
2021-08-03T19:06:36Z
|
HIGH
| 8.2
|
{'CWE-22'}
|
{'https://www.npmjs.com/package/tar', 'https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9', 'https://www.npmjs.com/advisories/1770', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32804', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4', 'https://github.com/advisories/GHSA-3jfq-g458-7qm9'}
| null |
GHSA
|
GHSA-hf44-3mx6-vhhw
|
Navigate endpoint is vulnerable to regex injection that may lead to Denial of Service.
|
### Impact
The regex injection that may lead to Denial of Service.
### Patches
Will be patched in 2.4 and 3.0
### Workarounds
Versions lower than 2.x are only affected if the navigation module is added
### References
See this pull request for the fix: https://github.com/graphhopper/graphhopper/pull/2304
If you have any questions or comments about this advisory please [send us an Email](https://www.graphhopper.com/contact-form/) or create a topic [here](https://discuss.graphhopper.com/).
|
{'CVE-2021-29506'}
|
2022-04-19T19:02:56Z
|
2021-05-19T23:02:57Z
|
MODERATE
| 6.5
|
{'CWE-400'}
|
{'https://github.com/graphhopper/graphhopper/pull/2304', 'https://github.com/graphhopper/graphhopper/commit/eb189be1fa7443ebf4ae881e737a18f818c95f41', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29506', 'https://github.com/graphhopper/graphhopper/security/advisories/GHSA-hf44-3mx6-vhhw', 'https://github.com/advisories/GHSA-hf44-3mx6-vhhw'}
| null |
GHSA
|
GHSA-gc6c-5v9w-xmhw
|
Downloads Resources over HTTP in nodewebkit
|
Affected versions of `nodewebkit` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nodewebkit`.
## Recommendation
No patch is currently available, and the package author has deprecated this package.
The best path forward in mitigating this vulnerability is to use the [official installer](https://www.npmjs.com/nw) instead of this package, as per the package author's instructions.
|
{'CVE-2016-10580'}
|
2021-01-08T18:48:14Z
|
2019-02-18T23:51:27Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10580', 'https://nodesecurity.io/advisories/173', 'https://www.npmjs.com/advisories/173', 'https://github.com/advisories/GHSA-gc6c-5v9w-xmhw'}
| null |
GHSA
|
GHSA-xwqw-rf2q-xmhf
|
Cross-Site Scripting in buefy
|
Versions of buefy prior to 0.7.2 are vulnerable to Cross-Site Scripting, allowing attackers to manipulate the DOM and execute remote code. The autocomplete list renders user input as HTML without encoding.
## Recommendation
Upgrade to version 0.7.2 or later.
| null |
2021-09-24T22:00:39Z
|
2020-09-01T21:23:38Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-xwqw-rf2q-xmhf', 'https://www.npmjs.com/advisories/747', 'https://github.com/buefy/buefy/issues/1097'}
| null |
GHSA
|
GHSA-xgr2-v94m-rc9g
|
High severity vulnerability that affects activesupport
|
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
|
{'CVE-2013-0333'}
|
2021-09-21T22:32:53Z
|
2017-10-24T18:33:37Z
|
HIGH
| 0
| null |
{'http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0333', 'https://puppet.com/security/cve/cve-2013-0333', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source&output=gplain', 'http://www.kb.cert.org/vuls/id/628463', 'http://rhn.redhat.com/errata/RHSA-2013-0203.html', 'http://www.debian.org/security/2013/dsa-2613', 'http://rhn.redhat.com/errata/RHSA-2013-0202.html', 'http://support.apple.com/kb/HT5784', 'http://rhn.redhat.com/errata/RHSA-2013-0201.html', 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/', 'https://github.com/advisories/GHSA-xgr2-v94m-rc9g'}
| null |
GHSA
|
GHSA-4pmg-jgm5-3jg6
|
Malicious Package in erquest
|
All versions of `erquest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-09-30T21:14:54Z
|
2020-09-02T21:16:26Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-4pmg-jgm5-3jg6', 'https://www.npmjs.com/advisories/871'}
| null |
GHSA
|
GHSA-fm87-46vv-jqrr
|
Path Traversal in html-pages
|
Versions of `html-pages` before 2.1.0 are vulnerable to path traversal.
## Recommendation
Update to version 2.1.0 or later.
|
{'CVE-2018-3744'}
|
2021-01-08T18:52:20Z
|
2018-09-18T13:45:07Z
|
HIGH
| 0
|
{'CWE-35'}
|
{'https://hackerone.com/reports/306607', 'https://github.com/advisories/GHSA-fm87-46vv-jqrr', 'https://www.npmjs.com/advisories/665', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3744', 'https://github.com/danielcardoso/html-pages/issues/2'}
| null |
GHSA
|
GHSA-4wj3-p7hj-cvx8
|
Double free in ordnung
|
An issue was discovered in the ordnung crate through 2020-09-03 for Rust. compact::Vec violates memory safety via a remove() double free.
|
{'CVE-2020-35891'}
|
2021-08-25T20:48:47Z
|
2021-08-25T20:48:47Z
|
HIGH
| 7.5
|
{'CWE-415'}
|
{'https://github.com/maciejhirsz/ordnung/issues/8', 'https://github.com/advisories/GHSA-4wj3-p7hj-cvx8', 'https://rustsec.org/advisories/RUSTSEC-2020-0038.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35891'}
| null |
GHSA
|
GHSA-xcf7-q56x-78gh
|
Connection descriptor exhaustion in proxyproto
|
The package `github.com/pires/go-proxyproto` before 0.6.0 are vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header.
|
{'CVE-2021-23409'}
|
2021-07-26T21:23:49Z
|
2021-07-26T21:23:49Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/pires/go-proxyproto/releases/tag/v0.6.0', 'https://github.com/pires/go-proxyproto/pull/74', 'https://github.com/pires/go-proxyproto/issues/65', 'https://github.com/advisories/GHSA-xcf7-q56x-78gh', 'https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23409'}
| null |
GHSA
|
GHSA-3fvf-2gp4-89wq
|
Possibility for Denial of Service by overwriting PHP files with language exports
|
### Impact
Laravel Translation Manager didn't check the locale name, which allowed directory traversal when exporting files. The content would be a PHP file returning an array of translations, but this could lead to unexpected results, like denial of service. Access to the Laravel Translation Manager is required, because a new locale would have to be added and published.
### Patches
Version 0.6.2 fixes this issue.
### Workarounds
Only allow trusted admins to publish/edit translations.
### References
https://github.com/barryvdh/laravel-translation-manager/pull/417
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/barryvdh/laravel-translation-manager
* Email me (see Github profile)
### Credits
Found and reported by [Natalia Trojanowska](https://www.linkedin.com/in/trojanowskanatalia/)
| null |
2022-03-22T12:48:38Z
|
2022-03-18T23:17:15Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-3fvf-2gp4-89wq', 'https://github.com/barryvdh/laravel-translation-manager/security/advisories/GHSA-3fvf-2gp4-89wq'}
| null |
GHSA
|
GHSA-xfhh-rx56-rxcr
|
Path Traversal vulnerability that affects yard
|
## Possible arbitrary path traversal and file access via `yard server`
### Impact
A path traversal vulnerability was discovered in YARD <= 0.9.19 when using `yard server` to serve documentation. This bug would allow unsanitized HTTP requests to access arbitrary files on the machine of a yard server host under certain conditions.
Thanks to CuongMX from Viettel Cyber Security for discovering this vulnerability.
### Patches
Please upgrade to YARD v0.9.20 immediately if you are relying on yard server to host documentation in any untrusted environments.
### Workarounds
For users who cannot upgrade, it is possible to perform path sanitization of HTTP requests at your webserver level. WEBrick, for example, can perform such sanitization by default (which you can use via `yard server -s webrick`), as can certain rules in your webserver configuration.
|
{'CVE-2019-1020001'}
|
2022-04-19T19:02:23Z
|
2019-07-02T15:28:38Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-xfhh-rx56-rxcr', 'https://github.com/lsegal/yard/security/advisories/GHSA-xfhh-rx56-rxcr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020001'}
| null |
GHSA
|
GHSA-2jc8-4r6g-282j
|
Moderate severity vulnerability that affects python-gnupg
|
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
|
{'CVE-2014-1928'}
|
2021-08-30T22:22:11Z
|
2018-11-06T23:13:02Z
|
MODERATE
| 0
|
{'CWE-20'}
|
{'http://secunia.com/advisories/59031', 'https://code.google.com/p/python-gnupg/', 'http://seclists.org/oss-sec/2014/q1/294', 'https://github.com/advisories/GHSA-2jc8-4r6g-282j', 'http://secunia.com/advisories/56616', 'http://www.debian.org/security/2014/dsa-2946', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1928', 'https://code.google.com/p/python-gnupg/issues/detail?id=98', 'http://seclists.org/oss-sec/2014/q1/246'}
| null |
GHSA
|
GHSA-gpch-h32j-gx6x
|
Insufficiently Protected Credentials in Reactor Netty
|
The HttpClient from Reactor Netty, versions 0.9.x prior to 0.9.5, and versions 0.8.x prior to 0.8.16, may be used incorrectly, leading to a credentials leak during a redirect to a different domain. In order for this to happen, the HttpClient must have been explicitly configured to follow redirects.
|
{'CVE-2020-5404'}
|
2022-02-10T20:24:17Z
|
2022-02-10T20:24:17Z
|
MODERATE
| 5.9
|
{'CWE-522'}
|
{'https://pivotal.io/security/cve-2020-5404', 'https://github.com/advisories/GHSA-gpch-h32j-gx6x', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5404'}
| null |
GHSA
|
GHSA-m6cp-vxjx-65j6
|
SessionListener can prevent a session from being invalidated breaking logout
|
### Impact
If an exception is thrown from the `SessionListener#sessionDestroyed()` method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
There is no known path for an attacker to induce such an exception to be thrown, thus they must rely on an application to throw such an exception. The OP has also identified that during the call to `sessionDestroyed`, the `getLastAccessedTime()` throws an `IllegalStateException`, which potentially contrary to the servlet spec, so applications calling this method may always throw and fail to log out. If such an application was only tested on a non clustered test environment, then it may be deployed on a clustered environment with multiple contexts and fail to log out.
### Workarounds
The application should catch all Throwables within their `SessionListener#sessionDestroyed()` implementations.
|
{'CVE-2021-34428'}
|
2022-04-22T15:46:47Z
|
2021-06-23T20:23:04Z
|
LOW
| 3.5
|
{'CWE-613'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20210813-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34428', 'https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.debian.org/security/2021/dsa-4949', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-m6cp-vxjx-65j6', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-pgwj-prpq-jpc2
|
Check service IDs are valid
|
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, when service ids allow user input, this could allow for SQL Injection and remote code execution. This is related to symfony/dependency-injection.
|
{'CVE-2019-10910'}
|
2021-09-30T18:39:00Z
|
2019-11-18T17:27:31Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10910', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10910.yaml', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid', 'https://symfony.com/cve-2019-10910', 'https://github.com/advisories/GHSA-pgwj-prpq-jpc2', 'https://github.com/symfony/symfony/commit/d2fb5893923292a1da7985f0b56960b5bb10737b', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/dependency-injection/CVE-2019-10910.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/proxy-manager-bridge/CVE-2019-10910.yaml'}
| null |
GHSA
|
GHSA-p8xr-4v2c-rvgp
|
High severity vulnerability that affects org.apache.hbase:hbase
|
Apache HBase 0.98 before 0.98.12.1, 1.0 before 1.0.1.1, and 1.1 before 1.1.0.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, uses incorrect ACLs for ZooKeeper coordination state, which allows remote attackers to cause a denial of service (daemon outage), obtain sensitive information, or modify data via unspecified client traffic.
|
{'CVE-2015-1836'}
|
2021-06-10T22:06:23Z
|
2018-10-18T18:04:50Z
|
HIGH
| 7.3
|
{'CWE-284'}
|
{'https://github.com/advisories/GHSA-p8xr-4v2c-rvgp', 'http://www-01.ibm.com/support/docview.wss?uid=swg21969546', 'http://www.securitytracker.com/id/1034365', 'http://mail-archives.apache.org/mod_mbox/www-announce/201505.mbox/%3CCA+RK=_CFiTfQ2d0V+kuJx_y5izmYccaKjXaJ3V72KK7tbOhbkg@mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1836', 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html'}
| null |
GHSA
|
GHSA-v95x-h953-x7fg
|
Malicious Package in k0a_multer
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:19:28Z
|
2020-09-03T19:47:55Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1130', 'https://github.com/advisories/GHSA-v95x-h953-x7fg'}
| null |
GHSA
|
GHSA-2xwp-m7mq-7q3r
|
CLI does not correctly implement strict mode
|
In the affected versions, the AWS Encryption CLI operated in "discovery mode" even when "strict mode" was specified. Although decryption only succeeded if the user had permission to decrypt with at least one of the CMKs, decryption could be successful using a CMK that was not included in the user-defined set when the CLI was operating in "strict mode."
Affected users should upgrade to Encryption CLI v1.8.x or v2.1.x as soon as possible.
| null |
2021-09-27T20:50:17Z
|
2020-10-28T17:05:38Z
|
LOW
| 0
|
{'CWE-326'}
|
{'https://github.com/aws/aws-encryption-sdk-cli/commit/7d21b8051cab9e52e056fe427d2bff19cf146460', 'https://github.com/aws/aws-encryption-sdk-cli/security/advisories/GHSA-2xwp-m7mq-7q3r', 'https://github.com/advisories/GHSA-2xwp-m7mq-7q3r'}
| null |
GHSA
|
GHSA-hx46-vwmx-wx95
|
High severity vulnerability that affects actionpack
|
Withdrawn, accidental duplicate publish.
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
| null |
2021-12-02T23:15:02Z
|
2018-08-13T20:48:25Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-hx46-vwmx-wx95', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.