ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-cr3f-r24j-3chw
|
Cobbler before 3.3.0 allows authorization bypass for modification of settings.
|
Cobbler before 3.3.0 allows authorization bypass for modification of settings.
|
{'CVE-2021-40325'}
|
2021-10-13T17:27:13Z
|
2021-10-05T17:53:29Z
|
MODERATE
| 0
|
{'CWE-863'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40325', 'https://github.com/advisories/GHSA-cr3f-r24j-3chw', 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}
| null |
GHSA
|
GHSA-hp68-xhvj-x6j6
|
Insufficient patch for Regular Expression Denial of Service (ReDoS) to jsx-slack v4.5.1
|
We found the patch for CVE-2021-43838 in jsx-slack v4.5.1 is insufficient to save from Regular Expression Denial of Service (ReDoS) attack.
This vulnerability affects to jsx-slack v4.5.1 and earlier versions.
### Impact
If attacker can put a lot of JSX elements into `<blockquote>` tag _with including multibyte characters_, an internal regular expression for escaping characters may consume an excessive amount of computing resources.
```javascript
/** @jsxImportSource jsx-slack */
import { Section } from 'jsx-slack'
console.log(
<Section>
<blockquote>
{[...Array(40)].map(() => (
<p>亜</p>
))}
</blockquote>
</Section>
)
```
v4.5.1 has released by passing the test against ASCII characters but missed the case of multibyte characters.
https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q
### Patches
jsx-slack v4.5.2 has updated regular expressions for escaping blockquote characters to prevent catastrophic backtracking. It is also including an updated test case to confirm rendering multiple tags in `<blockquote>` with multibyte characters.
### References
- https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc
### Credits
Thanks to @hieki for finding out this vulnerability.
|
{'CVE-2021-43843'}
|
2022-04-19T19:03:18Z
|
2022-01-06T18:34:18Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-hp68-xhvj-x6j6', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43843', 'https://github.com/yhatt/jsx-slack/releases/tag/v4.5.2', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q', 'https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc'}
| null |
GHSA
|
GHSA-vxhc-c4qm-647p
|
Improper Access Control in Dolibarr
|
In “Dolibarr” application, 2.8.1 to 13.0.4 don’t restrict or incorrectly restricts access to a resource from an unauthorized actor. A low privileged attacker can modify the Private Note which only an administrator has rights to do, the affected field is at “/adherents/note.php?id=1” endpoint.
|
{'CVE-2021-25954'}
|
2021-10-21T13:35:03Z
|
2021-08-11T15:18:11Z
|
MODERATE
| 4.3
|
{'CWE-863', 'CWE-284'}
|
{'https://github.com/advisories/GHSA-vxhc-c4qm-647p', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25954', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25954', 'https://github.com/Dolibarr/dolibarr/commit/8cc100012d46282799fb19f735a53b7101569377'}
| null |
GHSA
|
GHSA-q34c-48gc-m9g8
|
Moderate severity vulnerability that affects actionpack
|
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "['xyz', nil]" values, a related issue to CVE-2012-2660.
|
{'CVE-2012-2694'}
|
2021-09-16T19:19:24Z
|
2017-10-24T18:33:38Z
|
MODERATE
| 0
| null |
{'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html', 'https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-q34c-48gc-m9g8', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2694', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}
| null |
GHSA
|
GHSA-jmgw-6vjg-jjwg
|
High severity vulnerability that affects actionpack
|
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
|
{'CVE-2013-0156'}
|
2021-09-14T19:48:13Z
|
2017-10-24T18:33:37Z
|
HIGH
| 0
|
{'CWE-20'}
|
{'http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html', 'http://rhn.redhat.com/errata/RHSA-2013-0153.html', 'http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0156', 'https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156', 'https://github.com/advisories/GHSA-jmgw-6vjg-jjwg', 'http://www.kb.cert.org/vuls/id/628463', 'http://www.insinuator.net/2013/01/rails-yaml/', 'https://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source&output=gplain', 'http://www.kb.cert.org/vuls/id/380039', 'http://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.html', 'http://rhn.redhat.com/errata/RHSA-2013-0155.html', 'http://www.debian.org/security/2013/dsa-2604', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/', 'https://puppet.com/security/cve/cve-2013-0156'}
| null |
GHSA
|
GHSA-wmpv-c2jp-j2xg
|
ERC1155Supply vulnerability in OpenZeppelin Contracts
|
When ERC1155 tokens are minted, a callback is invoked on the receiver of those tokens, as required by the spec. When including the `ERC1155Supply` extension, total supply is not updated until after the callback, thus during the callback the reported total supply is lower than the real number of tokens in circulation.
### Impact
If a system relies on accurately reported supply, an attacker may be able to mint tokens and invoke that system after receiving the token balance but before the supply is updated.
### Patches
A fix is included in version 4.3.3 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
### Workarounds
If accurate supply is relevant, do not mint tokens to untrusted receivers.
### Credits
The issue was identified and reported by @ChainSecurityAudits.
### For more information
Read [TotalSupply Inconsistency in ERC1155 NFT Tokens](https://medium.com/chainsecurity/totalsupply-inconsistency-in-erc1155-nft-tokens-8f8e3b29f5aa) by @ChainSecurityAudits for a more detailed breakdown.
If you have any questions or comments about this advisory, email us at security@openzeppelin.com.
| null |
2022-04-19T19:03:14Z
|
2021-11-15T23:28:18Z
|
LOW
| 0
| null |
{'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wmpv-c2jp-j2xg', 'https://github.com/advisories/GHSA-wmpv-c2jp-j2xg'}
| null |
GHSA
|
GHSA-mh9j-v6mq-pfch
|
Path manipulation in matyhtf/framework
|
matyhtf framework v3.0.5 is affected by a path manipulation vulnerability in Smarty.class.php. The issue was fixed in version 3.0.6.
|
{'CVE-2021-43676'}
|
2022-03-18T15:08:05Z
|
2021-12-04T00:01:07Z
|
CRITICAL
| 9.8
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43676', 'https://github.com/matyhtf/framework/commit/25084603b7ea771eebe263d39744fe6abf1f8d61', 'https://github.com/advisories/GHSA-mh9j-v6mq-pfch', 'https://github.com/matyhtf/framework/issues/206'}
| null |
GHSA
|
GHSA-gv2h-gf8m-r68j
|
Exposure of server configuration in github.com/go-vela/server
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
* The ability to expose configuration set in the [Vela server](https://github.com/go-vela/server) via [pipeline template functionality](https://go-vela.github.io/docs/templates/overview/).
* It impacts all users of Vela.
Sample of template exposing server configuration [using Sprig's `env` function](http://masterminds.github.io/sprig/os.html):
```yaml
metadata:
template: true
steps:
- name: sample
image: alpine:latest
commands:
# OAuth client ID for Vela <-> GitHub communication
- echo {{ env "VELA_SOURCE_CLIENT" }}
# secret used for server <-> worker communication
- echo {{ env "VELA_SECRET" }}
```
### Patches
_Has the problem been patched? What versions should users upgrade to?_
* Upgrade to `0.6.1`
#### Additional Recommended Action(s)
* Rotate all secrets
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
* No
### For more information
If you have any questions or comments about this advisory:
* Email us at [vela@target.com](mailto:vela@target.com)
|
{'CVE-2020-26294'}
|
2022-04-19T19:02:43Z
|
2022-02-15T00:19:57Z
|
HIGH
| 7.4
|
{'CWE-200', 'CWE-78'}
|
{'https://github.com/go-vela/compiler/commit/f1ace5f8a05c95c4d02264556e38a959ee2d9bda', 'https://github.com/helm/helm/blob/6297c021cbda1483d8c08a8ec6f4a99e38be7302/pkg/engine/funcs.go#L46-L47', 'https://github.com/go-vela/compiler/security/advisories/GHSA-gv2h-gf8m-r68j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26294', 'https://github.com/advisories/GHSA-gv2h-gf8m-r68j', 'https://pkg.go.dev/github.com/go-vela/compiler/compiler'}
| null |
GHSA
|
GHSA-3qpm-h9ch-px3c
|
Remote code injection, Improper Input Validation and Uncontrolled Recursion in Log4j library
|
### Summary
The version used of Log4j, the library used for logging by PowerNukkit, is subject to a remote code execution vulnerability via the ldap JNDI parser.
It's well detailed at [CVE-2021-44228](https://github.com/advisories/GHSA-jfh8-c2jp-5v3q) and CVE-2021-45105(https://github.com/advisories/GHSA-p6xc-xr62-6r2g).
### Impact
Malicious client code could be used to send messages and cause remote code execution on the server.
### Patches
PowerNukkit `1.5.2.1` is a patch-release that only updates the Log4j version to `2.17.0` and should be used instead of `1.5.2.0`.
All versions prior to `1.5.2.1` are affected and are not patched.
### Workarounds
If you can't upgrade, you can use the `-Dlog4j2.formatMsgNoLookups=true` startup argument as remediation, as this prevents the vulnerability from happening.
### References
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://github.com/advisories/GHSA-p6xc-xr62-6r2g
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the PowerNukkit repository](https://github.com/PowerNukkit/PowerNukkit/issues)
| null |
2022-04-19T19:03:18Z
|
2022-01-06T18:31:23Z
|
CRITICAL
| 10
|
{'CWE-20', 'CWE-502', 'CWE-400'}
|
{'https://github.com/advisories/GHSA-3qpm-h9ch-px3c', 'https://github.com/PowerNukkit/PowerNukkit/security/advisories/GHSA-3qpm-h9ch-px3c'}
| null |
GHSA
|
GHSA-855m-jchh-9qjc
|
Malicious Package in commnader
|
All versions of `commnader` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:01:43Z
|
2020-09-02T20:19:22Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-855m-jchh-9qjc', 'https://www.npmjs.com/advisories/850'}
| null |
GHSA
|
GHSA-7g8m-5qh9-9pgw
|
Directory Traversal in wind-mvc
|
Affected versions of `wind-mvc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16220'}
|
2021-01-14T15:46:39Z
|
2020-09-01T18:07:51Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16220', 'https://nodesecurity.io/advisories/417', 'https://github.com/advisories/GHSA-7g8m-5qh9-9pgw', 'https://www.npmjs.com/advisories/417', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wind-mvc'}
| null |
GHSA
|
GHSA-2gxj-qrp2-53jv
|
Incorrect reliance on Trait memory layout in mopa
|
An issue was discovered in the mopa crate through 2021-06-01 for Rust. It incorrectly relies on Trait memory layout, possibly leading to future occurrences of arbitrary code execution or ASLR bypass.
|
{'CVE-2021-45695'}
|
2022-01-07T18:24:37Z
|
2022-01-06T22:11:11Z
|
CRITICAL
| 9.8
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45695', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/mopa/RUSTSEC-2021-0095.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0095.html', 'https://github.com/advisories/GHSA-2gxj-qrp2-53jv'}
| null |
GHSA
|
GHSA-gvr4-7xgc-gx3w
|
Cross-Site Scripting in fileview
|
All versions of `fileview` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-15602'}
|
2021-01-08T20:23:38Z
|
2020-04-01T16:36:15Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1452', 'https://github.com/itworkcenter/fileview/issues/1', 'https://github.com/advisories/GHSA-gvr4-7xgc-gx3w', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15602', 'https://hackerone.com/reports/507159', 'https://github.com/itworkcenter/fileview/pull/2'}
| null |
GHSA
|
GHSA-w5m8-5v9m-xhx5
|
Critical severity vulnerability that affects Haraka
|
Haraka version 2.8.8 and earlier comes with a plugin for processing attachments for zip files. Versions 2.8.8 and earlier can be vulnerable to command injection.
|
{'CVE-2016-1000282'}
|
2021-09-21T17:56:30Z
|
2019-02-12T17:26:10Z
|
CRITICAL
| 9.8
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-w5m8-5v9m-xhx5', 'https://github.com/outflanknl/Exploits/blob/master/harakiri-CVE-2016-1000282.py', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000282'}
| null |
GHSA
|
GHSA-j96r-xvjq-r9pg
|
Moderate severity vulnerability that affects activesupport
|
The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
|
{'CVE-2015-3227'}
|
2021-09-14T19:36:52Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 0
| null |
{'http://lists.opensuse.org/opensuse-updates/2015-07/msg00050.html', 'https://github.com/advisories/GHSA-j96r-xvjq-r9pg', 'http://www.debian.org/security/2016/dsa-3464', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3227', 'http://www.securityfocus.com/bid/75234', 'http://www.securitytracker.com/id/1033755', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/bahr2JLnxvk/x4EocXnHPp8J', 'http://openwall.com/lists/oss-security/2015/06/16/16'}
| null |
GHSA
|
GHSA-52c9-458g-whrf
|
Malicious Package in js-3ha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:00:43Z
|
2020-09-03T22:58:17Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-52c9-458g-whrf', 'https://www.npmjs.com/advisories/1280'}
| null |
GHSA
|
GHSA-j8jp-9x42-4pj5
|
Unrestricted Upload of File with Dangerous Type in MODX Revolution
|
MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.
|
{'CVE-2022-26149'}
|
2022-03-11T23:20:59Z
|
2022-02-27T00:00:14Z
|
HIGH
| 7.2
|
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26149', 'https://github.com/advisories/GHSA-j8jp-9x42-4pj5', 'https://github.com/sartlabs/0days/blob/main/Modx/Exploit.txt'}
| null |
GHSA
|
GHSA-8wwf-2644-f8x4
|
Path traversal
|
The thefuck (aka The Fuck) package before 3.31 for Python allows Path Traversal that leads to arbitrary file deletion via the `undo archive operation` feature.
|
{'CVE-2021-34363'}
|
2022-03-29T22:16:29Z
|
2021-06-15T15:49:01Z
|
CRITICAL
| 9.1
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-34363', 'https://github.com/nvbn/thefuck/commit/e343c577cd7da4d304b837d4a07ab4df1e023092', 'https://github.com/nvbn/thefuck/releases/tag/3.31', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YA6UNQSOY6M3NJDZLS6YJXTS4WGDMEEJ/', 'https://github.com/advisories/GHSA-8wwf-2644-f8x4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MEDDLBFVRUQHPYIBJ4MFM3M4NUJUXL5/', 'https://vuln.ryotak.me/advisories/48'}
| null |
GHSA
|
GHSA-rc77-xxq6-4mff
|
Command Injection in hot-formula-parser
|
Versions of `hot-formula-parser` prior to 3.0.1 are vulnerable to Command Injection. The package fails to sanitize values passed to the `parse` function and concatenates it in an `eval` call. If a value of the formula is supplied by user-controlled input it may allow attackers to run arbitrary commands in the server.
Parsing the following formula creates a `test` file in the present directory:
`"SUM([(function(){require('child_process').execSync('touch test')})(),2])"`
## Recommendation
Upgrade to version 3.0.1 or later.
|
{'CVE-2020-6836'}
|
2021-08-25T21:04:45Z
|
2020-05-06T19:32:33Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://blog.truesec.com/2020/01/17/reverse-shell-through-a-node-js-math-parser/', 'https://github.com/handsontable/formula-parser/commit/396b089738d4bf30eb570a4fe6a188affa95cd5e', 'https://www.npmjs.com/advisories/1439', 'https://github.com/advisories/GHSA-rc77-xxq6-4mff', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6836', 'https://github.com/handsontable/formula-parser/pull/58'}
| null |
GHSA
|
GHSA-99p8-9p2c-49j4
|
Improper Access Control in Onionshare
|
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerability ID: OTF-009
- Vulnerability type: Improper Access Control
- Threat level: Low
## Description:
Authenticated users (or unauthenticated in public mode) can send messages without being visible in the list of chat participants.
## Technical description:
Prerequisites:
- Existing chatroom
- Access to the chatroom (Public or known Private Key)
- Either a modified frontend client or manual requests from burp/curl
If a user opens the chatroom without emitting the join message he will not be present in session.users[x] list. Therefore there is no listing in the frontend and no chat participant knows another party joined the chat. It is still possible to send messages in the chatroom.
If a user decides to abuse OTF-003 (page 22) he can impersonate messages from existing users; others would not be able to distinguish original and faked messages. This is also a prerequisite for OTF-004 (page 19).
## Impact:
An adversary with access to the chat environment can send messages to the chat without being visible in the list of chat participants.
## Recommendation:
- Allow chat access only after emission of the join event.
- Implement proper session handling.
|
{'CVE-2022-21695'}
|
2022-01-21T23:20:16Z
|
2022-01-21T23:20:16Z
|
MODERATE
| 4.3
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21695', 'https://github.com/advisories/GHSA-99p8-9p2c-49j4', 'https://github.com/onionshare/onionshare/security/advisories/GHSA-99p8-9p2c-49j4', 'https://github.com/onionshare/onionshare/releases/tag/v2.5'}
| null |
GHSA
|
GHSA-hx8w-ghh8-r4xf
|
Write access to the Catalog for any user when restricted-admin role is enabled in Rancher
|
### Impact
This vulnerability only affects customers using the [`restricted-admin`](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/global-permissions/#restricted-admin) role in Rancher. For this role to be active, Rancher must be bootstrapped with the environment variable `CATTLE_RESTRICTED_DEFAULT_ADMIN=true` or the configuration flag `restrictedAdmin=true`.
A flaw was discovered in Rancher versions from 2.5.0 up to and including 2.5.12 and from 2.6.0 up to and including 2.6.3 where the `global-data` role in `cattle-global-data` namespace grants write access to the Catalogs. Since each user with any level of catalog access was bound to the `global-data` role, this grants write access to templates (`CatalogTemplates`) and template versions (`CatalogTemplateVersions`) for any user with any level of catalog access. New users created in Rancher are by default assigned to the `user` role (standard user), which is not designed to grant write catalog access. This vulnerability effectively elevates the privilege of any user to write access for the catalog template and catalog template version resources.
A malicious user could abuse this vulnerability to:
1. Make applications or individual versions of applications visible or hidden on the UI, by modifying `version` and `rancherMaxVersion` fields.
2. Change the logo (field `icon`) of an application or template to an arbitrary image.
3. Make a chart appear as a trusted or partner chart. This can be abused to make less trusted charts, such as customer defined charts, appear more legitimate than they are, by adding the label `io.rancher.certified: partner`.
4. Swap template versions between templates of charts inside the same catalog. This can be exploited to swap the files from one chart or version to another, by changing `versionDir` field. When a user on the target cluster deploys their chart, it will deploy the modified version.
This vulnerability does not allow to modify the base64 encoded `files` fields of the `templateVersions`, so one cannot inject arbitrary data to charts that have already been pulled from their respective catalog.
Without access to the Catalog, malicious users are limited to injecting apps which already exist in a registered catalog. They would need write access to the catalog or external write access to a source repo to inject arbitrary code.
### Patches
Patched versions include releases 2.5.13, 2.6.4 and later versions.
### Workarounds
Limit access in Rancher to trusted users. There is not a direct mitigation besides upgrading to the patched Rancher versions.
**Note:** If you use the `restricted-admin` as the default admin role in your environment, it's highly advised to review `CatalogTemplates` and `CatalogTemplateVersions` for possible malicious modifications.
### For more information
If you have any questions or comments about this advisory:
* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.
* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
|
{'CVE-2021-4200'}
|
2022-05-02T19:26:56Z
|
2022-05-02T19:26:55Z
|
HIGH
| 8.1
|
{'CWE-285', 'CWE-269'}
|
{'https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/global-permissions/#restricted-admin', 'https://github.com/rancher/rancher/security/advisories/GHSA-hx8w-ghh8-r4xf', 'https://github.com/advisories/GHSA-hx8w-ghh8-r4xf'}
| null |
GHSA
|
GHSA-pwhf-7427-9vv2
|
Non-atomic writes in cgc
|
An issue was discovered in the cgc crate through 2020-12-10 for Rust. Ptr::write performs non-atomic write operations on an underlying pointer.
|
{'CVE-2020-36468'}
|
2021-08-25T20:56:57Z
|
2021-08-25T20:56:57Z
|
MODERATE
| 5.9
|
{'CWE-657'}
|
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/cgc/RUSTSEC-2020-0148.md', 'https://github.com/advisories/GHSA-pwhf-7427-9vv2', 'https://rustsec.org/advisories/RUSTSEC-2020-0148.html', 'https://github.com/playXE/cgc/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36468'}
| null |
GHSA
|
GHSA-782p-53wq-cxmj
|
High severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua
|
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
|
{'CVE-2018-12086'}
|
2021-06-11T13:55:56Z
|
2018-10-16T19:51:31Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'http://www.securityfocus.com/bid/105538', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12086.pdf', 'https://www.debian.org/security/2018/dsa-4359', 'https://github.com/advisories/GHSA-782p-53wq-cxmj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12086', 'http://www.securitytracker.com/id/1041909'}
| null |
GHSA
|
GHSA-wwf2-5cj8-jx6w
|
Hijacked Environment Variables in nodesqlite
|
The `nodesqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16049'}
|
2021-01-08T00:50:40Z
|
2018-07-23T20:50:21Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16049', 'https://www.npmjs.com/advisories/492', 'https://github.com/advisories/GHSA-wwf2-5cj8-jx6w', 'https://nodesecurity.io/advisories/492'}
| null |
GHSA
|
GHSA-jvjp-vh27-r9h5
|
Cross-site Scripting in PiranhaCMS
|
In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution.
|
{'CVE-2021-25977'}
|
2021-10-27T18:53:03Z
|
2021-10-27T18:53:03Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25977', 'https://github.com/advisories/GHSA-jvjp-vh27-r9h5', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977'}
| null |
GHSA
|
GHSA-x65c-4fgj-5fc3
|
Cross-site Scripting in pandao
|
pandao Editor.md 1.5.0 allows XSS via an attribute of an ABBR or SUP element.
|
{'CVE-2019-14653'}
|
2021-08-17T21:58:08Z
|
2019-08-23T00:05:00Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/pandao/editor.md/issues/715', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14653', 'https://github.com/advisories/GHSA-x65c-4fgj-5fc3'}
| null |
GHSA
|
GHSA-cr6j-3jp9-rw65
|
Critical severity vulnerability that affects org.apache.struts:struts2-core
|
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when using results with no namespace and in same time, its upper action(s) have no or wildcard namespace. Same possibility when using url tag which doesn't have value and action set and in same time, its upper action(s) have no or wildcard namespace.
|
{'CVE-2018-11776'}
|
2021-09-09T20:50:15Z
|
2018-10-18T19:24:38Z
|
HIGH
| 8.1
|
{'CWE-20'}
|
{'http://www.securitytracker.com/id/1041888', 'https://www.exploit-db.com/exploits/45262/', 'https://github.com/advisories/GHSA-cr6j-3jp9-rw65', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://www.exploit-db.com/exploits/45260/', 'https://lgtm.com/blog/apache_struts_CVE-2018-11776', 'https://security.netapp.com/advisory/ntap-20181018-0002/', 'https://cwiki.apache.org/confluence/display/WW/S2-057', 'http://www.securitytracker.com/id/1041547', 'http://www.securityfocus.com/bid/105125', 'https://github.com/hook-s3c/CVE-2018-11776-Python-PoC', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012', 'https://security.netapp.com/advisory/ntap-20180822-0001/', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11776', 'https://www.exploit-db.com/exploits/45367/'}
| null |
GHSA
|
GHSA-536q-8gxx-m782
|
Cross-Site Scripting in dojo
|
Versions of `dojo` prior to 1.4.2 are vulnerable to DOM-based Cross-Site Scripting (XSS). The package does not sanitize URL parameters in the `_testCommon.js` and `runner.html` test files, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 1.4.2 or later.
|
{'CVE-2010-2273'}
|
2021-08-17T22:24:34Z
|
2019-09-11T23:02:57Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/dojo/dojo/pull/307', 'http://secunia.com/advisories/38964', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50932', 'https://bugs.dojotoolkit.org/ticket/10773', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50849', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50994', 'http://bugs.dojotoolkit.org/ticket/10773', 'http://secunia.com/advisories/40007', 'https://github.com/advisories/GHSA-536q-8gxx-m782', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50856', 'https://www.npmjs.com/advisories/972', 'http://www.vupen.com/english/advisories/2010/1281', 'http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/', 'http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/', 'https://github.com/dojo/dojo/commit/9117ffd5a3863e44c92fcd58564c0da22be858f4', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50958', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833', 'http://www-01.ibm.com/support/docview.wss?uid=swg21431472', 'https://nvd.nist.gov/vuln/detail/CVE-2010-2273', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50896'}
| null |
GHSA
|
GHSA-c9cg-q8r2-xvjq
|
Improper Authentication in Auth0.AuthenticationApi
|
Auth0 auth0.net before 6.5.4 has Incorrect Access Control because IdentityTokenValidator can be accidentally used to validate untrusted ID tokens.
|
{'CVE-2019-16929'}
|
2021-08-18T22:01:21Z
|
2019-10-24T20:56:12Z
|
HIGH
| 7.5
|
{'CWE-287'}
|
{'https://auth0.com/docs/security/bulletins/cve-2019-16929', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16929', 'https://github.com/advisories/GHSA-c9cg-q8r2-xvjq'}
| null |
GHSA
|
GHSA-23c7-6444-399m
|
Improper Input Validation in sopel-plugins.channelmgnt
|
### Impact
On some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once.
We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that.
Freenode is not affected.
### Patches
Upgrade to 2.0.1 or higher
### Workarounds
Do not use this plugin on networks where TARGMAX > 1.
### For more information
If you have any questions or comments about this advisory:
* Open an issue on [phab](https://phab.mirahezebots.org/maniphest/task/edit/form/1/).
* Email us at [staff(at)mirahezebots(dot)org](mailto:staff@mirahezebots.org)
|
{'CVE-2021-21431'}
|
2021-04-12T20:48:22Z
|
2021-04-09T15:42:40Z
|
HIGH
| 7.6
|
{'CWE-20', 'CWE-284'}
|
{'https://github.com/MirahezeBots/sopel-channelmgnt/commit/643388365f28c5cc682254ab913c401f0e53260a', 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856', 'https://github.com/advisories/GHSA-23c7-6444-399m', 'https://pypi.org/project/sopel-plugins.channelmgnt/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21431', 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m'}
| null |
GHSA
|
GHSA-q6gq-997w-f55g
|
Infinite loop in xz
|
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
|
{'CVE-2020-16845'}
|
2021-12-16T19:16:40Z
|
2021-12-16T19:16:40Z
|
HIGH
| 7.5
|
{'CWE-835'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16845', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html', 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo', 'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/', 'https://security.netapp.com/advisory/ntap-20200924-0002/', 'https://www.debian.org/security/2021/dsa-4848', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/', 'https://github.com/advisories/GHSA-q6gq-997w-f55g', 'https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html', 'https://github.com/ulikunitz/xz/issues/35'}
| null |
GHSA
|
GHSA-cr8h-x88h-jwj2
|
Downloads Resources over HTTP in wixtoolset
|
Affected versions of `wixtoolset` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `wixtoolset`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2015.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10663'}
|
2021-01-08T18:55:58Z
|
2019-02-18T23:44:45Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/wixtoolset/issues/issues/6187', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10663', 'https://www.npmjs.com/advisories/264', 'https://github.com/advisories/GHSA-cr8h-x88h-jwj2', 'https://nodesecurity.io/advisories/264'}
| null |
GHSA
|
GHSA-rjvj-673q-4hfw
|
Command Injection in traceroute
|
All versions of `traceroute` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `trace` function is vulnerable and can be abused if the `host` value is controlled by an attacker.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-04T20:53:02Z
|
2020-09-04T17:54:31Z
|
CRITICAL
| 0
|
{'CWE-77'}
|
{'https://snyk.io/vuln/npm:traceroute:20160311', 'https://www.npmjs.com/advisories/1465', 'https://github.com/advisories/GHSA-rjvj-673q-4hfw', 'https://github.com/jaw187/node-traceroute'}
| null |
GHSA
|
GHSA-38cg-gg9j-q9j9
|
Improper Certificate Validation and Insufficient Verification of Data Authenticity in Keycloak
|
A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.
|
{'CVE-2019-3875'}
|
2021-08-17T15:33:33Z
|
2019-06-27T17:25:57Z
|
MODERATE
| 4.8
|
{'CWE-295', 'CWE-345'}
|
{'https://github.com/advisories/GHSA-38cg-gg9j-q9j9', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3875', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3875'}
| null |
GHSA
|
GHSA-mm4m-qg48-f7wc
|
Improper Synchronization and Race Condition in vm-memory
|
rust-vmm vm-memory before 0.1.1 and 0.2.x before 0.2.1 allows attackers to cause a denial of service (loss of IP networking) because read_obj and write_obj do not properly access memory. This affects aarch64 (with musl or glibc) and x86_64 (with musl).
|
{'CVE-2020-13759'}
|
2021-08-25T21:01:29Z
|
2021-08-25T21:01:29Z
|
HIGH
| 7.5
|
{'CWE-662', 'CWE-362'}
|
{'https://github.com/advisories/GHSA-mm4m-qg48-f7wc', 'https://github.com/rust-vmm/vm-memory/releases/tag/v0.2.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13759', 'https://github.com/rust-vmm/vm-memory/issues/93', 'https://github.com/rust-vmm/vm-memory/releases/tag/v0.1.1'}
| null |
GHSA
|
GHSA-fcr6-6cph-vmcm
|
Stored XSS vulnerability in Jenkins Git Parameter Plugin
|
Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
|
{'CVE-2022-29040'}
|
2022-04-29T04:21:08Z
|
2022-04-13T00:00:17Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29040', 'https://github.com/advisories/GHSA-fcr6-6cph-vmcm', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}
| null |
GHSA
|
GHSA-66hf-2p6w-jqfw
|
XSS in laravel/framework
|
A security researcher has disclosed a possible XSS vulnerability in the Blade templating engine.
Given the following two Blade templates:
resources/views/parent.blade.php:
```html
@section('content')
<input value="{{ $value }}">
@show
```
resources/views/child.blade.php:
```html
@extends('parent')
@section('content')
<input value="{{ $value }}">
@endsection
```
And a route like the following:
```php
Route::get('/example', function() {
$value = '//localhost/###parent-placeholder-040f06fd774092478d450774f5ba30c5da78acc8## onclick=location.assign(this.value);//';
return view('child', ['value' => $value]);
});
```
The broken HTML element may be clicked and the user is taken to another location in their browser due to XSS. This is due to the user being able to guess the parent placeholder SHA-1 hash by trying common names of sections. If the parent template contains an exploitable HTML structure an XSS vulnerability can be exposed.
This vulnerability has been patched by determining the parent placeholder at runtime and using a random hash that is unique to each request.
|
{'CVE-2021-43808'}
|
2022-04-19T19:03:17Z
|
2021-12-08T19:57:36Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-66hf-2p6w-jqfw', 'https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b', 'https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw'}
| null |
GHSA
|
GHSA-47qg-q58v-7vrp
|
UNEDITABLE_SCHEMAS and UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES not respected by frontend service backend
|
### Impact
Any install that has `UNEDITABLE_SCHEMAS` and/or `UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES` set in the front-end, is being impacted. The value of these properties is ignored if set, allowing any user to modify table and column descriptions, even though the properties imply they shouldn't be.
### Patches
There is an attached PR that applies this restriction on the back-end.
### Workarounds
N/A
### References
N/A
### For more information
If you have any questions or comments about this advisory:
* Email us at [amundsen-security@lists.lfaidata.foundation](mailto:amundsen-security@lists.lfaidata.foundation)
### More details
Summary: I believe that UNEDITABLE_SCHEMAS and
UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES are only being applied on the
front-end, not on the frontend service back-end, allowing any user to
modify table and column descriptions even if this configuration parameter
is set.
Repro steps:
1. docker-compose -f docker-amundsen.yml up neo4j elasticsearch
amundsensearch amundsenmetadata
2. python example/scripts/sample_data_loader.py
3. FRONTEND_SVC_CONFIG_MODULE_CLASS=amundsen_application.config.TestConfig
PYTHONPATH=. python3 amundsen_application/wsgi.py
4. Attempt a modification to a table description:
curl '<http://localhost:5000/api/metadata/v0/put_table_description>' \\\\
-X 'PUT' \\\\
-H 'Content-Type: application/json;charset=UTF-8' \\\\
--data-binary '{"description":"2t test table","key":"hive://gold.test_schema/test_table1","source":"user"}'
{"msg":"Success"}
5. This correctly succeeds, which can be validated by GETing the info:
curl '<http://localhost:5000/api/metadata/v0/get_table_description?key=hive://gold.test_schema/test_table1>'
{"description":"1st test table","msg":"Success"}
At this point, modify TestConfig inside config.py to add this line: UNEDITABLE_SCHEMAS
= set(['test_schema'])
You can now re-run step 4, and step 5 with different data, and confirm
that the modification has persisted. If you build and run the UI, you can
see that on the page
<http://localhost:5000/table_detail/gold/hive/test_schema/test_table1>
http://localhost:5000/table_detail/gold/hive/test_schema/test_table1, the
inline editor is correctly disabled.
Looking at
amundsenfrontendlibrary/amundsen_application/api/metadata/v0.py:268
put_table_description, you can see there's no reference to
UNEDITABLE_SCHEMAS or UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES.
The only place I can find these referenced is in
amundsenfrontendlibrary/amundsen_application/api/utils/metadata_utils.py:marshall_table_full,
which would explain why the UI is correctly respecting this setting.
If this is correct, put_column_description would also be similarly
affected.
I believe the correct fix for all of these methods is to load the table,
run it through marshall_dashboard_partial to fully evaluate what's
editable or not (to reuse the same code path for FE and back-end), and
reject the response if it's not editable. I'll implement a fix along these
lines once someone confirms this.
History: This functionality was introduced in
<https://github.com/amundsen-io/amundsenfrontendlibrary/pull/497/files>
https://github.com/amundsen-io/amundsenfrontendlibrary/pull/497 on July
9, corresponding to the 2.3.0 release of amundsenfrontend. That release was
introduced into the main repo dockerfile on October 28 in
<https://github.com/amundsen-io/amundsen/pull/785>
https://github.com/amundsen-io/amundsen/pull/785
| null |
2022-04-19T19:02:40Z
|
2020-12-02T18:28:10Z
|
LOW
| 0
|
{'CWE-602'}
|
{'https://github.com/amundsen-io/amundsenfrontendlibrary/commit/0b47694ea74cbbef34e03eb45f29643b16a1332a', 'https://github.com/advisories/GHSA-47qg-q58v-7vrp', 'https://github.com/amundsen-io/amundsenfrontendlibrary/security/advisories/GHSA-47qg-q58v-7vrp'}
| null |
GHSA
|
GHSA-jv2r-jx6q-89jg
|
Use of Uninitialized Resource in bronzedb-protocol.
|
An issue was discovered in the bronzedb-protocol crate through 2021-01-03 for Rust. ReadKVExt may read from uninitialized memory locations.
|
{'CVE-2021-45682'}
|
2022-01-07T16:16:58Z
|
2022-01-06T22:16:32Z
|
CRITICAL
| 9.8
|
{'CWE-908'}
|
{'https://github.com/advisories/GHSA-jv2r-jx6q-89jg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45682', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/bronzedb-protocol/RUSTSEC-2021-0084.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0084.html'}
| null |
GHSA
|
GHSA-xxx9-3xcr-gjj3
|
XML Injection in Xerces Java affects Nokogiri
|
## Summary
Nokogiri v1.13.4 updates the vendored `xerces:xercesImpl` from 2.12.0 to 2.12.2, which addresses [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437). That CVE is scored as CVSS 6.5 "Medium" on the NVD record.
Please note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`.
## Mitigation
Upgrade to Nokogiri `>= v1.13.4`.
## Impact
### [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437) in xerces-J
- **Severity**: Medium
- **Type**: [CWE-91](https://cwe.mitre.org/data/definitions/91.html) XML Injection (aka Blind XPath Injection)
- **Description**: There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
- **See also**: https://github.com/advisories/GHSA-h65f-jvqw-m9fj
| null |
2022-04-11T21:39:49Z
|
2022-04-11T21:30:00Z
|
MODERATE
| 6.5
|
{'CWE-91'}
|
{'https://github.com/advisories/GHSA-xxx9-3xcr-gjj3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437', 'https://github.com/advisories/GHSA-h65f-jvqw-m9fj', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer'}
| null |
GHSA
|
GHSA-q5rx-8c2h-5q7j
|
Apache Gobblin trusts all certificates used for LDAP connections in Gobblin-as-a-Service
|
Apache Gobblin trusts all certificates used for LDAP connections in Gobblin-as-a-Service. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue.
|
{'CVE-2021-36152'}
|
2022-02-11T16:15:31Z
|
2022-02-06T00:01:07Z
|
CRITICAL
| 9.8
| null |
{'https://lists.apache.org/thread/3bxf7rbf4zh95r78jtgth6gwhr5fyl2j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36152', 'https://github.com/advisories/GHSA-q5rx-8c2h-5q7j'}
| null |
GHSA
|
GHSA-566x-hhrf-qf8m
|
Use after free in ordered-float
|
An issue was discovered in the ordered-float crate before 1.1.1 and 2.x before 2.0.1 for Rust. A NotNan value can contain a NaN.
|
{'CVE-2020-35923'}
|
2021-08-25T20:50:30Z
|
2021-08-25T20:50:30Z
|
MODERATE
| 5.5
|
{'CWE-416'}
|
{'https://github.com/advisories/GHSA-566x-hhrf-qf8m', 'https://rustsec.org/advisories/RUSTSEC-2020-0082.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35923', 'https://github.com/reem/rust-ordered-float/pull/71'}
| null |
GHSA
|
GHSA-mw7r-3g6w-85qg
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
|
{'CVE-2019-1131'}
|
2021-03-29T20:57:46Z
|
2021-03-29T20:57:46Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-mw7r-3g6w-85qg', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
| null |
GHSA
|
GHSA-q2qh-cgc2-qhr3
|
Directory Traversal in serve
|
Affected versions of `serve` do not properly handle `%2e` (.) and `%2f` (/) characters, and allow the, characters to be used in paths. This can be used to traverse the directory tree and list content of any directory the user running the process has access to.
Mitigating factors:
This vulnerability only allows listing of directory contents and does not allow reading of arbitrary files.
## Recommendation
Update to version 6.4.9 later.
|
{'CVE-2018-3712'}
|
2021-01-08T18:18:40Z
|
2018-07-27T17:07:50Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'https://github.com/zeit/serve/pull/316', 'https://github.com/advisories/GHSA-q2qh-cgc2-qhr3', 'https://hackerone.com/reports/307666', 'https://www.npmjs.com/advisories/561', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3712'}
| null |
GHSA
|
GHSA-hhff-3c89-5m7p
|
Directory Traversal in byucslabsix
|
Affected versions of `byucslabsix` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16166'}
|
2021-01-08T18:40:52Z
|
2018-07-23T20:45:42Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/byucslabsix', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16166', 'https://nodesecurity.io/advisories/399', 'https://www.npmjs.com/advisories/399', 'https://github.com/advisories/GHSA-hhff-3c89-5m7p'}
| null |
GHSA
|
GHSA-whjr-jj69-7prm
|
Malicious Package in import-mysql
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:15:59Z
|
2020-09-03T19:44:35Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-whjr-jj69-7prm', 'https://www.npmjs.com/advisories/1127'}
| null |
GHSA
|
GHSA-rffp-mc78-wjf7
|
Command Injection in cocos-utils
|
All versions of `cocos-utils` are vulnerable to Remote Code Execution. The `unzip()` function concatenates user input to `exec()` which may allow attackers to execute arbitrary commands on the server.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-09-27T16:20:58Z
|
2020-09-02T18:26:48Z
|
HIGH
| 0
|
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/829', 'https://github.com/advisories/GHSA-rffp-mc78-wjf7'}
| null |
GHSA
|
GHSA-hh8v-jmh3-9437
|
Cross-site scripting in SocksJS-node
|
htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter.
|
{'CVE-2020-8823'}
|
2021-04-14T15:14:26Z
|
2021-04-13T15:25:33Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://www.npmjs.com/package/sockjs', 'https://www.sockjs.org', 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS', 'https://github.com/advisories/GHSA-hh8v-jmh3-9437', 'https://snyk.io/vuln/SNYK-JS-SOCKJS-548397', 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8823'}
| null |
GHSA
|
GHSA-g84j-95x2-7g67
|
Downloads Resources over HTTP in tomita
|
Affected versions of `tomita` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10662'}
|
2021-01-08T18:48:35Z
|
2019-02-18T23:44:50Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10662', 'https://nodesecurity.io/advisories/267', 'https://github.com/advisories/GHSA-g84j-95x2-7g67', 'https://www.npmjs.com/advisories/267'}
| null |
GHSA
|
GHSA-p9wf-3xpg-c9g5
|
XML External Entity Injection in PyWPS
|
An XML external entity (XXE) injection in PyWPS before 4.5.0 allows an attacker to view files on the application server filesystem by assigning a path to the entity. OWSLib 0.24.1 may also be affected.
|
{'CVE-2021-39371'}
|
2021-09-07T17:16:01Z
|
2021-09-02T17:11:13Z
|
HIGH
| 7.5
|
{'CWE-91', 'CWE-611'}
|
{'https://github.com/geopython/pywps/pull/616', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00001.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39371', 'https://github.com/advisories/GHSA-p9wf-3xpg-c9g5', 'https://github.com/geopython/OWSLib/issues/790'}
| null |
GHSA
|
GHSA-fj93-7wm4-8x2g
|
Cross-Site Scripting in jquery-mobile
|
All version of `jquery-mobile` are vulnerable to Cross-Site Scripting. The package checks for content in `location.hash` and if a URL is found it does an XmlHttpRequest (XHR) to the URL and renders the response with `innerHTML`. It fails to validate the `Content-Type` of the response, allowing attackers to include malicious payloads as part of query parameters that are reflected back to the user. A response such as `{"q":"<iframe/src='javascript:alert(1)'></iframe>","results":[]}` would be parsed as HTML and the JavaScript payload executed.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-09-27T21:03:59Z
|
2020-09-02T21:22:47Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/jquery/jquery-mobile/issues/8640', 'https://gist.github.com/jupenur/e5d0c6f9b58aa81860bf74e010cf1685', 'https://snyk.io/vuln/SNYK-JS-JQUERYMOBILE-174599', 'https://www.npmjs.com/advisories/883', 'https://github.com/jquery/jquery-mobile/pull/8650', 'https://github.com/jquery/jquery-mobile/commit/b0d9cc758a48f13321750d7409fb7655dcdf2b50', 'https://github.com/advisories/GHSA-fj93-7wm4-8x2g', 'https://github.com/jquery/jquery-mobile/pull/8649'}
| null |
GHSA
|
GHSA-gmw6-94gg-2rc2
|
UNIX Symbolic Link (Symlink) Following in @npmcli/arborist
|
### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder.
This is accomplished by extracting package contents into a project's `node_modules` folder.
If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system.
Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed.
1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.)
2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe.
### Patches
2.8.2 (included in npm v7.20.7 and above)
### Workarounds
Do not run `npm install` on untrusted codebases, without first ensuring that the `node_modules` directory in the project is not a symbolic link.
### Fix
Prior to extracting any package contents, the `node_modules` folder into which it is extracted is verified to be a real directory. If it is not, then it is removed.
Caveat: if you are currently relying on creating a symbolic link to the `node_modules` folder in order to share dependencies between projects, then that will no longer be possible. Please use the `npm link` command, explicit `file:...` dependencies, and/or `workspaces` to share dependencies in a development environment.
|
{'CVE-2021-39135'}
|
2022-03-11T20:21:21Z
|
2021-08-31T16:03:34Z
|
MODERATE
| 8.2
|
{'CWE-61', 'CWE-59'}
|
{'https://github.com/advisories/GHSA-gmw6-94gg-2rc2', 'https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.npmjs.com/package/@npmcli/arborist', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39135'}
| null |
GHSA
|
GHSA-jcgr-9698-82jx
|
Improper Neutralization of Special Elements used in a Command ('Command Injection') in @floffah/build
|
### Impact
If you are using the esbuild target or command you are at risk of code/option injection. Attackers can use the command line option to maliciously change your settings in order to damage your project.
### Patches
The problem has been patched in v1.0.0 as it uses a proper method to pass configs to esbuild/estrella.
### Workarounds
There is no work around. You should update asap.
### Notes
This notice is mainly just to make sure people update to the latest version. This isn't that bad, but should encourage you to update.
| null |
2021-05-28T15:53:40Z
|
2021-05-28T15:53:40Z
|
LOW
| 0
|
{'CWE-77'}
|
{'https://github.com/Floffah/build/security/advisories/GHSA-jcgr-9698-82jx', 'https://github.com/advisories/GHSA-jcgr-9698-82jx'}
| null |
GHSA
|
GHSA-3mw4-6rj6-74g5
|
Null pointer dereference in TensorFlow
|
### Impact
The [implementation of `QuantizedMaxPool`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/quantized_pooling_ops.cc#L114-L130) has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer.
```python
import tensorflow as tf
tf.raw_ops.QuantizedMaxPool(
input = tf.constant([[[[4]]]], dtype=tf.quint8),
min_input = [],
max_input = [1],
ksize = [1, 1, 1, 1],
strides = [1, 1, 1, 1],
padding = "SAME", name=None
)
```
### Patches
We have patched the issue in GitHub commit [53b0dd6dc5957652f35964af16b892ec9af4a559](https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
|
{'CVE-2022-21739'}
|
2022-02-11T16:22:38Z
|
2022-02-09T23:46:46Z
|
MODERATE
| 6.5
|
{'CWE-476'}
|
{'https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21739', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/quantized_pooling_ops.cc#L114-L130', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3mw4-6rj6-74g5', 'https://github.com/advisories/GHSA-3mw4-6rj6-74g5'}
| null |
GHSA
|
GHSA-x2jp-hh65-4xvf
|
Cross-site scripting (XSS) and Server side request forgery (SSRF) in moodle
|
Text-based feedback answers required additional sanitizing to prevent stored XSS and blind SSRF risks in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
|
{'CVE-2021-20280'}
|
2021-11-18T15:25:56Z
|
2021-03-29T20:42:15Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=1939037', 'https://github.com/moodle/moodle/commit/a303eb9e9e387f95ea2a80cb1ce6c0b132ec1cc4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20280', 'https://moodle.org/mod/forum/discuss.php?d=419651', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'http://packetstormsecurity.com/files/164817/Moodle-Cross-Site-Scripting-Server-Side-Request-Forgery.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGOMHMYM3WICJ6D6U22Z6LPJGT5A6MZM/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/', 'https://github.com/advisories/GHSA-x2jp-hh65-4xvf'}
| null |
GHSA
|
GHSA-394c-5j6w-4xmx
|
Regular Expression Denial of Service (ReDoS) in ua-parser-js
|
The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).
|
{'CVE-2020-7793'}
|
2022-02-09T22:46:53Z
|
2022-02-09T22:46:53Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050387', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-1050388', 'https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b18', 'https://github.com/advisories/GHSA-394c-5j6w-4xmx', 'https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7793'}
| null |
GHSA
|
GHSA-wq3v-3grq-6f86
|
Improper Control of Dynamically-Managed Code Resources in Crafter CMS Crafter Studio
|
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy scripting. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.
|
{'CVE-2020-25802'}
|
2022-02-09T23:07:55Z
|
2022-02-09T23:07:55Z
|
HIGH
| 7.2
|
{'CWE-913'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25802', 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2020080101', 'https://github.com/advisories/GHSA-wq3v-3grq-6f86'}
| null |
GHSA
|
GHSA-q28m-8xjw-8vr5
|
Keepalive Connections Causing Denial Of Service in puma
|
This vulnerability is related to [CVE-2019-16770](https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994).
### Impact
The fix for CVE-2019-16770 was incomplete. The original fix only protected existing connections that had already been accepted from having their requests starved by greedy persistent-connections saturating all threads in the same process. However, new connections may still be starved by greedy persistent-connections saturating all threads in all processes in the cluster.
A `puma` server which received more concurrent `keep-alive` connections than the server had threads in its threadpool would service only a subset of connections, denying service to the unserved connections.
### Patches
This problem has been fixed in `puma` 4.3.8 and 5.3.1.
### Workarounds
Setting `queue_requests false` also fixes the issue. This is not advised when using `puma` without a reverse proxy, such as `nginx` or `apache`, because you will open yourself to slow client attacks (e.g. [slowloris](https://en.wikipedia.org/wiki/Slowloris_(computer_security))).
The fix is very small. [A git patch is available here](https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837) for those using [unsupported versions](https://github.com/puma/puma/security/policy#supported-versions) of Puma.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Puma](https://github.com/puma/puma).
* To report problems with this fix or to report another vulnerability, see [our security policy.](https://github.com/puma/puma/security/policy)
### Acknowledgements
Thank you to @MSP-Greg, @wjordan and @evanphx for their review on this issue.
Thank you to @ioquatix for providing a modified fork of `wrk` which made debugging this issue much easier.
|
{'CVE-2021-29509'}
|
2022-04-19T19:02:57Z
|
2021-05-18T01:27:15Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-q28m-8xjw-8vr5', 'https://github.com/puma/puma/security/advisories/GHSA-q28m-8xjw-8vr5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29509', 'https://rubygems.org/gems/puma', 'https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837', 'https://github.com/puma/puma/security/policy'}
| null |
GHSA
|
GHSA-xgj6-pgrm-x4r2
|
Moderate severity vulnerability that affects gtk2
|
Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.
|
{'CVE-2007-6183'}
|
2021-09-21T22:31:50Z
|
2017-10-24T18:33:38Z
|
MODERATE
| 0
|
{'CWE-134'}
|
{'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453689', 'http://securityreason.com/securityalert/3407', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/38757', 'http://www.vupen.com/english/advisories/2007/4022', 'http://security.gentoo.org/glsa/glsa-200712-09.xml', 'http://secunia.com/advisories/27825', 'https://nvd.nist.gov/vuln/detail/CVE-2007-6183', 'https://bugzilla.redhat.com/show_bug.cgi?id=402871', 'http://osvdb.org/40774', 'http://ruby-gnome2.svn.sourceforge.net/viewvc/ruby-gnome2/ruby-gnome2/trunk/gtk/src/rbgtkmessagedialog.c?view=log', 'http://em386.blogspot.com/2007/11/your-favorite-better-than-c-scripting.html', 'http://www.securityfocus.com/archive/1/484240/100/0/threaded', 'http://bugs.gentoo.org/show_bug.cgi?id=200623', 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00214.html', 'https://github.com/advisories/GHSA-xgj6-pgrm-x4r2', 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00251.html', 'http://www.debian.org/security/2007/dsa-1431', 'http://secunia.com/advisories/28060', 'http://secunia.com/advisories/28022', 'http://www.securityfocus.com/bid/26616', 'http://www.mandriva.com/security/advisories?name=MDVSA-2008:033', 'http://secunia.com/advisories/27975'}
| null |
GHSA
|
GHSA-p65m-qr5x-rrqq
|
High severity vulnerability that affects webbynode
|
The message function in lib/webbynode/notify.rb in the Webbynode gem 1.0.5.3 and earlier for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a growlnotify message.
|
{'CVE-2013-7086'}
|
2021-09-15T21:37:03Z
|
2017-10-24T18:33:36Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-p65m-qr5x-rrqq', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7086', 'http://www.vapid.dhs.org/advisories/webbynode-command-inj.html', 'http://archives.neohapsis.com/archives/bugtraq/2013-12/0079.html', 'https://github.com/webbynode/webbynode/pull/85', 'http://seclists.org/oss-sec/2013/q4/493', 'http://packetstormsecurity.com/files/124421', 'http://osvdb.org/100920', 'http://seclists.org/oss-sec/2013/q4/497', 'http://www.securityfocus.com/bid/64289', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89705'}
| null |
GHSA
|
GHSA-mg8r-9g6j-hwv9
|
Authentication Bypass in hapi-auth-jwt2
|
Versions of `hapi-auth-jwt2` prior to version 5.1.2 are affected by a complete authentication bypass vulnerability when in the `try` authentication mode.
## Recommendation
Update to version 5.1.2 or later.
|
{'CVE-2016-10525'}
|
2021-09-15T18:58:18Z
|
2019-02-18T23:39:00Z
|
CRITICAL
| 9.8
|
{'CWE-287'}
|
{'https://github.com/dwyl/hapi-auth-jwt2/pull/112', 'https://github.com/dwyl/hapi-auth-jwt2/issues/111', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10525', 'https://nodesecurity.io/advisories/81', 'https://github.com/advisories/GHSA-mg8r-9g6j-hwv9', 'https://www.npmjs.com/advisories/81'}
| null |
GHSA
|
GHSA-r35g-4525-29fq
|
Division by 0 in `FusedBatchNorm`
|
### Impact
An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.FusedBatchNorm`:
```python
import tensorflow as tf
x = tf.constant([], shape=[1, 1, 1, 0], dtype=tf.float32)
scale = tf.constant([], shape=[0], dtype=tf.float32)
offset = tf.constant([], shape=[0], dtype=tf.float32)
mean = tf.constant([], shape=[0], dtype=tf.float32)
variance = tf.constant([], shape=[0], dtype=tf.float32)
epsilon = 0.0
exponential_avg_factor = 0.0
data_format = "NHWC"
is_training = False
tf.raw_ops.FusedBatchNorm(
x=x, scale=scale, offset=offset, mean=mean,
variance=variance, epsilon=epsilon,
exponential_avg_factor=exponential_avg_factor,
data_format=data_format, is_training=is_training)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/828f346274841fa7505f7020e88ca36c22e557ab/tensorflow/core/kernels/fused_batch_norm_op.cc#L295-L297) performs a division based on the last dimension of the `x` tensor:
```cc
const int depth = x.dimension(3);
const int rest_size = size / depth;
```
Since this is controlled by the user, an attacker can trigger a denial of service.
### Patches
We have patched the issue in GitHub commit [1a2a87229d1d61e23a39373777c056161eb4084d](https://github.com/tensorflow/tensorflow/commit/1a2a87229d1d61e23a39373777c056161eb4084d).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29555'}
|
2021-05-21T14:23:58Z
|
2021-05-21T14:23:58Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/commit/1a2a87229d1d61e23a39373777c056161eb4084d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r35g-4525-29fq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29555', 'https://github.com/advisories/GHSA-r35g-4525-29fq'}
| null |
GHSA
|
GHSA-29hg-r7c7-54fr
|
Double free in insert_many
|
An issue was discovered in the insert_many crate through 2021-01-26 for Rust. Elements may be dropped twice if a .next() method panics.
|
{'CVE-2021-29933'}
|
2021-08-25T20:55:06Z
|
2021-08-25T20:55:06Z
|
HIGH
| 7.5
|
{'CWE-415'}
|
{'https://rustsec.org/advisories/RUSTSEC-2021-0042.html', 'https://github.com/rphmeier/insert_many/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29933', 'https://github.com/advisories/GHSA-29hg-r7c7-54fr'}
| null |
GHSA
|
GHSA-w9r2-qrpm-4rmj
|
Data race in disrustor
|
An issue was discovered in the disrustor crate through 2020-12-17 for Rust. RingBuffer doe not properly limit the number of mutable references.
|
{'CVE-2020-36470'}
|
2021-08-25T20:56:59Z
|
2021-08-25T20:56:59Z
|
MODERATE
| 5.9
|
{'CWE-362'}
|
{'https://github.com/advisories/GHSA-w9r2-qrpm-4rmj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36470', 'https://github.com/sklose/disrustor/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0150.html'}
| null |
GHSA
|
GHSA-2mw7-wggm-m6w3
|
Low severity vulnerability that affects ethereumjs-vm
|
ethereumjs-vm 2.4.0 allows attackers to cause a denial of service (vm.runCode failure and REVERT) via a "code: Buffer.from(my_code, 'hex')" attribute.
|
{'CVE-2018-19183'}
|
2021-08-31T19:28:41Z
|
2018-11-21T22:22:46Z
|
HIGH
| 7.5
|
{'CWE-119'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-19183', 'https://github.com/advisories/GHSA-2mw7-wggm-m6w3', 'https://github.com/ethereumjs/ethereumjs-vm/issues/386'}
| null |
GHSA
|
GHSA-7ggw-h8pp-r95r
|
Session ID not invalidated after logout
|
### Impact
When logging out, the session ID was not invalidated. This is not a problem while the user is logged out, but as soon as the user logs back in the old session ID would be valid again; which means that anyone that gained access to the old session cookie would be able to act as the logged in user. This is not a major concern for the majority of cases, since it requires a malicious party gaining access to the session cookie in the first place, but nevertheless has been fixed.
### Patches
Issue has been patched in Build 472 (v1.0.472) and v1.1.2.
### Workarounds
Apply https://github.com/octobercms/library/commit/642f597489e6f644d4bd9a0c267e864cabead024 to your installation manually if unable to upgrade to Build 472 or v1.1.2.
### References
- Reported by Anisio (Brazilian Information Security Analyst)
- http://cve.circl.lu/cve/CVE-2021-3311
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="699" alt="Screen Shot 2021-02-07 at 11 50 35 PM" src="https://user-images.githubusercontent.com/7253840/107180881-51eaf000-699f-11eb-8828-333128faf2a6.png">
|
{'CVE-2021-3311'}
|
2021-03-05T21:40:39Z
|
2021-02-10T02:32:35Z
|
LOW
| 0
|
{'CWE-613'}
|
{'https://github.com/octobercms/october/security/advisories/GHSA-7ggw-h8pp-r95r', 'https://anisiosantos.me/october-cms-token-reactivation', 'https://github.com/advisories/GHSA-7ggw-h8pp-r95r', 'https://packagist.org/packages/october/rain', 'https://octobercms.com/forum/chan/announcements', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3311', 'http://cve.circl.lu/cve/CVE-2021-3311', 'https://github.com/octobercms/library/commit/642f597489e6f644d4bd9a0c267e864cabead024'}
| null |
GHSA
|
GHSA-q4cq-539c-3mmm
|
Directory Traversal in serveryztyzt
|
Affected versions of `serveryztyzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16103'}
|
2021-01-14T15:55:11Z
|
2020-09-01T16:48:14Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt', 'https://github.com/advisories/GHSA-q4cq-539c-3mmm', 'https://www.npmjs.com/advisories/354', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16103', 'https://nodesecurity.io/advisories/354'}
| null |
GHSA
|
GHSA-m33v-338h-4v9f
|
Path traversal in Node-Red
|
### Impact
This vulnerability allows arbitrary path traversal via the Projects API.
If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API.
### Patches
The issue has been patched in Node-RED 1.2.8
### Workarounds
The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED.
The primary workaround is not give untrusted users read access to the Node-RED editor.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@nodered.org](mailto:team@nodered.org)
### Acknowledgements
Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.
|
{'CVE-2021-21298'}
|
2021-03-01T18:55:47Z
|
2021-02-26T16:31:23Z
|
LOW
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-m33v-338h-4v9f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21298', 'https://github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f', 'https://github.com/node-red/node-red/releases/tag/1.2.8', 'https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456', 'https://www.npmjs.com/package/@node-red/runtime'}
| null |
GHSA
|
GHSA-vmhw-fhj6-m3g5
|
Path Traversal in angular-http-server
|
Versions of `angular-http-server` before 1.4.4 are vulnerable to path traversal.
## Recommendation
Update to version 1.4.4 or later.
| null |
2021-08-04T20:22:14Z
|
2019-05-31T23:46:33Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/simonh1000/angular-http-server/commit/8bafc9577161469f5dea01e0b98ea9c525d063e9', 'https://nodesecurity.io/advisories/656', 'https://www.npmjs.com/advisories/656', 'https://hackerone.com/reports/330349', 'https://github.com/advisories/GHSA-vmhw-fhj6-m3g5'}
| null |
GHSA
|
GHSA-f34m-x9pj-62vq
|
Cross-Site Scripting Vulnerability in @joeattardi/emoji-button
|
### Impact
There are two vectors for XSS attacks with versions of @joeattardi/emoji-button before 4.6.2:
- A URL for a custom emoji
- An i18n string
In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code.
### Patches
This vulnerability is fixed starting in version 4.6.2. This is resolved by properly escaping strings that are inserted into the HTML document.
### Workarounds
There is no workaround other than upgrading to a non-vulnerable version.
### Credit
This issue was discovered by GitHub team member [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh) and was reported by the GitHub Security Lab team.
|
{'CVE-2021-43785'}
|
2022-04-19T19:03:16Z
|
2021-12-01T18:29:02Z
|
HIGH
| 7.6
|
{'CWE-79'}
|
{'https://github.com/joeattardi/emoji-button/security/advisories/GHSA-f34m-x9pj-62vq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43785', 'https://github.com/advisories/GHSA-f34m-x9pj-62vq', 'https://github.com/joeattardi/emoji-button/commit/fe54bef107eb3f74873a4018f2ff49fa124c6a2e', 'https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16'}
| null |
GHSA
|
GHSA-3mpp-xfvh-qh37
|
node-ipc behavior change
|
node-ipc version 11.0.0 and newer include a message from the maintainer that is written to the user’s desktop. Please review the version changes before proceeding.
| null |
2022-03-16T23:55:33Z
|
2022-03-16T23:54:35Z
|
LOW
| 0
| null |
{'https://github.com/RIAEvangelist/node-ipc/releases/tag/v11.0.0', 'https://github.com/advisories/GHSA-3mpp-xfvh-qh37'}
| null |
GHSA
|
GHSA-2rh5-jvgx-pgw3
|
Any storage file can be downloaded from p.sh if full server path is known
|
The default configuration for platform.sh (.platform.app.yaml) allows access to uploaded files if you know or can guess their location, regardless of whether roles grant content read access to the content containing those files. If you're using Legacy Bridge, the default configuration also allows access to certain legacy files that should not be readable, including the legacy var directory and extension directories.
| null |
2021-09-14T20:25:13Z
|
2021-09-14T20:25:13Z
|
HIGH
| 0
|
{'CWE-200'}
|
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-006-storage-and-legacy-files-accessible-if-path-is-known', 'https://github.com/advisories/GHSA-2rh5-jvgx-pgw3', 'https://github.com/ezsystems/ezplatform/security/advisories/GHSA-2rh5-jvgx-pgw3'}
| null |
GHSA
|
GHSA-vrf2-xghr-j52v
|
Private files publicly accessible with Cloud Storage providers
|
### Impact
Private files publicly accessible with Cloud Storage providers when the hashed URL is known
### Patches
We recommend first changing your configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`.
When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html
Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities
| null |
2021-10-05T17:26:42Z
|
2021-06-28T18:20:42Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v', 'https://github.com/advisories/GHSA-vrf2-xghr-j52v'}
| null |
GHSA
|
GHSA-g7j3-p357-cw8p
|
Directory Traversal in f2e-server
|
Affected versions of `f2e-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
Update to version 1.12.12 or later.
|
{'CVE-2017-16038'}
|
2021-09-10T20:27:48Z
|
2018-07-24T16:29:12Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/346', 'https://github.com/shy2850/node-server/pull/12/files', 'https://github.com/shy2850/node-server/issues/10', 'https://github.com/advisories/GHSA-g7j3-p357-cw8p', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16038', 'https://nodesecurity.io/advisories/346'}
| null |
GHSA
|
GHSA-4x7w-frcq-v4m3
|
Path Traversal in @wturyn/swagger-injector
|
All versions of `@wturyn/swagger-injector` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the configured `dist` folder using relative paths.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-09-29T18:38:23Z
|
2020-09-03T20:38:47Z
|
CRITICAL
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/1173', 'https://github.com/advisories/GHSA-4x7w-frcq-v4m3'}
| null |
GHSA
|
GHSA-2rfj-2mwp-787v
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
|
{'CVE-2019-0993'}
|
2021-03-29T20:57:51Z
|
2021-03-29T20:57:51Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0993', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0993', 'https://github.com/advisories/GHSA-2rfj-2mwp-787v', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'}
| null |
GHSA
|
GHSA-g93h-75m9-3qq4
|
Downloads Resources over HTTP in pngcrush-installer
|
Affected versions of `pngcrush-installer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pngcrush-installer`.
## Recommendation
Update to version 1.8.10 or later.
|
{'CVE-2016-10570'}
|
2021-01-08T18:48:01Z
|
2019-02-18T23:52:27Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/189', 'https://github.com/advisories/GHSA-g93h-75m9-3qq4', 'https://www.npmjs.com/advisories/189', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10570'}
| null |
GHSA
|
GHSA-4wm8-fjv7-j774
|
Escape sequence injection in RubyGems
|
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
|
{'CVE-2019-8325'}
|
2021-08-17T14:44:54Z
|
2019-06-20T16:08:21Z
|
HIGH
| 7.5
|
{'CWE-74'}
|
{'https://github.com/advisories/GHSA-4wm8-fjv7-j774', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8325', 'https://hackerone.com/reports/317353'}
| null |
GHSA
|
GHSA-pmv6-gf98-p3r5
|
Command Injection in kill-port
|
Versions of `kill-port` prior to 1.3.2 are vulnerable to Command Injection. The package does not validate user input on the `kill` function. This may allow attackers to run arbitrary commands in the system if user input (such as the port number) is passed directly to the function.
## Recommendation
Upgrade to version 1.3.2 or later.
|
{'CVE-2019-5414'}
|
2021-01-08T18:20:19Z
|
2019-03-25T16:17:18Z
|
HIGH
| 0
|
{'CWE-77'}
|
{'https://hackerone.com/reports/389561', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5414', 'https://www.npmjs.com/advisories/966', 'https://github.com/advisories/GHSA-pmv6-gf98-p3r5'}
| null |
GHSA
|
GHSA-93f3-23rq-pjfp
|
Sensitive information exposure through logs in npm CLI
|
Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
|
{'CVE-2020-15095'}
|
2021-01-14T17:40:21Z
|
2020-07-07T18:56:16Z
|
LOW
| 4.4
|
{'CWE-532'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html', 'https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/', 'https://security.gentoo.org/glsa/202101-07', 'https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp', 'https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15095', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html', 'https://github.com/advisories/GHSA-93f3-23rq-pjfp', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html'}
| null |
GHSA
|
GHSA-pxmp-fwjc-4x7q
|
HTML Injection in marky-markdown
|
All versions of `marky-markdown` are vulnerable to HTML Injection due to a validation bypass. The package only allows iframes where the source is `youtube.com` but it is possible to bypass the validation with sources where `youtube.com` is the sub-domain, such as `youtube.com.evil.co`. This
## Recommendation
This package is no longer maintained. Please upgrade to `@npmcorp/marky-markdown`
| null |
2021-10-04T20:56:43Z
|
2020-09-03T15:45:23Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-pxmp-fwjc-4x7q', 'https://www.npmjs.com/advisories/1471'}
| null |
GHSA
|
GHSA-hm48-76wh-q86v
|
High severity vulnerability that affects activerecord
|
Withdrawn, accidental duplicate publish.
activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls.
| null |
2021-12-03T14:10:42Z
|
2018-08-21T19:03:17Z
|
HIGH
| 0
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2014-3514', 'https://github.com/advisories/GHSA-hm48-76wh-q86v'}
| null |
GHSA
|
GHSA-jp5v-5gx4-jmj9
|
Ability to forge per-form CSRF tokens in Rails
|
It is possible to possible to, given a global CSRF token such as the one
present in the authenticity_token meta tag, forge a per-form CSRF token for
any action for that session.
Impact
------
Given the ability to extract the global CSRF token, an attacker would be able to
construct a per-form CSRF token for that session.
Workarounds
-----------
This is a low-severity security issue. As such, no workaround is necessarily
until such time as the application can be upgraded.
|
{'CVE-2020-8166'}
|
2021-10-06T22:06:43Z
|
2020-05-26T15:11:13Z
|
MODERATE
| 4.3
|
{'CWE-352'}
|
{'https://groups.google.com/forum/#!topic/rubyonrails-security/NOjKiGeXUgw', 'https://github.com/advisories/GHSA-jp5v-5gx4-jmj9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8166', 'https://hackerone.com/reports/732415', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8166.yml'}
| null |
GHSA
|
GHSA-6jx3-rqcx-g3ww
|
Downloads Resources over HTTP in air-sdk
|
Affected versions of `air-sdk` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `air-sdk`.
## Recommendation
No patch is currently available for this vulnerability, and the package hasn't seen an update since 2015.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10603'}
|
2021-01-08T19:21:31Z
|
2019-02-18T23:33:48Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/200', 'https://www.npmjs.com/advisories/200', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10603', 'https://github.com/advisories/GHSA-6jx3-rqcx-g3ww'}
| null |
GHSA
|
GHSA-3c67-gc48-983w
|
Path Traversal in Ansible
|
An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running ansible-galaxy collection install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system.
|
{'CVE-2020-10691'}
|
2021-04-20T16:44:37Z
|
2021-04-20T16:44:37Z
|
MODERATE
| 5.2
|
{'CWE-22'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10691', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10691', 'https://github.com/ansible/ansible/pull/68596', 'https://github.com/advisories/GHSA-3c67-gc48-983w'}
| null |
GHSA
|
GHSA-f7r3-p866-q9qr
|
Denial of Service in ircdkit
|
Versions of `ircdkit` before 1.0.3 are vulnerable to a remote denial of service.
## Recommendation
Upgrade to version 1.0.4.
| null |
2021-08-04T21:22:46Z
|
2019-06-03T17:27:49Z
|
LOW
| 3.7
|
{'CWE-400'}
|
{'https://github.com/Twipped/ircdkit/commit/f0cc6dc913ec17b499fa33a676bb72c624456f2c', 'https://github.com/advisories/GHSA-f7r3-p866-q9qr', 'https://www.npmjs.com/advisories/735', 'https://github.com/Twipped/ircdkit/issues/1', 'https://snyk.io/vuln/SNYK-JS-IRCDKIT-173688'}
| null |
GHSA
|
GHSA-f99g-pg48-wrfc
|
twill is vulnerable to Cross-Site Request Forgery (CSRF)
|
twill is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-3932'}
|
2021-12-16T00:40:00Z
|
2021-11-15T23:19:26Z
|
MODERATE
| 6.3
|
{'CWE-352', 'CWE-268'}
|
{'https://github.com/advisories/GHSA-f99g-pg48-wrfc', 'https://github.com/area17/twill/commit/81d80d1fbbdd8bb73c020f03c623fd4487bd9b78', 'https://github.com/area17/twill/commits/bab94c1e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3932', 'https://github.com/area17/twill/releases/tag/2.5.3', 'https://github.com/area17/twill/commit/5cded9fc', 'https://huntr.dev/bounties/6ef21e34-f6d9-445a-b657-375c53dc2b43', 'https://github.com/area17/twill/releases/tag/1.2.5'}
| null |
GHSA
|
GHSA-fgp6-8g62-qx6w
|
Malicious Package in smartsearchwp
|
All versions of `smartsearchwp` contain malicious code. The package is malware intended to steal credentials from websites it is loaded in. It traverses DOM elements looking for fields such as `username` and `password` and uploads it to a remote server. The package also port-scans the local gateway and uploads the information to the remote server. It has a feature to fetch commands from the remote server and execute them with `eval`. The npm security team analysis found several bugs in the malware that prevent it from actually performing its actions. The malicious code is also not invoked upon installation or require; it would require transpiling TypeScript code and using it in a website.
## Recommendation
Remove the package from your environment. There is no indication of further compromise.
| null |
2021-09-30T21:58:44Z
|
2020-09-03T17:01:45Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1011', 'https://github.com/advisories/GHSA-fgp6-8g62-qx6w'}
| null |
GHSA
|
GHSA-v57x-gxfj-484q
|
Security Advisory for "Log4Shell"
|
### Impact
A highly critical 0-day exploit (CVE-2021-44228) is found in Apache log4j 2 library on December 9, 2021.
This affects Apache log4j versions from 2.0-beta9 to 2.14.1 (inclusive).
This vulnerability allows a remote attacker to execute code on the server if the system logs an attacker-controlled string value with the attacker's JNDI LDAP server lookup.
Another vulnerability related to the same library, which was discovered on 12/14/2021 (CVE-2021-45046) and revealed another Remote Code Execution vulnerability, has been investigated by Hazelcast team as well and it is found that it does not affect Hazelcast Products under default configurations.
The finding of CVE-2021-45105 on 12/14/2021, which can cause a Denial of Service attack, was investigated by Hazelcast team and it is confirmed that it does not affect Hazelcast Products under default configurations.
The finding of CVE-2021-44832 on 12/28/2021, which is a medium vulnerability, is investigated by our security team as well, and not considered to be as critical. It requires attacker to be able to modify logging configuration, which means attacker can modify the filesystem and/or can already execute arbitrary code which is more of a general security breach rather than something log4j specific.
Note that Hazelcast IMDG and IMDG Enterprise itself is not affected.
However, given version distributions are considered to be vulnerable since related ZIP and TGZ distributions contain a vulnerable Hazelcast Management Center version.
### Patches
CVE-2021-44228 is fixed in log4j 2.15.0.
CVE-2021-45046 is fixed in log4j 2.16.0.
CVE-2021-45105 is fixed in log4j 2.17.0.
CVE-2021-44832 is fixed in log4j 2.17.1.
As of 12/21/2021, Hazelcast team has released a new version of all affected products that upgrades log4j to 2.17.0 as listed below:
Hazelcast Management Center 4.2021.12-1, Hazelcast Management Center 5.0.4.
Hazelcast IMDG and IMDG Enterprise 4.0.5, 4.1.8 and 4.2.4.
Hazelcast Jet 4.5.3.
Hazelcast Platform 5.0.2.
As of 01/06/2022, Hazelcast Management Center 4.2022.01 with the updated log4j 2.17.1 is released. log4j2.17.1 will be included in Management Center 5.1 that is expected to be released in February.
Hazelcast recommends upgrading to the latest versions available.
### Workarounds
For users that an upgrade is not an option, below mitigations can be applied.
#### Disabling lookups via Environment Variable
Setting the environment variable LOG4J_FORMAT_MSG_NO_LOOKUPS=true .
This option is the easiest to apply for containerized environments.
#### Disabling lookups in log4j2 configuration
Another good option since there is no need to replace JARs or no need to modify logging configuration file, users who cannot upgrade to 2.17.0 can mitigate the exposure by:
Users of Log4j 2.10 or greater may add `-Dlog4j2.formatMsgNoLookups=true `as a command line option or add `-Dlog4j2.formatMsgNoLookups=true` in a `log4j2.component.properties` file on the classpath to prevent lookups in log event messages.
Users since Log4j 2.7 may specify `%m{nolookups}` in the PatternLayout configuration to prevent lookups in log event messages.
As an example; users deploying Hazelcast Management Center via helm charts can do the following to disable lookups and restart in one command:
`helm upgrade <release-name> hazelcast/hazelcast --set mancenter.javaOpts="<javaOpts> -Dlog4j2.formatMsgNoLookups=true"`
Where <release-name> is the release name and <javaOpts> is existing java options user has added previously.
#### Removing the JndiLookup from classpath
Remove the JndiLookup and JndiManager classes from the log4j-core jar. Note that removal of the JndiManager will cause the JndiContextSelector and JMSAppender to no longer function.
### References
https://nvd.nist.gov/vuln/detail/CVE-2021-44228
https://nvd.nist.gov/vuln/detail/CVE-2021-45046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105
https://nvd.nist.gov/vuln/detail/CVE-2021-44832
https://logging.apache.org/log4j/2.x/index.html
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our repo](https://github.com/hazelcast/hazelcast)
* Slack us at [Hazelcast Community Slack](https://slack.hazelcast.com/)
| null |
2022-04-22T17:07:23Z
|
2022-01-21T23:25:04Z
|
CRITICAL
| 10
|
{'CWE-20', 'CWE-502', 'CWE-400'}
|
{'https://github.com/hazelcast/hazelcast/security/advisories/GHSA-v57x-gxfj-484q', 'https://github.com/advisories/GHSA-v57x-gxfj-484q'}
| null |
GHSA
|
GHSA-gf2j-7qwg-4f5x
|
Moderate severity vulnerability that affects org.keycloak:keycloak-core
|
The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack.
|
{'CVE-2018-14637'}
|
2021-09-10T20:46:10Z
|
2018-12-21T17:48:45Z
|
HIGH
| 8.1
|
{'CWE-287', 'CWE-285'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-14637', 'https://github.com/advisories/GHSA-gf2j-7qwg-4f5x'}
| null |
GHSA
|
GHSA-9g3v-j3cr-6fc6
|
Cross-site Scripting in snipe-it
|
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-3879'}
|
2021-10-25T20:08:06Z
|
2021-10-21T17:48:26Z
|
MODERATE
| 6.8
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-9g3v-j3cr-6fc6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3879', 'https://github.com/snipe/snipe-it/commit/bda23bb1e66fd7ce42c75c69cf5eea4e80865c1c', 'https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe'}
| null |
GHSA
|
GHSA-q3m9-9fj2-mfwr
|
URL Redirection to Untrusted Site ('Open Redirect') in Products.isurlinportal
|
### Impact
Various parts of Plone use the 'is url in portal' check for security, mostly to see if it is safe to redirect to a url. A url like `https://example.org` is not in the portal.
But the url `https:example.org` without slashes tricks our code and it _is_ considered to be in the portal.
When redirecting, some browsers go to `https://example.org`, others give an error.
Attackers may use this to redirect you to their site, especially as part of a phishing attack.
### Patches
The problem has been patched in `Products.isurlinportal` 1.2.0.
This is a recommended upgrade for all users of Plone 4.3 and 5, on Python 2.7 or higher.
It has not been tested on earlier Plone or Python versions.
Upcoming Plone 5.2.5 and higher will include the new version.
### Discovered
This vulnerability was discovered and reported by Yuji Tounai of Mitsui Bussan Secure Directions, Inc. Thank you!
### For more information
If you have any questions or comments about this advisory:
* Email the Plone Security Team at [security@plone.org](mailto:security@plone.org), especially when you think you have discovered a security problem or when you are not sure.
* Open an issue in [the tracker](https://github.com/plone/Products.isurlinportal/issues) if your question or comment can be public.
|
{'CVE-2021-32806'}
|
2021-08-30T23:21:08Z
|
2021-08-05T17:02:12Z
|
MODERATE
| 6.5
|
{'CWE-601'}
|
{'https://github.com/advisories/GHSA-q3m9-9fj2-mfwr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32806', 'https://github.com/plone/Products.isurlinportal/commit/d4fd34990d18adf05a10dc5e2bb4b066798280ba', 'https://github.com/plone/Products.isurlinportal/security/advisories/GHSA-q3m9-9fj2-mfwr', 'http://jvn.jp/en/jp/JVN50804280/index.html'}
| null |
GHSA
|
GHSA-v9w8-hq92-v39m
|
Cross-site Scripting (XSS) in baserCMS
|
Improper neutralization of JavaScript input in the blog article editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.
|
{'CVE-2021-20683'}
|
2021-06-08T20:10:45Z
|
2021-06-08T20:10:45Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/baserproject/basercms', 'https://jvn.jp/en/jp/JVN64869876/index.html', 'https://github.com/advisories/GHSA-v9w8-hq92-v39m', 'https://basercms.net/security/JVN64869876', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20683', 'https://packagist.org/packages/baserproject/basercms', 'https://github.com/baserproject/basercms/commit/88ccc61e5656b05dd13204d61de706efaa2cd0b1'}
| null |
GHSA
|
GHSA-2p68-f74v-9wc6
|
Unintended unmarshalling in ActiveSupport
|
In ActiveSupport, there is potentially unexpected behaviour in the MemCacheStore and RedisCacheStore where, when
untrusted user input is written to the cache store using the `raw: true` parameter, re-reading the result
from the cache can evaluate the user input as a Marshalled object instead of plain text. Vulnerable code looks like:
```
data = cache.fetch("demo", raw: true) { untrusted_string }
```
Versions Affected: rails < 5.2.5, rails < 6.0.4
Not affected: Applications not using MemCacheStore or RedisCacheStore. Applications that do not use the `raw` option when storing untrusted user input.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
Unmarshalling of untrusted user input can have impact up to and including RCE. At a minimum,
this vulnerability allows an attacker to inject untrusted Ruby objects into a web application.
In addition to upgrading to the latest versions of Rails, developers should ensure that whenever
they are calling `Rails.cache.fetch` they are using consistent values of the `raw` parameter for both
reading and writing, especially in the case of the RedisCacheStore which does not, prior to these changes,
detect if data was serialized using the raw option upon deserialization.
Workarounds
-----------
It is recommended that application developers apply the suggested patch or upgrade to the latest release as
soon as possible. If this is not possible, we recommend ensuring that all user-provided strings cached using
the `raw` argument should be double-checked to ensure that they conform to the expected format.
|
{'CVE-2020-8165'}
|
2021-01-08T21:29:12Z
|
2020-05-26T14:49:24Z
|
HIGH
| 0
|
{'CWE-502'}
|
{'https://groups.google.com/forum/#!topic/rubyonrails-security/bv6fW4S0Y1c', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html', 'https://github.com/advisories/GHSA-2p68-f74v-9wc6', 'https://hackerone.com/reports/413388', 'https://groups.google.com/g/rubyonrails-security/c/bv6fW4S0Y1c', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html', 'https://www.debian.org/security/2020/dsa-4766', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2020-8165.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8165', 'https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/'}
| null |
GHSA
|
GHSA-5hxw-r847-qfwp
|
Moderate severity vulnerability that affects opencv.js
|
opencv.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
|
{'CVE-2017-16066'}
|
2021-01-08T19:50:29Z
|
2018-08-29T23:47:07Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-5hxw-r847-qfwp', 'https://nodesecurity.io/advisories/505', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16066'}
| null |
GHSA
|
GHSA-4q2r-qxp6-h5j6
|
Improper Restriction of XML External Entity Reference in Quokka
|
XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the component 'quokka/core/content/views.py'.
|
{'CVE-2020-18705'}
|
2022-03-23T20:17:57Z
|
2021-08-30T16:25:18Z
|
CRITICAL
| 9.8
|
{'CWE-611'}
|
{'https://github.com/rochacbruno/quokka/issues/676', 'https://github.com/quokkaproject/quokka/pull/679', 'https://nvd.nist.gov/vuln/detail/CVE-2020-18705', 'https://github.com/advisories/GHSA-4q2r-qxp6-h5j6'}
| null |
GHSA
|
GHSA-gppp-5xc5-wfpx
|
Moderate severity vulnerability that affects activerecord
|
Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.
|
{'CVE-2013-0155'}
|
2021-09-13T12:43:35Z
|
2017-10-24T18:33:37Z
|
MODERATE
| 0
| null |
{'http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A', 'https://puppet.com/security/cve/cve-2013-0155', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'http://www.debian.org/security/2013/dsa-2609', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0155', 'http://rhn.redhat.com/errata/RHSA-2013-0155.html', 'http://support.apple.com/kb/HT5784', 'https://github.com/advisories/GHSA-gppp-5xc5-wfpx', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}
| null |
GHSA
|
GHSA-rjhc-w3fj-j6x9
|
Malicious Package in alipayjsapi
|
All versions of `alipayjsapi` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T18:35:42Z
|
2020-09-03T17:32:45Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-rjhc-w3fj-j6x9', 'https://www.npmjs.com/advisories/1048'}
| null |
GHSA
|
GHSA-893h-35v4-mxqx
|
Path Traversal in Ansible
|
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.
|
{'CVE-2020-1737'}
|
2021-04-20T16:43:33Z
|
2021-04-20T16:43:33Z
|
MODERATE
| 7.8
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-893h-35v4-mxqx', 'https://security.gentoo.org/glsa/202006-11', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737', 'https://github.com/ansible/ansible/issues/67795', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1737', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/'}
| null |
GHSA
|
GHSA-hxjf-h2mh-r6hj
|
Use After Free in libpulse-binding
|
An issue was discovered in the libpulse-binding crate before 1.2.1 for Rust. get_format_info can cause a use-after-free.
|
{'CVE-2018-25027'}
|
2022-01-06T22:20:12Z
|
2022-01-06T22:20:12Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/libpulse-binding/RUSTSEC-2018-0021.md', 'https://rustsec.org/advisories/RUSTSEC-2018-0021.html', 'https://github.com/advisories/GHSA-hxjf-h2mh-r6hj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25027'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.