ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-86wf-436m-h424
|
Resource Exhaustion Denial of Service in http-proxy-agent
|
A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
|
{'CVE-2019-10196'}
|
2022-01-06T20:30:13Z
|
2022-01-06T20:30:13Z
|
MODERATE
| 9.8
|
{'CWE-665'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10196', 'https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb', 'https://github.com/advisories/GHSA-86wf-436m-h424', 'https://www.npmjs.com/advisories/607', 'https://bugzilla.redhat.com/show_bug.cgi?id=1567245'}
| null |
GHSA
|
GHSA-gmq2-39ff-f5qg
|
A failed upgrade may lead to hung goroutines
|
### Impact
Processes using tableflip may encounter hung goroutines in the parent process, after a failed upgrade.
The Go runtime has annoying behaviour around setting and clearing
O_NONBLOCK: exec.Cmd.Start() ends up calling os.File.Fd() for any
file in exec.Cmd.ExtraFiles. os.File.Fd() disables both the use
of the runtime poller for the file and clears O_NONBLOCK from
the underlying open file descriptor.
This can lead to goroutines hanging in a parent process, after at least
one failed upgrade. The bug manifests in goroutines which rely on
either a deadline or interruption via Close() to be unblocked being stuck
in read or accept like syscalls. As far as I can tell we've not experienced
this problem in production, so it's most likely quite rare.
### Patches
The problem has been fixed in v1.2.2.
### Workarounds
None.
### References
* https://github.com/cloudflare/tableflip/commit/cae714b289e199db5da5f08af861ea65be6232c0
| null |
2021-05-21T16:25:48Z
|
2021-05-21T16:25:48Z
|
LOW
| 0
| null |
{'https://github.com/cloudflare/tableflip/security/advisories/GHSA-gmq2-39ff-f5qg', 'https://github.com/cloudflare/tableflip/commit/cae714b289e199db5da5f08af861ea65be6232c0', 'https://github.com/advisories/GHSA-gmq2-39ff-f5qg'}
| null |
GHSA
|
GHSA-2mqv-4j3r-vjvp
|
Open redirect in @auth0/nextjs-auth0
|
### Overview
Versions `<=1.6.1` do not filter out certain `returnTo` parameter values from the login url, which expose the application to an open redirect vulnerability.
### Am I affected?
You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `<=1.6.1`.
### How to fix that?
Upgrade to version `>=1.6.2`
### Will this update impact my users?
The fix provided in the patch will not affect your users.
|
{'CVE-2021-43812'}
|
2021-12-17T19:11:45Z
|
2021-12-16T18:52:21Z
|
MODERATE
| 6.4
|
{'CWE-601'}
|
{'https://github.com/advisories/GHSA-2mqv-4j3r-vjvp', 'https://github.com/auth0/nextjs-auth0/commit/0bbd9f8a0c93af51f607f28633b5fb18c5e48ad6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43812', 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-2mqv-4j3r-vjvp'}
| null |
GHSA
|
GHSA-j9wj-26p5-fj2v
|
Directory Traversal in gaoxuyan
|
Affected versions of `gaoxuyan` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16153'}
|
2021-01-14T16:03:32Z
|
2020-09-01T17:17:29Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16153', 'https://github.com/advisories/GHSA-j9wj-26p5-fj2v', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gaoxuyan', 'https://www.npmjs.com/advisories/378', 'https://nodesecurity.io/advisories/378'}
| null |
GHSA
|
GHSA-cvw2-xj8r-mjf7
|
Activerecord-session_store Timing Attack
|
The `activerecord-session_store` (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.
## Recommendation
This has been fixed in version 2.0.0. All users are advised to update to this version or later.
|
{'CVE-2019-25025'}
|
2021-03-24T17:32:13Z
|
2021-03-09T00:45:31Z
|
MODERATE
| 0
|
{'CWE-208'}
|
{'https://rubygems.org/gems/activerecord-session_store', 'https://github.com/rubysec/ruby-advisory-db/blob/master/activerecord-session_store/CVE-2019-25025.yml', 'https://github.com/rails/activerecord-session_store/releases/tag/v2.0.0', 'https://github.com/rails/activerecord-session_store/commit/9d4dd113d3010b82daaadf0b0ee6b9fb2afb2160', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25025', 'https://github.com/rails/activerecord-session_store/pull/151', 'https://github.com/advisories/GHSA-cvw2-xj8r-mjf7'}
| null |
GHSA
|
GHSA-87v6-crgm-2gfj
|
Division by zero in Tensorflow
|
### Impact
The [implementation of `FractionalMaxPool`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_max_pool_op.cc#L36-L192) can be made to crash a TensorFlow process via a division by 0:
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.FractionalMaxPool(
value=tf.constant(value=[[[[1, 4, 2, 3]]]], dtype=tf.int64),
pooling_ratio=[1.0, 1.44, 1.73, 1.0],
pseudo_random=False,
overlapping=False,
deterministic=False,
seed=0,
seed2=0,
name=None)
```
### Patches
We have patched the issue in GitHub commit [ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb](https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
|
{'CVE-2022-21735'}
|
2022-02-11T16:23:19Z
|
2022-02-10T00:21:32Z
|
MODERATE
| 6.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_max_pool_op.cc#L36-L192', 'https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-87v6-crgm-2gfj', 'https://github.com/advisories/GHSA-87v6-crgm-2gfj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21735'}
| null |
GHSA
|
GHSA-mf27-wg66-m8f5
|
A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages.
|
A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages.
|
{'CVE-2020-35210'}
|
2022-01-04T18:57:50Z
|
2021-12-17T20:41:09Z
|
MODERATE
| 6.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-mf27-wg66-m8f5', 'https://docs.google.com/presentation/d/1eZznIciFI06_5UJrXvlLugH2-nmjfYpQO5NyNMc9RxU/edit?usp=sharing', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35210'}
| null |
GHSA
|
GHSA-vfvf-6gx5-mqv6
|
Incorrect Authorization in ORY Oathkeeper
|
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. A patch will be released with `v0.38.12-beta.1`. Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process.
|
{'CVE-2021-32701'}
|
2021-06-24T20:16:02Z
|
2021-06-24T20:16:02Z
|
HIGH
| 7.5
|
{'CWE-863'}
|
{'https://github.com/ory/oathkeeper/pull/424', 'https://github.com/ory/oathkeeper/commit/1f9f625c1a49e134ae2299ee95b8cf158feec932', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32701', 'https://github.com/advisories/GHSA-vfvf-6gx5-mqv6', 'https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr'}
| null |
GHSA
|
GHSA-f6px-w8rh-7r89
|
Data race in Beego
|
The File Session Manager in Beego 1.10.0 allows local users to read session files because there is a race condition involving file creation within a directory with weak permissions.
|
{'CVE-2019-16354'}
|
2021-08-02T17:15:05Z
|
2021-08-02T17:15:05Z
|
MODERATE
| 4.7
|
{'CWE-362', 'CWE-732'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16354', 'https://github.com/beego/beego/issues/3763', 'https://github.com/astaxie/beego/blob/develop/session/sess_file.go#L141', 'https://github.com/astaxie/beego/issues/3763', 'https://github.com/advisories/GHSA-f6px-w8rh-7r89', 'https://github.com/beego/beego/pull/3975/commits/f99cbe0fa40936f2f8dd28e70620c559b6e5e2fd'}
| null |
GHSA
|
GHSA-hx7j-43w2-7rj7
|
Prototype pollution in nconf-toml
|
Prototype pollution vulnerability in `nconf-toml` versions 0.0.1 through 0.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25946'}
|
2021-10-05T17:22:39Z
|
2021-06-07T22:12:13Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/RobLoach/nconf-toml/blob/8ade08cd1cfb9691ab7cc5c3514cc05c5085918f/index.js#L8', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25946', 'https://github.com/advisories/GHSA-hx7j-43w2-7rj7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25946'}
| null |
GHSA
|
GHSA-9vxv-wpv4-f52p
|
Information leakage in Error Handler
|
### Impact
Information leakage in Error Handler
### Patches
We recommend updating to the current version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021
| null |
2021-05-21T14:29:33Z
|
2021-05-21T14:29:33Z
|
MODERATE
| 0
|
{'CWE-209'}
|
{'https://github.com/advisories/GHSA-9vxv-wpv4-f52p', 'https://github.com/shopware/shopware/security/advisories/GHSA-9vxv-wpv4-f52p'}
| null |
GHSA
|
GHSA-pxqr-8v54-m2hj
|
Moderate severity vulnerability that affects rails_admin
|
rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem.
|
{'CVE-2016-10522'}
|
2021-01-08T18:19:29Z
|
2018-08-08T22:30:35Z
|
MODERATE
| 0
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10522', 'https://www.sourceclear.com/blog/Rails_admin-Vulnerability-Disclosure/', 'https://github.com/advisories/GHSA-pxqr-8v54-m2hj', 'https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a', 'https://www.sourceclear.com/registry/security/cross-site-request-forgery-csrf-/ruby/sid-3173'}
| null |
GHSA
|
GHSA-q7cg-43mg-qp69
|
ASP.NET Core Information Disclosure Vulnerability
|
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1 and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
An information disclosure vulnerability exists in .NET 5.0, .NET Core 3.1 and .NET Core 2.1 where a JWT token is logged if it cannot be parsed.
### Patches
* If you're using .NET 5.0, you should download and install Runtime 5.0.9 or SDK 5.0.206 (for Visual Studio 2019 v16.8) or SDK 5.0.303 (for Visual Studio 2019 V16.10) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
* If you're using .NET Core 3.1, you should download and install Runtime 3.1.18 or SDK 3.1.118 (for Visual Studio 2019 v16.4) or 3.1.412 (for Visual Studio 2019 v16.7 or later) from https://dotnet.microsoft.com/download/dotnet-core/3.1.
* If you're using .NET Core 2.1, you should download and install Runtime 2.1.29 or SDK 2.1.525 (for Visual Studio 2019 v15.9) or 2.1.817 from https://dotnet.microsoft.com/download/dotnet-core/2.1.
* If your application is using .NET Core 2.1 running on .NET Framework see the [Updating .NET Core 2.1 on .NET Framework](#updating-2.1) section below.
### <a name="updating-2.1"></a> Updating .NET Core 2.1 on .NET Framework
If you are running .NET Core 2.1 on .NET Framework you need to check your projects for dependencies and update them accordingly.
#### Direct dependencies
Direct dependencies are discoverable by examining your `csproj` file. They can be fixed by [editing the project file](#fixing-direct-dependencies) or using NuGet to update the dependency.
#### Transitive dependencies
Transitive dependencies occur when you add a package to your project that in turn relies on another package. For example, if Contoso publishes a package `Contoso.Utility` which, in turn, depends on `Contoso.Internals` and you add the `Contoso.Utility` package to your project now your project has a direct dependency on `Contoso.Utility` and, because `Contoso.Utility` depends 'Contoso.Internals', your application gains a transitive dependency on the `Contoso.Internals` package.
Transitive dependencies are reviewable in two ways:
* In the Visual Studio Solution Explorer window, which supports searching.
* By examining the `project.assets.json` file contained in the obj directory of your project for `csproj` based projects
The `project.assets.json` files are the authoritative list of all packages used by your project, containing both direct and transitive dependencies.
There are two ways to view transitive dependencies. You can either [use Visual Studio’s Solution Explorer](#vs-solution-explorer), or you can review [the `project.assets.json` file](#project-assets-json)).
##### <a name="vs-solution-explorer"></a>Using Visual Studio Solution Explorer
To use Solution Explorer, open the project in Visual Studio, and then press Ctrl+; to activate the search in Solution Explorer. Search for the [vulnerable package](#affected-software) and make a note of the version numbers of any results you find.
For example, search for `Microsoft.AspNetCore.Authentication.JwtBearer` and update the package to the latest version
##### <a name="project-assets-json"></a> Manually reviewing project.assets.json
Open the *project.assets.json* file from your project’s obj directory in your editor. We suggest you use an editor that understands JSON and allows you to collapse and expand nodes to review this file.
Visual Studio and Visual Studio Code provide JSON friendly editing.
Search the *project.assets.json* file for the [vulnerable package](#affected-software), using the format `packagename/` for each of the package names from the preceding table. If you find the assembly name in your search:
* Examine the line on which they are found, the version number is after the `/`.
* Compare to the [vulnerable versions table](#affected-software).
For example, a search result that shows `Microsoft.AspNetCore.Authentication.JwtBearer/2.1.0` is a reference to version 2.1.1 of `Microsoft.AspNetCore.Authentication.JwtBearer`.
If your *project.assets.json* file includes references to the [vulnerable package](#affected-software), then you need to fix the transitive dependencies.
If you have not found any reference to any vulnerable packages, this means either
* None of your direct dependencies depend on any vulnerable packages, or
* You have already fixed the problem by updating the direct dependencies.
#### Other Details
- Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/195
- An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/35246
- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34532
|
{'CVE-2021-34532'}
|
2021-10-21T14:15:43Z
|
2021-08-25T14:45:28Z
|
MODERATE
| 5.5
| null |
{'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-q7cg-43mg-qp69', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34532', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34532', 'https://github.com/advisories/GHSA-q7cg-43mg-qp69'}
| null |
GHSA
|
GHSA-97jg-43c9-q6pf
|
Unauthenticated user can retrieve the list of users through uorgsuggest.vm
|
A guest user without the right to view pages of the wiki can still list documents related to users of the wiki. The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1. There is no known workaround for this problem.
|
{'CVE-2022-24819'}
|
2022-04-19T15:25:48Z
|
2022-04-08T21:53:38Z
|
MODERATE
| 5.3
|
{'CWE-359'}
|
{'https://github.com/advisories/GHSA-97jg-43c9-q6pf', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-97jg-43c9-q6pf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24819', 'https://jira.xwiki.org/browse/XWIKI-18850'}
| null |
GHSA
|
GHSA-2ppp-9496-p23q
|
Insufficient Entropy in Spring Security
|
Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.
|
{'CVE-2020-5408'}
|
2021-06-15T17:57:30Z
|
2020-06-15T19:34:31Z
|
MODERATE
| 6.5
|
{'CWE-329', 'CWE-330'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5408', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://tanzu.vmware.com/security/cve-2020-5408', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/advisories/GHSA-2ppp-9496-p23q'}
| null |
GHSA
|
GHSA-fp5j-3fpf-mhj5
|
Sensitive data written to disk unencrypted in Spark
|
Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs.
|
{'CVE-2019-10099'}
|
2021-07-27T20:59:49Z
|
2019-08-08T15:18:22Z
|
HIGH
| 7.5
|
{'CWE-312'}
|
{'https://lists.apache.org/thread.html/c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e@%3Cuser.spark.apache.org%3E', 'https://github.com/advisories/GHSA-fp5j-3fpf-mhj5', 'https://lists.apache.org/thread.html/ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2@%3Cissues.spark.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10099'}
| null |
GHSA
|
GHSA-7r96-8g3x-g36m
|
Improper Verification of Cryptographic Signature
|
### Impact
The `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature of a SHA-512 hash matching the SHA-512 hash of the message even if the signature is invalid.
### Patches
Upgrade to `v7.0.3` immediately to resolve this issue. Since the vulnerability lies within the verification method, the previous signatures are still valid. We highly recommend reverifying any signatures that were previously verified with the vulnerable `verifyWithMessage` method.
### Workarounds
In `tenvoy.js` under the `verifyWithMessage` method definition within the `tEnvoyNaClSigningKey` class, ensure that the return statement call to `this.verify` ends in `.verified`. For example, the return statement should start with `return this.verify(signed, password).verified && ` instead of `return this.verify(signed, password) && `.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/TogaTech/tEnvoy](https://github.com/TogaTech/tEnvoy)
| null |
2022-01-04T19:36:52Z
|
2021-06-28T17:16:56Z
|
CRITICAL
| 9.8
|
{'CWE-347'}
|
{'https://github.com/advisories/GHSA-7r96-8g3x-g36m', 'https://github.com/TogaTech/tEnvoy/security/advisories/GHSA-7r96-8g3x-g36m', 'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b'}
| null |
GHSA
|
GHSA-p694-23q3-rvrc
|
Remote Code Execution in Apache Synapse
|
In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed by injecting specially crafted serialized objects. And the presence of Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) or previous versions in Synapse distribution makes this exploitable. To mitigate the issue, we need to limit RMI access to trusted users only. Further upgrading to 3.0.1 version will eliminate the risk of having said Commons Collection version. In Synapse 3.0.1, Commons Collection has been updated to 3.2.2 version.
|
{'CVE-2017-15708'}
|
2022-03-18T20:16:32Z
|
2020-11-04T18:23:25Z
|
CRITICAL
| 9.8
|
{'CWE-74', 'CWE-502'}
|
{'https://github.com/advisories/GHSA-p694-23q3-rvrc', 'https://lists.apache.org/thread.html/77f2accf240d25d91b47033e2f8ebec84ffbc6e6627112b2f98b66c9@%3Cdev.synapse.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r0fb289cd38c915b9a13a3376134f96222dd9100f1ef66b41631865c6@%3Ccommits.doris.apache.org%3E', 'http://www.securityfocus.com/bid/102154', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15708', 'https://security.gentoo.org/glsa/202107-37', 'https://www.oracle.com/security-alerts/cpujan2020.html'}
| null |
GHSA
|
GHSA-rhrq-64mq-hf9h
|
FPE in TFLite division operations
|
### Impact
The implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc)
There is no check that the divisor tensor does not contain zero elements.
### Patches
We have patched the issue in GitHub commit [1e206baedf8bef0334cca3eb92bab134ef525a28](https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37683'}
|
2021-08-25T14:40:16Z
|
2021-08-25T14:40:16Z
|
MODERATE
| 5.5
|
{'CWE-369'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37683', 'https://github.com/advisories/GHSA-rhrq-64mq-hf9h', 'https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rhrq-64mq-hf9h'}
| null |
GHSA
|
GHSA-2wr2-8qjq-gh55
|
Exposure of Resource to Wrong Sphere in org.craftercms:crafter-search
|
Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes.
|
{'CVE-2021-23264'}
|
2021-12-16T15:27:35Z
|
2021-12-16T15:27:35Z
|
CRITICAL
| 9.1
|
{'CWE-402', 'CWE-668'}
|
{'https://github.com/craftercms/craftercms/commit/0e256ef0372c7be9d6e2fefc4652dd4fd94770a1', 'https://github.com/advisories/GHSA-2wr2-8qjq-gh55', 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120107', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23264'}
| null |
GHSA
|
GHSA-mc84-xr9p-938r
|
High severity vulnerability that affects generator-jhipster
|
## Generated code uses repository configuration that downloads over HTTP instead of HTTPS
### Impact
Gradle users were using the http://repo.spring.io/plugins-release repositories in plain HTTP, and not HTTPS, so a man-in-the-middle attack was possible at build time.
### Patches
Maven users should at least upgrade to 6.3.0 while Gradle users should update to 6.3.1.
If you are not able to upgrade make sure not to use a Maven repository via `http` in your build file.
### Workarounds
Replace all custom repository definitions in `build.gradle` or `pom.xml` with their `https` version.
e.g.
```xml
<repository>
<id>oss.sonatype.org-snapshot</id>
<url>https://oss.sonatype.org/content/repositories/snapshots</url> // <-- must be httpS
<releases>
<enabled>false</enabled>
</releases>
<snapshots>
<enabled>true</enabled>
</snapshots>
</repository>
```
```gradle
maven { url "https://repo.spring.io/plugins-release" } // <-- must be httpS
```
### References
* https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* https://max.computer/blog/how-to-take-over-the-computer-of-any-java-or-clojure-or-scala-developer/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/jhipster/generator-jhipster/issues](https://github.com/jhipster/generator-jhipster/issues)
| null |
2021-09-15T18:50:23Z
|
2019-09-23T18:31:05Z
|
HIGH
| 8.1
|
{'CWE-829', 'CWE-494'}
|
{'https://github.com/advisories/GHSA-mc84-xr9p-938r', 'https://snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-536074', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mc84-xr9p-938r'}
| null |
GHSA
|
GHSA-2hwp-g4g7-mwwj
|
Reflected Cross-Site Scripting in jquery.terminal
|
Versions of `jquery.terminal` prior to 1.21.0 are vulnerable to Reflected Cross-Site Scripting. If the application has either of the options `anyLinks` or `invokeMethods` set to true, the application may execute arbitrary JavaScript through crafted malicious payloads due to insufficient sanitization.
## Recommendation
Upgrade to version 1.21.0 or later
| null |
2021-08-04T20:10:06Z
|
2019-05-29T20:25:35Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/769', 'https://github.com/advisories/GHSA-2hwp-g4g7-mwwj', 'https://github.com/jcubic/jquery.terminal/commit/c8b7727d21960031b62a4ef1ed52f3c634046211'}
| null |
GHSA
|
GHSA-44m4-9cjp-j587
|
IBX-1392: Image filenames sanitization
|
ezsystems/ezpublish-kernel versions 7.5.* before 7.5.26 are vulnerable to certain injection attacks and unauthorized access to some image files.
| null |
2022-01-21T23:24:14Z
|
2022-01-21T23:24:14Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-44m4-9cjp-j587', 'https://github.com/ezsystems/ezpublish-kernel/releases/tag/v7.5.26', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-44m4-9cjp-j587', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}
| null |
GHSA
|
GHSA-r33q-22hv-j29q
|
Denial of service in github.com/ethereum/go-ethereum
|
### Impact
A DoS vulnerability can make a LES server crash via malicious `GetProofsV2` request from a connected LES client.
### Patches
The vulnerability was patched in https://github.com/ethereum/go-ethereum/pull/21896.
### Workarounds
This vulnerability only concerns users explicitly enabling `les` server; disabling `les` prevents the exploit.
It can also be patched by manually applying the patch in https://github.com/ethereum/go-ethereum/pull/21896.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum)
* Email us at [security@ethereum.org](mailto:security@ethereum.org)
|
{'CVE-2020-26264'}
|
2022-04-19T19:02:42Z
|
2021-06-29T21:14:07Z
|
MODERATE
| 6.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26264', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-r33q-22hv-j29q', 'https://github.com/advisories/GHSA-r33q-22hv-j29q', 'https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46', 'https://github.com/ethereum/go-ethereum/pull/21896', 'https://github.com/ethereum/go-ethereum/releases/tag/v1.9.25'}
| null |
GHSA
|
GHSA-qxjq-v4wf-ppvh
|
Out of bounds read in dync
|
An issue was discovered in the dync crate before 0.5.0 for Rust. VecCopy allows misaligned element access because u8 is not always the type in question.
|
{'CVE-2020-35903'}
|
2021-08-25T20:49:47Z
|
2021-08-25T20:49:47Z
|
MODERATE
| 5.5
|
{'CWE-125'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35903', 'https://github.com/elrnv/dync/issues/4', 'https://rustsec.org/advisories/RUSTSEC-2020-0050.html', 'https://github.com/advisories/GHSA-qxjq-v4wf-ppvh'}
| null |
GHSA
|
GHSA-9hfg-pxr6-q4vp
|
Use of a Broken or Risky Cryptographic Algorithm in crypto2
|
An issue was discovered in the crypto2 crate through 2021-10-08 for Rust. During Chacha20 encryption and decryption, an unaligned read of a u32 may occur.
|
{'CVE-2021-45709'}
|
2022-01-07T18:25:56Z
|
2022-01-06T22:04:51Z
|
CRITICAL
| 9.8
|
{'CWE-327'}
|
{'https://github.com/advisories/GHSA-9hfg-pxr6-q4vp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45709', 'https://rustsec.org/advisories/RUSTSEC-2021-0121.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/crypto2/RUSTSEC-2021-0121.md'}
| null |
GHSA
|
GHSA-v98j-7crc-wvrj
|
Authentication bypass in Apache Shiro
|
Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
|
{'CVE-2020-17523'}
|
2022-02-24T13:47:13Z
|
2022-02-09T22:03:57Z
|
CRITICAL
| 9.8
|
{'CWE-287'}
|
{'https://github.com/apache/shiro/pull/263', 'https://lists.apache.org/thread.html/rce5943430a6136d37a1f2fc201d245fe094e2727a0bc27e3b2d43a39%40%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r679ca97813384bdb1a4c087810ba44d9ad9c7c11583979bb7481d196@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17523', 'https://issues.apache.org/jira/browse/SHIRO-797', 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r5b93ddf97e2c4cda779d22fab30539bdec454cfa5baec4ad0ffae235@%3Cgitbox.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-v98j-7crc-wvrj', 'http://shiro.apache.org/download.html', 'https://lists.apache.org/thread.html/rd4b613e121438b97e3eb263cac3137caddb1dbd8f648b73a4f1898a6@%3Cissues.activemq.apache.org%3E'}
| null |
GHSA
|
GHSA-rvg8-pwq2-xj7q
|
Out-of-bounds Read in base64url
|
Versions of `base64url` before 3.0.0 are vulnerable to to out-of-bounds reads as it allocates uninitialized Buffers when number is passed in input on Node.js 4.x and below.
## Recommendation
Update to version 3.0.0 or later.
| null |
2021-09-24T20:34:57Z
|
2020-09-01T20:42:44Z
|
MODERATE
| 0
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-rvg8-pwq2-xj7q', 'https://hackerone.com/reports/321687', 'https://www.npmjs.com/advisories/658', 'https://github.com/brianloveswords/base64url/pull/25'}
| null |
GHSA
|
GHSA-9wrq-xvmp-xjc8
|
High severity vulnerability that affects rails.
|
Unspecified vulnerability in the "dependency resolution mechanism" in Ruby on Rails 1.1.0 through 1.1.5 allows remote attackers to execute arbitrary Ruby code via a URL that is not properly handled in the routing code, which leads to a denial of service (application hang) or "data loss," a different vulnerability than CVE-2006-4111.
|
{'CVE-2006-4112'}
|
2021-12-01T19:40:38Z
|
2017-10-24T18:33:38Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-9wrq-xvmp-xjc8', 'http://www.securityfocus.com/bid/19454', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/28364', 'http://www.securityfocus.com/archive/1/442934/100/0/threaded', 'http://secunia.com/advisories/21466', 'http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure', 'http://secunia.com/advisories/21424', 'http://secunia.com/advisories/21749', 'http://securitytracker.com/id?1016673', 'http://www.kb.cert.org/vuls/id/699540', 'https://nvd.nist.gov/vuln/detail/CVE-2006-4112', 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml', 'http://www.novell.com/linux/security/advisories/2006_21_sr.html'}
| null |
GHSA
|
GHSA-qc9x-gjcv-465w
|
Pipenv's requirements.txt parsing allows malicious index url in comments
|
## Issue Summary
Due to a flaw in pipenv's parsing of requirements files, an attacker can insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file (e.g. with "`pipenv install -r requirements.txt`") to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on the victims' systems.
### Impact
The impact of successful exploitation is **severe/critical**.
If an attacker is able to hide a malicious `--index-url` option in a requirements file that a victim installs with pipenv, the attacker can embed arbitrary malicious code in packages served from their malicious index server that will be executed on the victim's host during installation (remote code execution/RCE). Exploitation using this technique would be relatively simple to achieve for an attacker with basic knowledge of Python, as the attacker can simply build a source distribution for any of the packages specified in the requirements file, and embed arbitrary malicious code in the setup.py file. When pip installs from a source distribution, any code in the setup.py is executed by the install process.
Basic attacks might use the initial RCE triggered when a victim installs the attacker's malicious package to steal credentials from the victim's host, leach the host's resources to mine cryptocurrency, or install exploit kits or other malware. More sophisticated attackers may use more advanced techniques to persist access to the victim's host, hide or remove evidence of their attack by deleting references to the malicious index server in the Pipfile and Pipfile.lock generated by pipenv or other potential indicators of compromise. Highly sophisticated attackers could attempt to pivot to additional targets from the initial compromised host, and might leverage any exposed credentials in the compromised host environment or implicit authorization granted to the host to gain privileged access to other systems or resources, such as source repositories or package registries.
### Likelihood
The overall likelihood of exploitation is **low to moderate** depending on a range of factors.
The primary hurdle to successful exploitation of this vulnerability depends on an attacker's ability to surreptitiously insert a specially crafted string into a requirements.txt file which will be installed by a victim (or victims). Unfortunately, because the attacker can insert this string into a comment, the attacker's ability to evade suspicion is greatly increased, and they may even be able to hide the initial payload in plain sight if a victim assumes that comments will be ignored by pipenv as expected.
In many common usage contexts — for example in environments where a requirements file is used to lock or "freeze" dependency versions for reproducible builds — requirements files can often become quite large, particularly when leveraging pip's integrity checking, which requires every dependency specified in the requirements file to includes hashes for all of its distribution files. In such cases, a malicious actor might mask an exploitation attempt by opening a pull request ostensibly to update or "bump" the project's dependencies to their latest versions, but surreptitiously insert a malicious `—index-url` option amidst the many other changes associated with updating the dependencies in a lock file. As these dependency updates often result in hundreds or even thousands of changes spread across the requirements file and are not easy to review manually, such an attack could be difficult to identify or prevent without tools or other mitigating controls.
Moreover, because the `argparse` module is used to parse the `--index-url`, `--extra-index-url`, and `--trusted-host` options, an attacker's ability to obfuscate their payload and hide their malicious intent is even more greatly enhanced, as the attacker may use abbreviated option names, which are supported by default with `argparse`. For example, an attacker can insert the string, "`--t pypi.org`" into a comment anywhere in the requirements file, which will automatically be expanded to "`--trusted-host pypi.org`" during processing by pipenv. This "`--trusted-host pypi.org`" option will disable SSL/TLS validation when pipenv attempts to connect to the default/official package index server (https://pypi.org/simple), and could allow a malicious index server to pose as the pipi.org index server in a man-in-the-middle attack.
Setting up the malicious index server to serve compromised package versions is relatively simple, even for a non-sophisticated attacker. As `pip` uses a simple directory format for serving packages, the malicious packages simply need to be placed in the correct folder structure and served using an HTTP server with autoindex enabled (e.g. `python3 -m http.server`).
Packaging up the exploit code into the malicious package versions would also be trivial for an attacker with basic knowledge of Python development, as the attacker can simply clone the source code for any of the packages specified in the requirements file, embed their malicious exploit code in the cloned package's setup.py file, and then build a source distribution of the package. When pip installs a package from a source distribution, any code in the setup.py is executed by the install process.
### Additional Context & Details
According to the requirements file format specification (https://pip.pypa.io/en/stable/reference/requirements-file-format/#comments), any lines which begin with a "#" character, and/or any text in a line following a whitespace and a "#" character, should be interpreted as a comment which will be removed/ignored during processing of the requirements file.
However, due to a flaw in pipenv's parsing of requirements files, an attacker can insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file (e.g. with "`pipenv install -r requirements.txt`") to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker is then able to gain arbitrary remote code execution on the victims' systems.
The vulnerable requirements file parsing code is in the parse_indexes(str: line) function of the pipenv.utils module:
https://github.com/pypa/pipenv/blob/cdde3f7bcee6bacba89538f73aba9401337be10c/pipenv/utils.py#L2061-L2078
This function is called iteratively on each line of a requirements file, and uses the argparse module to find and process `--index-url`, `--extra-index-url`, and `--trusted-host` options (and variations thereof). However, it does not ignore these options when they appear in comments, or validate that these options appear on their own lines as required by the requirements file specification (see: https://pip.pypa.io/en/stable/reference/requirements-file-format/#global-options). The options can also be abbreviated due to default behavior provided by the `argparse.ArgumentParser` object used to parse these options in the requirements file, so that `--trusted-host` and `--t` will be treated as equivalent by pipenv, for example.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/pypa/pipenv/](https://github.com/pypa/pipenv/)
* Contact the pipenv maintainers:
* [Dan Ryan](https://github.com/techalchemy)
* [Tzu-ping Chung](https://github.com/uranusjr)
* [Nate Prewitt](https://github.com/nateprewitt)
* Contact the contributor who discovered the issue and authored this report:
* [Chris Passarello](https://github.com/milo-minderbinder)
|
{'CVE-2022-21668'}
|
2022-03-30T16:44:16Z
|
2022-01-12T22:29:41Z
|
HIGH
| 8
|
{'CWE-20', 'CWE-77'}
|
{'https://github.com/pypa/pipenv/releases/tag/v2022.1.8', 'https://github.com/pypa/pipenv/security/advisories/GHSA-qc9x-gjcv-465w', 'https://github.com/advisories/GHSA-qc9x-gjcv-465w', 'https://github.com/pypa/pipenv/commit/439782a8ae36c4762c88e43d5f0d8e563371b46f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56HBA3EOSLEDNCCBJVHE6DO34P56EOUM/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21668', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHQRIWKDP3SVJABAPEXBIQPKDI6UP7G4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KCROBYHUS6DKQPCXBRPCZ5CDBNQTYAWT/'}
| null |
GHSA
|
GHSA-c56f-grv3-gpfr
|
Regular expression denial of service in forms
|
The package forms before 1.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via email validation.
|
{'CVE-2021-23388'}
|
2021-06-07T22:10:13Z
|
2021-06-07T22:10:13Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-FORMS-1296389', 'https://github.com/caolan/forms/pull/214', 'https://github.com/advisories/GHSA-c56f-grv3-gpfr', 'https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23388'}
| null |
GHSA
|
GHSA-7qw8-847f-pggm
|
Improper Locking in github.com/containers/storage
|
A deadlock vulnerability was found in 'github.com/containers/storage' in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).
|
{'CVE-2021-20291'}
|
2021-05-25T21:58:26Z
|
2021-05-10T19:35:07Z
|
HIGH
| 6.5
|
{'CWE-667', 'CWE-400'}
|
{'https://github.com/advisories/GHSA-7qw8-847f-pggm', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNMB7O2UIXE34PGSCSOULGHPX5LIJBMM/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYOHNG2Q7DCAQZMGYLMENLKALGDLG3X/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5D7XL7FL24TWFMGQ3K2S72EOUSLZMKL/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WX24EITRXVHDM5M223BVTJA2ODF2FSHI/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1939485', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20291', 'https://github.com/containers/storage/commit/306fcabc964470e4b3b87a43a8f6b7d698209ee1', 'https://unit42.paloaltonetworks.com/cve-2021-20291/'}
| null |
GHSA
|
GHSA-58p8-9g59-q2hr
|
Potential DOS attack due to unrestricted attachment count in messages
|
Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property "attachment-max-count".
|
{'CVE-2019-12406'}
|
2021-06-17T19:59:48Z
|
2019-11-08T17:15:11Z
|
MODERATE
| 6.5
|
{'CWE-770'}
|
{'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rca465c9d1e1969281338522b76701c85a07abd045c494261137236e0@%3Cissues.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rb2a6dab1f781f55326543c56dc29ea677759439ddfeba920c83037e6@%3Cissues.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-58p8-9g59-q2hr', 'https://lists.apache.org/thread.html/r92238967ba2783d3ab5a483f2e17f5fdaa8ace98990f69f9e8e15de0@%3Cissues.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rabc395b38acb7f2465bfbf0bc16d6e1e95720c89bea87abe8808eeea@%3Cissues.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2019-12406.txt.asc', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12406', 'https://www.oracle.com/security-alerts/cpujan2020.html'}
| null |
GHSA
|
GHSA-2pwf-xwr3-hp55
|
Moderate severity vulnerability that affects actionview
|
Withdrawn, accidental duplicate publish.
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
| null |
2021-12-02T23:15:02Z
|
2018-08-13T20:48:52Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-2pwf-xwr3-hp55', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2097'}
| null |
GHSA
|
GHSA-4hfc-fv33-ph9p
|
Malicious Package in sj-tw-abc
|
All versions of `sj-tw-abc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T16:15:38Z
|
2020-09-03T23:26:33Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-4hfc-fv33-ph9p', 'https://www.npmjs.com/advisories/1310'}
| null |
GHSA
|
GHSA-8fg4-j562-mjrc
|
Low severity vulnerability that affects apache-airflow
|
In Apache Airflow 1.8.2 and earlier, an authenticated user can execute code remotely on the Airflow webserver by creating a special object.
|
{'CVE-2017-15720'}
|
2021-09-07T17:25:40Z
|
2019-01-25T16:19:01Z
|
HIGH
| 8.8
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15720', 'https://github.com/advisories/GHSA-8fg4-j562-mjrc', 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}
| null |
GHSA
|
GHSA-hvmf-r92r-27hr
|
Django allows unintended model editing
|
Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)
|
{'CVE-2019-19118'}
|
2021-08-19T16:04:59Z
|
2019-12-04T21:26:28Z
|
MODERATE
| 6.5
|
{'CWE-276'}
|
{'https://security.gentoo.org/glsa/202004-17', 'https://github.com/advisories/GHSA-hvmf-r92r-27hr', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://security.netapp.com/advisory/ntap-20191217-0003/', 'https://groups.google.com/forum/#!topic/django-announce/GjGqDvtNmWQ', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19118', 'http://www.openwall.com/lists/oss-security/2019/12/02/1', 'https://github.com/django/django/commit/103ebe2b5ff1b2614b85a52c239f471904d26244', 'https://github.com/django/django/commit/36f580a17f0b3cb087deadf3b65eea024f479c21', 'https://www.djangoproject.com/weblog/2019/dec/02/security-releases/'}
| null |
GHSA
|
GHSA-27xw-p8v6-9jjr
|
Moderate severity vulnerability that affects org.springframework.security:spring-security-core
|
Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.
|
{'CVE-2018-15801'}
|
2022-04-08T21:48:09Z
|
2018-12-20T22:01:31Z
|
HIGH
| 7.4
|
{'CWE-345'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-15801', 'https://pivotal.io/security/cve-2018-15801', 'https://github.com/advisories/GHSA-27xw-p8v6-9jjr'}
| null |
GHSA
|
GHSA-c7vg-w8q8-c3wf
|
Session Fixation
|
Shopware is an open source eCommerce platform. Potential session hijacking of store customers in versions below 6.3.5.2. We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
{'CVE-2021-32710'}
|
2021-09-08T18:00:20Z
|
2021-09-08T18:00:20Z
|
MODERATE
| 5.9
|
{'CWE-384'}
|
{'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e', 'https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32710', 'https://github.com/advisories/GHSA-c7vg-w8q8-c3wf'}
| null |
GHSA
|
GHSA-5w74-jx7m-x6hv
|
XSS vulnerability in theme config file in Mautic
|
### Impact
Mautic before v2.13.0 has stored XSS via a theme config file.
### Patches
Update to 2.13.0 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2018-8071'}
|
2021-01-19T21:16:17Z
|
2021-01-19T21:16:17Z
|
LOW
| 6.1
|
{'CWE-79'}
|
{'https://github.com/mautic/mautic/commit/3add236e9cc00ea9b211b52cccc4660379b2ee8b', 'https://github.com/advisories/GHSA-5w74-jx7m-x6hv', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8071', 'https://github.com/mautic/mautic/security/advisories/GHSA-5w74-jx7m-x6hv', 'https://github.com/mautic/mautic/releases/tag/2.13.0'}
| null |
GHSA
|
GHSA-rggc-4g3r-j7ff
|
Remote Code Execution in Contao Managed Edition
|
Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter.
|
{'CVE-2022-26265'}
|
2022-03-30T16:47:05Z
|
2022-03-20T00:00:30Z
|
CRITICAL
| 9.8
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-rggc-4g3r-j7ff', 'https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26265'}
| null |
GHSA
|
GHSA-ccmq-qvcp-5mrm
|
Critical severity vulnerability that affects owlmixin
|
An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
|
{'CVE-2017-16618'}
|
2022-03-22T21:47:59Z
|
2018-07-13T16:01:12Z
|
CRITICAL
| 9.8
| null |
{'https://github.com/advisories/GHSA-ccmq-qvcp-5mrm', 'https://github.com/tadashi-aikawa/owlmixin/commit/5d0575303f6df869a515ced4285f24ba721e0d4e', 'https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16618-convert-through-owlmixin/', 'https://github.com/tadashi-aikawa/owlmixin/issues/12', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16618'}
| null |
GHSA
|
GHSA-v6fq-q792-j46j
|
Improper Input Validation in Apache Unomi
|
Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.
|
{'CVE-2020-11975'}
|
2022-02-09T23:20:47Z
|
2022-02-09T23:20:47Z
|
HIGH
| 9.8
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-v6fq-q792-j46j', 'http://unomi.apache.org/security/cve-2020-11975.txt', 'https://lists.apache.org/thread.html/r79672c25e0ef9bb4b9148376281200a8e61c6d5ef5bb705e9a363460@%3Ccommits.unomi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11975', 'https://lists.apache.org/thread.html/r01021bc4b25c1e98812efca0b07f0e078a6281bd52f7c3817a429d95@%3Ccommits.unomi.apache.org%3E'}
| null |
GHSA
|
GHSA-vhvh-528q-ff3p
|
Security feature bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated
|
A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated, aka "ASP.NET Security Feature Bypass Vulnerability." This affects ASP.NET, ASP.NET Core 1.1, ASP.NET Core 1.0, ASP.NET Core 2.0, ASP.NET MVC 5.2.
|
{'CVE-2018-8171'}
|
2022-04-26T19:05:55Z
|
2018-10-16T19:56:50Z
|
HIGH
| 7.5
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-8171', 'http://www.securityfocus.com/bid/104659', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8171', 'http://www.securitytracker.com/id/1041267', 'https://github.com/advisories/GHSA-vhvh-528q-ff3p'}
| null |
GHSA
|
GHSA-65q2-x652-xx84
|
Downloads Resources over HTTP in dalek-browser-ie
|
Affected versions of `dalek-browser-ie` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie`.
## Recommendation
No patch is currently available for this vulnerability, and the package author has marked the package as deprecated.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10605'}
|
2021-01-08T19:46:45Z
|
2019-02-18T23:50:04Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10605', 'https://www.npmjs.com/advisories/209', 'https://nodesecurity.io/advisories/209', 'https://github.com/advisories/GHSA-65q2-x652-xx84'}
| null |
GHSA
|
GHSA-h4x4-5qp2-wp46
|
Moderate severity vulnerability that affects com.fasterxml.jackson.datatype:jackson-datatype-jsr353
|
Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Databind that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8.
|
{'CVE-2018-1000873'}
|
2021-09-13T15:14:09Z
|
2018-12-21T17:46:54Z
|
MODERATE
| 6.5
|
{'CWE-20'}
|
{'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200904-0004/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000873', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/FasterXML/jackson-modules-java8/pull/87', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-h4x4-5qp2-wp46', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=1665601', 'https://github.com/FasterXML/jackson-modules-java8/issues/90', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
| null |
GHSA
|
GHSA-jgrh-5m3h-9c5f
|
Web Cache Poisoning in find-my-way
|
This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version' header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack.
|
{'CVE-2020-7764'}
|
2020-11-10T20:19:43Z
|
2020-11-09T22:17:13Z
|
MODERATE
| 5.9
|
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7764', 'https://github.com/delvedor/find-my-way/commit/ab408354690e6b9cf3c4724befb3b3fa4bb90aac', 'https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269', 'https://github.com/advisories/GHSA-jgrh-5m3h-9c5f', 'https://www.npmjs.com/package/find-my-way'}
| null |
GHSA
|
GHSA-44gg-pmqr-4669
|
Access Restriction Bypass in Docker
|
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
|
{'CVE-2014-6408'}
|
2022-04-12T22:38:18Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 0
|
{'CWE-285'}
|
{'https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6408', 'https://www.openwall.com/lists/oss-security/2014/11/24/5', 'https://docs.docker.com/v1.3/release-notes/', 'https://secunia.com/advisories/60171', 'https://secunia.com/advisories/60241', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6408', 'https://github.com/docker/docker/commit/c9379eb3fbbc484c056f5a5e49d8d0b755a29c45', 'https://github.com/advisories/GHSA-44gg-pmqr-4669', 'https://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html'}
| null |
GHSA
|
GHSA-hrjm-c879-pp86
|
Side-channel timing attack in libsecp256k1
|
An issue was discovered in the libsecp256k1 crate before 0.3.1 for Rust. Scalar::check_overflow allows a timing side-channel attack; consequently, attackers can obtain sensitive information.
|
{'CVE-2019-25003'}
|
2021-08-25T20:46:46Z
|
2021-08-25T20:46:46Z
|
HIGH
| 7.5
|
{'CWE-208'}
|
{'https://github.com/paritytech/libsecp256k1/commit/11ba23a9766a5079918cd9f515bc100bc8164b50', 'https://github.com/advisories/GHSA-hrjm-c879-pp86', 'https://rustsec.org/advisories/RUSTSEC-2019-0027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25003'}
| null |
GHSA
|
GHSA-m3f9-w3p3-p669
|
Heap buffer overflow in `QuantizedMul`
|
### Impact
An attacker can cause a heap buffer overflow in `QuantizedMul` by passing in invalid thresholds for the quantization:
```python
import tensorflow as tf
x = tf.constant([256, 328], shape=[1, 2], dtype=tf.quint8)
y = tf.constant([256, 328], shape=[1, 2], dtype=tf.quint8)
min_x = tf.constant([], dtype=tf.float32)
max_x = tf.constant([], dtype=tf.float32)
min_y = tf.constant([], dtype=tf.float32)
max_y = tf.constant([], dtype=tf.float32)
tf.raw_ops.QuantizedMul(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/87cf4d3ea9949051e50ca3f071fc909538a51cd0/tensorflow/core/kernels/quantized_mul_op.cc#L287-L290) assumes that the 4 arguments are always valid scalars and tries to access the numeric value directly:
```cc
const float min_x = context->input(2).flat<float>()(0);
const float max_x = context->input(3).flat<float>()(0);
const float min_y = context->input(4).flat<float>()(0);
const float max_y = context->input(5).flat<float>()(0);
```
However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow.
### Patches
We have patched the issue in GitHub commit [efea03b38fb8d3b81762237dc85e579cc5fc6e87](https://github.com/tensorflow/tensorflow/commit/efea03b38fb8d3b81762237dc85e579cc5fc6e87).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29535'}
|
2021-05-21T14:22:28Z
|
2021-05-21T14:22:28Z
|
LOW
| 2.5
|
{'CWE-131', 'CWE-787'}
|
{'https://github.com/advisories/GHSA-m3f9-w3p3-p669', 'https://github.com/tensorflow/tensorflow/commit/efea03b38fb8d3b81762237dc85e579cc5fc6e87', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m3f9-w3p3-p669', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29535'}
| null |
GHSA
|
GHSA-jvfv-jhw9-jmpp
|
Malicious Package in b5ffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:22:22Z
|
2020-09-03T21:23:09Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1228', 'https://github.com/advisories/GHSA-jvfv-jhw9-jmpp'}
| null |
GHSA
|
GHSA-244r-fcj3-ghjq
|
Exposure of class information in RESTEasy
|
A flaw was found in RESTEasy in all current versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.
|
{'CVE-2021-20289'}
|
2022-04-22T15:49:36Z
|
2021-04-07T21:51:33Z
|
MODERATE
| 5.3
|
{'CWE-209', 'CWE-668'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20210528-0008/', 'https://github.com/advisories/GHSA-244r-fcj3-ghjq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20289', 'https://bugzilla.redhat.com/show_bug.cgi?id=1935927', 'https://bugzilla.redhat.com/show_bug.cgi?id=1941544', 'https://issues.redhat.com/browse/RESTEASY-2843'}
| null |
GHSA
|
GHSA-9fj5-jg6f-qg5r
|
Use of Hard-coded Credentials in Apache Kylin
|
Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into kylin's configuration file, there is a risk that the password may be decrypted. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
|
{'CVE-2021-45458'}
|
2022-01-14T19:39:33Z
|
2022-01-08T00:43:09Z
|
MODERATE
| 0
|
{'CWE-798', 'CWE-326'}
|
{'https://github.com/apache/kylin/pull/1782', 'https://github.com/advisories/GHSA-9fj5-jg6f-qg5r', 'http://www.openwall.com/lists/oss-security/2022/01/06/7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45458', 'https://lists.apache.org/thread/oof215qz188k16vhlo97cm1jksxdowfy', 'https://github.com/apache/kylin/pull/1781', 'http://www.openwall.com/lists/oss-security/2022/01/06/3'}
| null |
GHSA
|
GHSA-84rm-qf37-fgc2
|
Integer Overflow in openssl-src
|
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
|
{'CVE-2021-23841'}
|
2022-05-05T00:15:24Z
|
2021-08-25T20:52:21Z
|
MODERATE
| 5.9
|
{'CWE-476', 'CWE-190'}
|
{'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'http://seclists.org/fulldisclosure/2021/May/70', 'https://www.tenable.com/security/tns-2021-03', 'https://rustsec.org/advisories/RUSTSEC-2021-0058', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://support.apple.com/kb/HT212534', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.openssl.org/news/secadv/20210216.txt', 'https://security.gentoo.org/glsa/202103-03', 'http://seclists.org/fulldisclosure/2021/May/68', 'https://security.netapp.com/advisory/ntap-20210513-0002/', 'http://seclists.org/fulldisclosure/2021/May/67', 'https://support.apple.com/kb/HT212528', 'https://www.tenable.com/security/tns-2021-09', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23841', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807', 'https://security.netapp.com/advisory/ntap-20210219-0009/', 'https://support.apple.com/kb/HT212529', 'https://www.debian.org/security/2021/dsa-4855', 'https://github.com/advisories/GHSA-84rm-qf37-fgc2', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-6hrm-jqp3-64cv
|
Improper Certificate Validation in TweetStream
|
TweetStream 2.6.1 uses the library eventmachine in an insecure way that does not have TLS hostname validation. This allows an attacker to perform a man-in-the-middle attack.
|
{'CVE-2020-24393'}
|
2021-04-13T15:42:36Z
|
2021-04-13T15:42:36Z
|
MODERATE
| 5.9
|
{'CWE-295'}
|
{'https://github.com/advisories/GHSA-6hrm-jqp3-64cv', 'https://securitylab.github.com/advisories/GHSL-2020-096-tweetstream-tweetstream', 'https://github.com/tweetstream/tweetstream', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24393'}
| null |
GHSA
|
GHSA-8j36-q8x7-pm6q
|
OS Command Injection in systeminformation
|
This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands.
|
{'CVE-2020-7778'}
|
2022-02-09T23:14:11Z
|
2022-02-09T23:14:11Z
|
HIGH
| 7.3
|
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1043753', 'https://github.com/sebhildebrandt/systeminformation/commit/11103a447ab9550c25f1fbec7e6d903720b3fea8%23diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7778', 'https://github.com/advisories/GHSA-8j36-q8x7-pm6q', 'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js', 'https://github.com/sebhildebrandt/systeminformation/commit/73dce8d717ca9c3b7b0d0688254b8213b957f0fa%23diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc', 'https://gist.github.com/EffectRenan/b434438938eed0b21b376cedf5c81e80'}
| null |
GHSA
|
GHSA-p699-3wgc-7h72
|
Moderate severity vulnerability that affects org.apache.tika:tika-core
|
A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18.
|
{'CVE-2018-1339'}
|
2021-09-15T21:42:37Z
|
2018-10-17T15:43:59Z
|
MODERATE
| 5.5
|
{'CWE-835'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1339', 'https://github.com/advisories/GHSA-p699-3wgc-7h72', 'https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2669'}
| null |
GHSA
|
GHSA-rjh8-p66p-jrh5
|
Data races in rusqlite
|
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via an Auxdata API data race.
|
{'CVE-2020-35871'}
|
2021-08-25T20:46:59Z
|
2021-08-25T20:46:59Z
|
HIGH
| 8.1
|
{'CWE-362'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35871', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/advisories/GHSA-rjh8-p66p-jrh5', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3'}
| null |
GHSA
|
GHSA-qppg-v75c-r5ff
|
S3Scanner before 2.0.2 allows Directory Traversal
|
S3Scanner before 2.0.2 allows Directory Traversal via a crafted bucket, as demonstrated by a <Key>../ substring in a ListBucketResult element.
|
{'CVE-2021-32061'}
|
2021-11-30T22:21:36Z
|
2021-11-30T22:21:36Z
|
MODERATE
| 5.3
|
{'CWE-22'}
|
{'https://vuln.ryotak.me/advisories/62', 'https://github.com/sa7mon/S3Scanner/releases/tag/2.0.2', 'https://github.com/sa7mon/S3Scanner/issues/122', 'https://github.com/advisories/GHSA-qppg-v75c-r5ff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32061'}
| null |
GHSA
|
GHSA-m956-frf4-m2wr
|
Ansible is vulnerable to an improper input validation in Ansible's handling of data sent from client systems
|
Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.
|
{'CVE-2016-9587'}
|
2022-04-26T18:42:56Z
|
2018-10-10T17:22:53Z
|
HIGH
| 8.1
|
{'CWE-20'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9587', 'https://www.exploit-db.com/exploits/41013/', 'https://access.redhat.com/errata/RHSA-2017:0515', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9587', 'http://rhn.redhat.com/errata/RHSA-2017-0195.html', 'https://access.redhat.com/errata/RHSA-2017:0448', 'https://github.com/advisories/GHSA-m956-frf4-m2wr', 'https://access.redhat.com/errata/RHSA-2017:1685', 'http://rhn.redhat.com/errata/RHSA-2017-0260.html', 'http://www.securityfocus.com/bid/95352', 'https://security.gentoo.org/glsa/201701-77'}
| null |
GHSA
|
GHSA-x6wp-rfwh-hcx7
|
Regular Expression Denial of Service in content
|
Affected versions of `content` are vulnerable to a regular expression denial of service when parsing malicious `Content-Type` and `Content-Disposition` headers.
## Recommendation
Update to version 3.0.6 or later.
|
{'CVE-2017-16111'}
|
2021-01-08T00:19:21Z
|
2018-07-24T19:55:05Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/530', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16111', 'https://nodesecurity.io/advisories/530', 'https://github.com/advisories/GHSA-x6wp-rfwh-hcx7'}
| null |
GHSA
|
GHSA-39pj-gq8q-9pfj
|
Authentication Weakness in keystone
|
Versions of `keystone` prior to 0.3.16 are affected by a partial authentication bypass vulnerability. In the default sign in functionality, if an attacker provides a full and correct password, yet only provides part of the associated email address, authentication will be granted.
## Recommendation
Update to version 0.3.16 or later.
|
{'CVE-2015-9240'}
|
2021-08-31T20:54:56Z
|
2018-06-07T19:43:20Z
|
HIGH
| 7.5
|
{'CWE-1255'}
|
{'https://www.npmjs.com/package/keystone', 'https://nodesecurity.io/advisories/60', 'https://www.npmjs.com/advisories/60', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9240', 'https://github.com/advisories/GHSA-39pj-gq8q-9pfj'}
| null |
GHSA
|
GHSA-fjq3-5pxw-4wj4
|
Cross-Site Request Forgery in Webargs
|
flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.
|
{'CVE-2020-7965'}
|
2021-04-07T21:06:30Z
|
2021-04-07T21:06:30Z
|
MODERATE
| 8.8
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7965', 'https://github.com/advisories/GHSA-fjq3-5pxw-4wj4', 'https://webargs.readthedocs.io/en/latest/changelog.html'}
| null |
GHSA
|
GHSA-9mrq-cjgh-32g2
|
Low severity vulnerability that affects smartbanner.js
|
## rel noopener vulnerability
### Impact
Clicking on smartbanner _View_ link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile 3rd parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner.
### Patches
`rel="noopener"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability.
### Workarounds
If you can not upgrade to `v1.14.1`:
1. Ensure _View_ link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams
2. If _View_ link is going to a 3rd party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel="noopener"` is imposed on all `target="_blank"` links.
Following combination of smartbanner meta tags can be used to achieve the above:
```html
<meta name="smartbanner:enabled-platforms" content="none">
<meta name="smartbanner:include-user-agent-regex" content="Mobile.*Safari">
```
### References
* [About rel=noopener](https://mathiasbynens.github.io/rel-noopener/)
* [Safari 12.1 Release Notes](https://developer.apple.com/documentation/safari_release_notes/safari_12_1_release_notes#3130296)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [smartbanner.js](https://github.com/ain/smartbanner.js/issues/new)
| null |
2021-12-03T14:38:19Z
|
2019-09-13T13:22:33Z
|
LOW
| 0
| null |
{'https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2', 'https://github.com/advisories/GHSA-9mrq-cjgh-32g2'}
| null |
GHSA
|
GHSA-484f-743f-6jx2
|
Object injection in cookie driver in phpfastcache
|
## Object injection in cookie driver
### Impact
An possible object injection has been discovered in cookie driver prior 5.0.13 versions (of 5.x releases).
### Patches
The issue has been addressed by enforcing JSON conversion when deserializing
### Workarounds
If you can't fix it, use another driver such as "Files" (Filesystem)
### References
Fixing release: https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the issue tracker](https://github.com/PHPSocialNetwork/phpfastcache/issues)
* Email us at [security@geolim4.com](mailto:security@geolim4.com)
|
{'CVE-2019-16774'}
|
2021-01-08T21:28:17Z
|
2019-12-12T22:50:20Z
|
HIGH
| 4.4
|
{'CWE-94'}
|
{'https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13', 'https://github.com/advisories/GHSA-484f-743f-6jx2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16774', 'https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4', 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2'}
| null |
GHSA
|
GHSA-fxjm-wvj9-9c39
|
Information disclosure in Apache Superset
|
An information disclosure issue was found in Apache Superset 0.34.0, 0.34.1, 0.35.0, and 0.35.1. Authenticated Apache Superset users are able to retrieve other users' information, including hashed passwords, by accessing an unused and undocumented API endpoint on Apache Superset.
|
{'CVE-2020-1932'}
|
2021-07-28T18:07:36Z
|
2020-02-26T19:54:57Z
|
MODERATE
| 6.5
|
{'CWE-200'}
|
{'https://lists.apache.org/thread.html/r4e5323c3bc786005495311a6ff53ac6d990b2c7eb52941a1a13ce227%40%3Cdev.superset.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1932', 'https://github.com/advisories/GHSA-fxjm-wvj9-9c39'}
| null |
GHSA
|
GHSA-jfvf-rfmq-qwf8
|
Croos-site scripting in Croogo
|
Croogo before 3.0.7 allows XSS via the title to admin/menus/menus or admin/taxonomy/vocabularies.
|
{'CVE-2019-20789'}
|
2021-06-22T15:23:21Z
|
2021-06-22T15:23:21Z
|
LOW
| 4.8
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-20789', 'https://github.com/croogo/croogo/issues/940', 'https://github.com/advisories/GHSA-jfvf-rfmq-qwf8', 'https://github.com/croogo/croogo/compare/3.0.6...3.0.7'}
| null |
GHSA
|
GHSA-jx6h-3fjx-cgv5
|
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
|
Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.
|
{'CVE-2018-1305'}
|
2021-09-14T19:53:27Z
|
2018-10-17T16:31:48Z
|
MODERATE
| 6.5
| null |
{'https://access.redhat.com/errata/RHSA-2018:0466', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20180706-0001/', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html', 'https://www.debian.org/security/2018/dsa-4281', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1305', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-jx6h-3fjx-cgv5', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0465', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/103144', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html', 'https://access.redhat.com/errata/RHSA-2019:2205', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://www.securitytracker.com/id/1040428', 'https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E', 'https://usn.ubuntu.com/3665-1/'}
| null |
GHSA
|
GHSA-jchg-g94r-64qg
|
Malicious Package in mogobd
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:20:04Z
|
2020-09-03T19:50:10Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-jchg-g94r-64qg', 'https://www.npmjs.com/advisories/1132'}
| null |
GHSA
|
GHSA-4wcx-c9c4-89p2
|
Malicious Package in react-datepicker-plus
|
Versions 2.4.3 and 2.4.2 of `react-datepicker-plus` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-30T22:08:43Z
|
2020-09-11T21:23:30Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/946', 'https://github.com/advisories/GHSA-4wcx-c9c4-89p2'}
| null |
GHSA
|
GHSA-9cx9-x2gp-9qvh
|
CRLF vulnerability in Fiber
|
### Impact
The filename that is given in [c.Attachment()](https://docs.gofiber.io/ctx#attachment) is not escaped, and therefore vulnerable for a CRLF injection attack. I.e. an attacker could upload a custom filename and then give the link to the victim. With this filename, the attacker can change the name of the downloaded file, redirect to another site, change the authorization header, etc.
### Steps to reproduce
```go
package main
import "github.com/gofiber/fiber"
const badFileName = "another secret document.pdf\"\r\nLocation: google.com\r\nAuthorization: \"example_of_session_fixation"
func splitTheResponse(c *fiber.Ctx) {
c.Attachment(badFileName)
}
func main() {
app := fiber.New()
app.Get("/attack", splitTheResponse)
app.Listen("127.0.0.1:8080")
}
```
```
HTTP/1.1 200 OK
Date: Fri, 10 Jul 2020 19:47:04 GMT
Content-Type: application/octet-stream
Content-Length: 0
Content-Disposition: attachment; filename="another secret document.pdf"
Location: google.com
Authorization: "example_of_session_fixation"
```
### Patches
This issue has been patched in `v1.12.6` with commit [579](https://github.com/gofiber/fiber/pull/579/commits/f698b5d5066cfe594102ae252cd58a1fe57cf56f) escaping the filename by default.
### Workarounds
You could of course serialize the input yourself before passing it to `ctx.Attachment()`, this is actually a good practice by default. But in case you forget, we got you covered 👍
### References
A CRLF injection attack is one of several types of injection attacks. It can be used to escalate to more malicious attacks such as Cross-site Scripting (XSS), page injection, web cache poisoning, cache-based defacement, and more. A CRLF injection vulnerability exists if an attacker can inject the CRLF characters into a web application, for example using a user input form or an HTTP request, [see acunetix](https://www.acunetix.com/websitesecurity/crlf-injection/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [gofiber/fiber](https://github.com/gofiber/fiber)
* Join us on [Discord](https://gofiber.io/discord)
|
{'CVE-2020-15111'}
|
2022-04-19T19:02:30Z
|
2021-06-29T21:24:28Z
|
MODERATE
| 4.2
|
{'CWE-93', 'CWE-74'}
|
{'https://github.com/gofiber/fiber/pull/579/commits/f698b5d5066cfe594102ae252cd58a1fe57cf56f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15111', 'https://github.com/gofiber/fiber/security/advisories/GHSA-9cx9-x2gp-9qvh', 'https://github.com/advisories/GHSA-9cx9-x2gp-9qvh'}
| null |
GHSA
|
GHSA-vjcj-5g2r-vxqc
|
Moderate severity vulnerability that affects editor.md
|
Pandao Editor.md 1.5.0 allows XSS via crafted attributes of an invalid IMG element.
|
{'CVE-2018-16330'}
|
2021-09-20T22:06:18Z
|
2018-09-06T03:22:00Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16330', 'https://github.com/pandao/editor.md/issues/612', 'https://github.com/advisories/GHSA-vjcj-5g2r-vxqc'}
| null |
GHSA
|
GHSA-h582-2pch-3xv3
|
High severity vulnerability that affects django
|
The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
|
{'CVE-2015-5143'}
|
2021-09-13T16:09:05Z
|
2019-07-05T21:10:39Z
|
HIGH
| 0
| null |
{'http://www.securitytracker.com/id/1032820', 'https://github.com/advisories/GHSA-h582-2pch-3xv3', 'http://www.ubuntu.com/usn/USN-2671-1', 'https://security.gentoo.org/glsa/201510-06', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html', 'http://rhn.redhat.com/errata/RHSA-2015-1678.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5143', 'http://www.debian.org/security/2015/dsa-3305', 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html', 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html', 'http://www.securityfocus.com/bid/75666', 'http://rhn.redhat.com/errata/RHSA-2015-1686.html', 'http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html', 'https://www.djangoproject.com/weblog/2015/jul/08/security-releases/'}
| null |
GHSA
|
GHSA-9pcf-h8q9-63f6
|
Sandbox Breakout / Arbitrary Code Execution in safe-eval
|
All versions of `safe-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload chaining a function's callee and caller constructors can escape the sandbox and execute arbitrary code.
For example, the payload
```
((() => {
const targetKey = Object.keys(this)[0];
Object.defineProperty(this, targetKey, {
get: function() {
return arguments.callee.caller.constructor(
"return global.process.mainModule.require('child_process').execSync('pwd').toString()"
)();
}
});
})();```
may be used to print the `pwd` to the console.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-09-03T17:12:41Z
|
2020-09-03T17:12:41Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-9pcf-h8q9-63f6', 'https://www.npmjs.com/advisories/1033'}
| null |
GHSA
|
GHSA-7phj-gmgx-2r66
|
Moderate severity vulnerability that affects activerecord
|
Withdrawn, accidental duplicate publish.
activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
| null |
2021-12-03T14:24:44Z
|
2018-09-17T21:58:09Z
|
MODERATE
| 0
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7577', 'https://github.com/advisories/GHSA-7phj-gmgx-2r66'}
| null |
GHSA
|
GHSA-xq58-69h2-765m
|
Cross Site Request Forgery in mailman
|
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
|
{'CVE-2021-44227'}
|
2021-12-16T15:27:06Z
|
2021-12-16T15:27:06Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44227', 'https://github.com/advisories/GHSA-xq58-69h2-765m', 'https://bugs.launchpad.net/mailman/+bug/1952384'}
| null |
GHSA
|
GHSA-qr7j-h6gg-jmgc
|
Deserialization of Untrusted Data in jackson-databind
|
An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.
|
{'CVE-2018-11307'}
|
2021-04-27T16:01:46Z
|
2019-07-16T17:42:21Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-qr7j-h6gg-jmgc', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7525', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11307', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2032', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1822'}
| null |
GHSA
|
GHSA-8hqw-qp6r-vqcm
|
Malicious Package in bitcoin-sweep
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:42:45Z
|
2020-09-04T16:40:00Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1366', 'https://github.com/advisories/GHSA-8hqw-qp6r-vqcm'}
| null |
GHSA
|
GHSA-hvxq-j2r4-4jm8
|
Regular Expression Denial of Service in sql-injection
|
All versions of `sql-injection` are vulnerable to Regular Expression Denial of Service. The package processes a request's body with regular expressions that may take exponentially longer to execute for large inputs.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-09-03T20:31:04Z
|
2020-09-03T20:31:04Z
|
HIGH
| 0
| null |
{'https://www.npmjs.com/advisories/1163', 'https://github.com/advisories/GHSA-hvxq-j2r4-4jm8'}
| null |
GHSA
|
GHSA-879r-7f3w-8jj3
|
Moderate severity vulnerability that affects Plone and Zope2
|
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.
|
{'CVE-2012-5489'}
|
2021-09-07T14:31:58Z
|
2018-07-23T19:52:06Z
|
MODERATE
| 0
| null |
{'https://bugs.launchpad.net/zope2/+bug/1079238', 'https://github.com/advisories/GHSA-879r-7f3w-8jj3', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'https://plone.org/products/plone-hotfix/releases/20121106', 'https://plone.org/products/plone/security/advisories/20121106/05', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5489'}
| null |
GHSA
|
GHSA-rhq2-2574-78mc
|
Unzip function in ZipUtil.java in Hutool allows remote attackers to overwrite arbitrary files via directory traversal
|
The unzip function in ZipUtil.java in Hutool before 4.1.12 allows remote attackers to overwrite arbitrary files via directory traversal sequences in a filename within a ZIP archive.
|
{'CVE-2018-17297'}
|
2022-04-27T14:42:54Z
|
2018-10-17T19:54:53Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/looly/hutool/issues/162', 'https://github.com/advisories/GHSA-rhq2-2574-78mc', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17297'}
| null |
GHSA
|
GHSA-95jp-77w6-qj52
|
Cross-site Scripting in python-cjson
|
Python-cjson 1.0.5 does not properly handle a ['/'] argument to cjson.encode, which makes it easier for remote attackers to conduct certain cross-site scripting (XSS) attacks involving Firefox and the end tag of a SCRIPT element.
|
{'CVE-2009-4924'}
|
2021-12-06T18:19:27Z
|
2021-12-06T18:17:45Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2009-4924', 'http://t3.dotgnu.info/blog/insecurity/quotes-dont-help.html', 'https://github.com/advisories/GHSA-95jp-77w6-qj52', 'http://pypi.python.org/pypi/python-cjson/', 'https://github.com/pypa/advisory-db/tree/main/vulns/python-cjson/PYSEC-2010-26.yaml'}
| null |
GHSA
|
GHSA-j3rh-8vwq-wh84
|
Use of Cryptographically Weak Pseudo-Random Number Generator in JHipster Kotlin
|
JHipster Kotlin is using an insecure source of randomness to generate all of it's random values. JHipster Kotlin relies upon apache commons lang3 `RandomStringUtils`.
From the documentation:
> Caveat: Instances of Random, upon which the implementation of this class relies, are not cryptographically secure.
> \- https://commons.apache.org/proper/commons-lang/javadocs/api-3.9/org/apache/commons/lang3/RandomStringUtils.html
Here are the examples of JHipster Kotlin'ss use of an insecure PRNG:
https://github.com/jhipster/jhipster-kotlin/blob/193ae8f13c0be686f9687e78bacfedb144c47d8c/generators/server/templates/src/main/kotlin/package/service/util/RandomUtil.kt.ejs#L32
## Proof Of Concepts Already Exist
There has been a POC of taking one RNG value generated `RandomStringUtils` and reversing it to generate all of the past/future RNG values public since March 3rd, 2018.
https://medium.com/@alex91ar/the-java-soothsayer-a-practical-application-for-insecure-randomness-c67b0cd148cd
POC Repository: https://github.com/alex91ar/randomstringutils
## Potential Impact Technical
All that is required is to get one password reset token from a JHipster Kotlin generated service and using the POC above, you can reverse what all future password reset tokens to be generated by this server. This allows an attacker to pick and choose what account they would like to takeover by sending account password reset requests for targeted accounts.
## Potential Impact Scale
Not as large as for the original jhipster project as the kotlin blueprint is not that widely used.
### Patches
Update your generated applications to > 1.2.0
### Workarounds
Change the content of `RandomUtil.kt` like this:
```kotlin
import java.security.SecureRandom
import org.apache.commons.lang3.RandomStringUtils
private const val DEF_COUNT = 20
object RandomUtil {
private val secureRandom: SecureRandom = SecureRandom()
init {
secureRandom.nextBytes(byteArrayOf(64.toByte()))
}
private fun generateRandomAlphanumericString(): String {
return RandomStringUtils.random(DEF_COUNT, 0, 0, true, true, null, secureRandom)
}
/**
* Generate a password.
*
* @return the generated password.
*/
fun generatePassword(): String = generateRandomAlphanumericString()
}
```
Important is to exchange **every** call of `RandomStringUtils.randomAlphaNumeric`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JHipster Kotlin](https://github.com/jhipster/jhipster-kotlin)
|
{'CVE-2019-16303'}
|
2022-04-19T19:02:30Z
|
2020-06-26T16:48:13Z
|
CRITICAL
| 9.8
|
{'CWE-338'}
|
{'https://github.com/jhipster/jhipster-kotlin/issues/183', 'https://lists.apache.org/thread.html/rc87fa35a48b5d70b06af6fb81785ed82e82686eb83307aae6d250dc9@%3Cissues.commons.apache.org%3E', 'https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html', 'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-j3rh-8vwq-wh84', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16303', 'https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7', 'https://snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-466980', 'https://www.npmjs.com/advisories/1187', 'https://github.com/jhipster/generator-jhipster/issues/10401', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c', 'https://github.com/advisories/GHSA-j3rh-8vwq-wh84', 'https://lists.apache.org/thread.html/rc3f00f5d3d2ec0e2381a3b9096d5f5b4d46ec1587ee7e251a3dbb897@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r6d243e7e3f25daeb242dacf3def411fba32a9388d3ff84918cb28ddd@%3Cissues.commons.apache.org%3E', 'https://www.npmjs.com/advisories/1188'}
| null |
GHSA
|
GHSA-wvjw-p9f5-vq28
|
Segfault in `tf.raw_ops.SparseCountSparseOutput`
|
### Impact
Passing invalid arguments (e.g., discovered via fuzzing) to `tf.raw_ops.SparseCountSparseOutput` results in segfault.
### Patches
We have patched the issue in GitHub commit [82e6203221865de4008445b13c69b6826d2b28d9](https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2021-29619'}
|
2021-05-21T14:29:02Z
|
2021-05-21T14:29:02Z
|
LOW
| 2.5
|
{'CWE-755'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wvjw-p9f5-vq28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29619', 'https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9', 'https://github.com/advisories/GHSA-wvjw-p9f5-vq28'}
| null |
GHSA
|
GHSA-pjpj-f6r8-56rm
|
High severity vulnerability that affects Microsoft.ChakraCore
|
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783.
|
{'CVE-2019-0609'}
|
2021-09-16T18:14:39Z
|
2019-04-09T19:43:59Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-pjpj-f6r8-56rm', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0609', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0609'}
| null |
GHSA
|
GHSA-ggmv-6q9p-9gm6
|
Cross-site Scripting in django-unicorn
|
The Unicorn framework before 0.36.1 for Django allows XSS via a component. NOTE: this issue exists because of an incomplete fix for CVE-2021-42053.
|
{'CVE-2021-42134'}
|
2021-10-19T14:51:12Z
|
2021-10-12T17:51:04Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/adamghill/django-unicorn/compare/0.36.0...0.36.1', 'https://github.com/advisories/GHSA-ggmv-6q9p-9gm6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42134', 'https://github.com/adamghill/django-unicorn/commit/3a832a9e3f6455ddd3b87f646247269918ad10c6'}
| null |
GHSA
|
GHSA-j88m-953w-8r2c
|
Moderate severity vulnerability that affects rendertron
|
Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs.
|
{'CVE-2017-18352'}
|
2021-09-14T19:19:43Z
|
2019-01-07T19:14:21Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18352', 'https://github.com/advisories/GHSA-j88m-953w-8r2c', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
| null |
GHSA
|
GHSA-cg3h-rc9q-g8v9
|
Cross-site Scripting in pimcore
|
pimcore version 10.3.0 and prior is vulnerable to cross-site scripting.
|
{'CVE-2022-0509'}
|
2022-02-14T22:35:25Z
|
2022-02-09T00:00:30Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0509', 'https://github.com/pimcore/pimcore/commit/6ccb5c12fc1be065ebce9c89c4677ee939b88597', 'https://huntr.dev/bounties/26cdf86c-8edc-4af6-8411-d569699ecd1b', 'https://github.com/advisories/GHSA-cg3h-rc9q-g8v9'}
| null |
GHSA
|
GHSA-2575-pghm-6qqx
|
Incorrect Permission Assignment for Critical Resource and Use of Cache Containing Sensitive Information in Kubernetes
|
In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be modified by other users/groups and disrupt the kubectl invocation.
|
{'CVE-2019-11244'}
|
2022-04-12T22:00:59Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 2.8
|
{'CWE-524', 'CWE-732'}
|
{'http://www.securityfocus.com/bid/108064', 'https://github.com/kubernetes/kubernetes/pull/77874/commits/f228ae3364729caed59087e23c42868454bc3ff4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11244', 'https://access.redhat.com/errata/RHSA-2020:0020', 'https://github.com/kubernetes/client-go/commit/790a4f63632139cf6731014d00a9a8338f1fbd7d', 'https://security.netapp.com/advisory/ntap-20190509-0002/', 'https://access.redhat.com/errata/RHSA-2019:3942', 'https://github.com/advisories/GHSA-2575-pghm-6qqx', 'https://github.com/kubernetes/kubernetes/pull/77874', 'https://access.redhat.com/errata/RHSA-2020:0074', 'https://github.com/kubernetes/kubernetes/issues/76676'}
| null |
GHSA
|
GHSA-gmch-cm2p-9qw9
|
Cross-site Scripting in lightning-server
|
This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller.
|
{'CVE-2020-7747'}
|
2021-05-10T18:39:15Z
|
2021-05-10T18:39:15Z
|
MODERATE
| 6.3
|
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381', 'https://github.com/lightning-viz/lightning/blob/master/app/controllers/session.js%23L230', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7747', 'https://github.com/advisories/GHSA-gmch-cm2p-9qw9'}
| null |
GHSA
|
GHSA-h436-432x-8fvx
|
High severity vulnerability that affects org.apache.commons:commons-compress
|
A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package.
|
{'CVE-2018-1324'}
|
2022-02-08T22:08:36Z
|
2019-03-14T15:41:12Z
|
MODERATE
| 5.5
|
{'CWE-835'}
|
{'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'http://www.securityfocus.com/bid/103490', 'https://github.com/advisories/GHSA-h436-432x-8fvx', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1324', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r5532dc8d5456b5151e8c286801e2e5769f5c04118b29c3b5d13ea387@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/1c7b6df6d1c5c8583518a0afa017782924918e4d6acfaf23ed5b2089@%3Cdev.commons.apache.org%3E', 'http://www.securitytracker.com/id/1040549', 'https://lists.apache.org/thread.html/b8ef29df0f1d55aa741170748352ae8e425c7b1d286b2f257711a2dd@%3Cdev.creadur.apache.org%3E'}
| null |
GHSA
|
GHSA-h466-j336-74wx
|
Prototype Pollution in mpath
|
Versions of `mpath` before 0.5.1 are vulnerable to prototype pollution. Provided certain input `mpath` can add or modify properties of the `Object` prototype. These properties will be present on all objects.
## Recommendation
Update to version `0.5.1` or later.
|
{'CVE-2018-16490'}
|
2021-01-08T18:44:33Z
|
2019-02-07T18:17:26Z
|
MODERATE
| 0
|
{'CWE-400'}
|
{'https://hackerone.com/reports/390860', 'https://www.npmjs.com/advisories/779', 'https://github.com/advisories/GHSA-h466-j336-74wx', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16490'}
| null |
GHSA
|
GHSA-x489-jjwm-52g7
|
Tinfoil Devise-two-factor does not "burn" a successfully validated one-time password (OTP)
|
Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step.
|
{'CVE-2015-7225'}
|
2022-04-26T18:26:36Z
|
2018-08-28T22:34:15Z
|
MODERATE
| 5.3
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7225', 'https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608', 'http://www.securityfocus.com/bid/76789', 'https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md', 'http://www.openwall.com/lists/oss-security/2015/06/20/4', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466', 'https://github.com/advisories/GHSA-x489-jjwm-52g7', 'http://www.openwall.com/lists/oss-security/2015/09/17/2'}
| null |
GHSA
|
GHSA-c7gp-2pch-qh2v
|
Out-of-bounds Write in OpenCV
|
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillUniColor function in utils.cpp when reading an image file by using cv::imread.
|
{'CVE-2017-12604'}
|
2021-11-18T15:33:03Z
|
2021-10-12T22:01:55Z
|
HIGH
| 8.8
|
{'CWE-787'}
|
{'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12604', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md', 'https://github.com/advisories/GHSA-c7gp-2pch-qh2v'}
| null |
GHSA
|
GHSA-544j-77x9-h938
|
Moderate severity vulnerability that affects actionpack
|
Withdrawn, accidental duplicate publish.
actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
| null |
2021-12-03T14:12:21Z
|
2018-09-17T21:53:30Z
|
MODERATE
| 0
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7581', 'https://github.com/advisories/GHSA-544j-77x9-h938'}
| null |
GHSA
|
GHSA-6r7x-hc8m-985r
|
Cross-site Scripting in Joplin
|
Joplin through 1.0.184 allows Arbitrary File Read via Cross-site Scripting (XSS).
|
{'CVE-2020-9038'}
|
2022-01-04T19:44:56Z
|
2020-10-13T17:29:25Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc', 'http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9038', 'https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20', 'https://github.com/advisories/GHSA-6r7x-hc8m-985r'}
| null |
GHSA
|
GHSA-2367-c296-3mp2
|
Link following in tar
|
An issue was discovered in the tar crate before 0.4.16 for Rust. Arbitrary file overwrite can occur via a symlink or hardlink in a TAR archive.
|
{'CVE-2018-20990'}
|
2021-08-25T20:43:54Z
|
2021-08-25T20:43:54Z
|
HIGH
| 7.5
|
{'CWE-59'}
|
{'https://rustsec.org/advisories/RUSTSEC-2018-0002.html', 'https://github.com/advisories/GHSA-2367-c296-3mp2', 'https://github.com/alexcrichton/tar-rs/pull/156', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20990'}
| null |
GHSA
|
GHSA-6566-9526-52v6
|
Exposure of Sensitive Information to an Unauthorized Actor in Concord
|
An issue was discovered in Walmart Labs Concord before 1.44.0. CORS Access-Control-Allow-Origin headers have a potentially unsafe dependency on Origin headers, and are not configurable. This allows remote attackers to discover host information, nodes, API metadata, and references to usernames via api/v1/apikey.
|
{'CVE-2020-10591'}
|
2022-02-10T20:48:59Z
|
2022-02-10T20:48:47Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://github.com/walmartlabs/concord/issues/22', 'https://github.com/walmartlabs/concord/compare/1.43.0...1.44.0', 'https://github.com/advisories/GHSA-6566-9526-52v6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10591'}
| null |
GHSA
|
GHSA-p2cq-cprg-frvm
|
Out of bounds write in tensorflow-lite
|
### Impact
In TensorFlow Lite models using segment sum can trigger a write out bounds / segmentation fault if the segment ids are not sorted. Code assumes that the segment ids are in increasing order, using the last element of the tensor holding them to determine the dimensionality of output tensor:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/segment_sum.cc#L39-L44
This results in allocating insufficient memory for the output tensor and in a write outside the bounds of the output array:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reference_ops.h#L2625-L2631
This usually results in a segmentation fault, but depending on runtime conditions it can provide for a write gadget to be used in future memory corruption-based exploits.
### Patches
We have patched the issue in 204945b and will release patch releases for all affected versions.
We recommend users to upgrade to TensorFlow 2.2.1, or 2.3.1.
### Workarounds
A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that the segment ids are sorted, although this only handles the case when the segment ids are stored statically in the model.
A similar validation could be done if the segment ids are generated at runtime between inference steps.
If the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2020-15214'}
|
2021-08-26T15:20:07Z
|
2020-09-25T18:28:56Z
|
HIGH
| 8.1
|
{'CWE-787'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2cq-cprg-frvm', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15214', 'https://github.com/advisories/GHSA-p2cq-cprg-frvm', 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'}
| null |
GHSA
|
GHSA-92qm-hc53-jjrj
|
Downloads Resources over HTTP in ibapi
|
Affected versions of `ibapi` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `ibapi`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10593'}
|
2021-09-16T20:44:03Z
|
2019-02-18T23:34:17Z
|
HIGH
| 0
|
{'CWE-311', 'CWE-269'}
|
{'https://github.com/advisories/GHSA-92qm-hc53-jjrj', 'https://www.npmjs.com/package/ibapi/v/2.5.6', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10593', 'https://www.npmjs.com/advisories/182', 'https://gitlord.com/summary/~dchem%2Fnode-ibapi-addon.git', 'https://nodesecurity.io/advisories/182', 'https://gitlord.com/commitdiff/~dchem%2Fnode-ibapi-addon.git/c00dd7c98cca0423052148337e523eeb7776da68'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.