ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-vp5x-3v8r-qprw
|
Deserialization of Untrusted Data in Dubbo
|
A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
|
{'CVE-2021-43297'}
|
2022-01-19T18:25:15Z
|
2022-01-12T22:51:04Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://lists.apache.org/thread/1mszxrvp90y01xob56yp002939c7hlww', 'https://github.com/advisories/GHSA-vp5x-3v8r-qprw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43297'}
| null |
GHSA
|
GHSA-j57w-3c39-gpp5
|
Improper Privilege Management in Snipe-IT
|
An unprivileged user of Snipe-IT prior to version 5.3.11 can create maintenance for an asset. Version 5.3.11 contains a patch for this issue.
|
{'CVE-2022-0611'}
|
2022-02-26T00:58:12Z
|
2022-02-17T00:00:35Z
|
HIGH
| 8.8
|
{'CWE-269'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0611', 'https://huntr.dev/bounties/7b7447fc-f1b0-446c-b016-ee3f6511010b', 'https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439', 'https://github.com/advisories/GHSA-j57w-3c39-gpp5'}
| null |
GHSA
|
GHSA-jhq9-wm9m-cf89
|
CHECK-failure in `UnsortedSegmentJoin`
|
### Impact
An attacker can cause a denial of service by controlling the values of `num_segments` tensor argument for `UnsortedSegmentJoin`:
```python
import tensorflow as tf
inputs = tf.constant([], dtype=tf.string)
segment_ids = tf.constant([], dtype=tf.int32)
num_segments = tf.constant([], dtype=tf.int32)
separator = ''
tf.raw_ops.UnsortedSegmentJoin(
inputs=inputs, segment_ids=segment_ids,
num_segments=num_segments, separator=separator)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a2a607db15c7cd01d754d37e5448d72a13491bdb/tensorflow/core/kernels/unsorted_segment_join_op.cc#L92-L93) assumes that the `num_segments` tensor is a valid scalar:
```cc
const Tensor& num_segments_tensor = context->input(2);
auto num_segments = num_segments_tensor.scalar<NUM_SEGMENTS_TYPE>()();
```
Since the tensor is empty the `CHECK` involved in `.scalar<T>()()` that checks that the number of elements is exactly 1 will be invalidated and this would result in process termination.
### Patches
We have patched the issue in GitHub commit [704866eabe03a9aeda044ec91a8d0c83fc1ebdbe](https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29552'}
|
2021-05-21T14:23:48Z
|
2021-05-21T14:23:48Z
|
LOW
| 2.5
|
{'CWE-617'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29552', 'https://github.com/advisories/GHSA-jhq9-wm9m-cf89', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jhq9-wm9m-cf89', 'https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe'}
| null |
GHSA
|
GHSA-238x-q7xf-p4xw
|
Downloads Resources over HTTP in arrayfire-js
|
Affected versions of `arrayfire-js` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `arrayfire-js`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10598'}
|
2021-01-08T20:10:37Z
|
2019-02-18T23:50:32Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-238x-q7xf-p4xw', 'https://nodesecurity.io/advisories/192', 'https://www.npmjs.com/advisories/192', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10598'}
| null |
GHSA
|
GHSA-8474-rc7c-wrhp
|
High severity vulnerability that affects safemode
|
Withdrawn, accidental duplicate publish.
The safemode rubygem, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
| null |
2021-12-02T23:18:10Z
|
2018-08-08T22:29:10Z
|
HIGH
| 0
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2017-7540', 'https://github.com/advisories/GHSA-8474-rc7c-wrhp'}
| null |
GHSA
|
GHSA-fxwm-rx68-p5vx
|
XSS in richtext custom tag attributes in ezsystems/ezplatform-richtext
|
The rich text editor does not escape attribute data when previewing custom tags. This means XSS is possible if custom tags are used, for users who have access to editing rich text content. Frontend content view is not affected, but the vulnerability could be used by editors to attack other editors. The fix ensures custom tag attribute data is escaped in the editor.
| null |
2021-12-01T18:28:29Z
|
2021-12-01T18:28:29Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-010-xss-in-richtext-custom-tag-attributes', 'https://github.com/advisories/GHSA-fxwm-rx68-p5vx', 'https://github.com/ezsystems/ezplatform-richtext/security/advisories/GHSA-fxwm-rx68-p5vx'}
| null |
GHSA
|
GHSA-98gj-wwxm-cj3h
|
Moderate severity vulnerability that affects mistune
|
Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument.
|
{'CVE-2017-16876'}
|
2021-09-07T21:10:10Z
|
2019-01-04T17:47:50Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/lepture/mistune/blob/master/CHANGES.rst', 'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98', 'https://bugzilla.redhat.com/show_bug.cgi?id=1524596', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NUR3GMHQBMA3UC4PFMCK6GCLOQC4LQQC/', 'https://github.com/advisories/GHSA-98gj-wwxm-cj3h', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16876'}
| null |
GHSA
|
GHSA-m8xj-5v73-3hh8
|
curlrequest allows execution of arbitrary commands
|
curlrequest through 1.0.1 allows execution of arbitrary commands. It is possible to inject arbitrary commands by using a semicolon char in any of the `options` values.
|
{'CVE-2020-7646'}
|
2021-08-25T21:07:37Z
|
2020-05-13T16:29:43Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://github.com/node-js-libs/curlrequest/blob/master/index.js#L239,', 'https://snyk.io/vuln/SNYK-JS-CURLREQUEST-568274', 'https://github.com/advisories/GHSA-m8xj-5v73-3hh8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7646'}
| null |
GHSA
|
GHSA-2v5j-q74q-r53f
|
django-helpdesk is vulnerable to Cross-site Scripting
|
django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
|
{'CVE-2021-3994'}
|
2021-12-03T20:42:26Z
|
2021-12-03T20:42:26Z
|
HIGH
| 8.8
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/be7f211d-4bfd-44fd-91e8-682329906fbd', 'https://github.com/advisories/GHSA-2v5j-q74q-r53f', 'https://github.com/django-helpdesk/django-helpdesk/releases/tag/0.3.2', 'https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3994'}
| null |
GHSA
|
GHSA-mj2c-5mjv-gmmj
|
SQL Injection in Pimcore
|
Pimcore prior to version 10.3.5 is vulnerable to SQL injection in ElementController.php. This vulnerability causes loss of data confidentiality.
|
{'CVE-2022-1339'}
|
2022-04-22T21:06:23Z
|
2022-04-14T00:00:19Z
|
HIGH
| 7.5
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-mj2c-5mjv-gmmj', 'https://github.com/pimcore/pimcore/commit/adae3be64427466bf0df15ceaea2ac30da93752c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1339', 'https://huntr.dev/bounties/ae8dc737-844e-40da-a9f7-e72d8e50f6f9'}
| null |
GHSA
|
GHSA-gm9g-2g8v-fvxj
|
Prototype Pollution in upmerge
|
All versions of `upmerge` are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-09-16T20:59:21Z
|
2019-06-06T15:32:28Z
|
MODERATE
| 7.5
|
{'CWE-400', 'CWE-345'}
|
{'https://github.com/advisories/GHSA-gm9g-2g8v-fvxj', 'https://www.npmjs.com/advisories/809', 'https://hackerone.com/reports/439120', 'https://snyk.io/vuln/SNYK-JS-UPMERGE-174133'}
| null |
GHSA
|
GHSA-9cw2-jqp5-7x39
|
Multiple Content Injection Vulnerabilities in marked
|
Versions 0.3.0 and earlier of `marked` are affected by two cross-site scripting vulnerabilities, even when `sanitize: true` is set.
The attack vectors for this vulnerability are GFM Codeblocks and JavaScript URLs.
## Recommendation
Upgrade to version 0.3.1 or later.
|
{'CVE-2014-3743'}
|
2021-09-23T20:56:40Z
|
2020-08-31T22:52:52Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-1850', 'https://github.com/advisories/GHSA-9cw2-jqp5-7x39', 'https://www.npmjs.com/advisories/22'}
| null |
GHSA
|
GHSA-27v7-qhfv-rqq8
|
Insecure Credential Storage in web3
|
All versions of `web3` are vulnerable to Insecure Credential Storage. The package stores encrypted wallets in local storage and requires a password to load the wallet. Once the wallet is loaded, the private key is accessible via LocalStorage. Exploiting this vulnerability likely requires a Cross-Site Scripting vulnerability to access the private key.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-09-16T20:58:49Z
|
2019-05-30T17:26:30Z
|
LOW
| 3.3
| null |
{'https://www.npmjs.com/advisories/877', 'https://snyk.io/vuln/SNYK-JS-WEB3-174533', 'https://github.com/advisories/GHSA-27v7-qhfv-rqq8', 'https://github.com/ethereum/web3.js/issues/2739'}
| null |
GHSA
|
GHSA-86wm-rrjm-8wh8
|
Buffer not correctly recycled in Gzip Request inflation
|
### Impact
If GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection and if an
attacker can send a request with a body that is received entirely by not consumed by the application, then a subsequent request
on the same connection will see that body prepended to it's body.
The attacker will not see any data, but may inject data into the body of the subsequent request
CVE score is [4.8 AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&version=3.1)
### Workarounds
The problem can be worked around by either:
- Disabling compressed request body inflation by GzipHandler.
- By always fully consuming the request content before sending a response.
- By adding a `Connection: close` to any response where the servlet does not fully consume request content.
|
{'CVE-2020-27218'}
|
2022-04-22T17:23:58Z
|
2020-12-02T18:28:18Z
|
MODERATE
| 4.8
|
{'CWE-226'}
|
{'https://lists.apache.org/thread.html/r186748e676e5aeb4eb603361e6367555ae4daecbde55cfd69fa68ec6@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/racf9e6ad2482cb9b1e3e1b2c1b443d9d5cf14055fb54dec3d2dcce91@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r2f168fd22c071bdd95ec696e45d2a01e928b9fcadbe94fbabeb1549d@%3Cissues.hbase.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20201218-0003/', 'https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rccc7ba8c51d662e13496df20466d27dbab54d7001e9e7b2f31468a9e@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r7d37d33f2d68912985daf40203182e3d86f3e81266b7a7f350689eeb@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6d5bb60a13e8b539600f86cb72097967b951de5c7ef1e4005cda74a7@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1dd302323c6fe1a542d0371de66a484918fa6c2831ae70d924974bea@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3d43529452c5a16338e8267eb911e8aedc64c3241624302e673961c1@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/re86a6ba09dc74e709db843e3561ead923c8fd1cba32343656dd8c44b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r602683484f607cd1b9598caf3e549fbb01c43fd46a582a32cc3bb545@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re3918edd403b0d3857a13ef2ccf3d2bc0231f3b8758e2a5777ea1cd3@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/reb75282901d0969ba6582725ce8672070715d0773f6ff54dedd60156@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rf273267fa2e49314643af3141cec239f97d41de8a59be4ef7e10c65a@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r2ffe719224cbe5897f2d06dd22fc77fa12377c39efe9de0c3bf3f837@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r6493e43007f41e34cdbbb66622307fa235374dd2ec5bf52c61075a68@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/re014afaa14f4df9d33912ab64dc57249e1c170c7448d7175c6d014ff@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/re03a566114435a8cc8eb72158242b0f560c5eeccbb4ee98d22de8373@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-86wm-rrjm-8wh8', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-86wm-rrjm-8wh8', 'https://lists.apache.org/thread.html/r8eea4c7797e701f6494c72942dd89f471cda4c2c6e9abbaf05d113d8@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r769e1ba36c607772f7403e7ef2a8ae14d9ddcab4a844f9b28bcf7959@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r7669dab41f2b34d56bb67700d869dc9c025ff72e9468204799f5ac29@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rc1de630c6ed9a958d9f811e816d6d8efb6ca94aed0869bc5cda9d7f8@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/racd55c9b704aa68cfb4436f17739b612b5d4f887155e04ed521a4b67@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r153fbefc27a1b2033692f32ef728ca909a7c7bcc1d21b6c35b38bdd5@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r15500b77c52390e2ec048cea4a6b45edf907ea61cd13259193ff8601@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r4b2e7417a76e3dd4dc9855c6c138c49484080754a09927454f6d89f0@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9f571b086965b35d4e91e47fb67c27b42b62762248b4900ba723599f@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r51ec0120b6c849d12fb7fef34db87ef0bf79fcfcd3d703a9800afbba@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r39f1b1be8e5c0935f7c515eedf907909474bad15185125daacb36d50@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb6a3866c02ac4446451c7d9dceab2373b6d32fb058f9085c6143de30@%3Creviews.spark.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=568892', 'https://lists.apache.org/thread.html/r2a541f08bf5f847394297c13a5305c2f76c11e46504ce2a49653890a@%3Creviews.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r821bbffb64da0f062b4e72d1aa600b91e26bc82a28298ab159121215@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r078c1203e48089b2c934b9f86b61bebe8c049e0ea6273b124f349988@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r489dfc3e259ad3837141985dd9291b93e6b40496cdf58808915d67e9@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ree677ff289ba9a90850f2e3ba7279555df1a170263ba39c5272db236@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcf7b5818f71bb97fd695eb0f54f8f4f69e15cc5f9ec761ea8be0d0d3@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r70940cb30356642f0c49af49259680d6bd866f51c4e8de0f8a498fb0@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9d7a86fb0b45e5b1855d4df83a5820eef813d55eae3edf224f3d5055@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra1c234f045871827f73e4d68326b067e72d3139e109207345fa57d9e@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r990e0296b188d4530d1053882f687fa4f938f108425db2999a180944@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8c22aad0711321537183ccddcade7274ebf9dcbdcdacc6c4f90f43de@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r8b2271909dabb45f0f1482ef35ffe106ae4b0cf8e877eb514e9cd421@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r4aff5ca6bc94a6f13ff77914fd960185ab70cd6cebe96fffd74543ac@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r3554a4f192db6008c03f2c6c3e0f1691a9b0d615ce955ef67a876ff7@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0d2de2ab5558da68b504bd30db74da1d97dc152a857f5b7e462288ab@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r500e22d0aedba1866d0b5e76429b76652a473a0209fa8bf66c9f7aab@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r81f82ab8ecb83568bafbecf9ce0e73be73980ac1e2af6baf0f344a59@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r32a25679d97bf5969d130f8e9b3a3fc54110095397d89952e93dbeb0@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rfa8879a713480b206c152334419499e6af0878c36217abcc9ab4f0d1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r25a47cd06750ebb4b0f23a9b7a57c209702c8566a4c970a41ac088df@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rc91c405c08b529b7292c75d9bd497849db700a1297fe3432990f6774@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdde0ad0a03eec962c56b46e70e225918ea2368dcc3fd3488741fad53@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbea4d456d88b043be86739ab0200ad06ba5a7921064411c098f79831@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rba4bca48d2cdfa8c08afc368a9cc4572ec85a5915ba29b8a194bf505@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rdbdbb4e51f8857e082b464cd128decd7263cf0fb8557f12993562c56@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E', 'https://lists.apache.org/thread.html/r2a57c7bbf36afc87f8ad9e1dd2f53a08e85a1b531283fc2efce4fe17@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3807b1c54066797c4870e03bd2376bdcce9c7c4e6143499f53cd9ca2@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r00858fe27ee35ac8fa0e1549d67e0efb789d63b791b5300390bd8480@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r543ea0a861a78d84c22656fb76880d7ab327048cf7ee3ccc7281375d@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/re4e67541a0a25a8589e89f52f8cd163c863fe04b59e048f9f1a04958@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/re4ae7ada52c5ecfe805eb86ddc0af399ec8a57bfb0d8c632b8723b88@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r391d20ab6ec03d6becc7a9f0c5e0f45a7ad8af6b996ae0a49839f6bd@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/rc2b603b7fa7f8dbfe0b3b59a6140b4d66868db3bf4b29d69a772d72a@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8ed14a84656fa0bb8df3bf9373c5be80f47ceac1e2ff068ee734fdb3@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rc0e35f4e8a8a36127e3ae7a67f325a3a6a4dbe05034130fb04b6f3b6@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5c64173663c71f222ea40617ab362d7a590935fb75c18817fdec377e@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb8f413dc923070919b09db3ac87d079a2dcc6f0adfbb029e206a7930@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3b7c8bc7a1cb8acdcf7753f436564d289d22f2906e934d1b11de3a40@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rf0181750e321518c8afa8001e0529d50a9447714ef4f58d98af57904@%3Creviews.spark.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r870bc5e6e354c3e28ea029cb5726c9e8dd2b88cb0f5f7de1d4e3133d@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r46589f4228aabd5fb16135ff5bef0f77f06cdef64f9785ac3349fa02@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra09a653997cbf10aab8c0deabc0fa49f5a8a8ce4305ce9089b98485f@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r8f5b144e7a7c2b338f01139d891abbaba12a8173ee01110d21bd0b4d@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4981622ba15e8be1657d30b7c85044c7aabe89751fa7324f8604b834@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r964d226dd08527fddd7a44410c50daa9d34d398e5c4793f1d7e19da8@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd20651e102cb6742a9d9322ea7b5fc3ab60a7ffecb50fa9157cbf176@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r306c8e5aad1b9afc0c9278430fb571950fbb3ab7dd5d369eb618ffa4@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r22776d06582985cca5bd2a92519a2b13b4cae2d8e087318da03c036d@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r05b7ffde2b8c180709e14bc9ca036407bea3ed9f09b32c4705d23a4a@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r5e5cb33b545548ec4684d33bd88b05a0ae89c4d7cac93eb63255f58f@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rf31e24700f725ef81bc5a2e0444a60e1f295ed0a54c0098362a7bdfa@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r96ef6d20c5bd3d42dab500bac56a427e1dce00cf85b083987617643d@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r850d1d0413716e8ba6d910cae7b01a0e560636e17d664769b5080ca5@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb4ca79d1af5237108ce8770b7c46ca78095f62ef21331d9d06142388@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r706562cbbdda569cc556d8a7983d1f9229606e7b51337b820785af26@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r8be8c6f0e404a3179d988eb8afed03ede5f2d5ce986d3f709fb82610@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r94230f46b91c364d39922a8ba0cfe12b8dba1556b14792719a7d921f@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r74ab0f5a5f16ca01eb145403ab753df5b348b8c1656d7c8501d0bfc6@%3Creviews.spark.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27218', 'https://lists.apache.org/thread.html/rcbc408088ae99dc3167ea293a562a3a9a7295a20e9a1bfc93e43ae1b@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r8c839a0d88cd6504abbe72c260371094f47014b2ba08d8d2c0232e3c@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5464405909eb0e1059d5dd57d10c435b9f19325fdebbadb4f1126997@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r66456df852de06a0eed2c0a50252a2c8d360b8a5c005f63c0b1e3d25@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rbbd003149f929b0e2fe58fb315de1658e98377225632e7e4239323fb@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rbe3f2e0a3c38ed9cbef81507b7cc6e523341865e30dc15c7503adc76@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9b46505868794fba04d401956304e63e4d8e39bdc118d30e5e87dcd9@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r23ce6b8965e30808daa77a80fcd69833b1fc632d80465d0419eff619@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rce9e232a663d8405c003fe83d5c86c27d1ed65561f3690e824717bc4@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rd9a960429741406f6557fa344a13d50a0c9976dac2e4c46bb54b32d7@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/re9214a4232b7ae204288c283bcee4e39f07da6cc34798e9217ba4eb6@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r8fee46fd9f1254150cc55eecf1ea6a448fca1f7cf1d1e7f9c4803fdb@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r01806ad8c9cb0590584baf5b1a60237ad92e4ad5bba082ca04d98179@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r942e21ee90e2617a00a08b17b0ac2db961959bec969b91df61584d38@%3Cdev.kafka.apache.org%3E'}
| null |
GHSA
|
GHSA-jxhw-mg8m-2pj8
|
Moderate severity vulnerability that affects devise
|
Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.
|
{'CVE-2013-0233'}
|
2021-09-14T19:54:29Z
|
2017-10-24T18:33:37Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-jxhw-mg8m-2pj8', 'http://blog.plataformatec.com.br/2013/01/security-announcement-devise-v2-2-3-v2-1-3-v2-0-5-and-v1-5-3-released/', 'http://www.openwall.com/lists/oss-security/2013/01/29/3', 'http://www.securityfocus.com/bid/57577', 'http://www.phenoelit.org/blog/archives/2013/02/05/mysql_madness_and_rails/index.html', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00000.html', 'http://www.metasploit.com/modules/auxiliary/admin/http/rails_devise_pass_reset', 'https://github.com/Snorby/snorby/issues/261', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0233'}
| null |
GHSA
|
GHSA-j33j-fg2g-mcv2
|
Cross-Site Request Forgery in CakePHP
|
CakePHP before 4.0.6 mishandles CSRF token generation. This might be remotely exploitable in conjunction with XSS.
|
{'CVE-2020-15400'}
|
2022-02-10T22:28:08Z
|
2022-02-10T22:27:58Z
|
MODERATE
| 4.3
|
{'CWE-352', 'CWE-79'}
|
{'https://github.com/advisories/GHSA-j33j-fg2g-mcv2', 'https://bakery.cakephp.org/2020/04/18/cakephp_406_released.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15400'}
| null |
GHSA
|
GHSA-pxcc-hj8w-fmm7
|
Command injection vulnerability in @prisma/sdk in getPackedPackage function
|
### Impact
As of today, we are not aware of any Prisma users or external consumers of the `@prisma/sdk` package who are affected by this security vulnerability.
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
It only affects the `getPackedPackage` function and this function is not advertised and only used for tests & building our CLI, no malicious code was found after checking our codebase.
### Patches
Fixed in
- @prisma/sdk@2.20.0 (latest channel)
- @prisma/sdk@2.20.0-dev.29 (dev channel)
Pull Request closing this vulnerability [https://github.com/prisma/prisma/pull/6245](https://github.com/prisma/prisma/pull/6245)
### Acknowledgements
This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh).
### For more information
If you have any questions or comments about this advisory:
- Create a discussion in [the Prisma repository](https://github.com/prisma/prisma/discussions)
- Email us at security@prisma.io
|
{'CVE-2021-21414'}
|
2022-04-27T18:19:20Z
|
2021-04-06T17:25:12Z
|
HIGH
| 7.7
|
{'CWE-78'}
|
{'https://github.com/prisma/prisma/pull/6245', 'https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7', 'https://github.com/advisories/GHSA-pxcc-hj8w-fmm7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21414', 'https://security.netapp.com/advisory/ntap-20210618-0003/'}
| null |
GHSA
|
GHSA-663j-rjcr-789f
|
CSV injection in shuup
|
“Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.
|
{'CVE-2021-25962'}
|
2021-10-21T14:31:43Z
|
2021-09-30T20:50:07Z
|
HIGH
| 8
|
{'CWE-1236'}
|
{'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25962', 'https://github.com/advisories/GHSA-663j-rjcr-789f'}
| null |
GHSA
|
GHSA-6pqm-xvfc-w7p4
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-3993'}
|
2021-12-03T20:42:35Z
|
2021-12-03T20:42:35Z
|
MODERATE
| 6.5
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3993', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871', 'https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9', 'https://github.com/advisories/GHSA-6pqm-xvfc-w7p4'}
| null |
GHSA
|
GHSA-7f42-p84j-f58p
|
Moderate severity vulnerability that affects sanitize
|
When Sanitize <= 4.6.2 is used in combination with libxml2 >= 2.9.2, a specially crafted HTML fragment can cause libxml2 to generate improperly escaped output, allowing non-whitelisted attributes to be used on whitelisted elements.
This can allow HTML and JavaScript injection, which could result in XSS if Sanitize's output is served to browsers.
|
{'CVE-2018-3740'}
|
2021-01-08T19:16:14Z
|
2018-03-21T11:56:32Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e', 'https://www.debian.org/security/2018/dsa-4358', 'https://github.com/rgrove/sanitize/issues/176', 'https://github.com/advisories/GHSA-7f42-p84j-f58p', 'https://about.gitlab.com/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3740'}
| null |
GHSA
|
GHSA-73v8-v6g4-vrpm
|
Arbitrary File Overwrite in decompress-zip
|
Vulnerable versions of `decompress-zip` are affected by the Zip-Slip vulnerability, an arbitrary file write vulnerability. The vulnerability occurs because `decompress-zip` does not verify that extracted files do not resolve to targets outside of the extraction root directory.
## Recommendation
For `decompress-zip` 0.2.x upgrade to 0.2.2 or later.
For `decompress-zip` 0.3.x upgrade to 0.3.2 or later.
| null |
2021-09-27T16:09:04Z
|
2020-09-02T15:58:13Z
|
HIGH
| 0
| null |
{'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/488.json', 'https://www.npmjs.com/advisories/777', 'https://github.com/advisories/GHSA-73v8-v6g4-vrpm'}
| null |
GHSA
|
GHSA-8pp6-8x4q-c5mx
|
Server side request forgery in C1 CMS
|
C1 CMS is an open-source, .NET based Content Management System (CMS). Versions prior to 6.12 allow an authenticated user to exploit Server Side Request Forgery (SSRF) by causing the server to make arbitrary GET requests to other servers in the local network or on localhost. The attacker may also truncate arbitrary files to zero size (effectively delete them) leading to denial of service (DoS) or altering application logic. The authenticated user may unknowingly perform the actions by visiting a specially crafted site. Patched in C1 CMS v6.12, no known workarounds exist.
|
{'CVE-2022-24789'}
|
2022-04-08T22:44:20Z
|
2022-03-30T00:00:31Z
|
HIGH
| 7.6
|
{'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24789', 'https://github.com/advisories/GHSA-8pp6-8x4q-c5mx', 'https://github.com/Orckestra/C1-CMS-Foundation/releases/tag/v6.12', 'https://github.com/Orckestra/C1-CMS-Foundation/security/advisories/GHSA-j9c2-gr6m-pp45'}
| null |
GHSA
|
GHSA-q9h2-4xhf-23xx
|
Data races in im
|
An issue was discovered in the im crate through 2020-11-09 for Rust. Because TreeFocus does not have bounds on its Send trait or Sync trait, a data race can occur.
|
{'CVE-2020-36204'}
|
2021-08-25T20:51:36Z
|
2021-08-25T20:51:36Z
|
MODERATE
| 4.7
|
{'CWE-662'}
|
{'https://github.com/bodil/im-rs/issues/157', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36204', 'https://github.com/advisories/GHSA-q9h2-4xhf-23xx', 'https://rustsec.org/advisories/RUSTSEC-2020-0096.html'}
| null |
GHSA
|
GHSA-v8j6-6c2r-r27c
|
Expression Language Injection in Apache Struts
|
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
|
{'CVE-2021-31805'}
|
2022-04-22T20:30:36Z
|
2022-04-13T00:00:30Z
|
CRITICAL
| 9.8
|
{'CWE-917'}
|
{'http://www.openwall.com/lists/oss-security/2022/04/12/6', 'https://cwiki.apache.org/confluence/display/WW/S2-062', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31805', 'https://security.netapp.com/advisory/ntap-20220420-0001/', 'https://github.com/advisories/GHSA-v8j6-6c2r-r27c'}
| null |
GHSA
|
GHSA-23x4-m842-fmwf
|
Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI-Generator online generator
|
### Impact
On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory.
This vulnerability is local privilege escalation because the contents of the outputFolder can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled.
openapi-generator-online creates insecure temporary folders with `File.createTempFile` during the code generation process. The insecure temporary folders store the auto-generated files which can be read and appended to by any users on the system.
### Vulnerable Code
https://github.com/OpenAPITools/openapi-generator/blob/c6530519975341d7784a252132b2f0854f488901/modules/openapi-generator-online/src/main/java/org/openapitools/codegen/online/service/Generator.java#L184-L187
This vulnerability exists due to a race condition between the deletion of the randomly generated temporary file and the creation of the temporary directory.
```java
File outputFolder = File.createTempFile("codegen-", "-tmp"); // Attacker knows the full path of the file that will be generated
// delete the file that was created
outputFolder.delete(); // Attacker sees file is deleted and begins a race to create their own directory before the code generator
// and make a directory of the same name
// SECURITY VULNERABILITY: Race Condition! - Attacker beats the code generator and now owns this directory
outputFolder.mkdir();
```
### Patches
The issue has been patched by changing the underlying logic to use `Files.createTempFile` and has been released in the v5.1.0 stable version.
This vulnerability has the same root cause as CVE-2021-21363 from the `swagger-api/swagger-codegen` project as this project and that one both share the same original source tree.
See: https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/)
* Email us at [security@openapitools.org](mailto:security@openapitools.org)
|
{'CVE-2021-21428'}
|
2022-04-19T19:02:52Z
|
2021-05-11T00:04:40Z
|
HIGH
| 9.3
|
{'CWE-379', 'CWE-378', 'CWE-377', 'CWE-269'}
|
{'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-23x4-m842-fmwf', 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21428', 'https://github.com/OpenAPITools/openapi-generator/pull/8788', 'https://github.com/advisories/GHSA-23x4-m842-fmwf', 'https://github.com/OpenAPITools/openapi-generator/blob/c6530519975341d7784a252132b2f0854f488901/modules/openapi-generator-online/src/main/java/org/openapitools/codegen/online/service/Generator.java#L184-L187'}
| null |
GHSA
|
GHSA-79jw-6wg7-r9g4
|
Use of Potentially Dangerous Function in mixme
|
### Impact
In Node.js mixme v0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
### Patches
The problem is corrected starting with version 0.5.1.
### References
Issue: https://github.com/adaltas/node-mixme/issues/1
Commit: https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028
|
{'CVE-2021-29491'}
|
2022-04-19T19:02:57Z
|
2021-05-06T15:45:39Z
|
HIGH
| 7.1
|
{'CWE-913'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29491', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4', 'https://github.com/advisories/GHSA-79jw-6wg7-r9g4', 'https://security.netapp.com/advisory/ntap-20210622-0002/'}
| null |
GHSA
|
GHSA-r773-pmw3-f4mr
|
Open Redirect in koa-remove-trailing-slashes
|
The package koa-remove-trailing-slashes before 2.0.2 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::removeTrailingSlashes(), as the web server uses relative URLs instead of absolute URLs.
|
{'CVE-2021-23384'}
|
2022-02-10T23:47:27Z
|
2022-02-10T23:47:27Z
|
MODERATE
| 5.4
|
{'CWE-601'}
|
{'https://snyk.io/vuln/SNYK-JS-KOAREMOVETRAILINGSLASHES-1085708', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23384', 'https://github.com/advisories/GHSA-r773-pmw3-f4mr', 'https://github.com/vgno/koa-remove-trailing-slashes/blame/6a01ba8fd019bd3ece44879c553037ad96ba7d47/index.js%23L31'}
| null |
GHSA
|
GHSA-fm7r-2pr7-rw2p
|
Malicious Package in yeoman-genrator
|
Version 3.1.1 of `yeoman-genrator` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:57:06Z
|
2020-09-02T21:45:02Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/912', 'https://github.com/advisories/GHSA-fm7r-2pr7-rw2p'}
| null |
GHSA
|
GHSA-vvw4-rfwf-p6hx
|
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
|
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
|
{'CVE-2020-17527'}
|
2022-04-22T17:22:37Z
|
2022-02-09T22:58:06Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/ra35c8d617b17d59f400112cebadec43ad379f98198b4a9726190d7ee@%3Cissues.guacamole.apache.org%3E', 'https://lists.apache.org/thread.html/rd5babd13d7a350b369b2f647b4dd32ce678af42f9aba5389df1ae6ca@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-vvw4-rfwf-p6hx', 'https://lists.apache.org/thread.html/r8a227ac6a755a6406c1cc47dd48800e973d4cf13fe7fe68ac59c679c@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rabbe6b3ae6a9795641d7a05c00d2378d5bbbe4240b7e20f09b092cce@%3Cissues.guacamole.apache.org%3E', 'https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r9fd47f1b03e9b41d16a5cf72659b533887267d3398d963c2fff3abfa@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r26a2a66339087fc37db3caf201e446d3e83b5cce314371e235ff1784@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r2d6e05c5ff96f8068a59dfdb3800e9ee8d4e36ce1971783c6e5f9b20@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rbba08c4dcef3603e36276d49adda8eedbe458c5104314b4038f697e1@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4835', 'https://security.netapp.com/advisory/ntap-20201210-0003/', 'http://www.openwall.com/lists/oss-security/2020/12/03/3', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00022.html', 'https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17527', 'https://security.gentoo.org/glsa/202012-23', 'https://lists.apache.org/thread.html/raa0e9ad388c1e6fd1e301b5e080f9439f64cb4178119a86a4801cc53@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r5a285242737ddef4d338236328aaaf3237183e1465a5efafd16b99ed@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-p6h4-93qp-jhcm
|
Command injection in Parse Server through prototype pollution
|
### Impact
This is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability has been confirmed on Linux (Ubuntu) and Windows.
### Patches
Upgrade to Parse Server >=4.10.7. If you are using a prerelease version of Parse Server 5.0 (alpha, beta) we will publish a timely fix for these. However, as a general reminder we do not consider prerelease versions to be suitable for production deployment.
Note that as part of the fix a new security feature scans for sensitive keywords in request data to prevent JavaScript prototype pollution. If such a keyword is found, the request is rejected with HTTP response code `400` and Parse Error `105` (`INVALID_KEY_NAME`). By default these keywords are: `{_bsontype: "Code"}`, `constructor`, `__proto__`. If you are using any of these keywords in your request data, you can override the default keywords by setting the new Parse Server option `requestKeywordDenylist` to `[]` and specify your own keywords as needed.
### Workarounds
Although the fix is more broad and includes several aspects of the vulnerability, a quick and targeted fix can be achieved by patching the MongoDB Node.js driver and disable BSON code execution. To apply the patch, add the following code to be executed before starting Parse Server, for example in `index.js`.
```
const BSON = require('bson');
const internalDeserialize = BSON.prototype.deserialize;
BSON.prototype.deserialize = (buffer, options = Object.create(null), ...others) => {
if (options.constructor) {
options = Object.assign(Object.create(null), options);
}
return internalDeserialize(buffer, options, ...others);
};
const internalDeserializeStream = BSON.prototype.deserializeStream;
BSON.prototype.deserializeStream = (
data,
startIndex,
numberOfDocuments,
documents,
docStartIndex,
options = Object.create(null),
...others
) => {
if (options.constructor) {
options = Object.assign(Object.create(null), options);
}
return internalDeserializeStream(
data,
startIndex,
numberOfDocuments,
documents,
docStartIndex,
options,
...others
);
};
```
### References
- Original report on [huntr.dev](https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/)
|
{'CVE-2022-24760'}
|
2022-04-19T18:24:25Z
|
2022-03-11T23:53:23Z
|
CRITICAL
| 10
|
{'CWE-74', 'CWE-1321'}
|
{'https://github.com/advisories/GHSA-p6h4-93qp-jhcm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24760', 'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d', 'https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-p6h4-93qp-jhcm'}
| null |
GHSA
|
GHSA-hpfq-8wx8-cgqw
|
Cross-Site Scripting in ids-enterprise
|
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `modal` component fails to sanitize input to the `title` attribute, which may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 4.18.2 or later
| null |
2021-08-04T21:16:12Z
|
2019-06-13T18:59:18Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/infor-design/enterprise-ng/issues/511', 'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4', 'https://github.com/advisories/GHSA-hpfq-8wx8-cgqw', 'https://www.npmjs.com/advisories/957'}
| null |
GHSA
|
GHSA-9pm8-xcj6-2m33
|
Missing Authorization in TYPO3 extension
|
The direct_mail extension through 5.2.3 for TYPO3 has Broken Access Control for newsletter subscriber tables.
|
{'CVE-2020-12698'}
|
2021-07-28T19:18:33Z
|
2021-07-26T21:34:52Z
|
MODERATE
| 4.3
|
{'CWE-862'}
|
{'https://github.com/advisories/GHSA-9pm8-xcj6-2m33', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005', 'https://typo3.org/help/security-advisories', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12698'}
| null |
GHSA
|
GHSA-fx8w-mjvm-hvpc
|
Path Traversal in Buildah
|
A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.
|
{'CVE-2020-10696'}
|
2021-05-18T18:32:41Z
|
2021-05-18T18:32:41Z
|
HIGH
| 8.8
|
{'CWE-22'}
|
{'https://access.redhat.com/security/cve/cve-2020-10696', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10696', 'https://bugzilla.redhat.com/show_bug.cgi?id=1817651', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10696', 'https://github.com/advisories/GHSA-fx8w-mjvm-hvpc', 'https://github.com/containers/buildah/pull/2245'}
| null |
GHSA
|
GHSA-rmrm-75hp-phr2
|
Improper Input Validation in Hibernate Validator
|
A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping) controls that developers may have put in place when handling user-controlled data in error messages.
|
{'CVE-2020-10693'}
|
2022-04-22T18:20:33Z
|
2021-06-04T21:36:34Z
|
MODERATE
| 5.3
|
{'CWE-20'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10693', 'https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E', 'https://www.ibm.com/support/pages/node/6348216', 'https://lists.apache.org/thread.html/rf9c17c3efc4a376a96e9e2777eee6acf0bec28e2200e4b35da62de4a@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rd418deda6f0ebe658c2015f43a14d03acb8b8c2c093c5bf6b880cd7c@%3Cpluto-dev.portals.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10693', 'https://github.com/advisories/GHSA-rmrm-75hp-phr2'}
| null |
GHSA
|
GHSA-375m-5fvv-xq23
|
VVE-2021-0002: Incorrect `returndatasize` when using simple forwarder proxies deployed prior to EIP-1167 adoption
|
## Background
@tjayrush reported a data handling issue with certain Web3 libraries using Vyper-deploy forwarder proxy contracts using our Vyper's built-in `create_forwarder_to` function prior to our change to support EIP-1167 style forwarder proxies.
### Impact
If you are an end user of a forwarder-style proxy deployed using Vyper's built-in `create_forwarder_to` function AND you have a function that returns >4096 bytes AND you do no return data sanitation on the value returned, you could potentially see a data corruption issue.
Otherwise, if you are handling the result of a return call AND you expect a specific `RETURNDATASIZE` that is less than 4096 (such as `SafeERC20.safeTransfer`) then the call will fail that check.
### Patches
The issue was patched when we upgraded to EIP-1167 style forwarder proxies in #2281.
### Workarounds
If you are making a call to a contract method that is expected to return <= 4096 bytes, there is no issue as the ABI decoders in both Solidity and Vyper will truncate the data properly. Web3 libraries will also do this, unless you are doing `eth_call` or `eth_sendTransaction` directly.
If you are using a Solidity library that checks `RETURNDATASIZE` of an external call to a forwarder proxy deployed prior to this patch, it will fail on that assertion (such as `SafeERC20.safeTransfer`). The workaround is to always do a greater than or equal to check, rather than a strict equals to check.
| null |
2021-04-19T15:11:54Z
|
2021-04-19T15:11:54Z
|
LOW
| 0
|
{'CWE-20'}
|
{'https://github.com/vyperlang/vyper/pull/2281', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-375m-5fvv-xq23', 'https://pypi.org/project/vyper/', 'https://github.com/advisories/GHSA-375m-5fvv-xq23'}
| null |
GHSA
|
GHSA-fw2f-7f87-5r6c
|
Improper Input Validation in access-policy
|
access-policy through 3.1.0 is vulnerable to Arbitrary Code Execution. User input provided to the `template` function is executed by the `eval` function resulting in code execution.
|
{'CVE-2020-7674'}
|
2021-07-29T18:14:19Z
|
2021-05-17T21:00:29Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-fw2f-7f87-5r6c', 'https://snyk.io/vuln/SNYK-JS-ACCESSPOLICY-571490', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7674'}
| null |
GHSA
|
GHSA-vfrc-7r7c-w9mx
|
Prototype Pollution in highlight.js
|
### Impact
Affected versions of this package are vulnerable to Prototype Pollution. A malicious HTML code block can be crafted that will result in prototype pollution of the base object's prototype during highlighting. If you allow users to insert custom HTML code blocks into your page/app via parsing Markdown code blocks (or similar) and do not filter the language names the user can provide you may be vulnerable.
The pollution should just be harmless data but this can cause problems for applications not expecting these properties to exist and can result in strange behavior or application crashes, i.e. a potential DOS vector.
_If your website or application does not render user provided data it should be unaffected._
### Patches
Versions 9.18.2 and 10.1.2 and newer include fixes for this vulnerability. If you are using version 7 or 8 you are encouraged to upgrade to a newer release.
### Workarounds
#### Patch your library
Manually patch your library to create null objects for both `languages` and `aliases`:
```js
const HLJS = function(hljs) {
// ...
var languages = Object.create(null);
var aliases = Object.create(null);
```
#### Filter out bad data from end users
Filter the language names that users are allowed to inject into your HTML to guarantee they are valid.
### References
* [What is Prototype Pollution?](https://codeburst.io/what-is-prototype-pollution-49482fc4b638)
* https://github.com/highlightjs/highlight.js/pull/2636
### For more information
If you have any questions or comments about this advisory:
* Please file an issue against [highlight.js](https://github.com/highlightjs/highlight.js/issues/)
|
{'CVE-2020-26237'}
|
2022-04-19T19:02:31Z
|
2020-11-24T22:58:41Z
|
LOW
| 5.8
|
{'CWE-471'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26237', 'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0', 'https://www.npmjs.com/package/highlight.js', 'https://github.com/highlightjs/highlight.js/pull/2636', 'https://github.com/advisories/GHSA-vfrc-7r7c-w9mx', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html', 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx'}
| null |
GHSA
|
GHSA-xrr6-3pc4-m447
|
Moderate severity vulnerability that affects activerecord
|
activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
|
{'CVE-2015-7577'}
|
2021-09-22T16:33:26Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 5.3
|
{'CWE-284'}
|
{'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/10', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.securitytracker.com/id/1034816', 'http://www.securityfocus.com/bid/81806', 'http://www.debian.org/security/2016/dsa-3464', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/cawsWcQ6c8g/LATIsglZEgAJ', 'https://github.com/advisories/GHSA-xrr6-3pc4-m447', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7577', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}
| null |
GHSA
|
GHSA-p479-rwhp-rwjx
|
Cross-site scripting in Jenkins Scriptler Plugin
|
Jenkins Scriptler Plugin 3.2 and earlier does not escape parameter names shown in job configuration forms, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission.
|
{'CVE-2021-21667'}
|
2022-01-06T18:45:29Z
|
2022-01-06T18:45:29Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-p479-rwhp-rwjx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21667', 'https://www.jenkins.io/security/advisory/2021-06-16/#SECURITY-2224', 'http://www.openwall.com/lists/oss-security/2021/06/16/3'}
| null |
GHSA
|
GHSA-cf8j-64h9-6q58
|
CSRF in Play Framework
|
In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can't be parsed.
|
{'CVE-2020-12480'}
|
2021-09-23T18:57:06Z
|
2020-08-18T17:30:25Z
|
MODERATE
| 6.5
|
{'CWE-352'}
|
{'https://www.playframework.com/security/vulnerability', 'https://www.playframework.com/security/vulnerability/CVE-2020-12480-CsrfBlacklistBypass', 'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154', 'https://github.com/advisories/GHSA-cf8j-64h9-6q58', 'https://github.com/playframework/playframework/pull/10285', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12480'}
| null |
GHSA
|
GHSA-rh46-3fgc-mvrf
|
Validation bypass is possible in Json Pattern Validator
|
In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
|
{'CVE-2019-19507'}
|
2021-08-19T16:05:30Z
|
2019-12-04T21:25:28Z
|
MODERATE
| 5.3
|
{'CWE-287'}
|
{'https://github.com/advisories/GHSA-rh46-3fgc-mvrf', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19507', 'https://www.npmjs.com/package/jpv', 'https://github.com/manvel-khnkoyan/jpv/issues/6'}
| null |
GHSA
|
GHSA-hfwx-c7q6-g54c
|
Vulnerability allowing for reading internal HTTP resources
|
### Impact
The vulnerability allows for reading and outputting files served by other services on the internal network in which the export server is hosted. If the export server is exposed to the internet, this potentially allows a malicious user to gain read access to internal web-resources.
The impact is limited to internal services that serve content via. HTTP(S), and requires the attacker to know internal hostnames/IP addresses.
The previous versions have been marked as deprecated on NPM.
### Patches
Version 2.1.0 released alongside this security advisory addresses the issue. **Please note that this release is not backwards compatible out of the box. See the [changelog](https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md) for details.**
Additionally, it's also recommended to upgrade to the latest version of Highcharts to get the added input sanitation implemented in version 9.0 and later.
### Workarounds
There are no known workarounds to the issue - an upgrade to version 2.1.0 is required.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the export server issue tracker](https://github.com/highcharts/node-export-server/issues)
* Email us at [security@highsoft.com](mailto:security@highsoft.com)
| null |
2021-03-12T23:04:46Z
|
2021-03-12T23:04:46Z
|
HIGH
| 0
|
{'CWE-552'}
|
{'https://github.com/advisories/GHSA-hfwx-c7q6-g54c', 'https://github.com/highcharts/node-export-server/security/advisories/GHSA-hfwx-c7q6-g54c', 'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6', 'https://www.npmjs.com/package/highcharts-export-server', 'https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md#210'}
| null |
GHSA
|
GHSA-w992-2gmj-9xxj
|
Cross-Site Scripting in swagger-ui
|
Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package allows HTML code in the `swagger.apiInfo.description` value without proper sanitization, which may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 2.2.1 or later.
| null |
2021-09-28T17:02:52Z
|
2020-09-11T21:23:29Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/988', 'https://github.com/swagger-api/swagger-ui/issues/830', 'https://github.com/advisories/GHSA-w992-2gmj-9xxj'}
| null |
GHSA
|
GHSA-mg2g-8pwj-r2j2
|
Authentication bypass in SilverStripe GraphQL
|
The GraphQL module accepts basic-auth as an authentication method by default. This can be used to bypass MFA authentication if the silverstripe/mfa module is installed, which is now a commonly installed module. A users password is still required though.
Basic-auth has been removed as a default authentication method. If desired, it can be re-enabled by adding it to the authenticators key of a schema, or on SilverStripe\Graphql\Auth\Handler
|
{'CVE-2020-26136'}
|
2022-04-19T19:03:26Z
|
2021-06-10T17:21:33Z
|
MODERATE
| 6.5
|
{'CWE-287', 'CWE-288'}
|
{'https://www.silverstripe.org/blog/tag/release', 'https://forum.silverstripe.org/c/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26136', 'https://www.silverstripe.org/download/security-releases/', 'https://github.com/advisories/GHSA-mg2g-8pwj-r2j2', 'https://www.silverstripe.org/download/security-releases/cve-2020-26136'}
| null |
GHSA
|
GHSA-44gv-fgcj-w546
|
Missing Authorization in DayByDay CRM
|
In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the appointments of all users in the system including administrators. However, this type of user is not authorized to view the calendar at all.
|
{'CVE-2022-22107'}
|
2022-01-08T00:31:55Z
|
2022-01-08T00:31:55Z
|
MODERATE
| 4.3
|
{'CWE-862'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22107', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22107', 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b', 'https://github.com/advisories/GHSA-44gv-fgcj-w546'}
| null |
GHSA
|
GHSA-c5c9-8c6m-727v
|
Cross-Site Scripting via Rich-Text Content
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC` (5.7)
### Problem
Failing to properly parse, sanitize and encode malicious rich-text content, the content rendering process in the website frontend is vulnerable to cross-site scripting. Corresponding rendering instructions via TypoScript functionality _[HTMLparser](https://docs.typo3.org/m/typo3/reference-typoscript/10.4/en-us/Functions/Htmlparser.html)_ do not consider all potentially malicious HTML tag & attribute combinations per default.
In addition, the lack of comprehensive default node configuration for rich-text fields in the backend user interface fosters this malfunction.
In default scenarios, a valid backend user account is needed to exploit this vulnerability. In case custom plugins used in the website frontend accept and reflect rich-text content submitted by users, no authentication is required.
### Solution
Update to TYPO3 versions 7.6.53 ELTS, 8.7.42 ELTS, 9.5.29, 10.4.19, 11.3.2 that fix the problem described above.
Custom package _[typo3/html-sanitizer](https://github.com/TYPO3/html-sanitizer)_ - based on allow-lists only - takes care of sanitizing potentially malicious markup. The default behavior is based on safe and commonly used markup - however, this can be extended or restricted further in case it is necessary for individual scenarios.
During the frontend rendering process, sanitization is applied to the default TypoScript path `lib.parseFunc`, which is implicitly used by the Fluid view-helper instruction `f:format.html`. Rich-text data persisted using the backend user interface is sanitized as well. Implementation details are explained in corresponding [ChangeLog documentation](https://docs.typo3.org/c/typo3/cms-core/master/en-us/Changelog/9.5.x/Important-94484-IntroduceHTMLSanitizer.html).
### Credits
Thanks to Benjamin Stiber, Gert-Jan Jansma, Gábor Ács-Kurucz, Alexander Kellner, Richie Lee, Nina Rösch who reported this issue, and to TYPO3 security team member Oliver Hader, as well as TYPO3 contributor Susanne Moog who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-013](https://typo3.org/security/advisory/typo3-core-sa-2021-013)
|
{'CVE-2021-32768'}
|
2022-04-19T19:03:05Z
|
2021-08-19T15:53:12Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://typo3.org/security/advisory/typo3-core-sa-2021-013', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-c5c9-8c6m-727v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32768', 'https://github.com/advisories/GHSA-c5c9-8c6m-727v', 'https://github.com/TYPO3/typo3/security/advisories/GHSA-c5c9-8c6m-727v'}
| null |
GHSA
|
GHSA-rfh8-25h9-mhgf
|
Cross-site Scripting in YII2-CMS
|
YII2-CMS v1.0 has XSS in protected\core\modules\home\models\Contact.php via a name field to /contact.html.
|
{'CVE-2019-16130'}
|
2021-08-17T22:40:47Z
|
2019-10-14T21:12:08Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/weison-tech/yii2-cms/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16130', 'https://github.com/advisories/GHSA-rfh8-25h9-mhgf', 'http://www.iwantacve.cn/index.php/archives/277/'}
| null |
GHSA
|
GHSA-c82c-8pjw-6829
|
Malicious Package in @impala/bmap
|
Version 1.0.3 of `@impala/bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.3 of this module is found installed you will want to replace it with a version before or after 1.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T14:41:30Z
|
2020-09-01T19:41:45Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://snyk.io/vuln/SNYK-JS-IMPALABMAP-451019', 'https://github.com/advisories/GHSA-c82c-8pjw-6829', 'https://www.npmjs.com/advisories/613'}
| null |
GHSA
|
GHSA-6jvm-3j5h-79f6
|
Moderate severity vulnerability that affects paperclip
|
The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg.
|
{'CVE-2015-2963'}
|
2021-09-02T16:53:00Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2015-2963', 'http://www.securityfocus.com/bid/75304', 'http://openwall.com/lists/oss-security/2015/06/19/3', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000088', 'https://robots.thoughtbot.com/paperclip-security-release', 'http://jvn.jp/en/jp/JVN83881261/index.html', 'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57', 'https://github.com/advisories/GHSA-6jvm-3j5h-79f6'}
| null |
GHSA
|
GHSA-m898-h4pm-pqfr
|
Arbitrary code execution due to an uncontrolled search path for the git binary
|
### Impact
The go language recently addressed a security issue in the way that binaries are found before being executed. Some operating systems like Windows persist to have the current directory being part of the default search path, and having priority over the system-wide path.
This means that it's possible for a malicious user to craft for example a `git.bat` command, commit it and push it in a repository. Later when git-bug search for the git binary, this malicious executable can take priority and be executed.
### Who is impacted
This issue happen on Windows and some other operating systems with a badly configured PATH.
All version prior to 0.7.2 are vulnerable to this issue.
### Patches
Version 0.7.2 fix this issue. Users should update as soon as possible.
### References
More details about this issue can be found [here](https://blog.golang.org/path-security).
|
{'CVE-2021-28955'}
|
2021-05-25T18:44:09Z
|
2021-05-25T18:44:09Z
|
HIGH
| 7.2
|
{'CWE-427'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28955', 'https://vuln.ryotak.me/advisories/18', 'https://github.com/MichaelMure/git-bug/security/advisories/GHSA-m898-h4pm-pqfr', 'https://github.com/advisories/GHSA-m898-h4pm-pqfr', 'https://github.com/MichaelMure/git-bug/pull/604'}
| null |
GHSA
|
GHSA-rr6v-h7m8-wc9f
|
Cross-site Scripting in Froala WYSIWYG Editor
|
Froala WYSIWYG Editor 3.2.6-1 is affected by XSS due to a namespace confusion during parsing.
|
{'CVE-2021-28114'}
|
2021-07-29T15:14:44Z
|
2021-07-19T21:21:33Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://labs.bishopfox.com/advisories', 'https://froala.com/wysiwyg-editor/', 'https://labs.bishopfox.com/advisories/froala-editor-v3.2.6', 'https://github.com/advisories/GHSA-rr6v-h7m8-wc9f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28114'}
| null |
GHSA
|
GHSA-fv7x-4hpc-hf9f
|
Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-spring, org.apache.cxf.fediz:fediz-spring2, and org.apache.cxf.fediz:fediz-spring3
|
Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3 and Spring 4 plugins in versions before 1.4.3 and 1.3.3. The vulnerability can result in a security context that is set up using a malicious client's roles for the given enduser.
|
{'CVE-2017-12631'}
|
2021-06-17T18:59:15Z
|
2018-10-18T16:57:21Z
|
MODERATE
| 0
|
{'CWE-352'}
|
{'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12631', 'http://www.securityfocus.com/bid/102127', 'https://github.com/advisories/GHSA-fv7x-4hpc-hf9f', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'http://www.securitytracker.com/id/1040487', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'http://cxf.547215.n5.nabble.com/Apache-CXF-Fediz-1-4-3-and-1-3-3-released-with-a-new-security-advisory-CVE-2017-12631-td5785868.html'}
| null |
GHSA
|
GHSA-fg42-vwxx-xx5j
|
Data race in tiny_future
|
An issue was discovered in the tiny_future crate before 0.4.0 for Rust. Future<T> does not have bounds on its Send and Sync traits.
|
{'CVE-2020-36438'}
|
2021-08-25T20:58:53Z
|
2021-08-25T20:58:53Z
|
HIGH
| 8.1
|
{'CWE-119', 'CWE-362'}
|
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tiny_future/RUSTSEC-2020-0118.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36438', 'https://rustsec.org/advisories/RUSTSEC-2020-0118.html', 'https://github.com/advisories/GHSA-fg42-vwxx-xx5j'}
| null |
GHSA
|
GHSA-f8cm-364f-q9qh
|
Ensure that doorkeeper_token is valid when authenticating requests in API v2 calls
|
### Impact
The perpetrator who previously obtained an old expired user token could use it to access Storefront API v2 endpoints.
### Patches
Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version.
### Workarounds
In your project directory create a decorator file `app/controllers/spree/api/v2/base_controller_decotatror.rb` with contents:
```ruby
module Spree
module Api
module V2
module BaseControllerDecorator
private
def spree_current_user
return nil unless doorkeeper_token
return @spree_current_user if @spree_current_user
doorkeeper_authorize!
@spree_current_user ||= ::Spree.user_class.find_by(id: doorkeeper_token.resource_owner_id)
end
end
end
end
Spree::Api::V2::BaseController.prepend(Spree::Api::V2::BaseControllerDecorator)
```
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@spreecommerce.org](mailto:security@spreecommerce.org)
|
{'CVE-2020-15269'}
|
2022-04-19T19:02:38Z
|
2020-10-20T20:03:52Z
|
HIGH
| 7.4
|
{'CWE-287', 'CWE-613'}
|
{'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847', 'https://github.com/spree/spree/security/advisories/GHSA-f8cm-364f-q9qh', 'https://github.com/advisories/GHSA-f8cm-364f-q9qh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15269'}
| null |
GHSA
|
GHSA-8m73-w2r2-6xxj
|
Insecure defaults in UmbracoForms
|
This affects all versions of package UmbracoForms. When using the default configuration for upload forms, it is possible to upload arbitrary file types. The package offers a way for users to mitigate the issue. The users of this package can create a custom workflow and frontend validation that blocks certain file types, depending on their security needs and policies.
|
{'CVE-2020-7685'}
|
2021-09-23T17:27:09Z
|
2020-07-29T17:29:51Z
|
HIGH
| 7.5
|
{'CWE-1188'}
|
{'https://snyk.io/vuln/SNYK-DOTNET-UMBRACOFORMS-595765', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7685', 'https://github.com/advisories/GHSA-8m73-w2r2-6xxj'}
| null |
GHSA
|
GHSA-7q5g-gph2-4rc6
|
Upload of file to arbitrary path in Apache Flink
|
Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.
|
{'CVE-2020-17518'}
|
2022-02-09T22:29:52Z
|
2022-02-09T22:29:52Z
|
HIGH
| 7.5
|
{'CWE-23', 'CWE-22'}
|
{'https://lists.apache.org/thread.html/r0b000dc028616d33cb9aa388eb45d516b789cab0024dad94bc06588a@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r8167f30c4c60a11b8d5be3f55537beeda629be61196e693bde403b36@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rcb9e8af775f2a3706b69153aefde78f208871649df057c70ce2e24f9@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r88200d2f0b620c6b4b1585a7171355005c89e678b01d0e71a16c57e7@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r4a87837518804b31eb9db3048347ed2bb7b46fbaad5844f22a9fd4dc@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rb43cd476419a48be89c1339b527a18116f23eec5b6df2b2acbfef261%40%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r5444acac3407ef6397d6aef1b5aec2db53b4b88ef221e63084c1e5f2@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17518', 'https://lists.apache.org/thread.html/rd2467344f88bcaf108b8209ca92da8ec393c68174bfb8c27d1e20faa@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rb43cd476419a48be89c1339b527a18116f23eec5b6df2b2acbfef261@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r710693b0d3b229c81f485804ea1145b4edda79c9e77d66c39a0a2ff1@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rf8812a5703f4a5f1341138baf239258b250875699732cfdf9d55b21d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rb43cd476419a48be89c1339b527a18116f23eec5b6df2b2acbfef261@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r705fb2211b82c9f1f8d2b1d4c823bcbca50402ba09b96608ec657efe@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rec0d650fbd4ea1a5e1224a347d83a63cb44291c334ad58b8809bc23b@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r7b2ee88c66fc1d0823e66475631f5c3e7f0365204ff0cb094d9f2433@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rb43cd476419a48be89c1339b527a18116f23eec5b6df2b2acbfef261@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r229167538863518738e02f4c1c5a8bb34c1d45dadcc97adf6676b0c1@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rd6a1a0e2d73220a65a8f6535bbcd24bb66adb0d046c4a1aa18777cf3@%3Cdev.flink.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/01/05/1', 'https://github.com/advisories/GHSA-7q5g-gph2-4rc6', 'https://lists.apache.org/thread.html/rfe159ccf496d75813f24c6079c5d33872d83f5a2e39cb32c3aef5a73@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/ra8c96bf3ccb4e491f9ce87ba35f134b4449beb2a38d1ce28fd89001f@%3Cdev.flink.apache.org%3E'}
| null |
GHSA
|
GHSA-q9qc-pp5x-mc8c
|
Improper Neutralization of Special Elements Used in a Template Engine in microweber
|
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.
|
{'CVE-2022-0896'}
|
2022-03-14T21:01:06Z
|
2022-03-10T00:00:40Z
|
HIGH
| 8.8
|
{'CWE-94', 'CWE-1336'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0896', 'https://github.com/microweber/microweber/commit/e0224462b3dd6b1f7c6ec1197413afc6019bc3b5', 'https://github.com/advisories/GHSA-q9qc-pp5x-mc8c', 'https://huntr.dev/bounties/113056f1-7a78-4205-9f42-940ad41d8df0'}
| null |
GHSA
|
GHSA-v5r6-6r3c-wqxc
|
Memory exhaustion in asn1_der
|
An issue was discovered in the asn1_der crate before 0.6.2 for Rust. Attackers can trigger memory exhaustion by supplying a large value in a length field.
|
{'CVE-2019-15549'}
|
2021-08-25T20:44:56Z
|
2021-08-25T20:44:56Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15549', 'https://github.com/KizzyCode/asn1_der/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2019-0007.html', 'https://github.com/advisories/GHSA-v5r6-6r3c-wqxc'}
| null |
GHSA
|
GHSA-896r-f27r-55mw
|
json-schema is vulnerable to Prototype Pollution
|
json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
|
{'CVE-2021-3918'}
|
2021-11-19T20:16:17Z
|
2021-11-19T20:16:17Z
|
MODERATE
| 9.8
|
{'CWE-1321', 'CWE-915'}
|
{'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3918', 'https://github.com/advisories/GHSA-896r-f27r-55mw', 'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa'}
| null |
GHSA
|
GHSA-w8f3-pvx4-4c3h
|
Prototype Pollution in arr-flatten-unflatten
|
All versions of package arr-flatten-unflatten up to and including version 1.1.4 are vulnerable to Prototype Pollution via the constructor.
|
{'CVE-2020-7713'}
|
2021-07-29T21:16:54Z
|
2021-05-06T18:11:39Z
|
CRITICAL
| 0
|
{'CWE-1321'}
|
{'https://github.com/Quernest/arr-flatten-unflatten/pull/8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7713', 'https://github.com/advisories/GHSA-w8f3-pvx4-4c3h', 'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372', 'https://snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396'}
| null |
GHSA
|
GHSA-fm68-89m8-4gjj
|
JavaScript injection possible via html comments
|
In Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1, an unauthenticated user can inject arbitrary JavaScript code as a result of the sanitization engine ignoring HTML comments.
|
{'CVE-2019-8233'}
|
2021-08-18T22:15:48Z
|
2019-11-12T22:59:47Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://github.com/advisories/GHSA-fm68-89m8-4gjj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8233'}
| null |
GHSA
|
GHSA-prff-6j8q-vrv7
|
Cross-site Scripting in microweber
|
There is a persistent XSS Vulnerability exsists in the checkout page where we can able to execute any javascription in the last name field
|
{'CVE-2022-0379'}
|
2022-02-03T21:01:48Z
|
2022-01-28T22:15:33Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0379', 'https://huntr.dev/bounties/933f94b8-c5e7-4c3a-92e0-4d1577d5fee6', 'https://github.com/advisories/GHSA-prff-6j8q-vrv7', 'https://github.com/microweber/microweber/commit/f017cbfbd5c4f097d2c78c5e15b6c8a9da479d7b'}
| null |
GHSA
|
GHSA-j383-35pm-c5h4
|
Path Traversal in Grunt
|
Grunt prior to version 1.5.2 is vulnerable to path traversal.
|
{'CVE-2022-0436'}
|
2022-04-26T21:51:43Z
|
2022-04-13T00:00:16Z
|
MODERATE
| 5.5
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0436', 'https://github.com/advisories/GHSA-j383-35pm-c5h4', 'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c', 'https://github.com/gruntjs/grunt/pull/1743', 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665', 'https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b'}
| null |
GHSA
|
GHSA-rhf5-f553-xg82
|
Password exposure in concrete5/core
|
Unauthorized individuals could view password protected files using view_inline in Concrete CMS (previously concrete 5) prior to version 8.5.7. Concrete CMS now checks to see if a file has a password in view_inline and, if it does, the file is not rendered.For version 8.5.6, the following mitigations were put in place a. restricting file types for view_inline to images only b. putting a warning in the file manager to advise users.
|
{'CVE-2021-22951'}
|
2021-11-24T19:01:23Z
|
2021-11-23T18:18:16Z
|
MODERATE
| 0
|
{'CWE-200', 'CWE-639'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22951', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes', 'https://hackerone.com/reports/1102014', 'https://github.com/advisories/GHSA-rhf5-f553-xg82'}
| null |
GHSA
|
GHSA-6vc5-v7hw-h5h2
|
Cross-site Scripting in RosarioSIS
|
RosarioSIS through 6.8-beta allows modules/Custom/NotifyParents.php XSS because of the href attributes for AddStudents.php and User.php.
|
{'CVE-2020-15721'}
|
2022-02-10T22:26:10Z
|
2022-02-10T22:26:10Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-6vc5-v7hw-h5h2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15721', 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md', 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/291', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/c4a694860b50c4aa5c67d6568f7d0613fef1a30d'}
| null |
GHSA
|
GHSA-5ff8-jcf9-fw62
|
Cross-Site Scripting in markdown-it-katex
|
All versions of `markdown-it-katex` are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape error messages, which may allow attackers to execute arbitrary JavaScript in a victim's browser by triggering an error.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2022-03-24T22:20:47Z
|
2020-09-04T17:55:35Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/waylonflinn/markdown-it-katex/issues/26', 'https://www.npmjs.com/advisories/1466', 'https://github.com/advisories/GHSA-5ff8-jcf9-fw62'}
| null |
GHSA
|
GHSA-gjc9-932x-c59p
|
Malicious Package in leaflet-gpx
|
Version 1.0.1 of `leaflet-gpx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-03T00:34:33Z
|
2020-09-03T00:34:33Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/937', 'https://github.com/advisories/GHSA-gjc9-932x-c59p'}
| null |
GHSA
|
GHSA-ggmr-44cv-24pm
|
Code injection via unsafe YAML loading
|
### Impact
Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files.
An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally.
### Patches
The issue is fixed in version 2.3.24 and above by #964.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [awslabs/sockeye](https://github.com/awslabs/sockeye)
* Email us at [sockeye-dev](mailto:sockeye-dev@amazon.com)
### Attribution
This vulnerability was reported by Masatoshi Yoshizawa of yamory Security Team.
|
{'CVE-2021-43811'}
|
2021-12-10T18:30:32Z
|
2021-12-09T18:35:22Z
|
MODERATE
| 7.8
|
{'CWE-94'}
|
{'https://github.com/awslabs/sockeye/security/advisories/GHSA-ggmr-44cv-24pm', 'https://github.com/awslabs/sockeye/releases/tag/2.3.24', 'https://github.com/awslabs/sockeye/pull/964', 'https://github.com/advisories/GHSA-ggmr-44cv-24pm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43811'}
| null |
GHSA
|
GHSA-35rg-466w-77h3
|
Cross-site scripting in Products.CMFCore, Products.PluggableAuthService, Plone
|
Zope Products.CMFCore before 2.5.1 and Products.PluggableAuthService before 2.6.2, as used in Plone through 5.2.4 and other products, allow Reflected XSS.
|
{'CVE-2021-33507'}
|
2021-06-18T18:44:50Z
|
2021-06-18T18:44:50Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://plone.org/security/hotfix/20210518/reflected-xss-in-various-spots', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33507', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://github.com/advisories/GHSA-35rg-466w-77h3'}
| null |
GHSA
|
GHSA-743r-5g92-5vgf
|
Improper certificate management in AWS IoT Device SDK v2
|
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS.
|
{'CVE-2021-40829'}
|
2021-12-03T15:21:00Z
|
2021-11-24T21:11:16Z
|
MODERATE
| 6.3
|
{'CWE-295'}
|
{'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/advisories/GHSA-743r-5g92-5vgf', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40829', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/awslabs/aws-c-io/'}
| null |
GHSA
|
GHSA-qpfq-ph7r-qv6f
|
XStream is vulnerable to an Arbitrary Code Execution attack
|
### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21347](https://x-stream.github.io/CVE-2021-21347.html).
### Credits
The vulnerability was discovered and reported by threedr3am.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-21347'}
|
2022-04-19T19:02:48Z
|
2021-03-22T23:29:00Z
|
MODERATE
| 6.1
|
{'CWE-434', 'CWE-502'}
|
{'https://github.com/advisories/GHSA-qpfq-ph7r-qv6f', 'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21347', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://x-stream.github.io/CVE-2021-21347.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-rf4j-j272-fj86
|
Django allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive
|
django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.
|
{'CVE-2018-6188'}
|
2022-04-26T18:35:37Z
|
2018-10-03T21:13:54Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-6188', 'https://www.djangoproject.com/weblog/2018/feb/01/security-releases/', 'https://github.com/advisories/GHSA-rf4j-j272-fj86', 'http://www.securitytracker.com/id/1040422', 'https://usn.ubuntu.com/3559-1/'}
| null |
GHSA
|
GHSA-cmh5-qc8w-xvcq
|
Cross-Site Scripting in i18next
|
Affected versions of `i18next` may fail to sanitize user input when certain configuration options are used. When using the `.init` method, passing interpolation options without passing an `escapeValue` will default to `undefined` rather than the assumed `true`.
## Proof of Concept
```
var init = i18n.init({
interpolation: {
prefix: "__",
suffix: "__",
escapeValue: true
}
}, function(){
var test = i18n.t('__firstName__ __lastName__', {
firstName: 'Bob',
lastName: '["foo","bar"]',
});
console.log(test);
});
```
When `escapeValue` is explicitly passed, the result of `test` is:
```
<script>alert(1)</script> Johnson
```
This is supposed to be the default. However, if `escapeValue` is not included, the result is the unescaped string:
```
<script>alert(1)</script> Johnson
```
## Recommendation
Update to version 3.4.4 or later.
|
{'CVE-2017-16010'}
|
2021-01-08T18:57:46Z
|
2018-07-24T19:58:33Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://nodesecurity.io/advisories/326', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16010', 'https://github.com/advisories/GHSA-cmh5-qc8w-xvcq', 'https://github.com/i18next/i18next/pull/826', 'https://www.npmjs.com/advisories/326'}
| null |
GHSA
|
GHSA-h746-rm5q-8mgq
|
Legacy Node API Allows Impersonation in github.com/spiffe/spire/pkg/server/endpoints/node
|
#### Summary
In SPIRE 0.8.1 through 0.8.4 and before versions 0.9.4, 0.10.2, 0.11.3 and 0.12.1, specially crafted requests to the FetchX509SVID RPC of SPIRE Server’s Legacy Node API can result in the possible issuance of an X.509 certificate with a URI SAN for a SPIFFE ID that the agent is not authorized to distribute. Proper controls are in place to require that the caller presents a valid agent certificate that is already authorized to issue at least one SPIFFE ID, and the requested SPIFFE ID belongs to the same trust domain, prior to being able to trigger this vulnerability. This issue has been fixed in SPIRE versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1.
#### What are the changes introduced by the patched versions?
The changes introduced to address this issue are related to enforcing that the FetchX509SVID RPC of SPIRE Server’s Legacy Node API only issues X.509 certificates with SPIFFE IDs that the agent is authorized to distribute.
The patched version also includes a back-ported change that improves the handling of file descriptors related to workload attestation in SPIRE Agent.
There are no changes in the expected behavior of SPIRE.
#### Should I upgrade SPIRE?
All SPIRE users running affected versions are advised to upgrade to the corresponding patched version.
#### Workarounds
No workarounds have been identified for this vulnerability.
|
{'CVE-2021-27098'}
|
2022-04-19T19:02:49Z
|
2021-05-21T14:31:11Z
|
HIGH
| 8.1
|
{'CWE-284', 'CWE-295'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27098', 'https://github.com/spiffe/spire/security/advisories/GHSA-h746-rm5q-8mgq', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27098', 'https://github.com/advisories/GHSA-h746-rm5q-8mgq', 'https://github.com/spiffe/spire/commit/3c5115b57afc20a0a2c2b1b9dd60dd1fd9082e13'}
| null |
GHSA
|
GHSA-pc58-wgmc-hfjr
|
Prototype Pollution in mout
|
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.
|
{'CVE-2020-7792'}
|
2022-02-09T22:49:20Z
|
2022-02-09T22:49:10Z
|
HIGH
| 7.5
|
{'CWE-1321'}
|
{'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605', 'https://snyk.io/vuln/SNYK-JS-MOUT-1014544', 'https://github.com/advisories/GHSA-pc58-wgmc-hfjr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7792'}
| null |
GHSA
|
GHSA-6528-wvf6-f6qg
|
Pycrypto generates weak key parameters
|
lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.
|
{'CVE-2018-6594'}
|
2022-04-26T18:13:30Z
|
2018-07-12T20:29:26Z
|
HIGH
| 7.5
|
{'CWE-326'}
|
{'https://github.com/TElgamal/attack-on-pycrypto-elgamal', 'https://usn.ubuntu.com/3616-1/', 'https://lists.debian.org/debian-lts-announce/2018/02/msg00018.html', 'https://github.com/advisories/GHSA-6528-wvf6-f6qg', 'https://usn.ubuntu.com/3616-2/', 'https://security.gentoo.org/glsa/202007-62', 'https://github.com/dlitz/pycrypto/issues/253', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6594'}
| null |
GHSA
|
GHSA-gp2f-254m-rh32
|
Unauthorized access to data in @sap-cloud-sdk/core
|
### Impact
This affects applications on SAP Business Technology Platform that use the SAP Cloud SDK and enabled caching of destinations.
In some cases, when user information was missing, destinations were cached without user information, allowing other users to retrieve the same destination with its permissions.
By default, destination caching is disabled. If it is enabled the maximum lifetime is 5 minutes which limits the attack vector.
### Patches
The problem was fixed by #1769 and #1770. The security for caching has been increased. The changes are released in version 1.52.0.
### Workarounds
Disable destination caching (it is disabled by default).
### References
[destination cache API docs](https://sap.github.io/cloud-sdk/api/1.51.0/modules/sap_cloud_sdk_core#destinationCache)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/SAP/cloud-sdk-js
|
{'CVE-2021-41251'}
|
2022-04-19T19:03:13Z
|
2021-11-10T16:51:41Z
|
MODERATE
| 5.9
|
{'CWE-200'}
|
{'https://github.com/SAP/cloud-sdk-js/security/advisories/GHSA-gp2f-254m-rh32', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41251', 'https://github.com/advisories/GHSA-gp2f-254m-rh32', 'https://github.com/SAP/cloud-sdk-js/pull/1769', 'https://github.com/SAP/cloud-sdk-js/pull/1770'}
| null |
GHSA
|
GHSA-pv39-qp28-4mgh
|
Improper Restriction of XML External Entity Reference in soa-model
|
Soa-model is a toolkit and Java API for WSDL, WADL and XML Schema. An XML External Entity (XXE) vulnerability exists in versions of soa-model prior to 1.6.4 in the WSDLParser function. This issue has been fixed in version 1.6.4.
|
{'CVE-2021-43090'}
|
2022-04-12T16:40:10Z
|
2022-03-26T00:00:32Z
|
CRITICAL
| 9.8
|
{'CWE-611'}
|
{'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251', 'https://github.com/membrane/soa-model/releases/tag/v1.6.4', 'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43090', 'https://github.com/membrane/soa-model/issues/281', 'https://github.com/advisories/GHSA-pv39-qp28-4mgh'}
| null |
GHSA
|
GHSA-rqff-837h-mm52
|
Authorization bypass in url-parse
|
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
|
{'CVE-2022-0512'}
|
2022-02-24T14:01:29Z
|
2022-02-15T00:02:46Z
|
MODERATE
| 5.3
|
{'CWE-639'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0512', 'https://github.com/advisories/GHSA-rqff-837h-mm52', 'https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b', 'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'}
| null |
GHSA
|
GHSA-pf38-v6qj-j23h
|
Malfunction of CSRF token validation in Shopware
|
### Impact
The CSRF tokens were not renewed after login and logout.
An attacker could impersonate the victim if the attacker is able to use the same device as the victim used beforehand.
### Patches
We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
|
{'CVE-2022-24879'}
|
2022-04-28T21:01:54Z
|
2022-04-28T21:01:53Z
|
HIGH
| 7.5
|
{'CWE-352'}
|
{'https://github.com/shopware/shopware/security/advisories/GHSA-pf38-v6qj-j23h', 'https://github.com/advisories/GHSA-pf38-v6qj-j23h', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022', 'https://www.shopware.com/en/changelog-sw5/#5-7-9'}
| null |
GHSA
|
GHSA-7mq6-cp5m-f4j5
|
Cross-site Scripting in Anchor CMS
|
Cross Site Scripting (XSS) vulnerability exits in Anchor CMS <=0.12.7 in posts.php. Attackers can use the posts column to upload the title and content containing malicious code to achieve the purpose of obtaining the administrator cookie, thereby achieving other malicious operations.
|
{'CVE-2021-44116'}
|
2022-01-05T14:54:36Z
|
2022-01-05T14:54:36Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-7mq6-cp5m-f4j5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44116', 'https://www.cnblogs.com/unrealnumb/p/15573449.html'}
| null |
GHSA
|
GHSA-fmmc-742q-jg75
|
Polymorphic typing issue
|
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.
|
{'CVE-2019-16943'}
|
2021-07-27T22:13:25Z
|
2019-11-13T00:32:27Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20191017-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16943', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/6788e4c991f75b89d290ad06b463fcd30bcae99fee610345a35b7bc6@%3Cissues.iceberg.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4542', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2478', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://github.com/advisories/GHSA-fmmc-742q-jg75', 'https://lists.apache.org/thread.html/5ec8d8d485c2c8ac55ea425f4cd96596ef37312532712639712ebcdd@%3Ccommits.iceberg.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2020:0164'}
| null |
GHSA
|
GHSA-h6pr-c536-6rjg
|
Prototype Pollution in object-path-set
|
The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908
|
{'CVE-2021-23507'}
|
2022-02-11T16:16:48Z
|
2022-02-05T00:00:31Z
|
HIGH
| 7.5
|
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23507', 'https://github.com/skratchdot/object-path-set/blob/577f5299fed15bb9edd11c940ff3cf0b9f4748d5/index.js%23L8', 'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761', 'https://github.com/advisories/GHSA-h6pr-c536-6rjg'}
| null |
GHSA
|
GHSA-7p6h-3fmw-539q
|
Downloads Resources over HTTP in selenium-chromedriver
|
Affected versions of `selenium-chromedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-chromedriver`.
## Recommendation
No patch is currently available for this vulnerability, and the author has marked the package as deprecated.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo
|
{'CVE-2016-10624'}
|
2021-01-08T21:16:47Z
|
2019-02-18T23:47:27Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/222', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10624', 'https://github.com/advisories/GHSA-7p6h-3fmw-539q', 'https://www.npmjs.com/advisories/222'}
| null |
GHSA
|
GHSA-8q2c-2396-hf7j
|
Malicious Package in appx-compiler
|
All versions of `appx-compiler` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:31:15Z
|
2020-09-03T17:34:55Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-8q2c-2396-hf7j', 'https://www.npmjs.com/advisories/1050'}
| null |
GHSA
|
GHSA-xf96-32q2-9rw2
|
High severity vulnerability that affects rails
|
Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
|
{'CVE-2008-4094'}
|
2021-09-21T22:30:21Z
|
2017-10-24T18:33:38Z
|
HIGH
| 0
|
{'CWE-89'}
|
{'http://rails.lighthouseapp.com/projects/8994/tickets/288', 'http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/', 'http://secunia.com/advisories/31909', 'http://secunia.com/advisories/31875', 'http://www.vupen.com/english/advisories/2008/2562', 'http://www.securitytracker.com/id?1020871', 'http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1', 'http://www.openwall.com/lists/oss-security/2008/09/13/2', 'https://github.com/advisories/GHSA-xf96-32q2-9rw2', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/45109', 'http://secunia.com/advisories/31910', 'http://www.openwall.com/lists/oss-security/2008/09/16/1', 'http://rails.lighthouseapp.com/projects/8994/tickets/964', 'http://gist.github.com/8946', 'https://nvd.nist.gov/vuln/detail/CVE-2008-4094', 'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html', 'http://www.securityfocus.com/bid/31176'}
| null |
GHSA
|
GHSA-x462-89pf-6r5h
|
Crash due to malformed relay protocol message
|
### Impact
1. `syncthing` can be caused to crash and exit if sent a malformed relay
protocol message message with a negative length field.
2. The relay server `strelaysrv` can be caused to crash and exit if sent
a malformed relay protocol message with a negative length field.
At no point is sensitive data exposed or liable to be altered due to this
issue. Sensitive data is never exposed to relay operators. Syncthing itself
would need to be lured to connect to a malicious relay server in order to
exploit the issue.
### Patches
Fixed in version 1.15.0.
### Workarounds
1. No known workaround for `strelaysrv`.
2. `syncthing` can be configured to not use relays, or to only use specific,
trusted relays. If Syncthing is used in a closed environment or with
relaying disabled, i.e., it does not communicate with unknown relays,
Syncthing is not vulnerable.
### For more information
If you have any questions or comments about this advisory, please discuss it [on the forum](https://forum.syncthing.net/).
Thanks to Wojciech Paciorek for discovering and reporting this issue.
|
{'CVE-2021-21404'}
|
2021-05-21T16:23:17Z
|
2021-05-21T16:23:17Z
|
LOW
| 7.5
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-x462-89pf-6r5h', 'https://pkg.go.dev/github.com/syncthing/syncthing', 'https://github.com/syncthing/syncthing/releases/tag/v1.15.0', 'https://github.com/syncthing/syncthing/security/advisories/GHSA-x462-89pf-6r5h', 'https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21404'}
| null |
GHSA
|
GHSA-52q8-877j-gghq
|
remote code execution via cache action in MoinMoin
|
### Impact
The cache action in action/cache.py allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to
the wiki can use this to achieve remote code execution.
### Patches
Users are strongly advised to upgrade to a patched version.
MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.
### Workarounds
It is not advised to work around this, but to upgrade MoinMoin to a patched version.
That said, a work around via disabling the `cache` or the `AttachFile` action might be possible.
Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users.
### Credits
This vulnerability was discovered by Michael Chapman.
### For more information
If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de).
|
{'CVE-2020-25074'}
|
2022-03-22T20:54:56Z
|
2020-11-11T15:54:51Z
|
CRITICAL
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-52q8-877j-gghq', 'https://www.debian.org/security/2020/dsa-4787', 'http://moinmo.in/SecurityFixes', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00020.html', 'https://pypi.org/project/moin/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25074', 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-52q8-877j-gghq', 'https://github.com/moinwiki/moin-1.9/commit/6b96a9060069302996b5af47fd4a388fc80172b7'}
| null |
GHSA
|
GHSA-g4gg-9f62-jfph
|
Moderate severity vulnerability that affects com.orientechnologies:orientdb-studio
|
The Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict use of FRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.
|
{'CVE-2015-2918'}
|
2021-09-10T20:25:44Z
|
2018-10-18T17:41:40Z
|
MODERATE
| 6.1
|
{'CWE-20'}
|
{'https://www.kb.cert.org/vuls/id/845332', 'https://github.com/advisories/GHSA-g4gg-9f62-jfph', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2918'}
| null |
GHSA
|
GHSA-r23f-c2j5-rx2f
|
Local File read vulnerability in OctoberCMS
|
### Impact
An attacker can exploit this vulnerability to read local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466.
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1108" alt="Screen Shot 2020-03-31 at 2 37 53 PM" src="https://user-images.githubusercontent.com/7253840/78072989-44b3ac80-735d-11ea-8676-09c69f0409c4.png">
|
{'CVE-2020-5295'}
|
2022-04-19T19:02:26Z
|
2020-06-03T21:58:16Z
|
MODERATE
| 4.8
|
{'CWE-98'}
|
{'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://github.com/advisories/GHSA-r23f-c2j5-rx2f', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc', 'https://github.com/octobercms/october/security/advisories/GHSA-r23f-c2j5-rx2f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5295'}
| null |
GHSA
|
GHSA-6cw8-7j6c-hccp
|
Moderate severity vulnerability that affects io.vertx:vertx-core
|
In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response.
|
{'CVE-2018-12537'}
|
2021-01-08T21:06:43Z
|
2018-10-19T17:43:36Z
|
MODERATE
| 0
|
{'CWE-93'}
|
{'https://access.redhat.com/errata/RHSA-2018:2371', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536038', 'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72', 'https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2018-021_vertx.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12537', 'https://bugzilla.redhat.com/show_bug.cgi?id=1591072', 'https://github.com/eclipse/vert.x/issues/2470', 'https://github.com/advisories/GHSA-6cw8-7j6c-hccp', 'https://access.redhat.com/errata/RHSA-2018:3768'}
| null |
GHSA
|
GHSA-qh36-44jv-c8xj
|
Potential proxy IP restriction bypass in Kubernetes
|
As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane.
|
{'CVE-2020-8562'}
|
2022-03-30T21:11:44Z
|
2022-02-02T00:01:58Z
|
LOW
| 3.1
|
{'CWE-367'}
|
{'https://github.com/advisories/GHSA-qh36-44jv-c8xj', 'https://github.com/kubernetes/kubernetes/issues/101493', 'https://security.netapp.com/advisory/ntap-20220225-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8562', 'https://groups.google.com/g/kubernetes-security-announce/c/-MFX60_wdOY'}
| null |
GHSA
|
GHSA-c7fw-cr3w-wvfc
|
Data races in arr
|
An issue was discovered in the arr crate through 2020-08-25 for Rust. An attacker can smuggle non-Sync/Send types across a thread boundary to cause a data race.
|
{'CVE-2020-35886'}
|
2021-08-25T20:49:04Z
|
2021-08-25T20:49:04Z
|
MODERATE
| 4.7
|
{'CWE-362'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35886', 'https://github.com/sjep/array/issues/1', 'https://github.com/advisories/GHSA-c7fw-cr3w-wvfc', 'https://rustsec.org/advisories/RUSTSEC-2020-0034.html'}
| null |
GHSA
|
GHSA-f294-27fc-wgj7
|
Malicious Package in buffer-zor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:25:27Z
|
2020-09-03T22:16:31Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-f294-27fc-wgj7', 'https://www.npmjs.com/advisories/1255'}
| null |
GHSA
|
GHSA-cjc7-49v2-jp64
|
Incomplete validation in `SparseAdd`
|
### Impact
Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data:
```python
import tensorflow as tf
a_indices = tf.zeros([10, 97], dtype=tf.int64)
a_values = tf.zeros([10], dtype=tf.int64)
a_shape = tf.zeros([0], dtype=tf.int64)
b_indices = tf.zeros([0, 0], dtype=tf.int64)
b_values = tf.zeros([0], dtype=tf.int64)
b_shape = tf.zeros([0], dtype=tf.int64)
thresh = 0
tf.raw_ops.SparseAdd(a_indices=a_indices,
a_values=a_values,
a_shape=a_shape,
b_indices=b_indices,
b_values=b_values,
b_shape=b_shape,
thresh=thresh)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/sparse_add_op.cc) has a large set of validation for the two sparse tensor inputs (6 tensors in total), but does not validate that the tensors are not empty or that the second dimension of `*_indices` matches the size of corresponding `*_shape`. This allows attackers to send tensor triples that represent invalid sparse tensors to abuse code assumptions that are not protected by validation.
### Patches
We have patched the issue in GitHub commit [6fd02f44810754ae7481838b6a67c5df7f909ca3](https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3) followed by GitHub commit [41727ff06111117bdf86b37db198217fd7a143cc](https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29609'}
|
2021-05-21T17:08:02Z
|
2021-05-21T14:28:29Z
|
MODERATE
| 5.3
|
{'CWE-665', 'CWE-787'}
|
{'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cjc7-49v2-jp64', 'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29609', 'https://github.com/advisories/GHSA-cjc7-49v2-jp64'}
| null |
GHSA
|
GHSA-phrq-v4q2-hmq6
|
Code injection vulnerability in allSelectors()
|
Sabberworm PHP CSS Parser before 8.3.1 calls eval on uncontrolled data, possibly leading to remote code execution if the function allSelectors() or getSelectorsBySpecificity() is called with input from an attacker.
|
{'CVE-2020-13756'}
|
2022-03-26T00:32:36Z
|
2022-03-26T00:15:22Z
|
CRITICAL
| 9.8
|
{'CWE-20'}
|
{'https://github.com/sabberworm/PHP-CSS-Parser/releases/tag/8.3.1', 'https://github.com/sabberworm/PHP-CSS-Parser/commit/2ebf59e8bfbf6cfc1653a5f0ed743b95062c62a4', 'https://packetstormsecurity.com/files/cve/CVE-2020-13756', 'https://github.com/advisories/GHSA-phrq-v4q2-hmq6', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sabberworm/php-css-parser/CVE-2020-13756.yaml', 'http://seclists.org/fulldisclosure/2020/Jun/7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13756', 'http://packetstormsecurity.com/files/157923/Sabberworm-PHP-CSS-Code-Injection.html'}
| null |
GHSA
|
GHSA-8vf3-4w62-m3pq
|
XSS in Keycloak
|
It was found in all keycloak versions before 9.0.0 that links to external applications (Application Links) in the admin console are not validated properly and could allow Stored XSS attacks. An authed malicious user could create URLs to trick users in other realms, and possibly conduct further attacks.
|
{'CVE-2020-1697'}
|
2021-08-23T15:16:25Z
|
2020-04-15T21:09:09Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-8vf3-4w62-m3pq', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1697', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1697'}
| null |
GHSA
|
GHSA-vcph-57hv-89c4
|
Downloads Resources over HTTP in serc.js
|
Affected versions of `serc.js` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `serc.js`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10678'}
|
2021-01-08T01:57:37Z
|
2019-02-18T23:42:11Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/nowk/serc.js/blob/master/scripts/install.js#L5', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10678', 'https://www.npmjs.com/advisories/277', 'https://github.com/advisories/GHSA-vcph-57hv-89c4', 'https://nodesecurity.io/advisories/277'}
| null |
GHSA
|
GHSA-c8wh-6jw4-2h79
|
Potential unauthorized access to stored request & session data when plugin is misconfigured in October CMS Debugbar
|
### Impact
The debugbar contains a perhaps little known feature where it will log all requests (and all information pertaining to each request including session data) whenever it is enabled. This presents a problem if the plugin is ever enabled on a system that is open to untrusted users as the potential exists for them to use this feature to view all requests being made to the application and obtain sensitive information from those requests. There even exists the potential for account takeovers of authenticated users by non-authenticated public users, which would then lead to a number of other potential issues as an attacker could theoretically get full access to the system if the required conditions existed.
### Patches
Issue has been patched in v3.1.0 by locking down access to the debugbar to all users; it now requires an authenticated backend user with a specifically enabled permission before it is even usable, and the feature that allows access to stored request information is restricted behind a different permission that's more restrictive.
### Workarounds
Apply https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18 to your installation manually if unable to upgrade to v3.1.0.
### For more information
If you have any questions or comments about this advisory:
* Email us at [octobercms@luketowers.ca](mailto:octobercms@luketowers.ca) & [hello@octobercms.com](mailto:hello@octobercms.com)
### Acknowledgements
Thanks to [Freddie Poser](https://twitter.com/vogonjeltz101) for reporting the issue to the RainLab team.
|
{'CVE-2020-11094'}
|
2022-04-19T19:02:27Z
|
2020-06-03T23:19:12Z
|
MODERATE
| 6.1
|
{'CWE-532'}
|
{'https://github.com/rainlab/debugbar-plugin/security/advisories/GHSA-c8wh-6jw4-2h79', 'https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18', 'https://github.com/advisories/GHSA-c8wh-6jw4-2h79', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11094'}
| null |
GHSA
|
GHSA-rhwp-9vm9-547q
|
Command Injection in onion-oled-js
|
This affects all versions up to and including version 0.0.2 of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23377'}
|
2021-05-07T16:06:16Z
|
2021-05-07T16:06:16Z
|
CRITICAL
| 9.8
|
{'CWE-77'}
|
{'https://github.com/naddeoa/onion-oled-js/blob/8a523645d2cc29130f98de661b742893773d760d/src/oled-exp.js%23L91', 'https://github.com/advisories/GHSA-rhwp-9vm9-547q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23377', 'https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.