ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-j2r6-2m5c-vgh5
Counter overflow in chacha20
An issue was discovered in the chacha20 crate before 0.2.3 for Rust. A ChaCha20 counter overflow makes it easier for attackers to determine plaintext.
{'CVE-2019-25005'}
2021-08-25T20:45:20Z
2021-08-25T20:45:20Z
HIGH
7.5
{'CWE-190'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-25005', 'https://rustsec.org/advisories/RUSTSEC-2019-0029.html', 'https://github.com/advisories/GHSA-j2r6-2m5c-vgh5', 'https://github.com/RustCrypto/stream-ciphers/pull/64'}
null
GHSA
GHSA-9f66-54xg-pc2c
Open redirect vulnerability
### Impact _What kind of vulnerability is it? Who is impacted?_ Open redirect vulnerability - a maliciously crafted link to a jupyter server could redirect the browser to a different website. All jupyter servers running without a base_url prefix are technically affected, however, these maliciously crafted links can only be reasonably made for known jupyter server hosts. A link to your jupyter server may *appear* safe, but ultimately redirect to a spoofed server on the public internet. This same vulnerability was patched in upstream notebook v5.7.8. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Patched in jupyter_server 1.1.1. If upgrade is not available, a workaround can be to run your server on a url prefix: ``` jupyter server --ServerApp.base_url=/jupyter/ ``` ### References [OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org). Credit: Yaniv Nizry from CxSCA group at Checkmarx
{'CVE-2020-26275'}
2022-04-19T19:02:42Z
2020-12-21T18:01:41Z
LOW
6.1
{'CWE-601'}
{'https://pypi.org/project/jupyter-server/', 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-9f66-54xg-pc2c', 'https://github.com/jupyter-server/jupyter_server/commit/85e4abccf6ea9321d29153f73b0bd72ccb3a6bca', 'https://github.com/advisories/GHSA-9f66-54xg-pc2c', 'https://advisory.checkmarx.net/advisory/CX-2020-4291', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26275'}
null
GHSA
GHSA-877x-32pm-p28x
Link Following in Kata Runtime
A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions.
{'CVE-2020-2026'}
2022-04-12T22:54:56Z
2022-02-15T01:57:18Z
HIGH
8.8
{'CWE-59'}
{'https://github.com/kata-containers/runtime/pull/2713', 'https://github.com/kata-containers/runtime/releases/tag/1.10.5', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JPBKAQBF3OR72N55GWM2TDYQP2OHK6H/', 'https://github.com/kata-containers/runtime/releases/tag/1.11.1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWACJQSMY5BVDMVTF3FBN7HZSOSFOG3Q/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJAMOVB7DSOGX7J26QH5HZKU7GSSX2VU/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P7FHA4AF6Y6PAVJBTTQPUEHXZQUOF3P/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-2026', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNJHSSPCKUGJDVXXIXK2JUWCRJDQX7CE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6W5MKF7HSAIL2AX2BX6RV4WWVGUIKVLS/', 'https://github.com/kata-containers/runtime/issues/2712', 'https://github.com/advisories/GHSA-877x-32pm-p28x'}
null
GHSA
GHSA-56wv-2wr9-3h9r
Improper Verification of Cryptographic Signature in fastecdsa
An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail.
{'CVE-2020-12607'}
2021-10-12T16:30:37Z
2021-10-12T16:30:37Z
HIGH
7.5
{'CWE-347'}
{'https://github.com/AntonKueltz/fastecdsa/issues/52', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12607', 'https://github.com/AntonKueltz/fastecdsa/commit/7b64e3efaa806b4daaf73bb5172af3581812f8de', 'https://github.com/AntonKueltz/fastecdsa/commit/4a16daeaf139be20654ef58a9fe4c79dc030458c', 'https://github.com/AntonKueltz/fastecdsa/commit/e592f106edd5acf6dacedfab2ad16fe6c735c9d1', 'https://github.com/advisories/GHSA-56wv-2wr9-3h9r'}
null
GHSA
GHSA-78j5-gcmf-vqc8
Cross-Site Scripting (XSS) in Verdaccio
### Impact What kind of vulnerability is it? Who is impacted? Cross-Site Scripting XSS, malicious packages with content Javascript that might be executed in the User Interface stealing user credentials. ### Patches Has the problem been patched? What versions should users upgrade to? Users that still using `v3` must upgrade to **>3.12.0** or those have no problem to migrate to a major version **>=4.0.0** also fix the issue. ### Workarounds Is there a way for users to fix or remediate the vulnerability without upgrading? No, the users must update. ### References Are there any links users can visit to find out more? https://www.npmjs.com/advisories/832 https://www.npmjs.com/advisories/833 The issue was reported by the NPMJS Security Team ### For more information If you have any questions or comments about this advisory: * Read the Security Policy to find the ways to be in contact with us.
{'CVE-2019-14772'}
2022-04-19T19:02:26Z
2019-05-29T18:02:59Z
MODERATE
6.1
{'CWE-79'}
{'https://www.npmjs.com/advisories/833', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14772', 'https://github.com/advisories/GHSA-78j5-gcmf-vqc8', 'https://www.npmjs.com/advisories/832', 'https://github.com/verdaccio/verdaccio/security/advisories/GHSA-78j5-gcmf-vqc8'}
null
GHSA
GHSA-2289-pqfq-6wx7
Unrestricted upload of file with dangerous type in Apache Solr
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.
{'CVE-2019-12409'}
2021-08-19T16:48:05Z
2020-01-28T22:26:54Z
CRITICAL
9.8
{'CWE-434'}
{'https://support.f5.com/csp/article/K23720587?utm_source=f5support&utm_medium=RSS', 'https://github.com/github/advisory-review/pull/12462', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12409', 'https://lists.apache.org/thread.html/ce7c0b456b15f6c7518adefa54ec948fed6de8e951a2584500c1e541@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/6640c7e370fce2b74e466a605a46244ccc40666ad9e3064a4e04a85d@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-12409-RCE%20Vulnerability%20Due%20to%20Bad%20Defalut%20Config-Apache%20Solr', 'https://github.com/advisories/GHSA-2289-pqfq-6wx7', 'https://issues.apache.org/jira/browse/SOLR-13647', 'https://lists.apache.org/thread.html/925cdb49ceae78baddb45da7beb9b4d2b1ddc4a8e318c65e91fb4e87@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/a044eae4f6f5b0160ece5bf9cc4c0dad90ce7dd9bb210a9dc50b54be@%3Cgeneral.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/47e112035b4aa67ece3b75dbcd1b9c9212895b9dfe2a71f6f7c174e2@%3Cannounce.apache.org%3E'}
null
GHSA
GHSA-rrvm-gqq8-q2wx
Malicious Package in require-port
Version 1.0.0 of `require-port` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-29T20:45:42Z
2020-09-03T21:05:26Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1197', 'https://github.com/advisories/GHSA-rrvm-gqq8-q2wx'}
null
GHSA
GHSA-9gqh-q4cx-f2h9
Downloads Resources over HTTP in ipip
Affected versions of `ipip` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability, and the README states that the package is deprecated. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10594'}
2021-09-16T20:43:36Z
2019-02-18T23:50:41Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10594', 'https://www.npmjs.com/advisories/184', 'https://github.com/advisories/GHSA-9gqh-q4cx-f2h9', 'https://nodesecurity.io/advisories/184'}
null
GHSA
GHSA-5fh3-25xr-g85h
snipe-it is vulnerable to Cross-site Scripting
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-4018'}
2021-12-03T20:40:50Z
2021-12-03T20:40:50Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-5fh3-25xr-g85h', 'https://huntr.dev/bounties/c14395f6-bf0d-4b06-b4d1-b509d8a99b54', 'https://github.com/snipe/snipe-it/commit/ff81e6d5366c2cfb15618793ad919ae4cbb3ac57', 'https://github.com/snipe/snipe-it/releases/tag/v5.3.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4018'}
null
GHSA
GHSA-wfp9-vr4j-f49j
NoSQL Injection in sequelize
Versions of `sequelize` prior to 4.12.0 are vulnerable to NoSQL Injection. Query operators such as `$gt` are not properly sanitized and may allow an attacker to alter data queries, leading to NoSQL Injection. ## Recommendation Upgrade to version 4.12.0 or later
null
2021-08-04T20:49:45Z
2019-06-04T20:04:27Z
HIGH
0
{'CWE-89'}
{'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-174147', 'https://github.com/advisories/GHSA-wfp9-vr4j-f49j', 'https://github.com/sequelize/sequelize/issues/7310', 'https://www.npmjs.com/advisories/820/versions', 'https://www.npmjs.com/advisories/820'}
null
GHSA
GHSA-mwcx-532g-8pq3
Access and integrity issue within Eclipse Jetty
In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage for the FileSessionDataStore.
{'CVE-2018-12538'}
2022-04-26T18:56:03Z
2018-10-16T17:44:11Z
HIGH
8.8
{'CWE-384', 'CWE-6'}
{'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536018', 'https://github.com/advisories/GHSA-mwcx-532g-8pq3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12538', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'http://www.securitytracker.com/id/1041194', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
GHSA
GHSA-qh38-wrgf-cj2c
Directory Traversal in iter-server
Affected versions of `iter-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16183'}
2021-01-14T15:39:33Z
2020-09-01T18:48:05Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/454', 'https://nodesecurity.io/advisories/454', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-server', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16183', 'https://github.com/advisories/GHSA-qh38-wrgf-cj2c'}
null
GHSA
GHSA-6r97-cj55-9hrq
SQL Injection in Django
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
{'CVE-2019-14234'}
2022-03-21T21:11:02Z
2019-08-16T14:00:34Z
CRITICAL
9.8
{'CWE-89'}
{'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14234', 'https://github.com/advisories/GHSA-6r97-cj55-9hrq', 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs', 'https://github.com/django/django/commit/4f5b58f5cd3c57fee9972ab074f8dc6895d8f387'}
null
GHSA
GHSA-vcqg-cmv3-wj57
Directory Traversal in rtcmulticonnection-client
Affected versions of `rtcmulticonnection-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16125'}
2021-09-16T20:52:30Z
2018-07-23T22:48:49Z
HIGH
0
{'CWE-12', 'CWE-22'}
{'https://github.com/advisories/GHSA-vcqg-cmv3-wj57', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/rtcmulticonnection-client', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16125', 'https://nodesecurity.io/advisories/385', 'https://www.npmjs.com/advisories/385'}
null
GHSA
GHSA-phmw-pv3f-vvx7
Moderate severity vulnerability that affects paperclip
Withdrawn, accidental duplicate publish. The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg.
null
2021-12-02T23:09:13Z
2018-08-13T20:47:44Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-phmw-pv3f-vvx7', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2963'}
null
GHSA
GHSA-wcxc-jf6c-8rx9
Uncaught Exception in libpulse-binding
Affected versions of this crate failed to catch panics crossing FFI boundaries via callbacks, which is a form of UB. This flaw was corrected by [this commit][1] which was included in version 2.6.0.
null
2021-08-25T20:57:21Z
2021-08-25T20:57:21Z
MODERATE
0
{'CWE-248'}
{'https://github.com/advisories/GHSA-wcxc-jf6c-8rx9', 'https://rustsec.org/advisories/RUSTSEC-2019-0038.html', 'https://github.com/jnqnfe/pulse-binding-rust/commit/7fd282aef7787577c385aed88cb25d004b85f494'}
null
GHSA
GHSA-h4j5-c7cj-74xg
Arbitrary Code Injection
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
{'CVE-2020-28502'}
2021-05-04T18:02:34Z
2021-05-04T18:02:34Z
HIGH
9.8
{'CWE-94'}
{'https://github.com/advisories/GHSA-h4j5-c7cj-74xg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28502', 'https://github.com/mjwwit/node-XMLHttpRequest/commit/ee1e81fc67729c7c0eba5537ed7fe1e30a6b3291', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937', 'https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936', 'https://github.com/driverdan/node-XMLHttpRequest/commit/983cfc244c7567ad6a59e366e55a8037e0497fe6', 'https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480', 'https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935', 'https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js#L480', 'https://github.com/mjwwit/node-XMLHttpRequest/blob/ae38832a0f1347c5e96dda665402509a3458e302/lib/XMLHttpRequest.js#L531'}
null
GHSA
GHSA-8fv7-vm2p-5495
Directory Traversal in welcomyzt
`welcomyzt` is a simple file server. `welcomyzt` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Example Request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host: localhost ``` and server Response: ``` HTTP/1.1 200 OK Date: Thu, 04 May 2017 23:59:18 GMT Connection: keep-alive Transfer-Encoding: chunked {contents of /etc/passwd} ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16123'}
2021-01-14T15:48:19Z
2020-09-01T17:23:53Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-8fv7-vm2p-5495', 'https://www.npmjs.com/advisories/388', 'https://nodesecurity.io/advisories/388', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16123'}
null
GHSA
GHSA-5mm9-55c9-p5r7
Malicious Package in mogoose
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:26:49Z
2020-09-03T19:53:31Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1135', 'https://github.com/advisories/GHSA-5mm9-55c9-p5r7'}
null
GHSA
GHSA-2qx8-589j-gcpx
Moderate severity vulnerability that affects Plone and plone.app.users
plone.app.users in Plone 4.0 and 4.1 allows remote authenticated users to modify the properties of arbitrary accounts via unspecified vectors, as exploited in the wild in June 2011.
{'CVE-2011-1950'}
2021-08-31T19:40:02Z
2018-07-23T20:26:45Z
MODERATE
0
null
{'http://secunia.com/advisories/44775', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67695', 'http://plone.org/products/plone/security/advisories/CVE-2011-1950', 'http://securityreason.com/securityalert/8269', 'http://www.securityfocus.com/bid/48005', 'http://www.securityfocus.com/archive/1/518155/100/0/threaded', 'http://osvdb.org/72729', 'https://nvd.nist.gov/vuln/detail/CVE-2011-1950', 'https://github.com/advisories/GHSA-2qx8-589j-gcpx'}
null
GHSA
GHSA-pf6m-fxpq-fg8v
Nokogiri lacked integer overflow checks
The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Nokogiri prior to 1.7.2, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
{'CVE-2017-5029'}
2022-04-26T18:18:47Z
2018-07-31T18:21:29Z
HIGH
8.8
{'CWE-787'}
{'http://rhn.redhat.com/errata/RHSA-2017-0499.html', 'http://www.securityfocus.com/bid/96767', 'http://www.securitytracker.com/id/1038157', 'https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5029', 'https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html', 'https://github.com/advisories/GHSA-pf6m-fxpq-fg8v', 'https://crbug.com/676623', 'http://www.debian.org/security/2017/dsa-3810'}
null
GHSA
GHSA-gh2w-j7cx-2664
High severity vulnerability that affects activerecord
SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.
{'CVE-2012-6496'}
2021-09-10T21:36:12Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-89'}
{'https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source&output=gplain', 'http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/', 'https://bugzilla.redhat.com/show_bug.cgi?id=889649', 'http://security.gentoo.org/glsa/glsa-201401-22.xml', 'https://github.com/advisories/GHSA-gh2w-j7cx-2664', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6496', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html', 'http://rhn.redhat.com/errata/RHSA-2013-0155.html', 'http://rhn.redhat.com/errata/RHSA-2013-0220.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'http://www.securityfocus.com/bid/57084'}
null
GHSA
GHSA-f37q-q7p2-ccfc
Resource exhaustion in Mattermost
The image proxy component in Mattermost version 6.4.1 and earlier allocates memory for multiple copies of a proxied image, which allows an authenticated attacker to crash the server via links to very large image files.
{'CVE-2022-1337'}
2022-04-26T13:05:38Z
2022-04-14T00:00:17Z
MODERATE
6.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-f37q-q7p2-ccfc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1337', 'https://mattermost.com/security-updates/'}
null
GHSA
GHSA-8jj7-5vxc-pg2q
Integer overflow in TensorFlow
### Impact Under certain scenarios, Grappler component of TensorFlow is vulnerable to an integer overflow during [cost estimation for crop and resize](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L2621-L2689). Since the cropping parameters are user controlled, a malicious person can trigger undefined behavior. ### Patches We have patched the issue in GitHub commit [0aaaae6eca5a7175a193696383f582f53adab23f](https://github.com/tensorflow/tensorflow/commit/0aaaae6eca5a7175a193696383f582f53adab23f). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23587'}
2022-02-11T20:31:18Z
2022-02-09T23:27:49Z
HIGH
8.8
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L2621-L2689', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23587', 'https://github.com/tensorflow/tensorflow/commit/0aaaae6eca5a7175a193696383f582f53adab23f', 'https://github.com/advisories/GHSA-8jj7-5vxc-pg2q', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8jj7-5vxc-pg2q'}
null
GHSA
GHSA-r87w-47m8-22w3
Template Injection in jsrender
Affected versions of `jsrender` are susceptible to a remote code execution vulnerability when used with server delivered client-side tempates which dynamically embed user input. ## Proof of Concept ``` <POC-REQUEST> {{for ~x!=1?(constructor.constructor("return arguments.callee.caller")()):~y(10)}} {{:#data}} {{/for}} </POC-REQUEST> ``` ``` <POC-RESPONSE> function anonymous(data,view,j,u) { // template var v,t=j._tag,ret="" +t("for",view,this,[ {view:view,tmpl:1, params:{args:['~x!=1?(constructor.constructor(\"return arguments.callee.caller\")()):~y(10)']}, args:[view.hlp("x")!=1?(data.constructor.constructor("return arguments.callee.caller")()):view.hlp("y")(10)], props:{}}]); return ret; } <POC-RESPONSE> ``` ## Recommendation Update to version 0.9.74 or later.
{'CVE-2016-3942'}
2021-09-23T21:26:40Z
2020-09-01T15:24:24Z
MODERATE
6.3
{'CWE-94'}
{'https://www.npmjs.com/advisories/97', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3942', 'https://snyk.io/vuln/SNYK-DOTNET-JSRENDER-60173', 'https://github.com/advisories/GHSA-r87w-47m8-22w3', 'https://github.com/BorisMoore/jsrender/commit/f984e139deb0a7648d5b543860ec652c21f6dcf6'}
null
GHSA
GHSA-j4rw-x3vg-c8r7
Prototype Pollution in node-oojs
All versions of package node-oojs up to and including version 1.4.0 are vulnerable to Prototype Pollution via the setPath function.
{'CVE-2020-7721'}
2021-07-29T22:08:59Z
2021-05-06T18:12:37Z
CRITICAL
9.8
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7721', 'https://snyk.io/vuln/SNYK-JS-NODEOOJS-598678', 'https://github.com/advisories/GHSA-j4rw-x3vg-c8r7'}
null
GHSA
GHSA-c43v-hrmg-56r4
Moderate severity vulnerability that affects cocaine
The Cocaine gem 0.4.0 through 0.5.2 for Ruby allows context-dependent attackers to execute arbitrary commands via a crafted has object, related to recursive variable interpolation.
{'CVE-2013-4457'}
2021-09-08T21:28:39Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-78'}
{'https://github.com/advisories/GHSA-c43v-hrmg-56r4', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4457', 'http://www.openwall.com/lists/oss-security/2013/10/22/10', 'http://secunia.com/advisories/55365', 'https://github.com/thoughtbot/cocaine/blob/master/NEWS.md', 'http://osvdb.org/98835'}
null
GHSA
GHSA-m8cr-q935-8j67
Path Traversal in buttle
All versions of `buttle` are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths when fetching files. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
{'CVE-2018-3766'}
2021-01-08T18:29:59Z
2018-09-18T13:47:57Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3766', 'https://github.com/advisories/GHSA-m8cr-q935-8j67', 'https://www.npmjs.com/advisories/990', 'https://hackerone.com/reports/358112'}
null
GHSA
GHSA-6346-5r4h-ff5x
Microweber vulnerable to cross-site scripting (XSS)
Microweber is a drag and drop website builder and a powerful next generation CMS. Microweber versions 1.2.15 and prior are vulnerable to cross-site scripting. This could lead to injection of arbitrary JaveScript code, defacement of a page, or stealing cookies. A patch is available on the `master` branch of Microweber's GitHub repository.
{'CVE-2022-1555'}
2022-05-05T21:08:08Z
2022-05-05T00:00:26Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-6346-5r4h-ff5x', 'https://huntr.dev/bounties/d9f9b5bd-16f3-4eaa-9e36-d4958b557687', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1555', 'https://github.com/microweber/microweber/commit/724e2d186a33c0c27273107dc4f160a09384877f'}
null
GHSA
GHSA-wc9w-wvq2-ffm9
Server Side Request Forgery in Grafana
The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue that allows remote code execution. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on.
{'CVE-2020-13379'}
2022-04-12T22:53:25Z
2022-02-15T01:57:18Z
MODERATE
5.4
{'CWE-918'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html', 'https://community.grafana.com/t/release-notes-v7-0-x/29381', 'https://community.grafana.com/t/grafana-7-0-2-and-6-7-4-security-update/31408', 'https://lists.apache.org/thread.html/re7c4b251b52f49ba6ef752b829bca9565faaf93d03206b1db6644d31@%3Cdev.ambari.apache.org%3E', 'https://github.com/advisories/GHSA-wc9w-wvq2-ffm9', 'https://rhynorater.github.io/CVE-2020-13379-Write-Up', 'https://lists.apache.org/thread.html/r6bb57124a21bb638f552d81650c66684e70fc1ff9f40b6a8840171cd@%3Cissues.ambari.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/06/03/4', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html', 'https://community.grafana.com/t/release-notes-v6-7-x/27119', 'https://lists.apache.org/thread.html/r0928ee574281f8b6156e0a6d0291bfc27100a9dd3f9b0177ece24ae4@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/rad99b06d7360a5cf6e394afb313f8901dcd4cb777aee9c9197b3b23d@%3Cdev.ambari.apache.org%3E', 'https://mostwanted002.cf/post/grafanados/', 'https://lists.apache.org/thread.html/r40f0a97b6765de6b8938bc212ee9dfb5101e9efa48bcbbdec02b2a60@%3Cissues.ambari.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEKSZ6GE4EDOFZ23NGYWOCMD6O4JF5SO/', 'https://lists.apache.org/thread.html/rba0247a27be78bd14046724098462d058a9969400a82344b3007cf90@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r093b405a49fd31efa0d949ac1a887101af1ca95652a66094194ed933@%3Cdev.ambari.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O2KSCCGKNEENZN3DW7TSPFBBUZH3YZXZ/', 'https://lists.apache.org/thread.html/r6670a6c29044bcb77d4e5d165b5bd13fffe37b84caa5d6471b13b3a2@%3Cdev.ambari.apache.org%3E', 'https://www.exploit-db.com/exploits/48638', 'https://security.netapp.com/advisory/ntap-20200608-0006/', 'https://grafana.com/blog/2020/06/03/grafana-6.7.4-and-7.0.2-released-with-important-security-fix/', 'https://lists.apache.org/thread.html/re75f59639f3bc1d14c7ab362bc4485ade84f3c6a3c1a03200c20fe13@%3Cissues.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/rff71126fa7d9f572baafb9be44078ad409c85d2c0f3e26664f1ef5a2@%3Cdev.ambari.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/06/09/2', 'https://github.com/grafana/grafana/commit/ba953be95f0302c2ea80d23f1e5f2c1847365192', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13379', 'https://lists.apache.org/thread.html/rd0fd283e3844b9c54cd5ecc92d966f96d3f4318815bbf3ac41f9c820@%3Ccommits.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r984c3b42a500f5a6a89fbee436b9432fada5dc27ebab04910aafe4da@%3Cissues.ambari.apache.org%3E', 'http://packetstormsecurity.com/files/158320/Grafana-7.0.1-Denial-Of-Service.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00017.html'}
null
GHSA
GHSA-vp4x-94ff-2cmv
Cross-site scripting in forkcms
Persistent Cross-site scripting vulnerability on Fork CMS version 5.8.2 allows remote attackers to inject arbitrary Javascript code via the "navigation_title" parameter and the "title" parameter in /private/en/pages/add.
{'CVE-2020-23263'}
2022-02-10T22:29:03Z
2022-02-10T22:29:03Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23263', 'https://github.com/forkcms/forkcms/pull/3093', 'https://github.com/advisories/GHSA-vp4x-94ff-2cmv'}
null
GHSA
GHSA-xjxc-vfw2-cg96
Use after free in openssl
An issue was discovered in the openssl crate before 0.10.9 for Rust. A use-after-free occurs in CMS Signing.
{'CVE-2018-20997'}
2021-08-25T20:43:45Z
2021-08-25T20:43:45Z
CRITICAL
9.8
{'CWE-416'}
{'https://rustsec.org/advisories/RUSTSEC-2018-0010.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20997', 'https://github.com/sfackler/rust-openssl/pull/942', 'https://github.com/advisories/GHSA-xjxc-vfw2-cg96'}
null
GHSA
GHSA-758m-6g3q-g3hh
Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '' wildcard character
Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '*' wildcard character - like my*test, test*.txt. This can result in unintended behavior.
{'CVE-2017-7676'}
2022-04-27T13:54:30Z
2018-10-17T17:22:38Z
CRITICAL
9.8
{'CWE-20'}
{'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://github.com/advisories/GHSA-758m-6g3q-g3hh', 'http://www.securityfocus.com/bid/98958', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7676'}
null
GHSA
GHSA-5mv9-q7fq-9394
Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint
### Impact Due to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. ### Patches All users should upgrade to Singularity 3.7.4 or later. ### Workarounds Users who only interact with the default remote endpoint are not affected. Installations with an execution control list configured to restrict execution to containers signed with specific secure keys are not affected. ### For more information General questions about the impact of the advisory can be asked in the: - [SingularityCE Slack Channel](https://singularityce.slack.com) - [SingularityCE Mailing List](https://groups.google.com/g/singularity-ce) Any sensitive security concerns should be directed to: security@sylabs.io See our Security Policy here: https://sylabs.io/security-policy
{'CVE-2021-32635'}
2022-04-25T23:42:20Z
2021-06-01T21:21:01Z
MODERATE
6.3
{'CWE-20'}
{'https://github.com/hpcng/singularity/security/advisories/GHSA-jq42-hfch-42f3', 'https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394', 'https://github.com/advisories/GHSA-5mv9-q7fq-9394', 'https://github.com/sylabs/singularity/releases/tag/v3.7.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32635', 'https://security.gentoo.org/glsa/202107-50'}
null
GHSA
GHSA-wqgp-vphw-hphf
Security issues in AWS KMS and AWS Encryption SDKs: in-band protocol negotiation and robustness
Authors: Thai "[thaidn](https://twitter.com/xorninja)" Duong # Summary The following security vulnerabilities was discovered and reported to Amazon, affecting AWS KMS and all versions of [AWS Encryption SDKs](https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/introduction.html) prior to version 2.0.0: * **Information leakage**: an attacker can create ciphertexts that would leak the user’s AWS account ID, encryption context, user agent, and IP address upon decryption * **Ciphertext forgery**: an attacker can create ciphertexts that are accepted by other users * **Robustness**: an attacker can create ciphertexts that decrypt to different plaintexts for different users The first two bugs are somewhat surprising because they show that the ciphertext format can lead to vulnerabilities. These bugs (and the infamous [alg: "None"](https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/) bugs in JWT) belong to a class of vulnerabilities called **in-band protocol negotiation**. This is the second time we’ve found in-band protocol negotiation vulnerabilities in AWS cryptography libraries; see this [bug](https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw) in S3 Crypto SDK discovered by my colleague Sophie Schmieg. In JWT and S3 SDK the culprit is the algorithm field—here it is the key ID. Because the key ID is used to determine which decryption key to use, it can’t be meaningfully authenticated despite being under the attacker’s control. If the key ID is a URL indicating where to fetch the key, the attacker can replace it with their own URL, and learn side-channel information such as the timing and machines on which the decryption happens (this can also lead to [SSRF](https://portswigger.net/web-security/ssrf) issues, but that’s another topic for another day). In AWS, the key ID is a unique [Amazon Resource Name](https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html). If an attacker were to capture a ciphertext from a user and replace its key ID with their own, the victim’s AWS account ID, encryption context, user agent, and IP address would be logged to the attacker’s AWS account whenever the victim attempted to decrypt the modified ciphertext. The last bug shows that the non-committing property of AES-GCM (and other AEAD ciphers such as [AES-GCM-SIV](https://keymaterial.net/2020/09/07/invisible-salamanders-in-aes-gcm-siv/) or (X)ChaCha20Poly1305) is especially problematic in multi-recipient settings. These ciphers have a property that can cause nonidentical plaintexts when decrypting a single ciphertext with two different keys! For example, you can send a single encrypted email to Alice and Bob which, upon decryption, reads “attack” to Alice and “retreat” to Bob. The AWS Encryption SDKs are vulnerable to this attack because they allow a single ciphertext to be generated for multiple recipients, with each decrypting using a different key. I believe this kind of problem is prevalent. I briefly looked at [JWE](https://tools.ietf.org/html/rfc7516) and I think it is vulnerable. # Mitigations Amazon has fixed these bugs in release 2.0.0 of the SDKs. A new major version was required because, unfortunately, the fix for the last bug requires a breaking change from earlier versions. All users are recommended to upgrade. More details about Amazon’s mitigations can be found in [their announcement](https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/). We’re collaborating with Shay Gueron on a paper regarding fast committing AEADs. # Vulnerabilities ## Information Leakage The [Encrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Encrypt.html) API in AWS KMS encrypts plaintext into ciphertext by using a customer master key (CMK). The ciphertext format is undocumented, but it contains metadata that specifies the CMK and the encryption algorithm. I reverse-engineered the format and found the location of the CMK. Externally the CMK is identified by its key ARN, but within a ciphertext it is represented by an internal ID, which remained stable during my testing. When I replaced the internal ID of a CMK in a ciphertext with the internal ID of another CMK, I found that AWS KMS attempted to decrypt the ciphertext with the new CMK. The encryption failed and the failure event—including the AWS Account ID, the user agent and the IP address of the caller—was logged to Cloud Trail in the account that owned the replacement CMK. This enables the following attack: * The attacker creates a CMK that has a key policy that allows access from everyone. This requires no prior knowledge about the victim. * The attacker intercepts a ciphertext from the victim, and replaces its CMK with their CMK. * Whenever the victim attempts to decrypt the modified ciphertext, the attacker learns the timing of such actions, the victim’s AWS Account ID, user agent, encryption context, and IP address. This attack requires the victim to have an IAM policy that allows them to access the attacker’s CMK. I found that this practice was allowed by the AWS Visual Policy Editor, but I don’t know whether it is common. The AWS Encryption SDKs also succumb to this attack. The SDKs implement envelope encryption: encrypting data with a data encryption key (DEK) and then wrapping the DEK with a CMK using the Encrypt API in AWS KMS. The wrapped DEK is stored as part of the final ciphertext (format is defined [here](https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/message-format.html)). The attacker can mount this attack by replacing the CMK in the wrapped DEK with their own. ``` { "eventVersion": "1.05", "userIdentity": { "type": "AWSAccount", "principalId": "<redacted this is the principal ID of the victim>", "accountId": "<redacted - this is the AWS account ID of the victim>" }, "eventTime": "2020-06-21T21:05:04Z", "eventSource": "kms.amazonaws.com", "eventName": "Decrypt", "awsRegion": "us-west-2", "sourceIPAddress": "<redacted - this is the IP address of the victim>", "userAgent": "<redacted - this is the user agent of the victim>", "errorCode": "InvalidCiphertextException", "requestParameters": { // The encryption context might include other data from the victim "encryptionContext": { "aws-crypto-public-key": "AzfNOGOnNYFmpHspKrAm1L6XtRybONkmkhmB/IriKSA7b2NsV4MEPMph9yX2KTPKWw==" }, "encryptionAlgorithm": "SYMMETRIC_DEFAULT" }, "responseElements": null, "requestID": "aeced8e8-75a2-42c3-96ac-d1fa2a1c5ee6", "eventID": "780a0a6e-4ad8-43d4-a426-75d05022f870", "readOnly": true, "resources": [ { "accountId": "<redacted - this is the account ID of the attacker>", "type": "AWS::KMS::Key", "ARN": <redacted - this is the key ARN of the attacker> } ], "eventType": "AwsApiCall", "recipientAccountId": "<redacted - this is the account ID of the attacker>", "sharedEventID": "033e147c-8a36-42f5-9d6c-9e071eb752b7" } ``` **Figure 1: A failure event logged to the attacker’s Cloud Trail when the victim attempted to decrypt a modified ciphertext containing the attacker’s CMK.** ## Ciphertext Forgery The [Decrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Decrypt.html) API in AWS KMS doesn’t require the caller to specify the CMK. This parameter is required only when the ciphertext was encrypted under an asymmetric CMK. Otherwise, AWS KMS uses the metadata that it adds to the ciphertext blob to determine which CMK was used to encrypt the ciphertext. This leads to the following attack: * The attacker creates a CMK that has a key policy that allows access from everyone. This requires no prior knowledge about the victim. * The attacker generates a ciphertext by calling the Encrypt API with their key. * The attacker intercepts a ciphertext from the victim, and replaces it entirely with their ciphertext. * The victim successfully decrypts the ciphertext, as if it was encrypted under their own key. The attacker also learns when this happened, the victim’s AWS Account ID, user agent, encryption context, and IP address. Similar to the information leakage attack, this attack also requires the victim to have an IAM policy that allows them to access the attacker’s CMK. The AWS Encryption SDKs also succumb to this attack. They don’t specify the CMK when they call the Decrypt API to unwrap the DEK. ## Robustness The AWS Encryption SDKs allow a single ciphertext to be generated for multiple recipients, with each decrypting using a different key. To that end, it wraps the DEK multiple times, each under a different CMK. The wrapped DEKs can be combined to form a single ciphertext which can be sent to multiple recipients who can use their own credentials to decrypt it. It’s reasonable to expect that all recipients should decrypt the ciphertext to an identical plaintext. However, because of the use of AES-GMAC and AES-GCM, it’s possible to create a ciphertext that decrypts to two valid yet different plaintexts for two different users. In other words, the AWS Encryption SDKs are [not](https://eprint.iacr.org/2008/440.pdf) [robust](https://eprint.iacr.org/2019/016.pdf). The encryption of a message under two CMKs can be summarized as follows: * A DEK is randomly generated, and two wrapped DEKs are produced by calling the Encrypt API using the two CMKs * A per-message AES-GCM key (K) is derived using HKDF from the DEK, a randomly generated message ID, and a fixed algorithm ID. * A header is formed from the wrapped DEKs, the encryption context, and other metadata. A header authentication tag is computed on the header using AES-GMAC with K and a zero IV. * The message is encrypted using AES-GCM with K, a non-zero IV, and fixed associated additional data. This produces a message authentication tag. * The ciphertext consists of the header, the header authentication tag, the encrypted message, and the message authentication tag. (There’s also a self-signed digital signature that is irrelevant to this discussion). In order to decrypt a ciphertext, the AWS Encryption SDKs loops over the list of wrapped DEKs and returns the first one that it can successfully unwrap. The attacker therefore can wrap a unique DEK for each recipient. Next, the attacker exploits the non-committing property of GMAC to produce two messages that have the same GMAC tag under two different keys. The attacker has to do this twice, one for the header authentication tag and one for the message authentication tag. ``` Given a data blob B of one 128-bit block B_1, a GMAC tag is computed as follows: B_1 * H^2 + B_len * H + J where H and J depends on the key and B_len depends on the length of B. To find a message that can produce the same tag under two different keys, one can add append to B a new block B_2 whose value can be deduced by solving an algebraic equation. That is, we want to find B_2 such that: B_1 * H^3 + B_2 * H^2 + B_len * H + J = B_1 * H’^3 + B_2 * H’^2 + B_len * H’ + J’ where H’ and J’ are the corresponding H and J of the other key. B_2 is the only unknown value in this equation, thus it can be computed using finite field arithmetics of GF(2^128): B_2 = [B_1 * (H^3+H’^3) + B_len * (H + H’) + J + J’] * (H^2 + H’^2)^-1. ``` **Figure 2: How to find a message that has the same GMAC tag under two different keys.** The overall attack works as follows: * The attacker generates a random DEK, derives a per-message key K, and encrypts message M with it using AES in counter mode. This generates a ciphertext C. * The attacker generates another random DEK’, derives a per-message key K’, and performs trial decryption of C until the decrypted message M’ has desirable properties. For example, if the attacker wants the first bit of M’ different from that of M, this process should only take a few attempts. * The attacker finds a block C* such that the GMAC of C’ = C || C* under K and K’ are identical. Denote this tag C’_tag. * The attacker wraps DEK and DEK’ under two recipients’ CMK. * The attacker forms a header H and adds a block H* to the encryption context such that the new H’ has the same authentication tag H’_tag under K and K’. * The attacker output H’, H’_tag, C’, C’_tag. This attack is similar to the one discovered in [Facebook Messenger](https://eprint.iacr.org/2019/016.pdf). # Acknowledgement I’m grateful to Jen Barnason for carefully editing this advisory. I will never publish anything without her approval! I want to thank my friend and coworker Sophie “Queen of Hashing” Schmieg for wonderful discussions and for showing me how the arithmetic in GF(2^128) works. I want to thank Jonathan Bannet for asking the questions that led to this work.
{'CVE-2020-8897'}
2022-04-19T19:02:35Z
2021-10-12T16:01:12Z
HIGH
8.1
{'CWE-327'}
{'https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf', 'https://github.com/advisories/GHSA-wqgp-vphw-hphf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8897', 'https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/'}
null
GHSA
GHSA-wm93-f238-7v37
Integer overflow in Tensorflow
### Impact The [implementation of `OpLevelCostEstimator::CalculateOutputSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1598-L1617) is vulnerable to an integer overflow if an attacker can create an operation which would involve tensors with large enough number of elements: ```cc for (const auto& dim : output_shape.dim()) { output_size *= dim.size(); } ``` Here, we can have a large enough number of dimensions in `output_shape.dim()` or just a small number of dimensions being large enough to cause an overflow in the multiplication. ### Patches We have patched the issue in GitHub commit [b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae](https://github.com/tensorflow/tensorflow/commit/b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23576'}
2022-02-11T20:46:11Z
2022-02-10T00:32:44Z
MODERATE
6.5
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae', 'https://github.com/advisories/GHSA-wm93-f238-7v37', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1598-L1617', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23576', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wm93-f238-7v37'}
null
GHSA
GHSA-pqcf-v8v5-jmcg
Zip slip in Microweber
A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.
{'CVE-2020-28337'}
2022-02-10T22:23:18Z
2022-02-10T22:23:18Z
HIGH
7.2
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28337', 'https://sl1nki.page/blog/2021/02/01/microweber-zip-slip', 'http://packetstormsecurity.com/files/162514/Microweber-CMS-1.1.20-Remote-Code-Execution.html', 'https://github.com/microweber/microweber/commit/777ee9c3e7519eb3672c79ac41066175b2001b50', 'https://sl1nki.page/advisories/CVE-2020-28337', 'https://github.com/advisories/GHSA-pqcf-v8v5-jmcg'}
null
GHSA
GHSA-gj4p-3wh3-2rmf
High severity vulnerability that affects yard
lib/yard/core_ext/file.rb in the server in YARD before 0.9.11 does not block relative paths with an initial ../ sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files.
{'CVE-2017-17042'}
2021-09-10T21:52:35Z
2017-12-21T00:47:25Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-17042', 'https://github.com/lsegal/yard/commit/b0217b3e30dc53d057b1682506333335975e62b4', 'https://github.com/advisories/GHSA-gj4p-3wh3-2rmf'}
null
GHSA
GHSA-c7c7-xm8g-xm36
Moderate severity vulnerability that affects net.mingsoft:ms-mcms
An issue was discovered in com\mingsoft\basic\action\web\FileAction.java in MCMS 4.6.5. Since the upload interface does not verify the user login status, you can use this interface to upload files without setting a cookie. First, start an upload of JSP code with a .png filename, and then intercept the data packet. In the name parameter, change the suffix to jsp. In the response, the server returns the storage path of the file, which can be accessed to execute arbitrary JSP code.
{'CVE-2018-18830'}
2021-09-08T21:38:50Z
2018-11-01T14:48:29Z
CRITICAL
9.8
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-18830', 'https://gitee.com/mingSoft/MCMS/issues/IO0IQ', 'https://github.com/advisories/GHSA-c7c7-xm8g-xm36'}
null
GHSA
GHSA-84cm-v6jp-gjmr
OS command injection in git-diff-apply
In "index.js" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2.
{'CVE-2019-10776'}
2021-08-19T17:14:36Z
2020-02-14T23:09:24Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10776', 'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774', 'https://github.com/advisories/GHSA-84cm-v6jp-gjmr', 'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774,', 'https://github.com/kellyselden/git-diff-apply/commit/106d61d3ae723b4257c2a13e67b95eb40a27e0b5'}
null
GHSA
GHSA-v5v3-8jqf-vg27
Downloads Resources over HTTP in aerospike
Affected versions of `aerospike` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `aerospike`. ## Recommendation Update to version 2.4.2 or later
{'CVE-2016-10558'}
2021-01-08T01:57:42Z
2019-02-18T23:54:22Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10558', 'https://www.npmjs.com/advisories/167', 'https://github.com/advisories/GHSA-v5v3-8jqf-vg27', 'https://nodesecurity.io/advisories/167'}
null
GHSA
GHSA-hg7w-2pf7-mxm2
Malicious Package in wbe3
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T16:37:44Z
2020-09-03T17:02:31Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-hg7w-2pf7-mxm2', 'https://www.npmjs.com/advisories/1414'}
null
GHSA
GHSA-4gh8-x3vv-phhg
Predictable SIF UUID Identifiers in github.com/sylabs/sif
### Impact The `siftool new` command and [func siftool.New()](https://pkg.go.dev/github.com/sylabs/sif/pkg/siftool#New) produce predictable UUID identifiers due to insecure randomness in the version of the `github.com/satori/go.uuid` module used as a dependency. ### Patches A patch is available in versions 1.2.3 and newer of the module. Users are encouraged to upgrade. ### Workarounds Users passing [CreateInfo struct](https://pkg.go.dev/github.com/sylabs/sif/pkg/sif#CreateInfo) should ensure the `ID` field is generated using a version of `github.com/satori/go.uuid` that is not vulnerable to this issue. Unfortunately, the latest tagged release is vulnerable to this issue. One way to obtain a non-vulnerable version is: ``` go get github.com/satori/go.uuid@75cca531ea763666bc46e531da3b4c3b95f64557 ```
{'CVE-2021-29499'}
2021-05-18T18:30:38Z
2021-05-18T18:30:38Z
HIGH
7.5
{'CWE-330', 'CWE-340'}
{'https://github.com/sylabs/sif/security/advisories/GHSA-4gh8-x3vv-phhg', 'https://github.com/satori/go.uuid/issues/73', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29499', 'https://github.com/advisories/GHSA-4gh8-x3vv-phhg'}
null
GHSA
GHSA-72p5-2r6g-fm6v
Moderate severity vulnerability that affects total.js
Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format).
{'CVE-2019-10260'}
2021-06-11T14:17:28Z
2019-04-02T15:46:52Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/totaljs/cms/commit/75205f93009db3cf8c0b0f4f1fc8ab82d70da8ad', 'https://github.com/advisories/GHSA-72p5-2r6g-fm6v', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10260', 'https://github.com/totaljs/cms/commit/8b9d7dada998c08d172481d9f0fc0397c4b3c78d'}
null
GHSA
GHSA-g7p5-5759-qv46
Data leak in Tensorflow
### Impact The `data_splits` argument of [`tf.raw_ops.StringNGrams`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/StringNGrams) lacks validation. This allows a user to pass values that can cause heap overflow errors and even leak contents of memory ```python >>> tf.raw_ops.StringNGrams(data=["aa", "bb", "cc", "dd", "ee", "ff"], data_splits=[0,8], separator=" ", ngram_widths=[3], left_pad="", right_pad="", pad_width=0, preserve_short_sequences=False) StringNGrams(ngrams=<tf.Tensor: shape=(6,), dtype=string, numpy= array([b'aa bb cc', b'bb cc dd', b'cc dd ee', b'dd ee ff', b'ee ff \xf4j\xa7q\x7f\x00\x00q\x00\x00\x00\x00\x00\x00\x00\xd8\x9b~\xa8q\x7f\x00', b'ff \xf4j\xa7q\x7f\x00\x00q\x00\x00\x00\x00\x00\x00\x00\xd8\x9b~\xa8q\x7f\x00 \x9b~\xa8q\x7f\x00\x00p\xf5j\xa7q\x7f\x00\x00H\xf8j\xa7q\x7f\x00\x00\xf0\xf3\xf7\x85q\x7f\x00\x00`}\xa6\x00\x00\x00\x00\x00`~\xa6\x00\x00\x00\x00\x00\xb0~\xeb\x9bq\x7f\x00'],... ``` All the binary strings after `ee ff` are contents from the memory stack. Since these can contain return addresses, this data leak can be used to defeat ASLR. ### Patches We have patched the issue in 0462de5b544ed4731aa2fb23946ac22c01856b80 and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15205'}
2021-11-19T15:18:06Z
2020-09-25T18:28:38Z
CRITICAL
9
{'CWE-119', 'CWE-122', 'CWE-787'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-g7p5-5759-qv46', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15205', 'https://github.com/tensorflow/tensorflow/commit/0462de5b544ed4731aa2fb23946ac22c01856b80', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g7p5-5759-qv46'}
null
GHSA
GHSA-p4cr-64x4-f92f
Use of Uninitialized Resource in acc_reader.
An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. fill_buf may read from uninitialized memory locations.
{'CVE-2020-36514'}
2022-01-07T16:21:26Z
2022-01-06T22:17:23Z
CRITICAL
9.8
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36514', 'https://rustsec.org/advisories/RUSTSEC-2020-0155.html', 'https://github.com/advisories/GHSA-p4cr-64x4-f92f', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/acc_reader/RUSTSEC-2020-0155.md'}
null
GHSA
GHSA-vxp4-25qp-86qh
Moderate severity vulnerability that affects ember
Withdrawn, accidental duplicate publish. Cross-site scripting (XSS) vulnerability in Ember.js 1.8.x through 1.10.x, 1.11.x before 1.11.4, 1.12.x before 1.12.2, 1.13.x before 1.13.12, 2.0.x before 2.0.3, 2.1.x before 2.1.2, and 2.2.x before 2.2.1 allows remote attackers to inject arbitrary web script or HTML.
null
2021-12-02T21:43:44Z
2017-10-24T18:33:36Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-vxp4-25qp-86qh', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7565'}
null
GHSA
GHSA-hpjm-3ww5-6cpf
Cross-Site Scripting through Fluid view helper arguments
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7) > * CWE-79 ### Problem Three XSS vulnerabilities have been detected in Fluid: 1. TagBasedViewHelper allowed XSS throug maliciously crafted `additionalAttributes` arrays by creating keys with attribute-closing quotes followed by HTML. When rendering such attributes, TagBuilder would not escape the keys. 2. ViewHelpers which used the `CompileWithContentArgumentAndRenderStatic` trait, and which declared `escapeOutput = false`, would receive the content argument in unescaped format. 3. Subclasses of AbstractConditionViewHelper would receive the `then` and `else` arguments in unescaped format. ### Solution Update to versions 2.0.8, 2.1.7, 2.2.4, 2.3.7, 2.4.4, 2.5.11 or 2.6.10 of this `typo3fluid/fluid` package that fix the problem described. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases: * TYPO3 v9.5.23 (using typo3fluid/fluid v2.6.10) * TYPO3 v10.4.10 (using typo3fluid/fluid v2.6.10) The specific vulnerabilities are prevented by: 1. Explicitly escaping keys found in the `additionalAttributes` array passed to a TagBasedViewHelper before using them as attribute names. 2. Detecting "content argument" on ViewHelpers using the trait CompileWithContentArgumentAndRenderStatic and escaping it based on the state of `escapeChildren` when `escapeOutput` is toggled off. Escaping still will not occur if explicitly disabled by an enclosing ViewHelper. This homogenises escaping behavior of "content arguments" so the same strategy is used whether the "content" argument is passed as argument or child content. 3. Explicitly defining the `then` and `else` arguments on AbstractConditionViewHelper subclasses as escaped and applying escaping in all cases where escaping is not explicitly disabled by an enclosing ViewHelper. ### Affected cases 1. The fix for TagBasedViewHelper does not affect any valid use cases; it only prevents use of maliciously crafted attribute/value arrays passed as `additionalAttributes`. 2. Any case where a ViewHelper with a "content argument" and which defines `escapeOutput = false` is used with the content argument instead of passing variables as child node - e.g. `<v:h content="{variable}" />` instead of `<v:h>{variable}</v:h>` to intentionally circumvent escaping of any HTML in `{variable}`. 3. Any case where a condition ViewHelper is used with `then` or `else` arguments to render a variable containing HTML, excluding cases where the variable is intentionally unescaped - e.g. `<f:if condition="1" then="{variable -> f:format.raw()}" />`, and excluding any cases where a ViewHelper is used as argument value and the ViewHelper intentionally disables escaping - e.g. `<f:if condition="1" then="{f:render(section: 'MySection')}" />` does not escape the `then` argument because `f:render` disables output escaping. Cases 2 and 3 can be mitigated to allow variables with HTML to not be escaped, by intentionally disabling escaping by chaining the variable used in the argument with `f:format.raw` as described in case 3. Note that this constitutes a potential security issue, for which the template author is solely responsible. Example: `<f:if condition="1" then="{intentionalHtmlVariable}" />` can allow HTML in `{intentionalHtmlVariable}` by adding `-> f:format.raw()` - to become `<f:if condition="1" then="{intentionalHtmlVariable -> f:format.raw()}" />`. Custom ViewHelpers which use `CompileWithContentArgumentAndRenderStatic` can alternatively pass a 6th argument with value `false` to the call to `registerArgument` which registers the "content argument", which explicitly disables escaping of the argument value: `$this->registerArgument('arg', 'string', 'My argument', false, null, false);`. Note that this constitutes a potential security issue for which the ViewHelper author is solely responsible. **Variables containing HTML should only be allowed after taking great care to prevent XSS through other means, e.g. sanitising the variable before it is assigned to Fluid or only allowing such variables to come from trusted sources.** ### Credits Thanks to Jonas Eberle and Sinan Sekerci (Dreamlab Technologies) who reported this issue and to TYPO3 core merger Claus Due who fixed the issue. ### References * [TYPO3-CORE-SA-2020-009](https://typo3.org/security/advisory/typo3-core-sa-2020-009)
{'CVE-2020-26216'}
2022-04-19T19:02:41Z
2020-11-18T21:06:07Z
MODERATE
8
{'CWE-79'}
{'https://github.com/TYPO3/Fluid/commit/f20db4e74cf9803c6cffca2ed2f03e1b0b89d0dc', 'https://github.com/advisories/GHSA-hpjm-3ww5-6cpf', 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-hpjm-3ww5-6cpf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26216', 'https://typo3.org/security/advisory/typo3-core-sa-2020-009'}
null
GHSA
GHSA-vcwc-6mr9-8m7c
Cross-site Scripting in phpmyadmin
An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.
{'CVE-2022-23808'}
2022-01-28T22:36:28Z
2022-01-28T22:36:28Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/phpmyadmin/phpmyadmin/commit/5118acce1dfcdb09cbc0f73927bf51c46feeaf38', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23808', 'https://github.com/advisories/GHSA-vcwc-6mr9-8m7c', 'https://www.phpmyadmin.net/security/PMASA-2022-2/', 'https://github.com/phpmyadmin/phpmyadmin/commit/44eb12f15a562718bbe54c9a16af91ceea335d59'}
null
GHSA
GHSA-6c65-xcf5-299x
Uninitialized memory use in generator
An issue was discovered in the generator crate before 0.6.18 for Rust. Uninitialized memory is used by Scope, done, and yield_ during API calls.
{'CVE-2019-16144'}
2021-08-25T20:58:25Z
2021-08-25T20:58:25Z
HIGH
7.5
{'CWE-908'}
{'https://github.com/Xudong-Huang/generator-rs/issues/11', 'https://github.com/Xudong-Huang/generator-rs/issues/9', 'https://github.com/Xudong-Huang/generator-rs/issues/13', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16144', 'https://rustsec.org/advisories/RUSTSEC-2019-0020.html', 'https://github.com/advisories/GHSA-6c65-xcf5-299x', 'https://github.com/Xudong-Huang/generator-rs/issues/14'}
null
GHSA
GHSA-34f9-hjfq-rr8j
Overflow and uncaught divide by zero in Tensorflow
### Impact The [implementation of `UnravelIndex`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/unravel_index_op.cc#L36-L135) is vulnerable to a division by zero caused by an integer overflow bug: ```python import tensorflow as tf tf.raw_ops.UnravelIndex(indices=-0x100000,dims=[0x100000,0x100000]) ``` ### Patches We have patched the issue in GitHub commit [58b34c6c8250983948b5a781b426f6aa01fd47af](https://github.com/tensorflow/tensorflow/commit/58b34c6c8250983948b5a781b426f6aa01fd47af). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
{'CVE-2022-21729'}
2022-02-11T17:04:54Z
2022-02-10T00:18:53Z
MODERATE
6.5
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/unravel_index_op.cc#L36-L135', 'https://github.com/advisories/GHSA-34f9-hjfq-rr8j', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21729', 'https://github.com/tensorflow/tensorflow/commit/58b34c6c8250983948b5a781b426f6aa01fd47af', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-34f9-hjfq-rr8j'}
null
GHSA
GHSA-q4h9-46xg-m3x9
UUPSUpgradeable vulnerability in @openzeppelin/contracts-upgradeable
### Impact Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon. ### Patches A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds Initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301). ### References A post-mortem will be published in a few days in the [OpenZeppelin Forum](https://forum.openzeppelin.com/). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
null
2021-09-15T20:22:13Z
2021-09-15T20:22:13Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-q4h9-46xg-m3x9', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-q4h9-46xg-m3x9'}
null
GHSA
GHSA-vp93-gcx5-4w52
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize JSON schemas, allowing attackers to execute arbitrary JavaScript using `<script>` tags in the method descriptions. ## Recommendation Upgrade to version 2.2.1 or later.
null
2021-09-28T17:00:49Z
2020-09-11T21:21:19Z
MODERATE
0
{'CWE-79'}
{'https://github.com/swagger-api/swagger-ui/issues/1864', 'https://www.npmjs.com/advisories/986', 'https://github.com/advisories/GHSA-vp93-gcx5-4w52'}
null
GHSA
GHSA-wqfc-cr59-h64p
Missing Encryption of Sensitive Data in yarn
Yarn before 1.17.3 is vulnerable to Missing Encryption of Sensitive Data due to HTTP URLs in lockfile causing unencrypted authentication data to be sent over the network.
{'CVE-2019-5448'}
2021-11-04T17:08:47Z
2019-07-31T04:22:15Z
HIGH
8.1
{'CWE-319', 'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5448', 'https://hackerone.com/reports/640904', 'https://yarnpkg.com/blog/2019/07/12/recommended-security-update/', 'https://github.com/advisories/GHSA-wqfc-cr59-h64p', 'https://github.com/ChALkeR/notes/blob/master/Yarn-vuln.md'}
null
GHSA
GHSA-w578-j992-554x
Ansible fails to properly mark lookup-plugin results as unsafe
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.
{'CVE-2017-7481'}
2022-04-26T18:30:52Z
2018-09-06T03:28:50Z
CRITICAL
9.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-w578-j992-554x', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7481'}
null
GHSA
GHSA-h99w-9q5r-gjq9
HTTP Request Smuggling in puma
When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma. The following vulnerabilities are addressed by this advisory: - Lenient parsing of `Transfer-Encoding` headers, when unsupported encodings should be rejected and the final encoding must be `chunked`. - Lenient parsing of malformed `Content-Length` headers and chunk sizes, when only digits and hex digits should be allowed. - Lenient parsing of duplicate `Content-Length` headers, when they should be rejected. - Lenient parsing of the ending of chunked segments, when they should end with `\r\n`. The vulnerability has been fixed in 5.6.4 and 4.3.12. When deploying a proxy in front of Puma, turning on any and all functionality to make sure that the request matches the RFC7230 standard. These proxy servers are known to have "good" behavior re: this standard and upgrading Puma may not be necessary. Users are encouraged to validate for themselves. - Nginx (latest) - Apache (latest) - Haproxy 2.5+ - Caddy (latest) - Traefik (latest)
{'CVE-2022-24790'}
2022-04-12T16:42:35Z
2022-03-30T21:48:50Z
CRITICAL
9.1
{'CWE-444'}
{'https://github.com/puma/puma/commit/5bb7d202e24dec00a898dca4aa11db391d7787a5', 'https://github.com/puma/puma/security/advisories/GHSA-h99w-9q5r-gjq9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24790', 'https://github.com/advisories/GHSA-h99w-9q5r-gjq9', 'https://portswigger.net/web-security/request-smuggling'}
null
GHSA
GHSA-x2jc-pwfj-h9p3
SQL Injection in sequelize
Affected versions of `sequelize` use MySQL's backslash-based escape syntax when connecting to SQLite, despite the fact that SQLite uses PostgreSQL's escape syntax, which can result in a SQL Injection vulnerability. ## Recommendation Update to version 1.7.0-alpha3 or later.
{'CVE-2016-10554'}
2021-01-08T00:47:49Z
2019-02-18T23:54:28Z
MODERATE
0
{'CWE-89'}
{'https://nodesecurity.io/advisories/113', 'https://github.com/sequelize/sequelize/commit/c876192aa6ce1f67e22b26a4d175b8478615f42d', 'https://github.com/advisories/GHSA-x2jc-pwfj-h9p3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10554', 'https://www.npmjs.com/advisories/113'}
null
GHSA
GHSA-8928-2fgm-6x9x
HTTP Request Smuggling in actix-http
Affected versions of this crate did not properly detect invalid requests that could allow HTTP/1 request smuggling (HRS) attacks when running alongside a vulnerable front-end proxy server. This can result in leaked internal and/or user data, including credentials, when the front-end proxy is also vulnerable. Popular front-end proxies and load balancers already mitigate HRS attacks so it is recommended that they are also kept up to date; check your specific set up. You should upgrade even if the front-end proxy receives exclusively HTTP/2 traffic and connects to the back-end using HTTP/1; several downgrade attacks are known that can also expose HRS vulnerabilities.
{'CVE-2021-38512'}
2021-08-25T20:58:21Z
2021-08-25T20:58:21Z
HIGH
7.5
{'CWE-444'}
{'https://github.com/actix/actix-web/commit/e965d8298f421e9c89fe98b1300b8361e948c324', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/actix-http/RUSTSEC-2021-0081.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38512', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67URRW4K47SR6LNQB4YALPLGGQMQK7HO/', 'https://rustsec.org/advisories/RUSTSEC-2021-0081.html', 'https://github.com/actix/actix-web/pull/2363', 'https://github.com/advisories/GHSA-8928-2fgm-6x9x'}
null
GHSA
GHSA-r6ff-2q3c-v3pv
Compiler optimisation leads to SEGFAULT
Affected versions of the `pnet` crate were optimized out by compiler, which caused dereference of uninitialized file descriptor which caused segfault.
null
2021-08-25T21:00:01Z
2021-08-25T21:00:01Z
MODERATE
6
{'CWE-908'}
{'https://github.com/libpnet/libpnet/issues/449', 'https://github.com/libpnet/libpnet/pull/455', 'https://github.com/advisories/GHSA-r6ff-2q3c-v3pv', 'https://rustsec.org/advisories/RUSTSEC-2019-0037.html'}
null
GHSA
GHSA-g9fw-9x87-rmrj
Privilege Context Switching Error in Elasticsearch
Elasticsearch versions before 6.8.13 and 7.9.2 contain a document disclosure flaw when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain complex queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.
{'CVE-2020-7020'}
2021-03-18T19:27:13Z
2021-03-18T19:27:13Z
LOW
3.1
{'CWE-270', 'CWE-269'}
{'https://staging-website.elastic.co/community/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7020', 'https://github.com/advisories/GHSA-g9fw-9x87-rmrj', 'https://discuss.elastic.co/t/elastic-stack-7-9-3-and-6-8-13-security-update/253033', 'https://security.netapp.com/advisory/ntap-20201123-0001/'}
null
GHSA
GHSA-2x32-jm95-2cpx
Authentication Bypass in dex
A vulnerability exists in the SAML connector of the github.com/dexidp/dex library used to process SAML Signature Validation. This flaw allows an attacker to bypass SAML authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. This flaw affects dex versions before 2.27.0.
{'CVE-2020-27847'}
2021-12-20T17:52:12Z
2021-12-20T17:52:12Z
CRITICAL
9.8
{'CWE-228', 'CWE-290'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1907732', 'https://github.com/advisories/GHSA-2x32-jm95-2cpx', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/', 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27847'}
null
GHSA
GHSA-9wvh-ff5f-xjpj
Missing Authorization in Harbor
core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API. This is fixed in 1.9.0-rc1.
{'CVE-2019-16097'}
2022-04-12T22:49:27Z
2022-02-15T01:57:18Z
MODERATE
6.5
{'CWE-862'}
{'https://github.com/goharbor/harbor/commit/b6db8a8a106259ec9a2c48be8a380cb3b37cf517', 'https://github.com/advisories/GHSA-9wvh-ff5f-xjpj', 'http://www.vmware.com/security/advisories/VMSA-2019-0015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16097', 'https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/', 'https://github.com/goharbor/harbor/releases/tag/v1.7.6', 'https://github.com/goharbor/harbor/compare/v1.8.2...v1.9.0-rc1', 'https://github.com/ianxtianxt/CVE-2019-16097', 'https://github.com/goharbor/harbor/releases/tag/v1.8.3'}
null
GHSA
GHSA-3jmw-c69h-426c
Cross-Site Request Forgery (CSRF) can run untrusted code on Rundeck server
### Impact A user with `admin` access to the `system` resource type is potentially vulnerable to a CSRF attack that could cause the server to run untrusted code on all Rundeck editions. ### Patches Available in Rundeck 3.4.3 and 3.3.14 ### Workarounds Please visit [https://rundeck.com/security](https://rundeck.com/security) for information about specific workarounds. ### For more information If you have any questions or comments about this advisory: * Email us at [security@rundeck.com](mailto:security@rundeck.com) To report security issues to Rundeck please use the form at [https://rundeck.com/security](https://rundeck.com/security)
{'CVE-2021-39133'}
2021-09-01T18:26:48Z
2021-09-01T18:26:48Z
HIGH
7.2
{'CWE-352'}
{'https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39133', 'https://github.com/rundeck/rundeck/security/advisories/GHSA-3jmw-c69h-426c', 'https://github.com/advisories/GHSA-3jmw-c69h-426c'}
null
GHSA
GHSA-g6vq-wc8w-4g69
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4015'}
2021-12-06T17:19:18Z
2021-12-06T17:19:18Z
MODERATE
4.3
{'CWE-352'}
{'https://huntr.dev/bounties/b698d445-602d-4701-961c-dffe6d3009b1', 'https://github.com/firefly-iii/firefly-iii/releases/tag/5.6.5', 'https://github.com/firefly-iii/firefly-iii/commit/518b4ba5a7a56760902758ae0a2c6a392c2f4d37', 'https://github.com/advisories/GHSA-g6vq-wc8w-4g69', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4015'}
null
GHSA
GHSA-9x6q-5423-w5v9
Ansible fails to cache SSH host keys
Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.
{'CVE-2013-2233'}
2022-04-26T18:41:08Z
2018-10-10T17:23:39Z
HIGH
7.4
null
{'https://github.com/advisories/GHSA-9x6q-5423-w5v9', 'https://www.ansible.com/security', 'http://www.openwall.com/lists/oss-security/2013/07/02/6', 'https://github.com/ansible/ansible/issues/857', 'https://bugzilla.redhat.com/show_bug.cgi?id=980821', 'http://www.openwall.com/lists/oss-security/2013/07/01/2', 'https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2018-36.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2233'}
null
GHSA
GHSA-hrj5-qp7x-rpg6
SQL Injection in marginalia
marginalia < 1.6 is affected by: SQL Injection. The impact is: The impact is a injection of any SQL queries when a user controller argument is added as a component. The component is: Affects users that add a component that is user controller, for instance a parameter or a header. The attack vector is: Hacker inputs a SQL to a vulnerable vector(header, http parameter, etc). The fixed version is: 1.6.
{'CVE-2019-1010191'}
2021-08-17T19:05:54Z
2019-07-26T16:10:15Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1010191', 'https://github.com/basecamp/marginalia/pull/73/', 'https://github.com/advisories/GHSA-hrj5-qp7x-rpg6'}
null
GHSA
GHSA-6g33-f262-xjp4
Cryptographically Weak PRNG in randomatic
Affected versions of `randomatic` generate random values using a cryptographically weak psuedo-random number generator. This may result in predictable values instead of random values as intended. ## Recommendation Update to version 3.0.0 or later.
{'CVE-2017-16028'}
2021-01-08T20:58:34Z
2018-10-09T00:57:21Z
LOW
0
{'CWE-330'}
{'https://nodesecurity.io/advisories/157', 'https://github.com/advisories/GHSA-6g33-f262-xjp4', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16028', 'https://github.com/tableflip/react-native-meteor-oauth/blob/a7eb738b74c469f5db20296b44b7cae4e2337435/src/meteor-oauth.js#L66', 'https://www.npmjs.com/advisories/157', 'https://github.com/jonschlinkert/randomatic/commit/4a526959b3a246ae8e4a82f9c182180907227fe1#diff-b9cfc7f2cdf78a7f4b91a753d10865a2'}
null
GHSA
GHSA-r5jw-62xg-j433
Cross-Site Scripting in Kaminari
### Impact In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1. ### Releases The 1.2.1 gem including the patch has already been released. All past released versions are affected by this vulnerability. ### Workarounds Application developers who can't update the gem can workaround by overriding the `PARAM_KEY_EXCEPT_LIST` constant. ```ruby module Kaminari::Helpers PARAM_KEY_EXCEPT_LIST = [:authenticity_token, :commit, :utf8, :_method, :script_name, :original_script_name].freeze end ``` ### Credits Thanks to Daniel Mircea for finding the issue and sending a patch via GitHub. Also thanks to Aditya Prakash for reporting the vulnerability.
{'CVE-2020-11082'}
2022-04-19T19:02:27Z
2020-05-28T21:10:11Z
MODERATE
6.4
{'CWE-79'}
{'https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11082', 'https://github.com/github/advisory-review/pull/1020', 'https://www.debian.org/security/2021/dsa-5005', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00011.html', 'https://github.com/kaminari/kaminari/commit/8dd52a1aed3d2fa2835d836de23fc0d8c4ff5db8', 'https://github.com/advisories/GHSA-r5jw-62xg-j433'}
null
GHSA
GHSA-xcjx-m2pj-8g79
Manipulated inline images can cause Infinite Loop in PyPDF2
### Impact An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop if the PyPDF2 user wrote the following code: ```python from PyPDF2 import PdfFileReader, PdfFileWriter from PyPDF2.pdf import ContentStream reader = PdfFileReader("malicious.pdf", strict=False) for page in reader.pages: ContentStream(page.getContents(), reader) ``` ### Patches [`PyPDF2==1.27.5`](https://pypi.org/project/PyPDF2) and later are patched. Credits to [Sebastian Krause](https://github.com/sekrause) for finding ([issue](https://github.com/py-pdf/PyPDF2/issues/329)) and fixing ([PR](https://github.com/py-pdf/PyPDF2/pull/740)) it.
{'CVE-2022-24859'}
2022-04-22T20:54:43Z
2022-04-22T20:54:41Z
MODERATE
6.2
{'CWE-835'}
{'https://github.com/py-pdf/PyPDF2/issues/329', 'https://github.com/py-pdf/PyPDF2/security/advisories/GHSA-xcjx-m2pj-8g79', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24859', 'https://github.com/advisories/GHSA-xcjx-m2pj-8g79', 'https://github.com/py-pdf/PyPDF2/pull/740', 'https://github.com/py-pdf/PyPDF2/releases/tag/1.27.5'}
null
GHSA
GHSA-hw4v-5x4h-c3xm
Transaction validity oversight in pallet-ethereum
### Impact A bug in `pallet-ethereum` can cause invalid transactions to be included in the Ethereum block state in `pallet-ethereum` due to not validating the input data size. Any invalid transactions included this way have no possibility to alter the internal Ethereum or Substrate state. The transaction will appear to have be included, but is of no effect as it is rejected by the EVM engine. The impact is further limited by Substrate extrinsic size constraints. ### Patches Patches are applied in PR #465. ### Workarounds None. ### References Patch PR: https://github.com/paritytech/frontier/pull/465 ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Frontier repo](https://github.com/paritytech/frontier)
{'CVE-2021-39193'}
2021-09-07T14:25:43Z
2021-09-01T18:22:48Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/advisories/GHSA-hw4v-5x4h-c3xm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39193', 'https://github.com/paritytech/frontier/commit/0b962f218f0cdd796dadfe26c3f09e68f7861b26', 'https://github.com/paritytech/frontier/commit/dd112e', 'https://github.com/paritytech/frontier/pull/465', 'https://github.com/paritytech/frontier/security/advisories/GHSA-hw4v-5x4h-c3xm', 'https://github.com/paritytech/frontier/pull/465/commits/8a2b890a2fb477d5fedd0e4335b00623832849ae'}
null
GHSA
GHSA-mqgv-67vx-g4m5
Prototype Pollution in js-data
All versions of package js-data prior to 3.0.10 are vulnerable to Prototype Pollution via the deepFillIn function.
{'CVE-2020-28442'}
2022-02-09T22:46:05Z
2022-02-09T22:45:52Z
HIGH
9.8
{'CWE-1321'}
{'https://github.com/js-data/js-data/commit/2d9eed5d3e9710d7e7fecc6f6437c39fe73a4097', 'https://snyk.io/vuln/SNYK-JS-JSDATA-1023655', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28442', 'https://github.com/js-data/js-data/pull/574', 'https://github.com/advisories/GHSA-mqgv-67vx-g4m5'}
null
GHSA
GHSA-x2w5-5m2g-7h5m
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.
{'CVE-2018-14720'}
2021-06-10T19:39:26Z
2019-01-04T19:09:46Z
CRITICAL
9.8
{'CWE-502', 'CWE-611'}
{'https://www.debian.org/security/2019/dsa-4452', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://github.com/advisories/GHSA-x2w5-5m2g-7h5m', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:1107', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14720', 'https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1106'}
null
GHSA
GHSA-g42g-737j-qx6j
Access Restriction Bypass in kube-apiserver
A vulnerability in Kubernetes `kube-apiserver` could allow node updates to bypass a _Validating Admission Webhook_ and allow unauthorized node updates. The information that is provided to the admission controller could contain old configurations that overwrite values used for validation. Since the overwriting takes place before the validation, this could lead the admission controller to accept requests that should be blocked. The vulnerability can be exploited when an update action on node resources is performed and an admission controller is in place and configured to validate the action. Users are only affected by this vulnerability if they are running a _Validating Admission Webhook_ for Nodes that denies admission based partially on the old state of the Node object. It only impacts validating admission plugins that rely on old values in certain fields and does not impact calls from kubelets that go through the built-in NodeRestriction admission plugin.
{'CVE-2021-25735'}
2022-04-12T22:19:17Z
2021-12-16T19:55:25Z
MODERATE
6.5
{'CWE-863', 'CWE-284'}
{'https://groups.google.com/g/kubernetes-security-announce/c/FKAGqT4jx9Y', 'https://github.com/kubernetes/kubernetes/issues/100096', 'https://github.com/kubernetes/kubernetes/commit/00e81db174ef7aca497be5f42d87e46d14df2a90', 'https://sysdig.com/blog/cve-2021-25735-kubernetes-admission-bypass/', 'https://github.com/kubernetes/kubernetes/pull/99946', 'https://bugzilla.redhat.com/show_bug.cgi?id=1937562', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25735', 'https://github.com/advisories/GHSA-g42g-737j-qx6j', 'https://pkg.go.dev/k8s.io/kubernetes@v1.23.5/cmd/kube-apiserver'}
null
GHSA
GHSA-22q9-hqm5-mhmc
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to encode output in GET requests. The request is meant to respond with Content-Type `application/json` which does not trigger the vulnerability but if the web server changes the header to `text/html` it may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 2.2.1 or later.
null
2021-09-28T17:01:09Z
2020-09-11T21:22:24Z
MODERATE
0
{'CWE-79'}
{'https://github.com/swagger-api/swagger-ui/issues/1154', 'https://github.com/advisories/GHSA-22q9-hqm5-mhmc', 'https://www.npmjs.com/advisories/987'}
null
GHSA
GHSA-99wh-973f-779p
XML External Entity Reference in Hazelcast
The AbstractXmlConfigRootTagRecognizer() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks.
{'CVE-2022-0265'}
2022-04-01T19:47:36Z
2022-03-04T00:00:15Z
CRITICAL
9.8
{'CWE-611'}
{'https://huntr.dev/bounties/d63972a2-b910-480a-a86b-d1f75d24d563', 'https://github.com/hazelcast/hazelcast/commit/4d6b666cd0291abd618c3b95cdbb51aa4208e748', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0265', 'https://github.com/hazelcast/hazelcast/pull/20407', 'https://github.com/advisories/GHSA-99wh-973f-779p'}
null
GHSA
GHSA-r6pg-pjwc-j585
Null pointer dereference in `SparseFillEmptyRows`
### Impact An attacker can trigger a null pointer dereference in the implementation of `tf.raw_ops.SparseFillEmptyRows`: ```python import tensorflow as tf indices = tf.constant([], shape=[0, 0], dtype=tf.int64) values = tf.constant([], shape=[0], dtype=tf.int64) dense_shape = tf.constant([], shape=[0], dtype=tf.int64) default_value = 0 tf.raw_ops.SparseFillEmptyRows( indices=indices, values=values, dense_shape=dense_shape, default_value=default_value) ``` This is because of missing [validation](https://github.com/tensorflow/tensorflow/blob/fdc82089d206e281c628a93771336bf87863d5e8/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L230-L231) that was covered under a `TODO`. If the `dense_shape` tensor is empty, then `dense_shape_t.vec<>()` would cause a null pointer dereference in the implementation of the op: ```cc template <typename T, typename Tindex> struct SparseFillEmptyRows<CPUDevice, T, Tindex> { Status operator()(OpKernelContext* context, const Tensor& default_value_t, const Tensor& indices_t, const Tensor& values_t, const Tensor& dense_shape_t, typename AsyncOpKernel::DoneCallback done) { ... const auto dense_shape = dense_shape_t.vec<Tindex>(); ... } } ``` ### Patches We have patched the issue in GitHub commit [faa76f39014ed3b5e2c158593b1335522e573c7f](https://github.com/tensorflow/tensorflow/commit/faa76f39014ed3b5e2c158593b1335522e573c7f). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29565'}
2021-05-21T14:25:11Z
2021-05-21T14:25:11Z
LOW
2.5
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29565', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6pg-pjwc-j585', 'https://github.com/advisories/GHSA-r6pg-pjwc-j585', 'https://github.com/tensorflow/tensorflow/commit/faa76f39014ed3b5e2c158593b1335522e573c7f'}
null
GHSA
GHSA-pwpr-vp2v-99xw
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1217, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300.
{'CVE-2019-1138'}
2021-03-29T20:56:11Z
2021-03-29T20:56:11Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1138', 'https://github.com/advisories/GHSA-pwpr-vp2v-99xw', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1138', 'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046'}
null
GHSA
GHSA-3xg5-6c3j-vp8x
Improper Restriction of XML External Entity Reference in Quokka
XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the component 'quokka/utils/atom.py'.
{'CVE-2020-18703'}
2022-03-23T20:18:44Z
2021-08-30T16:23:34Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/rochacbruno/quokka/issues/676', 'https://github.com/advisories/GHSA-3xg5-6c3j-vp8x', 'https://nvd.nist.gov/vuln/detail/CVE-2020-18703'}
null
GHSA
GHSA-fx6f-fpfv-5hmc
Malicious Package in uploader-plugin
Version 1.0.2 of `uploader-plugin` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T19:10:12Z
2020-09-03T19:10:12Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/1100', 'https://github.com/advisories/GHSA-fx6f-fpfv-5hmc'}
null
GHSA
GHSA-px9f-597f-wmcf
Uncontrolled Resource Consumption in Apache OpenMeetings server
If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0
{'CVE-2021-27576'}
2021-06-16T17:43:36Z
2021-06-16T17:43:36Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-px9f-597f-wmcf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27576', 'https://github.com/apache/openmeetings/commit/060a3114ad759931aeb42cd9afa9d1ebb39d3075', 'https://lists.apache.org/thread.html/r9bb615bd70a0197368f5f3ffc887162686caeb0b5fc30592a7a871e9%40%3Cuser.openmeetings.apache.org%3E', 'https://issues.apache.org/jira/browse/OPENMEETINGS-2551', 'https://github.com/apache/openmeetings/commit/cbdfd2f9731a8fe3daa9b4adf5da4a063fde161d', 'https://openmeetings.apache.org/security.html#cve-2021-27576---apache-openmeetings-bandwidth-can', 'https://github.com/apache/openmeetings/commit/afe26c950b127776f2dfe920abff41a584874de8'}
null
GHSA
GHSA-m794-qv59-gj7c
Malicious Package in signqle
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T15:43:27Z
2020-09-03T17:03:22Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1410', 'https://github.com/advisories/GHSA-m794-qv59-gj7c'}
null
GHSA
GHSA-7pxj-m4jf-r6h2
Missing validation during checkpoint loading
### Impact An attacker can trigger undefined behavior, integer overflows, segfaults and `CHECK`-fail crashes if they can change saved checkpoints from outside of TensorFlow. This is because the checkpoints loading infrastructure is missing validation for invalid file formats. ### Patches We have patched the issue in GitHub commits [b619c6f865715ca3b15ef1842b5b95edbaa710ad](https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad), [e8dc63704c88007ee4713076605c90188d66f3d2](https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2), [368af875869a204b4ac552b9ddda59f6a46a56ec](https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec), and [abcced051cb1bd8fb05046ac3b6023a7ebcc4578](https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578). These fixes will be included in TensorFlow 2.7.0. We will also cherrypick these commits on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2021-41203'}
2021-11-10T19:12:46Z
2021-11-10T19:12:46Z
HIGH
7.8
{'CWE-345'}
{'https://github.com/advisories/GHSA-7pxj-m4jf-r6h2', 'https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec', 'https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578', 'https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41203', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7pxj-m4jf-r6h2', 'https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad'}
null
GHSA
GHSA-q2x5-6q7q-r872
Use After Free in tremor-script
An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A patch operation may result in a use-after-free.
{'CVE-2021-45701'}
2022-01-07T17:52:40Z
2022-01-06T22:10:17Z
CRITICAL
9.8
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45701', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tremor-script/RUSTSEC-2021-0111.md', 'https://github.com/advisories/GHSA-q2x5-6q7q-r872', 'https://rustsec.org/advisories/RUSTSEC-2021-0111.html'}
null
GHSA
GHSA-747p-jfqv-f43r
Downloads Resources over HTTP in mystem3
Affected versions of `mystem3` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem3`. ## Recommendation Update to version 1.0.8 or later.
{'CVE-2016-10626'}
2021-06-11T14:04:49Z
2019-02-18T23:47:26Z
HIGH
8.1
{'CWE-311'}
{'https://github.com/koorchik/node-mystem3/commit/4bd31c0e0110afc327c414d7ebfc2ffe738cbad2', 'https://github.com/advisories/GHSA-747p-jfqv-f43r', 'https://www.npmjs.com/advisories/229', 'https://nodesecurity.io/advisories/229', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10626'}
null
GHSA
GHSA-m34x-wgrh-g897
Directory traversal vulnerability in Next.js
Next.js 4 before 4.2.3 has Directory Traversal under the `/_next` request namespace.
{'CVE-2018-6184'}
2022-04-28T20:13:32Z
2018-01-24T19:38:52Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/vercel/next.js/releases/tag/4.2.3', 'https://github.com/advisories/GHSA-m34x-wgrh-g897', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6184'}
null
GHSA
GHSA-f5c9-x9j6-87qp
Prototype pollution in dotty
Prototype pollution vulnerability in 'dotty' before version 0.1.1 allows attackers to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25912'}
2021-02-05T20:43:08Z
2021-02-05T20:43:08Z
MODERATE
0
{'CWE-400'}
{'https://github.com/deoxxa/dotty/commit/cd997d37917186c131be71501a698803f2b7ebdb', 'https://www.npmjs.com/package/dotty', 'https://github.com/advisories/GHSA-f5c9-x9j6-87qp', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25912', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25912'}
null
GHSA
GHSA-mfv7-gq43-w965
Incomplete List of Disallowed Inputs in Kubernetes
A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.
{'CVE-2021-25737'}
2021-10-05T16:03:50Z
2021-09-07T23:09:24Z
MODERATE
4.8
{'CWE-184', 'CWE-601'}
{'https://security.netapp.com/advisory/ntap-20211004-0004/', 'https://github.com/kubernetes/kubernetes/issues/102106', 'https://github.com/advisories/GHSA-mfv7-gq43-w965', 'https://groups.google.com/g/kubernetes-security-announce/c/xAiN3924thY', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25737'}
null
GHSA
GHSA-m63j-wh5w-c252
Critical severity vulnerability that affects actionview
# Denial of Service Vulnerability in Action View Impact ------ Specially crafted accept headers can cause the Action View template location code to consume 100% CPU, causing the server unable to process requests. This impacts all Rails applications that render views. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are available at the normal locations. Workarounds ----------- This vulnerability can be mitigated by wrapping `render` calls with `respond_to` blocks. For example, the following example is vulnerable: ``` class UserController < ApplicationController def index render "index" end end ``` But the following code is not vulnerable: ``` class UserController < ApplicationController def index respond_to |format| format.html { render "index" } end end end ``` Implicit rendering is impacted, so this code is vulnerable: ``` class UserController < ApplicationController def index end end ``` But can be changed this this: ``` class UserController < ApplicationController def index respond_to |format| format.html { render "index" } end end end ``` Alternatively to specifying the format, the following monkey patch can be applied in an initializer: ``` $ cat config/initializers/formats_filter.rb # frozen_string_literal: true ActionDispatch::Request.prepend(Module.new do def formats super().select do |format| format.symbol || format.ref == "*/*" end end end) ``` Please note that only the 5.2.x, 5.1.x, 5.0.x, and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Also note that the patches for this vulnerability are the same as CVE-2019-5418. Credits ------- Thanks to John Hawthorn <john@hawthorn.email> of GitHub
{'CVE-2019-5419'}
2021-06-10T22:53:00Z
2019-03-13T17:25:55Z
CRITICAL
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-m63j-wh5w-c252', 'https://access.redhat.com/errata/RHSA-2019:1149', 'https://access.redhat.com/errata/RHSA-2019:1147', 'https://groups.google.com/forum/#!topic/rubyonrails-security/GN7w9fFAQeI', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html', 'https://access.redhat.com/errata/RHSA-2019:0796', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html', 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/', 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html', 'http://www.openwall.com/lists/oss-security/2019/03/22/1', 'https://access.redhat.com/errata/RHSA-2019:1289', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5419'}
null
GHSA
GHSA-9p3v-wf2w-v29c
Moderate severity vulnerability that affects rails
Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb.
{'CVE-2009-4214'}
2021-09-08T20:12:32Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-79'}
{'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1', 'http://www.securitytracker.com/id?1023245', 'http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released', 'https://nvd.nist.gov/vuln/detail/CVE-2009-4214', 'http://support.apple.com/kb/HT4077', 'http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5', 'http://www.debian.org/security/2011/dsa-2301', 'http://www.securityfocus.com/bid/37142', 'http://secunia.com/advisories/37446', 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html', 'http://www.debian.org/security/2011/dsa-2260', 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html', 'http://www.openwall.com/lists/oss-security/2009/12/08/3', 'https://github.com/advisories/GHSA-9p3v-wf2w-v29c', 'http://secunia.com/advisories/38915', 'http://www.openwall.com/lists/oss-security/2009/11/27/2', 'http://www.vupen.com/english/advisories/2009/3352'}
null
GHSA
GHSA-62fx-3v4f-mwxm
Bypass of sitemp access restrictions
A security bypass vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. A user with privileges to generate sitemaps can bypass configuration that restricts directory access. The bypass allows overwrite of a subset of configuration files which can lead to denial of service.
{'CVE-2019-8133'}
2021-08-18T22:23:23Z
2019-11-12T22:59:40Z
MODERATE
6.5
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-8133', 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://github.com/advisories/GHSA-62fx-3v4f-mwxm', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8133.yaml'}
null
GHSA
GHSA-49wp-qq6x-g2rf
Cross-site Request Forgery in fastify-csrf
The package fastify-csrf before 3.0.0 has a set of issues that affect its ability to do CSRF protection. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: `cookieOpts: { path: '/', sameSite: true }` 2. The CSRF token was available in the GET query parameter
{'CVE-2020-28482'}
2021-01-20T21:30:34Z
2021-01-20T21:30:34Z
MODERATE
0
{'CWE-352'}
{'https://github.com/fastify/fastify-csrf/pull/26', 'https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044', 'https://github.com/advisories/GHSA-49wp-qq6x-g2rf', 'https://www.npmjs.com/package/fastify-csrf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28482', 'https://github.com/fastify/fastify-csrf/commit/3c9de36e9e73ce0eda9207f84f2ac0243e1f5253'}
null
GHSA
GHSA-p75f-g7gx-2r7p
Exposure of Sensitive Information to an Unauthorized Actor in Products.PluggableAuthService ZODBRoleManager
### Impact _What kind of vulnerability is it? Who is impacted?_ Information disclosure vulnerability - everyone can list the names of roles defined in the ZODB Role Manager plugin if the site uses this plugin. ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem has been fixed in version 2.6.0. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to 2.6.0 and re-run the buildout, or if you used pip simply do `pip install "Products.PluggableAuthService>=2.6.0"` ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ There is no workaround. Users are encouraged to upgrade. ### References _Are there any links users can visit to find out more?_ - [GHSA-p75f-g7gx-2r7p](https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p75f-g7gx-2r7p) - [Products.PluggableAuthService on PyPI](https://github.com/zopefoundation/Products.PluggableAuthService) ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Products.PluggableAuthService issue tracker](https://github.com/zopefoundation/Products.PluggableAuthService/issues) * Email us at [security@plone.org](mailto:security@plone.org)
{'CVE-2021-21336'}
2022-04-19T19:02:49Z
2021-03-08T20:38:35Z
LOW
0
{'CWE-200'}
{'http://www.openwall.com/lists/oss-security/2021/05/21/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21336', 'https://github.com/zopefoundation/Products.PluggableAuthService/commit/2dad81128250cb2e5d950cddc9d3c0314a80b4bb', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://pypi.org/project/Products.PluggableAuthService/', 'https://github.com/advisories/GHSA-p75f-g7gx-2r7p', 'https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p75f-g7gx-2r7p'}
null
GHSA
GHSA-ww97-9w65-2crx
Improper Input Validation in Apache Solr
Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user).
{'CVE-2019-17558'}
2022-02-24T12:06:30Z
2020-02-12T18:45:28Z
MODERATE
7.5
{'CWE-74', 'CWE-94', 'CWE-20'}
{'https://lists.apache.org/thread.html/rf6d7ffae2b940114324e036b6394beadf27696d051ae0c4a5edf07af@%3Cissues.lucene.apache.org%3E', 'https://github.com/apache/lucene-solr/pull/1156', 'http://packetstormsecurity.com/files/157078/Apache-Solr-8.3.0-Velocity-Template-Remote-Code-Execution.html', 'https://lists.apache.org/thread.html/r9271d030452170ba6160c022757e1b5af8a4c9ccf9e04164dec02e7f@%3Cissues.lucene.apache.org%3E', 'https://issues.apache.org/jira/browse/SOLR-13971', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17558', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://lists.apache.org/thread.html/r79c7e75f90e735fd32c4e3e97340625aab66c09dfe8c4dc0ab768b69@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r8a36e4f92f4449dec517e560e1b55639f31b3aca26c37bbad45e31de@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r99c3f7ec3a079e2abbd540ecdb55a0e2a0f349ca7084273a12e87aeb@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r7f21ab40a9b17b1a703db84ac56773fcabacd4cc1eb5c4700d17c071@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r58c58fe51c87bc30ee13bb8b4c83587f023edb349018705208e65b37@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r0b7b9d4113e6ec1ae1d3d0898c645f758511107ea44f0f3a1210c5d5@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/re8d12db916b5582a23ed144b9c5abd0bea0be1649231aa880f6cbfff@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/ra29fa6ede5184385bf2c63e8ec054990a7d4622bba1d244bee70d82d@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r25f1bd4545617f5b86dde27b4c30fec73117af65598a30e20209739a@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rde3dbd8e646dabf8bef1b097e9a13ee0ecbdb8441aaed6092726c98d@%3Cissues.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/rb964fe5c4e3fc05f75e8f74bf6b885f456b7a7750c36e9a8045c627a@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r5074d814d3a8c75df4b20e66bfd268ee0a73ddea7e85070cec3ae78d@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r7b89b3dcfc1b6c52dd8d610b897ac98408245040c92b484fe97a51a2@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66@%3Cdev.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r12ab2cb15a34e49b4fecb5b2bdd7e10f3e8b7bf1f4f47fcde34d3a7c@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r8e7a3c253a695a7667da0b0ec57f9bb0e31f039e62afbc00a1d96f7b@%3Csolr-user.lucene.apache.org%3E', 'https://issues.apache.org/jira/browse/SOLR-14025', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rafc939fdd753f55707841cd5886fc7fcad4d8d8ba0c72429b3220a9a@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-ww97-9w65-2crx', 'https://lists.apache.org/thread.html/r5dc200f7337093285bac40e6d5de5ea66597c3da343a0f7553f1bb12@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r36e35fd76239a381643555966fb3e72139e018d52d76544fb42f96d8@%3Cissues.lucene.apache.org%3E'}
null
GHSA
GHSA-rgx6-rjj4-c388
Cross-site Scripting in ckeditor4
A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because --!> is mishandled.
{'CVE-2021-33829'}
2021-11-18T15:22:37Z
2021-06-21T17:16:42Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33829', 'https://ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/#improvements-for-comments-in-html-parser', 'https://www.drupal.org/sa-core-2021-003', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html', 'https://www.npmjs.com/package/ckeditor4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://github.com/advisories/GHSA-rgx6-rjj4-c388', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/'}
null
GHSA
GHSA-xp63-6vf5-xf3v
Command injection in codecov (npm package)
### Impact The `upload` method has a command injection vulnerability. Clients of the `codecov-node` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. A similar CVE was issued: [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh), but the fix was incomplete. It only blocked `&`, and command injection is still possible using backticks instead to bypass the sanitizer. We have written a [CodeQL](https://codeql.com) query, which automatically detects this vulnerability. You can see the results of the query on the `codecov-node` project [here](https://lgtm.com/query/7714424068617023832/). ### Patches This has been patched in version 3.7.1 ### Workarounds None, however, the attack surface is low in this case. Particularly in the standard use of codecov, where the module is used directly in a build pipeline, not built against as a library in another application that may supply malicious input and perform command injection. ### References * [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh) ### For more information If you have any questions or comments about this advisory: * Contact us via our [Security Email](mailto:security@codecov.io)
{'CVE-2020-15123'}
2021-01-07T23:47:14Z
2020-07-20T17:20:20Z
MODERATE
9.3
{'CWE-78'}
{'https://github.com/codecov/codecov-node/security/advisories/GHSA-xp63-6vf5-xf3v', 'https://github.com/codecov/codecov-node/pull/180', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15123', 'https://github.com/advisories/GHSA-xp63-6vf5-xf3v', 'https://lgtm.com/query/7714424068617023832', 'https://github.com/advisories/GHSA-5q88-cjfq-g2mh', 'https://github.com/codecov/codecov-node/commit/c0711c656686e902af2cd92d6aecc8074de4d83d'}
null
GHSA
GHSA-x7wr-283h-5h2v
Out-of-bounds Read in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerability ID: OTF-014 - Vulnerability type: Out-of-bounds Read - Threat level: Elevated ## Description: The desktop application was found to be vulnerable to denial of service via an undisclosed vulnerability in the QT image parsing. ## Technical description: Prerequisites: - Onion address is known - Public service or authentication is valid - Desktop application is used - History is displayed The rendering of images found in OTF-001 (page 25) could be elevated to a Denial of Service, which requires only very few bytes to be sent as a path parameter to any of the Onionshare functions. Roughly 20 bytes lead to 2GB memory consumption and this can be triggered multiple times. To be abused, this vulnerability requires rendering in the history tab, so some user interaction is required. The issue is in the process of disclosure to the QT security mailing list. More details will be provided after a fixed QT build has been deployed. ## Impact: An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can perform a Denial of Service attack, which quickly results in out-of-memory for the server. This requires the desktop application with rendered history, therefore the impact is only elevated. ## Recommendation: - Monitor for upstream fix - Fix OTF-001 (page 25) as a workaround
{'CVE-2022-21688'}
2022-01-21T23:20:29Z
2022-01-21T23:20:29Z
HIGH
7.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-x7wr-283h-5h2v', 'https://github.com/onionshare/onionshare/security/advisories/GHSA-x7wr-283h-5h2v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21688', 'https://github.com/onionshare/onionshare/releases/tag/v2.5'}
null
GHSA
GHSA-qhv9-728r-6jqg
ReDoS via long string of semicolons in tough-cookie
Affected versions of `tough-cookie` may be vulnerable to regular expression denial of service when long strings of semicolons exist in the `Set-Cookie` header. ## Recommendation Update to version 2.3.0 or later.
{'CVE-2016-1000232'}
2021-09-16T19:58:55Z
2018-10-10T18:57:02Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/salesforce/tough-cookie/commit/615627206357d997d5e6ff9da158997de05235ae', 'https://access.redhat.com/errata/RHSA-2016:2101', 'https://access.redhat.com/security/cve/cve-2016-1000232', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000232', 'https://github.com/salesforce/tough-cookie/commit/e4fc2e0f9ee1b7a818d68f0ac7ea696f377b1534', 'https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-affected-by-node-js-tough-cookie-module-vulnerability-to-a-denial-of-service-cve-2016-1000232/', 'https://www.npmjs.com/advisories/130', 'https://access.redhat.com/errata/RHSA-2017:2912', 'https://github.com/advisories/GHSA-qhv9-728r-6jqg'}
null
GHSA
GHSA-6q4w-3wp4-q5wf
Denial of Service in get-ip-range
The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion. Update get-ip-range dependency to 4.0.0 or above.
{'CVE-2021-27191'}
2022-05-03T02:57:48Z
2021-04-13T15:15:57Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6', 'https://github.com/advisories/GHSA-6q4w-3wp4-q5wf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27191', 'https://www.npmjs.com/package/get-ip-range', 'https://security.netapp.com/advisory/ntap-20210319-0002/', 'https://advisory.checkmarx.net/advisory/CX-2021-4304'}
null
GHSA
GHSA-q3vw-4jx3-rrr2
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2020-09-23T17:20:09Z
2020-09-23T17:20:09Z
LOW
0
null
{'https://github.com/personnummer/java/commit/3bad4e3354503d7cfd443257c94c41f57b3d1621', 'https://github.com/personnummer/java/security/advisories/GHSA-q3vw-4jx3-rrr2', 'https://github.com/advisories/GHSA-q3vw-4jx3-rrr2'}
null
GHSA
GHSA-xj62-87pg-vcv3
Regular Expression Denial of Service in jshamcrest
The `jshamcrest` package is affected by a regular expression denial of service vulnerability when certain types of user input are passed in to the emailAddress validator. ## Proof of concept ``` var js = require('jshamcrest') var emailAddress = new js.JsHamcrest.Matchers.emailAddress(); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } for (i=1;i<=10000000;i=i+1) { console.log("COUNT: " + i); var str = '66666666666666666666666666666@ffffffffffffffffffffffffffffffff.' + genstr(i, 'a') + '{' console.log("LENGTH: " + str.length); var start = process.hrtime(); emailAddress.matches(str) var end = process.hrtime(start); console.log(end); } ``` ### Results It takes about 116 characters to get a 1.6 second event loop block. ``` [ 1, 633084590 ] COUNT: 51 LENGTH: 116 ``` # Timeline - October 25, 2015 - Vulnerability Identified - October 25, 2015 - Maintainers notified (no response) ## Recommendation The `jshamcrest` package currently has no patched versions available. At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=validator).
{'CVE-2016-10521'}
2021-01-08T00:03:55Z
2019-02-18T23:38:51Z
HIGH
0
{'CWE-400'}
{'https://www.npmjs.com/advisories/53', 'https://github.com/advisories/GHSA-xj62-87pg-vcv3', 'https://nodesecurity.io/advisories/53', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10521'}
null