ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-cr3f-r24j-3chw
Cobbler before 3.3.0 allows authorization bypass for modification of settings.
Cobbler before 3.3.0 allows authorization bypass for modification of settings.
{'CVE-2021-40325'}
2021-10-13T17:27:13Z
2021-10-05T17:53:29Z
MODERATE
0
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40325', 'https://github.com/advisories/GHSA-cr3f-r24j-3chw', 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}
null
GHSA
GHSA-hp68-xhvj-x6j6
Insufficient patch for Regular Expression Denial of Service (ReDoS) to jsx-slack v4.5.1
We found the patch for CVE-2021-43838 in jsx-slack v4.5.1 is insufficient to save from Regular Expression Denial of Service (ReDoS) attack. This vulnerability affects to jsx-slack v4.5.1 and earlier versions. ### Impact If attacker can put a lot of JSX elements into `<blockquote>` tag _with including multibyte characters_, an internal regular expression for escaping characters may consume an excessive amount of computing resources. ```javascript /** @jsxImportSource jsx-slack */ import { Section } from 'jsx-slack' console.log( <Section> <blockquote> {[...Array(40)].map(() => ( <p>亜</p> ))} </blockquote> </Section> ) ``` v4.5.1 has released by passing the test against ASCII characters but missed the case of multibyte characters. https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q ### Patches jsx-slack v4.5.2 has updated regular expressions for escaping blockquote characters to prevent catastrophic backtracking. It is also including an updated test case to confirm rendering multiple tags in `<blockquote>` with multibyte characters. ### References - https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc ### Credits Thanks to @hieki for finding out this vulnerability.
{'CVE-2021-43843'}
2022-04-19T19:03:18Z
2022-01-06T18:34:18Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/advisories/GHSA-hp68-xhvj-x6j6', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43843', 'https://github.com/yhatt/jsx-slack/releases/tag/v4.5.2', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q', 'https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc'}
null
GHSA
GHSA-vxhc-c4qm-647p
Improper Access Control in Dolibarr
In “Dolibarr” application, 2.8.1 to 13.0.4 don’t restrict or incorrectly restricts access to a resource from an unauthorized actor. A low privileged attacker can modify the Private Note which only an administrator has rights to do, the affected field is at “/adherents/note.php?id=1” endpoint.
{'CVE-2021-25954'}
2021-10-21T13:35:03Z
2021-08-11T15:18:11Z
MODERATE
4.3
{'CWE-863', 'CWE-284'}
{'https://github.com/advisories/GHSA-vxhc-c4qm-647p', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25954', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25954', 'https://github.com/Dolibarr/dolibarr/commit/8cc100012d46282799fb19f735a53b7101569377'}
null
GHSA
GHSA-q34c-48gc-m9g8
Moderate severity vulnerability that affects actionpack
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "['xyz', nil]" values, a related issue to CVE-2012-2660.
{'CVE-2012-2694'}
2021-09-16T19:19:24Z
2017-10-24T18:33:38Z
MODERATE
0
null
{'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html', 'https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-q34c-48gc-m9g8', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2694', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}
null
GHSA
GHSA-jmgw-6vjg-jjwg
High severity vulnerability that affects actionpack
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
{'CVE-2013-0156'}
2021-09-14T19:48:13Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-20'}
{'http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html', 'http://rhn.redhat.com/errata/RHSA-2013-0153.html', 'http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0156', 'https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156', 'https://github.com/advisories/GHSA-jmgw-6vjg-jjwg', 'http://www.kb.cert.org/vuls/id/628463', 'http://www.insinuator.net/2013/01/rails-yaml/', 'https://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source&output=gplain', 'http://www.kb.cert.org/vuls/id/380039', 'http://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.html', 'http://rhn.redhat.com/errata/RHSA-2013-0155.html', 'http://www.debian.org/security/2013/dsa-2604', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/', 'https://puppet.com/security/cve/cve-2013-0156'}
null
GHSA
GHSA-wmpv-c2jp-j2xg
ERC1155Supply vulnerability in OpenZeppelin Contracts
When ERC1155 tokens are minted, a callback is invoked on the receiver of those tokens, as required by the spec. When including the `ERC1155Supply` extension, total supply is not updated until after the callback, thus during the callback the reported total supply is lower than the real number of tokens in circulation. ### Impact If a system relies on accurately reported supply, an attacker may be able to mint tokens and invoke that system after receiving the token balance but before the supply is updated. ### Patches A fix is included in version 4.3.3 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds If accurate supply is relevant, do not mint tokens to untrusted receivers. ### Credits The issue was identified and reported by @ChainSecurityAudits. ### For more information Read [TotalSupply Inconsistency in ERC1155 NFT Tokens](https://medium.com/chainsecurity/totalsupply-inconsistency-in-erc1155-nft-tokens-8f8e3b29f5aa) by @ChainSecurityAudits for a more detailed breakdown. If you have any questions or comments about this advisory, email us at security@openzeppelin.com.
null
2022-04-19T19:03:14Z
2021-11-15T23:28:18Z
LOW
0
null
{'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wmpv-c2jp-j2xg', 'https://github.com/advisories/GHSA-wmpv-c2jp-j2xg'}
null
GHSA
GHSA-mh9j-v6mq-pfch
Path manipulation in matyhtf/framework
matyhtf framework v3.0.5 is affected by a path manipulation vulnerability in Smarty.class.php. The issue was fixed in version 3.0.6.
{'CVE-2021-43676'}
2022-03-18T15:08:05Z
2021-12-04T00:01:07Z
CRITICAL
9.8
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43676', 'https://github.com/matyhtf/framework/commit/25084603b7ea771eebe263d39744fe6abf1f8d61', 'https://github.com/advisories/GHSA-mh9j-v6mq-pfch', 'https://github.com/matyhtf/framework/issues/206'}
null
GHSA
GHSA-gv2h-gf8m-r68j
Exposure of server configuration in github.com/go-vela/server
### Impact _What kind of vulnerability is it? Who is impacted?_ * The ability to expose configuration set in the [Vela server](https://github.com/go-vela/server) via [pipeline template functionality](https://go-vela.github.io/docs/templates/overview/). * It impacts all users of Vela. Sample of template exposing server configuration [using Sprig's `env` function](http://masterminds.github.io/sprig/os.html): ```yaml metadata: template: true steps: - name: sample image: alpine:latest commands: # OAuth client ID for Vela <-> GitHub communication - echo {{ env "VELA_SOURCE_CLIENT" }} # secret used for server <-> worker communication - echo {{ env "VELA_SECRET" }} ``` ### Patches _Has the problem been patched? What versions should users upgrade to?_ * Upgrade to `0.6.1` #### Additional Recommended Action(s) * Rotate all secrets ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ * No ### For more information If you have any questions or comments about this advisory: * Email us at [vela@target.com](mailto:vela@target.com)
{'CVE-2020-26294'}
2022-04-19T19:02:43Z
2022-02-15T00:19:57Z
HIGH
7.4
{'CWE-200', 'CWE-78'}
{'https://github.com/go-vela/compiler/commit/f1ace5f8a05c95c4d02264556e38a959ee2d9bda', 'https://github.com/helm/helm/blob/6297c021cbda1483d8c08a8ec6f4a99e38be7302/pkg/engine/funcs.go#L46-L47', 'https://github.com/go-vela/compiler/security/advisories/GHSA-gv2h-gf8m-r68j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26294', 'https://github.com/advisories/GHSA-gv2h-gf8m-r68j', 'https://pkg.go.dev/github.com/go-vela/compiler/compiler'}
null
GHSA
GHSA-3qpm-h9ch-px3c
Remote code injection, Improper Input Validation and Uncontrolled Recursion in Log4j library
### Summary The version used of Log4j, the library used for logging by PowerNukkit, is subject to a remote code execution vulnerability via the ldap JNDI parser. It's well detailed at [CVE-2021-44228](https://github.com/advisories/GHSA-jfh8-c2jp-5v3q) and CVE-2021-45105(https://github.com/advisories/GHSA-p6xc-xr62-6r2g). ### Impact Malicious client code could be used to send messages and cause remote code execution on the server. ### Patches PowerNukkit `1.5.2.1` is a patch-release that only updates the Log4j version to `2.17.0` and should be used instead of `1.5.2.0`. All versions prior to `1.5.2.1` are affected and are not patched. ### Workarounds If you can't upgrade, you can use the `-Dlog4j2.formatMsgNoLookups=true` startup argument as remediation, as this prevents the vulnerability from happening. ### References https://github.com/advisories/GHSA-jfh8-c2jp-5v3q https://github.com/advisories/GHSA-p6xc-xr62-6r2g ### For more information If you have any questions or comments about this advisory: * Open an issue in [the PowerNukkit repository](https://github.com/PowerNukkit/PowerNukkit/issues)
null
2022-04-19T19:03:18Z
2022-01-06T18:31:23Z
CRITICAL
10
{'CWE-20', 'CWE-502', 'CWE-400'}
{'https://github.com/advisories/GHSA-3qpm-h9ch-px3c', 'https://github.com/PowerNukkit/PowerNukkit/security/advisories/GHSA-3qpm-h9ch-px3c'}
null
GHSA
GHSA-855m-jchh-9qjc
Malicious Package in commnader
All versions of `commnader` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:01:43Z
2020-09-02T20:19:22Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-855m-jchh-9qjc', 'https://www.npmjs.com/advisories/850'}
null
GHSA
GHSA-7g8m-5qh9-9pgw
Directory Traversal in wind-mvc
Affected versions of `wind-mvc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16220'}
2021-01-14T15:46:39Z
2020-09-01T18:07:51Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16220', 'https://nodesecurity.io/advisories/417', 'https://github.com/advisories/GHSA-7g8m-5qh9-9pgw', 'https://www.npmjs.com/advisories/417', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wind-mvc'}
null
GHSA
GHSA-2gxj-qrp2-53jv
Incorrect reliance on Trait memory layout in mopa
An issue was discovered in the mopa crate through 2021-06-01 for Rust. It incorrectly relies on Trait memory layout, possibly leading to future occurrences of arbitrary code execution or ASLR bypass.
{'CVE-2021-45695'}
2022-01-07T18:24:37Z
2022-01-06T22:11:11Z
CRITICAL
9.8
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45695', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/mopa/RUSTSEC-2021-0095.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0095.html', 'https://github.com/advisories/GHSA-2gxj-qrp2-53jv'}
null
GHSA
GHSA-gvr4-7xgc-gx3w
Cross-Site Scripting in fileview
All versions of `fileview` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-15602'}
2021-01-08T20:23:38Z
2020-04-01T16:36:15Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1452', 'https://github.com/itworkcenter/fileview/issues/1', 'https://github.com/advisories/GHSA-gvr4-7xgc-gx3w', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15602', 'https://hackerone.com/reports/507159', 'https://github.com/itworkcenter/fileview/pull/2'}
null
GHSA
GHSA-w5m8-5v9m-xhx5
Critical severity vulnerability that affects Haraka
Haraka version 2.8.8 and earlier comes with a plugin for processing attachments for zip files. Versions 2.8.8 and earlier can be vulnerable to command injection.
{'CVE-2016-1000282'}
2021-09-21T17:56:30Z
2019-02-12T17:26:10Z
CRITICAL
9.8
{'CWE-77'}
{'https://github.com/advisories/GHSA-w5m8-5v9m-xhx5', 'https://github.com/outflanknl/Exploits/blob/master/harakiri-CVE-2016-1000282.py', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000282'}
null
GHSA
GHSA-j96r-xvjq-r9pg
Moderate severity vulnerability that affects activesupport
The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
{'CVE-2015-3227'}
2021-09-14T19:36:52Z
2017-10-24T18:33:36Z
MODERATE
0
null
{'http://lists.opensuse.org/opensuse-updates/2015-07/msg00050.html', 'https://github.com/advisories/GHSA-j96r-xvjq-r9pg', 'http://www.debian.org/security/2016/dsa-3464', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3227', 'http://www.securityfocus.com/bid/75234', 'http://www.securitytracker.com/id/1033755', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/bahr2JLnxvk/x4EocXnHPp8J', 'http://openwall.com/lists/oss-security/2015/06/16/16'}
null
GHSA
GHSA-52c9-458g-whrf
Malicious Package in js-3ha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:00:43Z
2020-09-03T22:58:17Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-52c9-458g-whrf', 'https://www.npmjs.com/advisories/1280'}
null
GHSA
GHSA-j8jp-9x42-4pj5
Unrestricted Upload of File with Dangerous Type in MODX Revolution
MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.
{'CVE-2022-26149'}
2022-03-11T23:20:59Z
2022-02-27T00:00:14Z
HIGH
7.2
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26149', 'https://github.com/advisories/GHSA-j8jp-9x42-4pj5', 'https://github.com/sartlabs/0days/blob/main/Modx/Exploit.txt'}
null
GHSA
GHSA-8wwf-2644-f8x4
Path traversal
The thefuck (aka The Fuck) package before 3.31 for Python allows Path Traversal that leads to arbitrary file deletion via the `undo archive operation` feature.
{'CVE-2021-34363'}
2022-03-29T22:16:29Z
2021-06-15T15:49:01Z
CRITICAL
9.1
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-34363', 'https://github.com/nvbn/thefuck/commit/e343c577cd7da4d304b837d4a07ab4df1e023092', 'https://github.com/nvbn/thefuck/releases/tag/3.31', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YA6UNQSOY6M3NJDZLS6YJXTS4WGDMEEJ/', 'https://github.com/advisories/GHSA-8wwf-2644-f8x4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MEDDLBFVRUQHPYIBJ4MFM3M4NUJUXL5/', 'https://vuln.ryotak.me/advisories/48'}
null
GHSA
GHSA-rc77-xxq6-4mff
Command Injection in hot-formula-parser
Versions of `hot-formula-parser` prior to 3.0.1 are vulnerable to Command Injection. The package fails to sanitize values passed to the `parse` function and concatenates it in an `eval` call. If a value of the formula is supplied by user-controlled input it may allow attackers to run arbitrary commands in the server. Parsing the following formula creates a `test` file in the present directory: `"SUM([(function(){require('child_process').execSync('touch test')})(),2])"` ## Recommendation Upgrade to version 3.0.1 or later.
{'CVE-2020-6836'}
2021-08-25T21:04:45Z
2020-05-06T19:32:33Z
CRITICAL
9.8
{'CWE-94'}
{'https://blog.truesec.com/2020/01/17/reverse-shell-through-a-node-js-math-parser/', 'https://github.com/handsontable/formula-parser/commit/396b089738d4bf30eb570a4fe6a188affa95cd5e', 'https://www.npmjs.com/advisories/1439', 'https://github.com/advisories/GHSA-rc77-xxq6-4mff', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6836', 'https://github.com/handsontable/formula-parser/pull/58'}
null
GHSA
GHSA-99p8-9p2c-49j4
Improper Access Control in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerability ID: OTF-009 - Vulnerability type: Improper Access Control - Threat level: Low ## Description: Authenticated users (or unauthenticated in public mode) can send messages without being visible in the list of chat participants. ## Technical description: Prerequisites: - Existing chatroom - Access to the chatroom (Public or known Private Key) - Either a modified frontend client or manual requests from burp/curl If a user opens the chatroom without emitting the join message he will not be present in session.users[x] list. Therefore there is no listing in the frontend and no chat participant knows another party joined the chat. It is still possible to send messages in the chatroom. If a user decides to abuse OTF-003 (page 22) he can impersonate messages from existing users; others would not be able to distinguish original and faked messages. This is also a prerequisite for OTF-004 (page 19). ## Impact: An adversary with access to the chat environment can send messages to the chat without being visible in the list of chat participants. ## Recommendation: - Allow chat access only after emission of the join event. - Implement proper session handling.
{'CVE-2022-21695'}
2022-01-21T23:20:16Z
2022-01-21T23:20:16Z
MODERATE
4.3
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21695', 'https://github.com/advisories/GHSA-99p8-9p2c-49j4', 'https://github.com/onionshare/onionshare/security/advisories/GHSA-99p8-9p2c-49j4', 'https://github.com/onionshare/onionshare/releases/tag/v2.5'}
null
GHSA
GHSA-hx8w-ghh8-r4xf
Write access to the Catalog for any user when restricted-admin role is enabled in Rancher
### Impact This vulnerability only affects customers using the [`restricted-admin`](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/global-permissions/#restricted-admin) role in Rancher. For this role to be active, Rancher must be bootstrapped with the environment variable `CATTLE_RESTRICTED_DEFAULT_ADMIN=true` or the configuration flag `restrictedAdmin=true`. A flaw was discovered in Rancher versions from 2.5.0 up to and including 2.5.12 and from 2.6.0 up to and including 2.6.3 where the `global-data` role in `cattle-global-data` namespace grants write access to the Catalogs. Since each user with any level of catalog access was bound to the `global-data` role, this grants write access to templates (`CatalogTemplates`) and template versions (`CatalogTemplateVersions`) for any user with any level of catalog access. New users created in Rancher are by default assigned to the `user` role (standard user), which is not designed to grant write catalog access. This vulnerability effectively elevates the privilege of any user to write access for the catalog template and catalog template version resources. A malicious user could abuse this vulnerability to: 1. Make applications or individual versions of applications visible or hidden on the UI, by modifying `version` and `rancherMaxVersion` fields. 2. Change the logo (field `icon`) of an application or template to an arbitrary image. 3. Make a chart appear as a trusted or partner chart. This can be abused to make less trusted charts, such as customer defined charts, appear more legitimate than they are, by adding the label `io.rancher.certified: partner`. 4. Swap template versions between templates of charts inside the same catalog. This can be exploited to swap the files from one chart or version to another, by changing `versionDir` field. When a user on the target cluster deploys their chart, it will deploy the modified version. This vulnerability does not allow to modify the base64 encoded `files` fields of the `templateVersions`, so one cannot inject arbitrary data to charts that have already been pulled from their respective catalog. Without access to the Catalog, malicious users are limited to injecting apps which already exist in a registered catalog. They would need write access to the catalog or external write access to a source repo to inject arbitrary code. ### Patches Patched versions include releases 2.5.13, 2.6.4 and later versions. ### Workarounds Limit access in Rancher to trusted users. There is not a direct mitigation besides upgrading to the patched Rancher versions. **Note:** If you use the `restricted-admin` as the default admin role in your environment, it's highly advised to review `CatalogTemplates` and `CatalogTemplateVersions` for possible malicious modifications. ### For more information If you have any questions or comments about this advisory: * Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. * Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. * Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
{'CVE-2021-4200'}
2022-05-02T19:26:56Z
2022-05-02T19:26:55Z
HIGH
8.1
{'CWE-285', 'CWE-269'}
{'https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/global-permissions/#restricted-admin', 'https://github.com/rancher/rancher/security/advisories/GHSA-hx8w-ghh8-r4xf', 'https://github.com/advisories/GHSA-hx8w-ghh8-r4xf'}
null
GHSA
GHSA-pwhf-7427-9vv2
Non-atomic writes in cgc
An issue was discovered in the cgc crate through 2020-12-10 for Rust. Ptr::write performs non-atomic write operations on an underlying pointer.
{'CVE-2020-36468'}
2021-08-25T20:56:57Z
2021-08-25T20:56:57Z
MODERATE
5.9
{'CWE-657'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/cgc/RUSTSEC-2020-0148.md', 'https://github.com/advisories/GHSA-pwhf-7427-9vv2', 'https://rustsec.org/advisories/RUSTSEC-2020-0148.html', 'https://github.com/playXE/cgc/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36468'}
null
GHSA
GHSA-782p-53wq-cxmj
High severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
{'CVE-2018-12086'}
2021-06-11T13:55:56Z
2018-10-16T19:51:31Z
HIGH
7.5
{'CWE-787'}
{'http://www.securityfocus.com/bid/105538', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12086.pdf', 'https://www.debian.org/security/2018/dsa-4359', 'https://github.com/advisories/GHSA-782p-53wq-cxmj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12086', 'http://www.securitytracker.com/id/1041909'}
null
GHSA
GHSA-wwf2-5cj8-jx6w
Hijacked Environment Variables in nodesqlite
The `nodesqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16049'}
2021-01-08T00:50:40Z
2018-07-23T20:50:21Z
MODERATE
0
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16049', 'https://www.npmjs.com/advisories/492', 'https://github.com/advisories/GHSA-wwf2-5cj8-jx6w', 'https://nodesecurity.io/advisories/492'}
null
GHSA
GHSA-jvjp-vh27-r9h5
Cross-site Scripting in PiranhaCMS
In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution.
{'CVE-2021-25977'}
2021-10-27T18:53:03Z
2021-10-27T18:53:03Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25977', 'https://github.com/advisories/GHSA-jvjp-vh27-r9h5', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977'}
null
GHSA
GHSA-x65c-4fgj-5fc3
Cross-site Scripting in pandao
pandao Editor.md 1.5.0 allows XSS via an attribute of an ABBR or SUP element.
{'CVE-2019-14653'}
2021-08-17T21:58:08Z
2019-08-23T00:05:00Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/pandao/editor.md/issues/715', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14653', 'https://github.com/advisories/GHSA-x65c-4fgj-5fc3'}
null
GHSA
GHSA-cr6j-3jp9-rw65
Critical severity vulnerability that affects org.apache.struts:struts2-core
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when using results with no namespace and in same time, its upper action(s) have no or wildcard namespace. Same possibility when using url tag which doesn't have value and action set and in same time, its upper action(s) have no or wildcard namespace.
{'CVE-2018-11776'}
2021-09-09T20:50:15Z
2018-10-18T19:24:38Z
HIGH
8.1
{'CWE-20'}
{'http://www.securitytracker.com/id/1041888', 'https://www.exploit-db.com/exploits/45262/', 'https://github.com/advisories/GHSA-cr6j-3jp9-rw65', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://www.exploit-db.com/exploits/45260/', 'https://lgtm.com/blog/apache_struts_CVE-2018-11776', 'https://security.netapp.com/advisory/ntap-20181018-0002/', 'https://cwiki.apache.org/confluence/display/WW/S2-057', 'http://www.securitytracker.com/id/1041547', 'http://www.securityfocus.com/bid/105125', 'https://github.com/hook-s3c/CVE-2018-11776-Python-PoC', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012', 'https://security.netapp.com/advisory/ntap-20180822-0001/', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11776', 'https://www.exploit-db.com/exploits/45367/'}
null
GHSA
GHSA-536q-8gxx-m782
Cross-Site Scripting in dojo
Versions of `dojo` prior to 1.4.2 are vulnerable to DOM-based Cross-Site Scripting (XSS). The package does not sanitize URL parameters in the `_testCommon.js` and `runner.html` test files, allowing attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 1.4.2 or later.
{'CVE-2010-2273'}
2021-08-17T22:24:34Z
2019-09-11T23:02:57Z
MODERATE
0
{'CWE-79'}
{'https://github.com/dojo/dojo/pull/307', 'http://secunia.com/advisories/38964', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50932', 'https://bugs.dojotoolkit.org/ticket/10773', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50849', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50994', 'http://bugs.dojotoolkit.org/ticket/10773', 'http://secunia.com/advisories/40007', 'https://github.com/advisories/GHSA-536q-8gxx-m782', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50856', 'https://www.npmjs.com/advisories/972', 'http://www.vupen.com/english/advisories/2010/1281', 'http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/', 'http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/', 'https://github.com/dojo/dojo/commit/9117ffd5a3863e44c92fcd58564c0da22be858f4', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50958', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833', 'http://www-01.ibm.com/support/docview.wss?uid=swg21431472', 'https://nvd.nist.gov/vuln/detail/CVE-2010-2273', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50896'}
null
GHSA
GHSA-c9cg-q8r2-xvjq
Improper Authentication in Auth0.AuthenticationApi
Auth0 auth0.net before 6.5.4 has Incorrect Access Control because IdentityTokenValidator can be accidentally used to validate untrusted ID tokens.
{'CVE-2019-16929'}
2021-08-18T22:01:21Z
2019-10-24T20:56:12Z
HIGH
7.5
{'CWE-287'}
{'https://auth0.com/docs/security/bulletins/cve-2019-16929', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16929', 'https://github.com/advisories/GHSA-c9cg-q8r2-xvjq'}
null
GHSA
GHSA-23c7-6444-399m
Improper Input Validation in sopel-plugins.channelmgnt
### Impact On some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. ### Patches Upgrade to 2.0.1 or higher ### Workarounds Do not use this plugin on networks where TARGMAX > 1. ### For more information If you have any questions or comments about this advisory: * Open an issue on [phab](https://phab.mirahezebots.org/maniphest/task/edit/form/1/). * Email us at [staff(at)mirahezebots(dot)org](mailto:staff@mirahezebots.org)
{'CVE-2021-21431'}
2021-04-12T20:48:22Z
2021-04-09T15:42:40Z
HIGH
7.6
{'CWE-20', 'CWE-284'}
{'https://github.com/MirahezeBots/sopel-channelmgnt/commit/643388365f28c5cc682254ab913c401f0e53260a', 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856', 'https://github.com/advisories/GHSA-23c7-6444-399m', 'https://pypi.org/project/sopel-plugins.channelmgnt/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21431', 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m'}
null
GHSA
GHSA-q6gq-997w-f55g
Infinite loop in xz
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
{'CVE-2020-16845'}
2021-12-16T19:16:40Z
2021-12-16T19:16:40Z
HIGH
7.5
{'CWE-835'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16845', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html', 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo', 'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/', 'https://security.netapp.com/advisory/ntap-20200924-0002/', 'https://www.debian.org/security/2021/dsa-4848', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/', 'https://github.com/advisories/GHSA-q6gq-997w-f55g', 'https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html', 'https://github.com/ulikunitz/xz/issues/35'}
null
GHSA
GHSA-cr8h-x88h-jwj2
Downloads Resources over HTTP in wixtoolset
Affected versions of `wixtoolset` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `wixtoolset`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10663'}
2021-01-08T18:55:58Z
2019-02-18T23:44:45Z
HIGH
0
{'CWE-311'}
{'https://github.com/wixtoolset/issues/issues/6187', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10663', 'https://www.npmjs.com/advisories/264', 'https://github.com/advisories/GHSA-cr8h-x88h-jwj2', 'https://nodesecurity.io/advisories/264'}
null
GHSA
GHSA-rjvj-673q-4hfw
Command Injection in traceroute
All versions of `traceroute` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `trace` function is vulnerable and can be abused if the `host` value is controlled by an attacker. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T20:53:02Z
2020-09-04T17:54:31Z
CRITICAL
0
{'CWE-77'}
{'https://snyk.io/vuln/npm:traceroute:20160311', 'https://www.npmjs.com/advisories/1465', 'https://github.com/advisories/GHSA-rjvj-673q-4hfw', 'https://github.com/jaw187/node-traceroute'}
null
GHSA
GHSA-38cg-gg9j-q9j9
Improper Certificate Validation and Insufficient Verification of Data Authenticity in Keycloak
A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.
{'CVE-2019-3875'}
2021-08-17T15:33:33Z
2019-06-27T17:25:57Z
MODERATE
4.8
{'CWE-295', 'CWE-345'}
{'https://github.com/advisories/GHSA-38cg-gg9j-q9j9', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3875', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3875'}
null
GHSA
GHSA-mm4m-qg48-f7wc
Improper Synchronization and Race Condition in vm-memory
rust-vmm vm-memory before 0.1.1 and 0.2.x before 0.2.1 allows attackers to cause a denial of service (loss of IP networking) because read_obj and write_obj do not properly access memory. This affects aarch64 (with musl or glibc) and x86_64 (with musl).
{'CVE-2020-13759'}
2021-08-25T21:01:29Z
2021-08-25T21:01:29Z
HIGH
7.5
{'CWE-662', 'CWE-362'}
{'https://github.com/advisories/GHSA-mm4m-qg48-f7wc', 'https://github.com/rust-vmm/vm-memory/releases/tag/v0.2.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13759', 'https://github.com/rust-vmm/vm-memory/issues/93', 'https://github.com/rust-vmm/vm-memory/releases/tag/v0.1.1'}
null
GHSA
GHSA-fcr6-6cph-vmcm
Stored XSS vulnerability in Jenkins Git Parameter Plugin
Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{'CVE-2022-29040'}
2022-04-29T04:21:08Z
2022-04-13T00:00:17Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29040', 'https://github.com/advisories/GHSA-fcr6-6cph-vmcm', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}
null
GHSA
GHSA-66hf-2p6w-jqfw
XSS in laravel/framework
A security researcher has disclosed a possible XSS vulnerability in the Blade templating engine. Given the following two Blade templates: resources/views/parent.blade.php: ```html @section('content') <input value="{{ $value }}"> @show ``` resources/views/child.blade.php: ```html @extends('parent') @section('content') <input value="{{ $value }}"> @endsection ``` And a route like the following: ```php Route::get('/example', function() { $value = '//localhost/###parent-placeholder-040f06fd774092478d450774f5ba30c5da78acc8## onclick=location.assign(this.value);//'; return view('child', ['value' => $value]); }); ``` The broken HTML element may be clicked and the user is taken to another location in their browser due to XSS. This is due to the user being able to guess the parent placeholder SHA-1 hash by trying common names of sections. If the parent template contains an exploitable HTML structure an XSS vulnerability can be exposed. This vulnerability has been patched by determining the parent placeholder at runtime and using a random hash that is unique to each request.
{'CVE-2021-43808'}
2022-04-19T19:03:17Z
2021-12-08T19:57:36Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-66hf-2p6w-jqfw', 'https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b', 'https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw'}
null
GHSA
GHSA-47qg-q58v-7vrp
UNEDITABLE_SCHEMAS and UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES not respected by frontend service backend
### Impact Any install that has `UNEDITABLE_SCHEMAS` and/or `UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES` set in the front-end, is being impacted. The value of these properties is ignored if set, allowing any user to modify table and column descriptions, even though the properties imply they shouldn't be. ### Patches There is an attached PR that applies this restriction on the back-end. ### Workarounds N/A ### References N/A ### For more information If you have any questions or comments about this advisory: * Email us at [amundsen-security@lists.lfaidata.foundation](mailto:amundsen-security@lists.lfaidata.foundation) ### More details Summary: I believe that UNEDITABLE_SCHEMAS and UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES are only being applied on the front-end, not on the frontend service back-end, allowing any user to modify table and column descriptions even if this configuration parameter is set. Repro steps: 1. docker-compose -f docker-amundsen.yml up neo4j elasticsearch amundsensearch amundsenmetadata 2. python example/scripts/sample_data_loader.py 3. FRONTEND_SVC_CONFIG_MODULE_CLASS=amundsen_application.config.TestConfig PYTHONPATH=. python3 amundsen_application/wsgi.py 4. Attempt a modification to a table description: curl '<http://localhost:5000/api/metadata/v0/put_table_description>' \\\\ -X 'PUT' \\\\ -H 'Content-Type: application/json;charset=UTF-8' \\\\ --data-binary '{"description":"2t test table","key":"hive://gold.test_schema/test_table1","source":"user"}' {"msg":"Success"} 5. This correctly succeeds, which can be validated by GETing the info: curl '<http://localhost:5000/api/metadata/v0/get_table_description?key=hive://gold.test_schema/test_table1>' {"description":"1st test table","msg":"Success"} At this point, modify TestConfig inside config.py to add this line: UNEDITABLE_SCHEMAS = set(['test_schema']) You can now re-run step 4, and step 5 with different data, and confirm that the modification has persisted. If you build and run the UI, you can see that on the page <http://localhost:5000/table_detail/gold/hive/test_schema/test_table1> http://localhost:5000/table_detail/gold/hive/test_schema/test_table1, the inline editor is correctly disabled. Looking at amundsenfrontendlibrary/amundsen_application/api/metadata/v0.py:268 put_table_description, you can see there's no reference to UNEDITABLE_SCHEMAS or UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES. The only place I can find these referenced is in amundsenfrontendlibrary/amundsen_application/api/utils/metadata_utils.py:marshall_table_full, which would explain why the UI is correctly respecting this setting. If this is correct, put_column_description would also be similarly affected. I believe the correct fix for all of these methods is to load the table, run it through marshall_dashboard_partial to fully evaluate what's editable or not (to reuse the same code path for FE and back-end), and reject the response if it's not editable. I'll implement a fix along these lines once someone confirms this. History: This functionality was introduced in <https://github.com/amundsen-io/amundsenfrontendlibrary/pull/497/files> https://github.com/amundsen-io/amundsenfrontendlibrary/pull/497 on July 9, corresponding to the 2.3.0 release of amundsenfrontend. That release was introduced into the main repo dockerfile on October 28 in <https://github.com/amundsen-io/amundsen/pull/785> https://github.com/amundsen-io/amundsen/pull/785
null
2022-04-19T19:02:40Z
2020-12-02T18:28:10Z
LOW
0
{'CWE-602'}
{'https://github.com/amundsen-io/amundsenfrontendlibrary/commit/0b47694ea74cbbef34e03eb45f29643b16a1332a', 'https://github.com/advisories/GHSA-47qg-q58v-7vrp', 'https://github.com/amundsen-io/amundsenfrontendlibrary/security/advisories/GHSA-47qg-q58v-7vrp'}
null
GHSA
GHSA-jv2r-jx6q-89jg
Use of Uninitialized Resource in bronzedb-protocol.
An issue was discovered in the bronzedb-protocol crate through 2021-01-03 for Rust. ReadKVExt may read from uninitialized memory locations.
{'CVE-2021-45682'}
2022-01-07T16:16:58Z
2022-01-06T22:16:32Z
CRITICAL
9.8
{'CWE-908'}
{'https://github.com/advisories/GHSA-jv2r-jx6q-89jg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45682', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/bronzedb-protocol/RUSTSEC-2021-0084.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0084.html'}
null
GHSA
GHSA-xxx9-3xcr-gjj3
XML Injection in Xerces Java affects Nokogiri
## Summary Nokogiri v1.13.4 updates the vendored `xerces:xercesImpl` from 2.12.0 to 2.12.2, which addresses [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437). That CVE is scored as CVSS 6.5 "Medium" on the NVD record. Please note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`. ## Mitigation Upgrade to Nokogiri `>= v1.13.4`. ## Impact ### [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437) in xerces-J - **Severity**: Medium - **Type**: [CWE-91](https://cwe.mitre.org/data/definitions/91.html) XML Injection (aka Blind XPath Injection) - **Description**: There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions. - **See also**: https://github.com/advisories/GHSA-h65f-jvqw-m9fj
null
2022-04-11T21:39:49Z
2022-04-11T21:30:00Z
MODERATE
6.5
{'CWE-91'}
{'https://github.com/advisories/GHSA-xxx9-3xcr-gjj3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437', 'https://github.com/advisories/GHSA-h65f-jvqw-m9fj', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer'}
null
GHSA
GHSA-q5rx-8c2h-5q7j
Apache Gobblin trusts all certificates used for LDAP connections in Gobblin-as-a-Service
Apache Gobblin trusts all certificates used for LDAP connections in Gobblin-as-a-Service. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue.
{'CVE-2021-36152'}
2022-02-11T16:15:31Z
2022-02-06T00:01:07Z
CRITICAL
9.8
null
{'https://lists.apache.org/thread/3bxf7rbf4zh95r78jtgth6gwhr5fyl2j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36152', 'https://github.com/advisories/GHSA-q5rx-8c2h-5q7j'}
null
GHSA
GHSA-566x-hhrf-qf8m
Use after free in ordered-float
An issue was discovered in the ordered-float crate before 1.1.1 and 2.x before 2.0.1 for Rust. A NotNan value can contain a NaN.
{'CVE-2020-35923'}
2021-08-25T20:50:30Z
2021-08-25T20:50:30Z
MODERATE
5.5
{'CWE-416'}
{'https://github.com/advisories/GHSA-566x-hhrf-qf8m', 'https://rustsec.org/advisories/RUSTSEC-2020-0082.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35923', 'https://github.com/reem/rust-ordered-float/pull/71'}
null
GHSA
GHSA-mw7r-3g6w-85qg
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1131'}
2021-03-29T20:57:46Z
2021-03-29T20:57:46Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-mw7r-3g6w-85qg', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
GHSA
GHSA-q2qh-cgc2-qhr3
Directory Traversal in serve
Affected versions of `serve` do not properly handle `%2e` (.) and `%2f` (/) characters, and allow the, characters to be used in paths. This can be used to traverse the directory tree and list content of any directory the user running the process has access to. Mitigating factors: This vulnerability only allows listing of directory contents and does not allow reading of arbitrary files. ## Recommendation Update to version 6.4.9 later.
{'CVE-2018-3712'}
2021-01-08T18:18:40Z
2018-07-27T17:07:50Z
MODERATE
0
{'CWE-22'}
{'https://github.com/zeit/serve/pull/316', 'https://github.com/advisories/GHSA-q2qh-cgc2-qhr3', 'https://hackerone.com/reports/307666', 'https://www.npmjs.com/advisories/561', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3712'}
null
GHSA
GHSA-hhff-3c89-5m7p
Directory Traversal in byucslabsix
Affected versions of `byucslabsix` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16166'}
2021-01-08T18:40:52Z
2018-07-23T20:45:42Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/byucslabsix', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16166', 'https://nodesecurity.io/advisories/399', 'https://www.npmjs.com/advisories/399', 'https://github.com/advisories/GHSA-hhff-3c89-5m7p'}
null
GHSA
GHSA-whjr-jj69-7prm
Malicious Package in import-mysql
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:15:59Z
2020-09-03T19:44:35Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-whjr-jj69-7prm', 'https://www.npmjs.com/advisories/1127'}
null
GHSA
GHSA-rffp-mc78-wjf7
Command Injection in cocos-utils
All versions of `cocos-utils` are vulnerable to Remote Code Execution. The `unzip()` function concatenates user input to `exec()` which may allow attackers to execute arbitrary commands on the server. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-27T16:20:58Z
2020-09-02T18:26:48Z
HIGH
0
{'CWE-77'}
{'https://www.npmjs.com/advisories/829', 'https://github.com/advisories/GHSA-rffp-mc78-wjf7'}
null
GHSA
GHSA-hh8v-jmh3-9437
Cross-site scripting in SocksJS-node
htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter.
{'CVE-2020-8823'}
2021-04-14T15:14:26Z
2021-04-13T15:25:33Z
MODERATE
6.1
{'CWE-79'}
{'https://www.npmjs.com/package/sockjs', 'https://www.sockjs.org', 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS', 'https://github.com/advisories/GHSA-hh8v-jmh3-9437', 'https://snyk.io/vuln/SNYK-JS-SOCKJS-548397', 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8823'}
null
GHSA
GHSA-g84j-95x2-7g67
Downloads Resources over HTTP in tomita
Affected versions of `tomita` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10662'}
2021-01-08T18:48:35Z
2019-02-18T23:44:50Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10662', 'https://nodesecurity.io/advisories/267', 'https://github.com/advisories/GHSA-g84j-95x2-7g67', 'https://www.npmjs.com/advisories/267'}
null
GHSA
GHSA-p9wf-3xpg-c9g5
XML External Entity Injection in PyWPS
An XML external entity (XXE) injection in PyWPS before 4.5.0 allows an attacker to view files on the application server filesystem by assigning a path to the entity. OWSLib 0.24.1 may also be affected.
{'CVE-2021-39371'}
2021-09-07T17:16:01Z
2021-09-02T17:11:13Z
HIGH
7.5
{'CWE-91', 'CWE-611'}
{'https://github.com/geopython/pywps/pull/616', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00001.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39371', 'https://github.com/advisories/GHSA-p9wf-3xpg-c9g5', 'https://github.com/geopython/OWSLib/issues/790'}
null
GHSA
GHSA-fj93-7wm4-8x2g
Cross-Site Scripting in jquery-mobile
All version of `jquery-mobile` are vulnerable to Cross-Site Scripting. The package checks for content in `location.hash` and if a URL is found it does an XmlHttpRequest (XHR) to the URL and renders the response with `innerHTML`. It fails to validate the `Content-Type` of the response, allowing attackers to include malicious payloads as part of query parameters that are reflected back to the user. A response such as `{"q":"<iframe/src='javascript:alert(1)'></iframe>","results":[]}` would be parsed as HTML and the JavaScript payload executed. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-27T21:03:59Z
2020-09-02T21:22:47Z
HIGH
0
{'CWE-79'}
{'https://github.com/jquery/jquery-mobile/issues/8640', 'https://gist.github.com/jupenur/e5d0c6f9b58aa81860bf74e010cf1685', 'https://snyk.io/vuln/SNYK-JS-JQUERYMOBILE-174599', 'https://www.npmjs.com/advisories/883', 'https://github.com/jquery/jquery-mobile/pull/8650', 'https://github.com/jquery/jquery-mobile/commit/b0d9cc758a48f13321750d7409fb7655dcdf2b50', 'https://github.com/advisories/GHSA-fj93-7wm4-8x2g', 'https://github.com/jquery/jquery-mobile/pull/8649'}
null
GHSA
GHSA-gmw6-94gg-2rc2
UNIX Symbolic Link (Symlink) Following in @npmcli/arborist
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. ### Patches 2.8.2 (included in npm v7.20.7 and above) ### Workarounds Do not run `npm install` on untrusted codebases, without first ensuring that the `node_modules` directory in the project is not a symbolic link. ### Fix Prior to extracting any package contents, the `node_modules` folder into which it is extracted is verified to be a real directory. If it is not, then it is removed. Caveat: if you are currently relying on creating a symbolic link to the `node_modules` folder in order to share dependencies between projects, then that will no longer be possible. Please use the `npm link` command, explicit `file:...` dependencies, and/or `workspaces` to share dependencies in a development environment.
{'CVE-2021-39135'}
2022-03-11T20:21:21Z
2021-08-31T16:03:34Z
MODERATE
8.2
{'CWE-61', 'CWE-59'}
{'https://github.com/advisories/GHSA-gmw6-94gg-2rc2', 'https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.npmjs.com/package/@npmcli/arborist', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39135'}
null
GHSA
GHSA-jcgr-9698-82jx
Improper Neutralization of Special Elements used in a Command ('Command Injection') in @floffah/build
### Impact If you are using the esbuild target or command you are at risk of code/option injection. Attackers can use the command line option to maliciously change your settings in order to damage your project. ### Patches The problem has been patched in v1.0.0 as it uses a proper method to pass configs to esbuild/estrella. ### Workarounds There is no work around. You should update asap. ### Notes This notice is mainly just to make sure people update to the latest version. This isn't that bad, but should encourage you to update.
null
2021-05-28T15:53:40Z
2021-05-28T15:53:40Z
LOW
0
{'CWE-77'}
{'https://github.com/Floffah/build/security/advisories/GHSA-jcgr-9698-82jx', 'https://github.com/advisories/GHSA-jcgr-9698-82jx'}
null
GHSA
GHSA-3mw4-6rj6-74g5
Null pointer dereference in TensorFlow
### Impact The [implementation of `QuantizedMaxPool`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/quantized_pooling_ops.cc#L114-L130) has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer. ```python import tensorflow as tf tf.raw_ops.QuantizedMaxPool( input = tf.constant([[[[4]]]], dtype=tf.quint8), min_input = [], max_input = [1], ksize = [1, 1, 1, 1], strides = [1, 1, 1, 1], padding = "SAME", name=None ) ``` ### Patches We have patched the issue in GitHub commit [53b0dd6dc5957652f35964af16b892ec9af4a559](https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
{'CVE-2022-21739'}
2022-02-11T16:22:38Z
2022-02-09T23:46:46Z
MODERATE
6.5
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21739', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/quantized_pooling_ops.cc#L114-L130', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3mw4-6rj6-74g5', 'https://github.com/advisories/GHSA-3mw4-6rj6-74g5'}
null
GHSA
GHSA-x2jp-hh65-4xvf
Cross-site scripting (XSS) and Server side request forgery (SSRF) in moodle
Text-based feedback answers required additional sanitizing to prevent stored XSS and blind SSRF risks in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
{'CVE-2021-20280'}
2021-11-18T15:25:56Z
2021-03-29T20:42:15Z
MODERATE
5.4
{'CWE-79'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1939037', 'https://github.com/moodle/moodle/commit/a303eb9e9e387f95ea2a80cb1ce6c0b132ec1cc4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20280', 'https://moodle.org/mod/forum/discuss.php?d=419651', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'http://packetstormsecurity.com/files/164817/Moodle-Cross-Site-Scripting-Server-Side-Request-Forgery.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGOMHMYM3WICJ6D6U22Z6LPJGT5A6MZM/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/', 'https://github.com/advisories/GHSA-x2jp-hh65-4xvf'}
null
GHSA
GHSA-394c-5j6w-4xmx
Regular Expression Denial of Service (ReDoS) in ua-parser-js
The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).
{'CVE-2020-7793'}
2022-02-09T22:46:53Z
2022-02-09T22:46:53Z
HIGH
7.5
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050387', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-1050388', 'https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b18', 'https://github.com/advisories/GHSA-394c-5j6w-4xmx', 'https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7793'}
null
GHSA
GHSA-wq3v-3grq-6f86
Improper Control of Dynamically-Managed Code Resources in Crafter CMS Crafter Studio
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy scripting. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.
{'CVE-2020-25802'}
2022-02-09T23:07:55Z
2022-02-09T23:07:55Z
HIGH
7.2
{'CWE-913'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25802', 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2020080101', 'https://github.com/advisories/GHSA-wq3v-3grq-6f86'}
null
GHSA
GHSA-q28m-8xjw-8vr5
Keepalive Connections Causing Denial Of Service in puma
This vulnerability is related to [CVE-2019-16770](https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994). ### Impact The fix for CVE-2019-16770 was incomplete. The original fix only protected existing connections that had already been accepted from having their requests starved by greedy persistent-connections saturating all threads in the same process. However, new connections may still be starved by greedy persistent-connections saturating all threads in all processes in the cluster. A `puma` server which received more concurrent `keep-alive` connections than the server had threads in its threadpool would service only a subset of connections, denying service to the unserved connections. ### Patches This problem has been fixed in `puma` 4.3.8 and 5.3.1. ### Workarounds Setting `queue_requests false` also fixes the issue. This is not advised when using `puma` without a reverse proxy, such as `nginx` or `apache`, because you will open yourself to slow client attacks (e.g. [slowloris](https://en.wikipedia.org/wiki/Slowloris_(computer_security))). The fix is very small. [A git patch is available here](https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837) for those using [unsupported versions](https://github.com/puma/puma/security/policy#supported-versions) of Puma. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Puma](https://github.com/puma/puma). * To report problems with this fix or to report another vulnerability, see [our security policy.](https://github.com/puma/puma/security/policy) ### Acknowledgements Thank you to @MSP-Greg, @wjordan and @evanphx for their review on this issue. Thank you to @ioquatix for providing a modified fork of `wrk` which made debugging this issue much easier.
{'CVE-2021-29509'}
2022-04-19T19:02:57Z
2021-05-18T01:27:15Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-q28m-8xjw-8vr5', 'https://github.com/puma/puma/security/advisories/GHSA-q28m-8xjw-8vr5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29509', 'https://rubygems.org/gems/puma', 'https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837', 'https://github.com/puma/puma/security/policy'}
null
GHSA
GHSA-xgj6-pgrm-x4r2
Moderate severity vulnerability that affects gtk2
Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.
{'CVE-2007-6183'}
2021-09-21T22:31:50Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-134'}
{'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453689', 'http://securityreason.com/securityalert/3407', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/38757', 'http://www.vupen.com/english/advisories/2007/4022', 'http://security.gentoo.org/glsa/glsa-200712-09.xml', 'http://secunia.com/advisories/27825', 'https://nvd.nist.gov/vuln/detail/CVE-2007-6183', 'https://bugzilla.redhat.com/show_bug.cgi?id=402871', 'http://osvdb.org/40774', 'http://ruby-gnome2.svn.sourceforge.net/viewvc/ruby-gnome2/ruby-gnome2/trunk/gtk/src/rbgtkmessagedialog.c?view=log', 'http://em386.blogspot.com/2007/11/your-favorite-better-than-c-scripting.html', 'http://www.securityfocus.com/archive/1/484240/100/0/threaded', 'http://bugs.gentoo.org/show_bug.cgi?id=200623', 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00214.html', 'https://github.com/advisories/GHSA-xgj6-pgrm-x4r2', 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00251.html', 'http://www.debian.org/security/2007/dsa-1431', 'http://secunia.com/advisories/28060', 'http://secunia.com/advisories/28022', 'http://www.securityfocus.com/bid/26616', 'http://www.mandriva.com/security/advisories?name=MDVSA-2008:033', 'http://secunia.com/advisories/27975'}
null
GHSA
GHSA-p65m-qr5x-rrqq
High severity vulnerability that affects webbynode
The message function in lib/webbynode/notify.rb in the Webbynode gem 1.0.5.3 and earlier for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a growlnotify message.
{'CVE-2013-7086'}
2021-09-15T21:37:03Z
2017-10-24T18:33:36Z
HIGH
0
{'CWE-94'}
{'https://github.com/advisories/GHSA-p65m-qr5x-rrqq', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7086', 'http://www.vapid.dhs.org/advisories/webbynode-command-inj.html', 'http://archives.neohapsis.com/archives/bugtraq/2013-12/0079.html', 'https://github.com/webbynode/webbynode/pull/85', 'http://seclists.org/oss-sec/2013/q4/493', 'http://packetstormsecurity.com/files/124421', 'http://osvdb.org/100920', 'http://seclists.org/oss-sec/2013/q4/497', 'http://www.securityfocus.com/bid/64289', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89705'}
null
GHSA
GHSA-mg8r-9g6j-hwv9
Authentication Bypass in hapi-auth-jwt2
Versions of `hapi-auth-jwt2` prior to version 5.1.2 are affected by a complete authentication bypass vulnerability when in the `try` authentication mode. ## Recommendation Update to version 5.1.2 or later.
{'CVE-2016-10525'}
2021-09-15T18:58:18Z
2019-02-18T23:39:00Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/dwyl/hapi-auth-jwt2/pull/112', 'https://github.com/dwyl/hapi-auth-jwt2/issues/111', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10525', 'https://nodesecurity.io/advisories/81', 'https://github.com/advisories/GHSA-mg8r-9g6j-hwv9', 'https://www.npmjs.com/advisories/81'}
null
GHSA
GHSA-r35g-4525-29fq
Division by 0 in `FusedBatchNorm`
### Impact An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.FusedBatchNorm`: ```python import tensorflow as tf x = tf.constant([], shape=[1, 1, 1, 0], dtype=tf.float32) scale = tf.constant([], shape=[0], dtype=tf.float32) offset = tf.constant([], shape=[0], dtype=tf.float32) mean = tf.constant([], shape=[0], dtype=tf.float32) variance = tf.constant([], shape=[0], dtype=tf.float32) epsilon = 0.0 exponential_avg_factor = 0.0 data_format = "NHWC" is_training = False tf.raw_ops.FusedBatchNorm( x=x, scale=scale, offset=offset, mean=mean, variance=variance, epsilon=epsilon, exponential_avg_factor=exponential_avg_factor, data_format=data_format, is_training=is_training) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/828f346274841fa7505f7020e88ca36c22e557ab/tensorflow/core/kernels/fused_batch_norm_op.cc#L295-L297) performs a division based on the last dimension of the `x` tensor: ```cc const int depth = x.dimension(3); const int rest_size = size / depth; ``` Since this is controlled by the user, an attacker can trigger a denial of service. ### Patches We have patched the issue in GitHub commit [1a2a87229d1d61e23a39373777c056161eb4084d](https://github.com/tensorflow/tensorflow/commit/1a2a87229d1d61e23a39373777c056161eb4084d). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29555'}
2021-05-21T14:23:58Z
2021-05-21T14:23:58Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/1a2a87229d1d61e23a39373777c056161eb4084d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r35g-4525-29fq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29555', 'https://github.com/advisories/GHSA-r35g-4525-29fq'}
null
GHSA
GHSA-29hg-r7c7-54fr
Double free in insert_many
An issue was discovered in the insert_many crate through 2021-01-26 for Rust. Elements may be dropped twice if a .next() method panics.
{'CVE-2021-29933'}
2021-08-25T20:55:06Z
2021-08-25T20:55:06Z
HIGH
7.5
{'CWE-415'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0042.html', 'https://github.com/rphmeier/insert_many/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29933', 'https://github.com/advisories/GHSA-29hg-r7c7-54fr'}
null
GHSA
GHSA-w9r2-qrpm-4rmj
Data race in disrustor
An issue was discovered in the disrustor crate through 2020-12-17 for Rust. RingBuffer doe not properly limit the number of mutable references.
{'CVE-2020-36470'}
2021-08-25T20:56:59Z
2021-08-25T20:56:59Z
MODERATE
5.9
{'CWE-362'}
{'https://github.com/advisories/GHSA-w9r2-qrpm-4rmj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36470', 'https://github.com/sklose/disrustor/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0150.html'}
null
GHSA
GHSA-2mw7-wggm-m6w3
Low severity vulnerability that affects ethereumjs-vm
ethereumjs-vm 2.4.0 allows attackers to cause a denial of service (vm.runCode failure and REVERT) via a "code: Buffer.from(my_code, 'hex')" attribute.
{'CVE-2018-19183'}
2021-08-31T19:28:41Z
2018-11-21T22:22:46Z
HIGH
7.5
{'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-19183', 'https://github.com/advisories/GHSA-2mw7-wggm-m6w3', 'https://github.com/ethereumjs/ethereumjs-vm/issues/386'}
null
GHSA
GHSA-7ggw-h8pp-r95r
Session ID not invalidated after logout
### Impact When logging out, the session ID was not invalidated. This is not a problem while the user is logged out, but as soon as the user logs back in the old session ID would be valid again; which means that anyone that gained access to the old session cookie would be able to act as the logged in user. This is not a major concern for the majority of cases, since it requires a malicious party gaining access to the session cookie in the first place, but nevertheless has been fixed. ### Patches Issue has been patched in Build 472 (v1.0.472) and v1.1.2. ### Workarounds Apply https://github.com/octobercms/library/commit/642f597489e6f644d4bd9a0c267e864cabead024 to your installation manually if unable to upgrade to Build 472 or v1.1.2. ### References - Reported by Anisio (Brazilian Information Security Analyst) - http://cve.circl.lu/cve/CVE-2021-3311 ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="699" alt="Screen Shot 2021-02-07 at 11 50 35 PM" src="https://user-images.githubusercontent.com/7253840/107180881-51eaf000-699f-11eb-8828-333128faf2a6.png">
{'CVE-2021-3311'}
2021-03-05T21:40:39Z
2021-02-10T02:32:35Z
LOW
0
{'CWE-613'}
{'https://github.com/octobercms/october/security/advisories/GHSA-7ggw-h8pp-r95r', 'https://anisiosantos.me/october-cms-token-reactivation', 'https://github.com/advisories/GHSA-7ggw-h8pp-r95r', 'https://packagist.org/packages/october/rain', 'https://octobercms.com/forum/chan/announcements', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3311', 'http://cve.circl.lu/cve/CVE-2021-3311', 'https://github.com/octobercms/library/commit/642f597489e6f644d4bd9a0c267e864cabead024'}
null
GHSA
GHSA-q4cq-539c-3mmm
Directory Traversal in serveryztyzt
Affected versions of `serveryztyzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16103'}
2021-01-14T15:55:11Z
2020-09-01T16:48:14Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt', 'https://github.com/advisories/GHSA-q4cq-539c-3mmm', 'https://www.npmjs.com/advisories/354', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16103', 'https://nodesecurity.io/advisories/354'}
null
GHSA
GHSA-m33v-338h-4v9f
Path traversal in Node-Red
### Impact This vulnerability allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API. ### Patches The issue has been patched in Node-RED 1.2.8 ### Workarounds The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED. The primary workaround is not give untrusted users read access to the Node-RED editor. ### For more information If you have any questions or comments about this advisory: * Email us at [team@nodered.org](mailto:team@nodered.org) ### Acknowledgements Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.
{'CVE-2021-21298'}
2021-03-01T18:55:47Z
2021-02-26T16:31:23Z
LOW
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-m33v-338h-4v9f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21298', 'https://github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f', 'https://github.com/node-red/node-red/releases/tag/1.2.8', 'https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456', 'https://www.npmjs.com/package/@node-red/runtime'}
null
GHSA
GHSA-vmhw-fhj6-m3g5
Path Traversal in angular-http-server
Versions of `angular-http-server` before 1.4.4 are vulnerable to path traversal. ## Recommendation Update to version 1.4.4 or later.
null
2021-08-04T20:22:14Z
2019-05-31T23:46:33Z
HIGH
0
{'CWE-22'}
{'https://github.com/simonh1000/angular-http-server/commit/8bafc9577161469f5dea01e0b98ea9c525d063e9', 'https://nodesecurity.io/advisories/656', 'https://www.npmjs.com/advisories/656', 'https://hackerone.com/reports/330349', 'https://github.com/advisories/GHSA-vmhw-fhj6-m3g5'}
null
GHSA
GHSA-f34m-x9pj-62vq
Cross-Site Scripting Vulnerability in @joeattardi/emoji-button
### Impact There are two vectors for XSS attacks with versions of @joeattardi/emoji-button before 4.6.2: - A URL for a custom emoji - An i18n string In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code. ### Patches This vulnerability is fixed starting in version 4.6.2. This is resolved by properly escaping strings that are inserted into the HTML document. ### Workarounds There is no workaround other than upgrading to a non-vulnerable version. ### Credit This issue was discovered by GitHub team member [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh) and was reported by the GitHub Security Lab team.
{'CVE-2021-43785'}
2022-04-19T19:03:16Z
2021-12-01T18:29:02Z
HIGH
7.6
{'CWE-79'}
{'https://github.com/joeattardi/emoji-button/security/advisories/GHSA-f34m-x9pj-62vq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43785', 'https://github.com/advisories/GHSA-f34m-x9pj-62vq', 'https://github.com/joeattardi/emoji-button/commit/fe54bef107eb3f74873a4018f2ff49fa124c6a2e', 'https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16'}
null
GHSA
GHSA-3mpp-xfvh-qh37
node-ipc behavior change
node-ipc version 11.0.0 and newer include a message from the maintainer that is written to the user’s desktop. Please review the version changes before proceeding.
null
2022-03-16T23:55:33Z
2022-03-16T23:54:35Z
LOW
0
null
{'https://github.com/RIAEvangelist/node-ipc/releases/tag/v11.0.0', 'https://github.com/advisories/GHSA-3mpp-xfvh-qh37'}
null
GHSA
GHSA-2rh5-jvgx-pgw3
Any storage file can be downloaded from p.sh if full server path is known
The default configuration for platform.sh (.platform.app.yaml) allows access to uploaded files if you know or can guess their location, regardless of whether roles grant content read access to the content containing those files. If you're using Legacy Bridge, the default configuration also allows access to certain legacy files that should not be readable, including the legacy var directory and extension directories.
null
2021-09-14T20:25:13Z
2021-09-14T20:25:13Z
HIGH
0
{'CWE-200'}
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-006-storage-and-legacy-files-accessible-if-path-is-known', 'https://github.com/advisories/GHSA-2rh5-jvgx-pgw3', 'https://github.com/ezsystems/ezplatform/security/advisories/GHSA-2rh5-jvgx-pgw3'}
null
GHSA
GHSA-vrf2-xghr-j52v
Private files publicly accessible with Cloud Storage providers
### Impact Private files publicly accessible with Cloud Storage providers when the hashed URL is known ### Patches We recommend first changing your configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities
null
2021-10-05T17:26:42Z
2021-06-28T18:20:42Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v', 'https://github.com/advisories/GHSA-vrf2-xghr-j52v'}
null
GHSA
GHSA-g7j3-p357-cw8p
Directory Traversal in f2e-server
Affected versions of `f2e-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation Update to version 1.12.12 or later.
{'CVE-2017-16038'}
2021-09-10T20:27:48Z
2018-07-24T16:29:12Z
HIGH
7.5
{'CWE-22'}
{'https://www.npmjs.com/advisories/346', 'https://github.com/shy2850/node-server/pull/12/files', 'https://github.com/shy2850/node-server/issues/10', 'https://github.com/advisories/GHSA-g7j3-p357-cw8p', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16038', 'https://nodesecurity.io/advisories/346'}
null
GHSA
GHSA-4x7w-frcq-v4m3
Path Traversal in @wturyn/swagger-injector
All versions of `@wturyn/swagger-injector` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the configured `dist` folder using relative paths. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-29T18:38:23Z
2020-09-03T20:38:47Z
CRITICAL
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/1173', 'https://github.com/advisories/GHSA-4x7w-frcq-v4m3'}
null
GHSA
GHSA-2rfj-2mwp-787v
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-0993'}
2021-03-29T20:57:51Z
2021-03-29T20:57:51Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0993', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0993', 'https://github.com/advisories/GHSA-2rfj-2mwp-787v', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'}
null
GHSA
GHSA-g93h-75m9-3qq4
Downloads Resources over HTTP in pngcrush-installer
Affected versions of `pngcrush-installer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pngcrush-installer`. ## Recommendation Update to version 1.8.10 or later.
{'CVE-2016-10570'}
2021-01-08T18:48:01Z
2019-02-18T23:52:27Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/189', 'https://github.com/advisories/GHSA-g93h-75m9-3qq4', 'https://www.npmjs.com/advisories/189', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10570'}
null
GHSA
GHSA-4wm8-fjv7-j774
Escape sequence injection in RubyGems
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
{'CVE-2019-8325'}
2021-08-17T14:44:54Z
2019-06-20T16:08:21Z
HIGH
7.5
{'CWE-74'}
{'https://github.com/advisories/GHSA-4wm8-fjv7-j774', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8325', 'https://hackerone.com/reports/317353'}
null
GHSA
GHSA-pmv6-gf98-p3r5
Command Injection in kill-port
Versions of `kill-port` prior to 1.3.2 are vulnerable to Command Injection. The package does not validate user input on the `kill` function. This may allow attackers to run arbitrary commands in the system if user input (such as the port number) is passed directly to the function. ## Recommendation Upgrade to version 1.3.2 or later.
{'CVE-2019-5414'}
2021-01-08T18:20:19Z
2019-03-25T16:17:18Z
HIGH
0
{'CWE-77'}
{'https://hackerone.com/reports/389561', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5414', 'https://www.npmjs.com/advisories/966', 'https://github.com/advisories/GHSA-pmv6-gf98-p3r5'}
null
GHSA
GHSA-93f3-23rq-pjfp
Sensitive information exposure through logs in npm CLI
Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
{'CVE-2020-15095'}
2021-01-14T17:40:21Z
2020-07-07T18:56:16Z
LOW
4.4
{'CWE-532'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html', 'https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/', 'https://security.gentoo.org/glsa/202101-07', 'https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp', 'https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15095', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html', 'https://github.com/advisories/GHSA-93f3-23rq-pjfp', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html'}
null
GHSA
GHSA-pxmp-fwjc-4x7q
HTML Injection in marky-markdown
All versions of `marky-markdown` are vulnerable to HTML Injection due to a validation bypass. The package only allows iframes where the source is `youtube.com` but it is possible to bypass the validation with sources where `youtube.com` is the sub-domain, such as `youtube.com.evil.co`. This ## Recommendation This package is no longer maintained. Please upgrade to `@npmcorp/marky-markdown`
null
2021-10-04T20:56:43Z
2020-09-03T15:45:23Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-pxmp-fwjc-4x7q', 'https://www.npmjs.com/advisories/1471'}
null
GHSA
GHSA-hm48-76wh-q86v
High severity vulnerability that affects activerecord
Withdrawn, accidental duplicate publish. activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls.
null
2021-12-03T14:10:42Z
2018-08-21T19:03:17Z
HIGH
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2014-3514', 'https://github.com/advisories/GHSA-hm48-76wh-q86v'}
null
GHSA
GHSA-jp5v-5gx4-jmj9
Ability to forge per-form CSRF tokens in Rails
It is possible to possible to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token for any action for that session. Impact ------ Given the ability to extract the global CSRF token, an attacker would be able to construct a per-form CSRF token for that session. Workarounds ----------- This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded.
{'CVE-2020-8166'}
2021-10-06T22:06:43Z
2020-05-26T15:11:13Z
MODERATE
4.3
{'CWE-352'}
{'https://groups.google.com/forum/#!topic/rubyonrails-security/NOjKiGeXUgw', 'https://github.com/advisories/GHSA-jp5v-5gx4-jmj9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8166', 'https://hackerone.com/reports/732415', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8166.yml'}
null
GHSA
GHSA-6jx3-rqcx-g3ww
Downloads Resources over HTTP in air-sdk
Affected versions of `air-sdk` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `air-sdk`. ## Recommendation No patch is currently available for this vulnerability, and the package hasn't seen an update since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10603'}
2021-01-08T19:21:31Z
2019-02-18T23:33:48Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/200', 'https://www.npmjs.com/advisories/200', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10603', 'https://github.com/advisories/GHSA-6jx3-rqcx-g3ww'}
null
GHSA
GHSA-3c67-gc48-983w
Path Traversal in Ansible
An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running ansible-galaxy collection install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system.
{'CVE-2020-10691'}
2021-04-20T16:44:37Z
2021-04-20T16:44:37Z
MODERATE
5.2
{'CWE-22'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10691', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10691', 'https://github.com/ansible/ansible/pull/68596', 'https://github.com/advisories/GHSA-3c67-gc48-983w'}
null
GHSA
GHSA-f7r3-p866-q9qr
Denial of Service in ircdkit
Versions of `ircdkit` before 1.0.3 are vulnerable to a remote denial of service. ## Recommendation Upgrade to version 1.0.4.
null
2021-08-04T21:22:46Z
2019-06-03T17:27:49Z
LOW
3.7
{'CWE-400'}
{'https://github.com/Twipped/ircdkit/commit/f0cc6dc913ec17b499fa33a676bb72c624456f2c', 'https://github.com/advisories/GHSA-f7r3-p866-q9qr', 'https://www.npmjs.com/advisories/735', 'https://github.com/Twipped/ircdkit/issues/1', 'https://snyk.io/vuln/SNYK-JS-IRCDKIT-173688'}
null
GHSA
GHSA-f99g-pg48-wrfc
twill is vulnerable to Cross-Site Request Forgery (CSRF)
twill is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3932'}
2021-12-16T00:40:00Z
2021-11-15T23:19:26Z
MODERATE
6.3
{'CWE-352', 'CWE-268'}
{'https://github.com/advisories/GHSA-f99g-pg48-wrfc', 'https://github.com/area17/twill/commit/81d80d1fbbdd8bb73c020f03c623fd4487bd9b78', 'https://github.com/area17/twill/commits/bab94c1e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3932', 'https://github.com/area17/twill/releases/tag/2.5.3', 'https://github.com/area17/twill/commit/5cded9fc', 'https://huntr.dev/bounties/6ef21e34-f6d9-445a-b657-375c53dc2b43', 'https://github.com/area17/twill/releases/tag/1.2.5'}
null
GHSA
GHSA-fgp6-8g62-qx6w
Malicious Package in smartsearchwp
All versions of `smartsearchwp` contain malicious code. The package is malware intended to steal credentials from websites it is loaded in. It traverses DOM elements looking for fields such as `username` and `password` and uploads it to a remote server. The package also port-scans the local gateway and uploads the information to the remote server. It has a feature to fetch commands from the remote server and execute them with `eval`. The npm security team analysis found several bugs in the malware that prevent it from actually performing its actions. The malicious code is also not invoked upon installation or require; it would require transpiling TypeScript code and using it in a website. ## Recommendation Remove the package from your environment. There is no indication of further compromise.
null
2021-09-30T21:58:44Z
2020-09-03T17:01:45Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1011', 'https://github.com/advisories/GHSA-fgp6-8g62-qx6w'}
null
GHSA
GHSA-v57x-gxfj-484q
Security Advisory for "Log4Shell"
### Impact A highly critical 0-day exploit (CVE-2021-44228) is found in Apache log4j 2 library on December 9, 2021. This affects Apache log4j versions from 2.0-beta9 to 2.14.1 (inclusive). This vulnerability allows a remote attacker to execute code on the server if the system logs an attacker-controlled string value with the attacker's JNDI LDAP server lookup. Another vulnerability related to the same library, which was discovered on 12/14/2021 (CVE-2021-45046) and revealed another Remote Code Execution vulnerability, has been investigated by Hazelcast team as well and it is found that it does not affect Hazelcast Products under default configurations. The finding of CVE-2021-45105 on 12/14/2021, which can cause a Denial of Service attack, was investigated by Hazelcast team and it is confirmed that it does not affect Hazelcast Products under default configurations. The finding of CVE-2021-44832 on 12/28/2021, which is a medium vulnerability, is investigated by our security team as well, and not considered to be as critical. It requires attacker to be able to modify logging configuration, which means attacker can modify the filesystem and/or can already execute arbitrary code which is more of a general security breach rather than something log4j specific. Note that Hazelcast IMDG and IMDG Enterprise itself is not affected. However, given version distributions are considered to be vulnerable since related ZIP and TGZ distributions contain a vulnerable Hazelcast Management Center version. ### Patches CVE-2021-44228 is fixed in log4j 2.15.0. CVE-2021-45046 is fixed in log4j 2.16.0. CVE-2021-45105 is fixed in log4j 2.17.0. CVE-2021-44832 is fixed in log4j 2.17.1. As of 12/21/2021, Hazelcast team has released a new version of all affected products that upgrades log4j to 2.17.0 as listed below: Hazelcast Management Center 4.2021.12-1, Hazelcast Management Center 5.0.4. Hazelcast IMDG and IMDG Enterprise 4.0.5, 4.1.8 and 4.2.4. Hazelcast Jet 4.5.3. Hazelcast Platform 5.0.2. As of 01/06/2022, Hazelcast Management Center 4.2022.01 with the updated log4j 2.17.1 is released. log4j2.17.1 will be included in Management Center 5.1 that is expected to be released in February. Hazelcast recommends upgrading to the latest versions available. ### Workarounds For users that an upgrade is not an option, below mitigations can be applied. #### Disabling lookups via Environment Variable Setting the environment variable LOG4J_FORMAT_MSG_NO_LOOKUPS=true . This option is the easiest to apply for containerized environments. #### Disabling lookups in log4j2 configuration Another good option since there is no need to replace JARs or no need to modify logging configuration file, users who cannot upgrade to 2.17.0 can mitigate the exposure by: Users of Log4j 2.10 or greater may add `-Dlog4j2.formatMsgNoLookups=true `as a command line option or add `-Dlog4j2.formatMsgNoLookups=true` in a `log4j2.component.properties` file on the classpath to prevent lookups in log event messages. Users since Log4j 2.7 may specify `%m{nolookups}` in the PatternLayout configuration to prevent lookups in log event messages. As an example; users deploying Hazelcast Management Center via helm charts can do the following to disable lookups and restart in one command: `helm upgrade <release-name> hazelcast/hazelcast --set mancenter.javaOpts="<javaOpts> -Dlog4j2.formatMsgNoLookups=true"` Where <release-name> is the release name and <javaOpts> is existing java options user has added previously. #### Removing the JndiLookup from classpath Remove the JndiLookup and JndiManager classes from the log4j-core jar. Note that removal of the JndiManager will cause the JndiContextSelector and JMSAppender to no longer function. ### References https://nvd.nist.gov/vuln/detail/CVE-2021-44228 https://nvd.nist.gov/vuln/detail/CVE-2021-45046 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105 https://nvd.nist.gov/vuln/detail/CVE-2021-44832 https://logging.apache.org/log4j/2.x/index.html ### For more information If you have any questions or comments about this advisory: * Open an issue in [our repo](https://github.com/hazelcast/hazelcast) * Slack us at [Hazelcast Community Slack](https://slack.hazelcast.com/)
null
2022-04-22T17:07:23Z
2022-01-21T23:25:04Z
CRITICAL
10
{'CWE-20', 'CWE-502', 'CWE-400'}
{'https://github.com/hazelcast/hazelcast/security/advisories/GHSA-v57x-gxfj-484q', 'https://github.com/advisories/GHSA-v57x-gxfj-484q'}
null
GHSA
GHSA-gf2j-7qwg-4f5x
Moderate severity vulnerability that affects org.keycloak:keycloak-core
The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack.
{'CVE-2018-14637'}
2021-09-10T20:46:10Z
2018-12-21T17:48:45Z
HIGH
8.1
{'CWE-287', 'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-14637', 'https://github.com/advisories/GHSA-gf2j-7qwg-4f5x'}
null
GHSA
GHSA-9g3v-j3cr-6fc6
Cross-site Scripting in snipe-it
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3879'}
2021-10-25T20:08:06Z
2021-10-21T17:48:26Z
MODERATE
6.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-9g3v-j3cr-6fc6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3879', 'https://github.com/snipe/snipe-it/commit/bda23bb1e66fd7ce42c75c69cf5eea4e80865c1c', 'https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe'}
null
GHSA
GHSA-q3m9-9fj2-mfwr
URL Redirection to Untrusted Site ('Open Redirect') in Products.isurlinportal
### Impact Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like `https://example.org` is not in the portal. But the url `https:example.org` without slashes tricks our code and it _is_ considered to be in the portal. When redirecting, some browsers go to `https://example.org`, others give an error. Attackers may use this to redirect you to their site, especially as part of a phishing attack. ### Patches The problem has been patched in `Products.isurlinportal` 1.2.0. This is a recommended upgrade for all users of Plone 4.3 and 5, on Python 2.7 or higher. It has not been tested on earlier Plone or Python versions. Upcoming Plone 5.2.5 and higher will include the new version. ### Discovered This vulnerability was discovered and reported by Yuji Tounai of Mitsui Bussan Secure Directions, Inc. Thank you! ### For more information If you have any questions or comments about this advisory: * Email the Plone Security Team at [security@plone.org](mailto:security@plone.org), especially when you think you have discovered a security problem or when you are not sure. * Open an issue in [the tracker](https://github.com/plone/Products.isurlinportal/issues) if your question or comment can be public.
{'CVE-2021-32806'}
2021-08-30T23:21:08Z
2021-08-05T17:02:12Z
MODERATE
6.5
{'CWE-601'}
{'https://github.com/advisories/GHSA-q3m9-9fj2-mfwr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32806', 'https://github.com/plone/Products.isurlinportal/commit/d4fd34990d18adf05a10dc5e2bb4b066798280ba', 'https://github.com/plone/Products.isurlinportal/security/advisories/GHSA-q3m9-9fj2-mfwr', 'http://jvn.jp/en/jp/JVN50804280/index.html'}
null
GHSA
GHSA-v9w8-hq92-v39m
Cross-site Scripting (XSS) in baserCMS
Improper neutralization of JavaScript input in the blog article editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.
{'CVE-2021-20683'}
2021-06-08T20:10:45Z
2021-06-08T20:10:45Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/baserproject/basercms', 'https://jvn.jp/en/jp/JVN64869876/index.html', 'https://github.com/advisories/GHSA-v9w8-hq92-v39m', 'https://basercms.net/security/JVN64869876', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20683', 'https://packagist.org/packages/baserproject/basercms', 'https://github.com/baserproject/basercms/commit/88ccc61e5656b05dd13204d61de706efaa2cd0b1'}
null
GHSA
GHSA-2p68-f74v-9wc6
Unintended unmarshalling in ActiveSupport
In ActiveSupport, there is potentially unexpected behaviour in the MemCacheStore and RedisCacheStore where, when untrusted user input is written to the cache store using the `raw: true` parameter, re-reading the result from the cache can evaluate the user input as a Marshalled object instead of plain text. Vulnerable code looks like: ``` data = cache.fetch("demo", raw: true) { untrusted_string } ``` Versions Affected: rails < 5.2.5, rails < 6.0.4 Not affected: Applications not using MemCacheStore or RedisCacheStore. Applications that do not use the `raw` option when storing untrusted user input. Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ Unmarshalling of untrusted user input can have impact up to and including RCE. At a minimum, this vulnerability allows an attacker to inject untrusted Ruby objects into a web application. In addition to upgrading to the latest versions of Rails, developers should ensure that whenever they are calling `Rails.cache.fetch` they are using consistent values of the `raw` parameter for both reading and writing, especially in the case of the RedisCacheStore which does not, prior to these changes, detect if data was serialized using the raw option upon deserialization. Workarounds ----------- It is recommended that application developers apply the suggested patch or upgrade to the latest release as soon as possible. If this is not possible, we recommend ensuring that all user-provided strings cached using the `raw` argument should be double-checked to ensure that they conform to the expected format.
{'CVE-2020-8165'}
2021-01-08T21:29:12Z
2020-05-26T14:49:24Z
HIGH
0
{'CWE-502'}
{'https://groups.google.com/forum/#!topic/rubyonrails-security/bv6fW4S0Y1c', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html', 'https://github.com/advisories/GHSA-2p68-f74v-9wc6', 'https://hackerone.com/reports/413388', 'https://groups.google.com/g/rubyonrails-security/c/bv6fW4S0Y1c', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html', 'https://www.debian.org/security/2020/dsa-4766', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2020-8165.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8165', 'https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/'}
null
GHSA
GHSA-5hxw-r847-qfwp
Moderate severity vulnerability that affects opencv.js
opencv.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
{'CVE-2017-16066'}
2021-01-08T19:50:29Z
2018-08-29T23:47:07Z
MODERATE
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-5hxw-r847-qfwp', 'https://nodesecurity.io/advisories/505', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16066'}
null
GHSA
GHSA-4q2r-qxp6-h5j6
Improper Restriction of XML External Entity Reference in Quokka
XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the component 'quokka/core/content/views.py'.
{'CVE-2020-18705'}
2022-03-23T20:17:57Z
2021-08-30T16:25:18Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/rochacbruno/quokka/issues/676', 'https://github.com/quokkaproject/quokka/pull/679', 'https://nvd.nist.gov/vuln/detail/CVE-2020-18705', 'https://github.com/advisories/GHSA-4q2r-qxp6-h5j6'}
null
GHSA
GHSA-gppp-5xc5-wfpx
Moderate severity vulnerability that affects activerecord
Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.
{'CVE-2013-0155'}
2021-09-13T12:43:35Z
2017-10-24T18:33:37Z
MODERATE
0
null
{'http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A', 'https://puppet.com/security/cve/cve-2013-0155', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'http://www.debian.org/security/2013/dsa-2609', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0155', 'http://rhn.redhat.com/errata/RHSA-2013-0155.html', 'http://support.apple.com/kb/HT5784', 'https://github.com/advisories/GHSA-gppp-5xc5-wfpx', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}
null
GHSA
GHSA-rjhc-w3fj-j6x9
Malicious Package in alipayjsapi
All versions of `alipayjsapi` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T18:35:42Z
2020-09-03T17:32:45Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-rjhc-w3fj-j6x9', 'https://www.npmjs.com/advisories/1048'}
null
GHSA
GHSA-893h-35v4-mxqx
Path Traversal in Ansible
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.
{'CVE-2020-1737'}
2021-04-20T16:43:33Z
2021-04-20T16:43:33Z
MODERATE
7.8
{'CWE-22'}
{'https://github.com/advisories/GHSA-893h-35v4-mxqx', 'https://security.gentoo.org/glsa/202006-11', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737', 'https://github.com/ansible/ansible/issues/67795', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1737', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/'}
null
GHSA
GHSA-hxjf-h2mh-r6hj
Use After Free in libpulse-binding
An issue was discovered in the libpulse-binding crate before 1.2.1 for Rust. get_format_info can cause a use-after-free.
{'CVE-2018-25027'}
2022-01-06T22:20:12Z
2022-01-06T22:20:12Z
HIGH
7.5
{'CWE-416'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/libpulse-binding/RUSTSEC-2018-0021.md', 'https://rustsec.org/advisories/RUSTSEC-2018-0021.html', 'https://github.com/advisories/GHSA-hxjf-h2mh-r6hj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25027'}
null