ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-vpq5-4rc8-c222
Denial of Service in canvas
Versions of `canvas` prior to 1.6.10 are vulnerable to Denial of Service. Processing malicious JPEGs or GIFs could crash the node process. ## Recommendation Upgrade to version 1.6.10
null
2020-08-31T18:36:23Z
2019-06-05T14:10:45Z
MODERATE
0
null
{'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957', 'https://www.npmjs.com/advisories/804', 'https://hackerone.com/reports/315037', 'https://github.com/advisories/GHSA-vpq5-4rc8-c222'}
null
GHSA
GHSA-4q97-fh3f-j294
Prototype Pollution in tiny-conf
All versions of package tiny-conf up to and including version 1.1.0 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7724'}
2021-07-29T22:08:56Z
2021-05-10T15:59:24Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05', 'https://snyk.io/vuln/SNYK-JS-TINYCONF-598792', 'https://github.com/advisories/GHSA-4q97-fh3f-j294', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7724'}
null
GHSA
GHSA-6mqr-q86q-6gwr
Authentication Bypass by CSRF Weakness
### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: * Executed whether as: * A before_action callback (the default) * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). * Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. Thanks @waiting-for-dev for reporting and providing a patch 👏 ### Patches Spree 4.3 users should update to spree_auth_devise 4.4.1 Spree 4.2 users should update to spree_auth_devise 4.2.1 ### Workarounds If possible, change your strategy to :exception: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` ### References https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
null
2022-04-19T19:03:15Z
2021-11-18T20:15:09Z
CRITICAL
9.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-6mqr-q86q-6gwr', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-6mqr-q86q-6gwr'}
null
GHSA
GHSA-84qj-9qf2-q92r
Malicious Package in pm-controls
Version 1.1.8 of `pm-controls` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T00:32:30Z
2020-09-03T00:32:30Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/949', 'https://github.com/advisories/GHSA-84qj-9qf2-q92r'}
null
GHSA
GHSA-63xm-rx5p-xvqr
Heap buffer overflow in Tensorflow
### Impact The implementation of `SparseFillEmptyRowsGrad` uses a double indexing pattern: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L263-L269 It is possible for `reverse_index_map(i)` to be an index outside of bounds of `grad_values`, thus resulting in a heap buffer overflow. ### Patches We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15195'}
2021-11-19T15:19:39Z
2020-09-25T18:28:29Z
HIGH
8.5
{'CWE-119', 'CWE-122', 'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15195', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-63xm-rx5p-xvqr', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr'}
null
GHSA
GHSA-vrcc-g6vj-mh5w
Denial of service in go-ethereum
Go-Ethereum v1.10.9 was discovered to contain an issue which allows attackers to cause a denial of service (DoS) via sending an excessive amount of messages to a node. This is caused by missing memory in the component /ethash/algorithm.go.
{'CVE-2021-42219'}
2022-03-30T20:05:14Z
2022-03-18T00:01:13Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-vrcc-g6vj-mh5w', 'https://docs.google.com/document/d/1dYFSpNZPC0OV-n1mMqdc269u9yYU1XQy/edit?usp=sharing&ouid=112110745137218798745&rtpof=true&sd=true', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42219'}
null
GHSA
GHSA-6fvx-r7hx-3vh6
JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java.
JavaMelody before 1.74.0 has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java.
{'CVE-2018-15531'}
2022-04-27T14:25:07Z
2018-10-17T18:28:00Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/javamelody/javamelody/wiki/ReleaseNotes', 'https://jenkins.io/security/advisory/2018-09-25/', 'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353', 'http://www.openwall.com/lists/oss-security/2018/09/25/3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15531', 'https://github.com/advisories/GHSA-6fvx-r7hx-3vh6'}
null
GHSA
GHSA-g785-775g-f2g8
Downloads Resources over HTTP in haxe
Affected versions of `haxe` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe`. ## Recommendation Update to version 5.0.10 or later.
{'CVE-2016-10602'}
2021-09-16T20:44:53Z
2019-02-18T23:50:21Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://github.com/advisories/GHSA-g785-775g-f2g8', 'https://nodesecurity.io/advisories/177', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10602', 'https://www.npmjs.com/advisories/177'}
null
GHSA
GHSA-36mj-6r7r-mqhf
User can obtain JWT token even if account is disabled
Users can authenticate this way even if their user account is disabled. This is a high risk vulnerability when account disabling is used to block users' access to the system. (Someone who never had an account cannot exploit this vulnerability.) The fix ensures tokens are generated only for enabled user accounts, and is distributed via Composer as ezsystems/ezplatform-rest v1.3.8
null
2021-09-29T17:09:23Z
2021-09-29T17:09:23Z
HIGH
0
{'CWE-284'}
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-007-jwt-auth-possible-for-disabled-users.-username-login-handler-can-t-be-disabled', 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-36mj-6r7r-mqhf', 'https://github.com/advisories/GHSA-36mj-6r7r-mqhf'}
null
GHSA
GHSA-hpv4-7p9c-mvfr
Heap buffer overflow in `FractionalAvgPoolGrad`
### Impact The implementation for `tf.raw_ops.FractionalAvgPoolGrad` can be tricked into accessing data outside of bounds of heap allocated buffers: ```python import tensorflow as tf tf.raw_ops.FractionalAvgPoolGrad( orig_input_tensor_shape=[0,1,2,3], out_backprop = np.array([[[[541],[541]],[[541],[541]]]]), row_pooling_sequence=[0, 0, 0, 0, 0], col_pooling_sequence=[-2, 0, 0, 2, 0], overlapping=True) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/fractional_avg_pool_op.cc#L205) does not validate that the input tensor is non-empty. Thus, code constructs an empty `EigenDoubleMatrixMap` and then accesses this buffer with indices that are outside of the empty area. ### Patches We have patched the issue in GitHub commit [0f931751fb20f565c4e94aa6df58d54a003cdb30](https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37651'}
2021-08-25T14:43:21Z
2021-08-25T14:43:21Z
HIGH
7.1
{'CWE-787', 'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37651', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr', 'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30', 'https://github.com/advisories/GHSA-hpv4-7p9c-mvfr'}
null
GHSA
GHSA-vg27-hr3v-3cqv
open redirect in pollbot
(From https://bugzilla.mozilla.org/show_bug.cgi?id=1753838) Summary: There was an open redirection vulnerability in the path of: https://pollbot.services.mozilla.com/ and https://pollbot.stage.mozaws.net/ Description: An attacker can redirect anyone to malicious sites. Steps To Reproduce: Type in this URL: https://pollbot.services.mozilla.com/%0a/evil.com/ It redirects to that website evil.com evil.com was used as an example but this could be any website. Note, the /%0a/ and trailing / are required. Supporting Material/References: https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html Impact Attackers can serve malicious websites that steal passwords or download ransomware to their victims machine due to a redirect and there are a heap of other attack vectors.
{'CVE-2022-0637'}
2022-04-19T19:03:23Z
2022-02-16T23:02:09Z
HIGH
0
{'CWE-601'}
{'https://github.com/advisories/GHSA-vg27-hr3v-3cqv', 'https://github.com/mozilla/PollBot/security/advisories/GHSA-vg27-hr3v-3cqv'}
null
GHSA
GHSA-gwfj-pw2x-h6c2
Out of bounds read in simd-json
An issue was discovered in the simd-json crate before 0.1.15 for Rust. There is an out-of-bounds read and an incorrect crossing of a page boundary.
{'CVE-2019-15550'}
2021-08-25T20:43:56Z
2021-08-25T20:43:56Z
HIGH
7.5
{'CWE-125'}
{'https://rustsec.org/advisories/RUSTSEC-2019-0008.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15550', 'https://github.com/Licenser/simdjson-rs/pull/27', 'https://github.com/advisories/GHSA-gwfj-pw2x-h6c2'}
null
GHSA
GHSA-3x58-xr87-2fcj
Cross-site scripting in bluemonday
bluemonday before 1.0.5 allows XSS because certain Go lowercasing converts an uppercase Cyrillic character, defeating a protection mechanism against the "script" string.
{'CVE-2021-29272'}
2022-03-15T21:37:06Z
2021-05-18T21:07:37Z
MODERATE
6.1
{'CWE-79'}
{'https://vuln.ryotak.me/advisories/4', 'https://github.com/microcosm-cc/bluemonday/issues/111', 'https://github.com/microcosm-cc/bluemonday/releases/tag/v1.0.5', 'https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee', 'https://vuln.ryotak.me/advisories/4.txt', 'https://github.com/advisories/GHSA-3x58-xr87-2fcj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29272'}
null
GHSA
GHSA-8vj3-jgcf-77jv
Malicious Package in requeest
All versions of `requeest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:04:44Z
2020-09-02T20:26:49Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/858', 'https://github.com/advisories/GHSA-8vj3-jgcf-77jv'}
null
GHSA
GHSA-h2fw-93qx-vrcq
SQL Injection in Moodle
An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default.
{'CVE-2022-0983'}
2022-04-05T20:54:47Z
2022-03-26T00:00:29Z
HIGH
8.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-h2fw-93qx-vrcq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G4GRMWBGHOJMFXMTORECQNULJK7ZJJ6Y/', 'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1', 'https://bugzilla.redhat.com/show_bug.cgi?id=2064119', 'https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74074', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0983'}
null
GHSA
GHSA-8cw5-rv98-5c46
Arbitrary PHP code execution in Drupal
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6, and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.
{'CVE-2019-6339'}
2022-01-06T22:30:06Z
2022-01-06T22:30:06Z
CRITICAL
9.8
{'CWE-20'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6339.yaml', 'https://www.drupal.org/sa-core-2019-002', 'https://lists.debian.org/debian-lts-announce/2019/02/msg00004.html', 'https://www.debian.org/security/2019/dsa-4370', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6339', 'https://github.com/advisories/GHSA-8cw5-rv98-5c46'}
null
GHSA
GHSA-rcp4-jm2v-mr3f
Cross-site scripting in Shopizer
A stored cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via customer_name in various forms of store administration. It is saved in the database. The code is executed for any user of store administration when information is fetched from the backend, e.g., in admin/customers/list.html.
{'CVE-2021-33561'}
2021-06-08T23:10:24Z
2021-06-08T23:10:24Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271', 'https://www.exploit-db.com/exploits/49901', 'https://github.com/advisories/GHSA-rcp4-jm2v-mr3f', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33561'}
null
GHSA
GHSA-3jxh-789f-p7m6
Cross-site Scripting
An issue was discovered in Craft CMS before 3.6.0. In some circumstances, a potential XSS vulnerability existed in connection with front-end forms that accepted user uploads.
{'CVE-2021-27902'}
2021-07-07T17:11:18Z
2021-07-02T18:36:31Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security-1', 'https://github.com/craftcms/cms/commit/8ee85a8f03c143fa2420e7d6f311d95cae3b19ce', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27902', 'https://github.com/advisories/GHSA-3jxh-789f-p7m6', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#360---2021-01-26'}
null
GHSA
GHSA-3c6g-pvg8-gqw2
Command injection in json
This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.
{'CVE-2020-7712'}
2022-02-08T22:04:50Z
2021-05-06T18:11:21Z
HIGH
7.2
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7712', 'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931', 'https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E', 'https://github.com/trentm/json/issues/144', 'https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-608932', 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/trentm/json/pull/145', 'https://snyk.io/vuln/SNYK-JS-JSON-597481', 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-3c6g-pvg8-gqw2', 'https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-82j4-vr25-x394
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0940'}
2022-03-23T15:41:45Z
2022-03-15T00:01:01Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-82j4-vr25-x394', 'https://github.com/star7th/showdoc/commit/78522520892d4e29cc94148c6ec84a204a607b73', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0940', 'https://huntr.dev/bounties/856bd2e2-db4f-4b7d-9927-222261ae3782'}
null
GHSA
GHSA-p523-jrph-qjc6
Insufficient Session Expiration in shopware
### Impact Automatically invalidate sessions upon password change ### Patches We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
{'CVE-2022-21652'}
2022-01-06T23:49:17Z
2022-01-06T23:49:17Z
LOW
3.5
{'CWE-613'}
{'https://github.com/advisories/GHSA-p523-jrph-qjc6', 'https://github.com/shopware/shopware/commit/47ebd126a94f4b019b6fde64c0df3d18d74ef7d0', 'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-p523-jrph-qjc6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21652'}
null
GHSA
GHSA-36cg-4jff-5863
Data races in signal-simple
An issue was discovered in the signal-simple crate through 2020-11-15 for Rust. There are unconditional implementations of Send and Sync for SyncChannel<T>.
{'CVE-2020-36446'}
2021-08-25T20:59:13Z
2021-08-25T20:59:13Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36446', 'https://github.com/advisories/GHSA-36cg-4jff-5863', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/signal-simple/RUSTSEC-2020-0126.md', 'https://rustsec.org/advisories/RUSTSEC-2020-0126.html'}
null
GHSA
GHSA-c66w-hq56-4q97
Network policy may be bypassed by some ICMP Echo Requests
## Impact Under certain conditions, ICMP Echo Request sent to a Cilium endpoint from an actor may bypass a network policy which _disallows_ access from the actor to the endpoint, but _allows_ from the endpoint to the actor. This does _NOT_ apply to UDP and TCP traffic. The actor is either a pod or a cluster host or a remote host. The following conditions must be met: 1. Network policies have been created which: a) do not allow access from the actor to the endpoint; b) allow access from the endpoint to the actor and does not specify neither protocol nor port. 2. The endpoint has sent ICMP Echo Request to the actor with the ICMP identifier X. 3. The actor sends ICMP Echo Request to the endpoint with the same ICMP identifier X. 4. The request from the actor (3.) is sent before the Cilium's conntrack GC has removed the previously created conntrack entry (2.). ## Detailed description See https://github.com/cilium/cilium/commit/dfb008a9099c4da1e0fd964c899c43ee13280b0e (v1.9.x), https://github.com/cilium/cilium/commit/ff6ebae6efca1bd991302b464dea428512823e79 (v1.8.x), https://github.com/cilium/cilium/commit/472bbeff75161979c317ab21d563f826291b5f37 (v1.7.x). ## Example ``` $ kubectl run server --image=quay.io/cilium/net-test:v1.0.0 --restart=Never -- sleep 3600 $ kubectl run client --image=quay.io/cilium/net-test:v1.0.0 --restart=Never -- sleep 3600 $ cat <<EOF | kubectl apply -f apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: server-netpol # allow client->server spec: podSelector: matchLabels: run: server ingress: - from: - podSelector: matchLabels: run: client policyTypes: - Ingress --- apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: client-netpol # deny any->client spec: podSelector: matchLabels: run: client policyTypes: - Ingress EOF $ kubectl exec -ti server -- xping -c1 -x666 $CLIENT_POD_IP PING 10.154.0.50 (10.154.0.50): 56 data bytes ^C --- 10.154.0.50 ping statistics --- 1 packets transmitted, 0 packets received, 100% packet loss <--- "client-netpol" policy denied command terminated with exit code 1 $ kubectl exec -ti client -- xping -c1 -x666 $SERVER_POD_IP PING 10.154.1.16 (10.154.1.16): 56 data bytes 64 bytes from 10.154.1.16: seq=0 ttl=60 time=0.822 ms --- 10.154.1.16 ping statistics --- 1 packets transmitted, 1 packets received, 0% packet loss <--- "server-netpol" policy allowed round-trip min/avg/max = 0.822/0.822/0.822 ms $ kubectl exec -ti server -- xping -c1 -x666 $CLIENT_POD_IP PING 10.154.0.50 (10.154.0.50): 56 data bytes 64 bytes from 10.154.0.50: seq=0 ttl=60 time=0.527 ms --- 10.154.0.50 ping statistics --- 1 packets transmitted, 1 packets received, 0% packet loss <--- "client-netpol" policy bypassed round-trip min/avg/max = 0.527/0.527/0.527 ms ``` ## For more information If you have any questions or comments about this advisory: - Open an issue in [Cilium Issues](https://github.com/cilium/cilium/issues) - Email us at security@cilium.io
null
2022-04-19T19:02:50Z
2021-05-21T14:32:37Z
LOW
0
null
{'https://github.com/cilium/cilium/security/advisories/GHSA-c66w-hq56-4q97', 'https://github.com/advisories/GHSA-c66w-hq56-4q97'}
null
GHSA
GHSA-vqcj-wrf2-7v73
Out-of-bounds Write
In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode.
{'CVE-2020-35654'}
2021-03-18T19:55:27Z
2021-03-18T19:55:27Z
HIGH
8.8
{'CWE-787'}
{'https://github.com/advisories/GHSA-vqcj-wrf2-7v73', 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35654'}
null
GHSA
GHSA-58w4-w77w-qv3w
Reflected XSS with parameters in PostComment
### Impact An attacker could inject malicious web code into the users' web browsers by creating a malicious link. ### Patches The problem is fixed in 4.2.0 ### References [Cross-site Scripting (XSS) - Reflected (CWE-79) ](https://cwe.mitre.org/data/definitions/79.html)
{'CVE-2020-26225'}
2022-04-19T19:02:40Z
2020-11-16T21:23:29Z
MODERATE
8.7
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26225', 'https://github.com/advisories/GHSA-58w4-w77w-qv3w', 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-58w4-w77w-qv3w', 'https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf'}
null
GHSA
GHSA-2cv6-6437-39p2
Cross-site Scripting in microweber
File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0930'}
2022-03-22T20:03:40Z
2022-03-13T00:00:53Z
HIGH
4.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-2cv6-6437-39p2', 'https://github.com/microweber/microweber/commit/33eb4cc0f80c1f86388c1862a8aee1061fa5d72e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0930', 'https://huntr.dev/bounties/d184ce19-9608-42f1-bc3d-06ece2d9a993'}
null
GHSA
GHSA-533p-g2hq-qr26
Command Injection in treekill
All versions of `treekill` are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T19:40:42Z
2020-09-04T17:16:35Z
HIGH
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-533p-g2hq-qr26', 'https://hackerone.com/reports/703415', 'https://www.npmjs.com/advisories/1433'}
null
GHSA
GHSA-wgx7-jwwm-cgjv
Improper Authentication in Apache Spark
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
{'CVE-2020-9480'}
2022-04-27T20:51:31Z
2022-02-10T23:05:20Z
CRITICAL
9.8
{'CWE-287', 'CWE-306'}
{'https://github.com/advisories/GHSA-wgx7-jwwm-cgjv', 'https://spark.apache.org/security.html#CVE-2020-9480', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9480', 'https://lists.apache.org/thread.html/ree9e87aae81852330290a478692e36ea6db47a52a694545c7d66e3e2@%3Cdev.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a27eaada75222761efc3f7238b5a3b@%3Ccommits.doris.apache.org%3E', 'https://lists.apache.org/thread.html/rb3956440747e41940d552d377d50b144b60085e7ff727adb0e575d8d@%3Ccommits.submarine.apache.org%3E', 'https://lists.apache.org/thread.html/r03ad9fe7c07d6039fba9f2152d345274473cb0af3d8a4794a6645f4b@%3Cuser.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
GHSA
GHSA-45hw-29x7-9x95
Arbitrary File Read in Snyk Broker
All versions of snyk-broker before 4.79.0 are vulnerable to Arbitrary File Read. It allows partial file reads for users who have access to Snyk's internal network via patch history from GitHub Commits API.
{'CVE-2020-7651'}
2021-07-29T17:23:09Z
2020-06-03T22:02:11Z
MODERATE
4.3
{'CWE-22'}
{'https://github.com/advisories/GHSA-45hw-29x7-9x95', 'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7651', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570610'}
null
GHSA
GHSA-7v2r-wxmg-mgvc
HTTP Request smuggling in tiny_http
An issue was discovered in the tiny_http crate through 2020-06-16 for Rust. HTTP Request smuggling can occur via a malformed Transfer-Encoding header.
{'CVE-2020-35884'}
2021-12-14T15:33:45Z
2021-08-25T20:48:56Z
MODERATE
6.5
{'CWE-444'}
{'https://github.com/tiny-http/tiny-http/issues/173', 'https://github.com/tiny-http/tiny-http/pull/190', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35884', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VO6SRTCEPEYO2OX647I3H5XUWLFDRDWL/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3JDNRE5RXJOWZZZF5QSCG4GUCSLTHF2/', 'https://rustsec.org/advisories/RUSTSEC-2020-0031.html', 'https://github.com/advisories/GHSA-7v2r-wxmg-mgvc'}
null
GHSA
GHSA-79rg-7mv3-jrr5
Rating Script Service expose XWiki to SQL injection
### Impact This issue impacts only XWiki with the Ratings API installed. The Rating Script Service expose an API to perform SQL requests without escaping the from and where search arguments. This might lead to an SQL script injection quite easily for any user having Script rights on XWiki. ### Patches The problem has been patched in XWiki 12.9RC1. ### Workarounds The only workaround besides upgrading XWiki would be to uninstall the Ratings API in XWiki from the Extension Manager. ### References https://jira.xwiki.org/browse/XWIKI-17662 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](http://jira.xwiki.org) * Email us at our [security mailing list](mailto:security@xwiki.org)
{'CVE-2021-21380'}
2021-03-25T15:14:39Z
2021-03-23T22:48:01Z
HIGH
7.7
{'CWE-89'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-79rg-7mv3-jrr5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21380', 'https://github.com/advisories/GHSA-79rg-7mv3-jrr5', 'https://jira.xwiki.org/browse/XWIKI-17662'}
null
GHSA
GHSA-p33m-7w7f-gmj8
Uncontrolled Resource Consumption in fun-map
fun-map through 3.3.1 is vulnerable to Prototype Pollution. The function assocInM could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
{'CVE-2020-7644'}
2021-12-10T20:05:07Z
2021-12-10T20:05:07Z
HIGH
8.1
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7644', 'https://github.com/nathan7/fun-map/blob/master/index.js#L137,', 'https://github.com/advisories/GHSA-p33m-7w7f-gmj8', 'https://snyk.io/vuln/SNYK-JS-FUNMAP-564436'}
null
GHSA
GHSA-59c7-4xj2-hgvw
Moderate severity vulnerability that affects rails-html-sanitizer
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
{'CVE-2015-7578'}
2021-09-01T21:30:33Z
2017-10-24T18:33:36Z
MODERATE
6.1
{'CWE-79'}
{'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578', 'http://www.securitytracker.com/id/1034816', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ', 'https://github.com/advisories/GHSA-59c7-4xj2-hgvw', 'http://www.openwall.com/lists/oss-security/2016/01/25/11', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html'}
null
GHSA
GHSA-6fw4-hr69-g3rv
Prototype Pollution in property-expr
The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function.
{'CVE-2020-7707'}
2021-07-29T22:00:51Z
2021-05-06T17:29:47Z
CRITICAL
9.8
{'CWE-915'}
{'https://github.com/advisories/GHSA-6fw4-hr69-g3rv', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857', 'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7707', 'https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800'}
null
GHSA
GHSA-ggxm-pgc9-g7fp
Arbitrary Code Execution in rdoc
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
{'CVE-2021-31799'}
2022-04-22T15:44:17Z
2021-09-01T18:53:15Z
HIGH
7
{'CWE-74', 'CWE-77'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security-tracker.debian.org/tracker/CVE-2021-31799', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html', 'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31799', 'https://github.com/advisories/GHSA-ggxm-pgc9-g7fp', 'https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/', 'https://security.netapp.com/advisory/ntap-20210902-0004/'}
null
GHSA
GHSA-c99h-fgqm-6679
UnixAuthenticationService in Apache Ranger was updated to correctly handle user input to avoid Stack-based buffer overflow
UnixAuthenticationService in Apache Ranger 1.2.0 was updated to correctly handle user input to avoid Stack-based buffer overflow. Versions prior to 1.2.0 should be upgraded to 1.2.0
{'CVE-2018-11778'}
2022-04-27T13:52:10Z
2018-10-17T17:22:23Z
HIGH
8.8
{'CWE-787'}
{'https://github.com/advisories/GHSA-c99h-fgqm-6679', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11778', 'https://lists.apache.org/thread.html/rd88077a781ef38f7687c100f93992f4dda8aa101925050c4af470998@%3Cdev.ranger.apache.org%3E', 'https://seclists.org/oss-sec/2018/q4/11', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://lists.apache.org/thread.html/r04bc435a92911de4b52d2b98f169bd7cf2e8bbeb53b03788df8f932c@%3Cdev.ranger.apache.org%3E'}
null
GHSA
GHSA-xgf5-5gjr-4hjq
Directory Traversal in zjjserver
Affected versions of `zjjserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16201'}
2021-01-14T15:42:25Z
2020-09-01T18:15:20Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/zjjserver', 'https://nodesecurity.io/advisories/427', 'https://github.com/advisories/GHSA-xgf5-5gjr-4hjq', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16201', 'https://www.npmjs.com/advisories/427'}
null
GHSA
GHSA-6m93-343m-3jrc
Cross-site Scripting in HTML2PDF
An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document.
{'CVE-2021-45394'}
2022-01-25T20:48:30Z
2022-01-21T23:29:48Z
HIGH
8.8
{'CWE-79', 'CWE-918'}
{'https://www.synacktiv.com/sites/default/files/2022-01/html2pdf_ssrf_deserialization.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45394', 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f', 'https://github.com/spipu/html2pdf/blob/master/CHANGELOG.md', 'https://github.com/spipu/html2pdf/releases/tag/v5.2.4', 'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585', 'https://github.com/advisories/GHSA-6m93-343m-3jrc'}
null
GHSA
GHSA-xrmp-99wj-p6jc
Prototype Pollution in deap
Versions of `deap` before 1.0.1 are vulnerable to prototype pollution. ## Recommendation Update to version 1.0.1 or later.
null
2021-08-04T21:21:43Z
2019-05-31T23:43:09Z
HIGH
7.3
{'CWE-400'}
{'https://github.com/advisories/GHSA-xrmp-99wj-p6jc', 'https://nodesecurity.io/advisories/611', 'https://www.npmjs.com/advisories/611', 'https://hackerone.com/reports/310446', 'https://snyk.io/vuln/npm:deap:20180415'}
null
GHSA
GHSA-97mp-9g5c-6c93
Malicious Package in bs58chcek
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:49:31Z
2020-09-04T16:50:48Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-97mp-9g5c-6c93', 'https://www.npmjs.com/advisories/1375'}
null
GHSA
GHSA-48ww-j4fc-435p
Command injection in nodemailer
This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails.
{'CVE-2020-7769'}
2021-07-29T20:31:01Z
2021-05-10T19:16:52Z
CRITICAL
9.8
{'CWE-88'}
{'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7769', 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834', 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js#L75', 'https://github.com/advisories/GHSA-48ww-j4fc-435p', 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js%23L75', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742', 'https://www.npmjs.com/package/nodemailer'}
null
GHSA
GHSA-c6p9-24rc-jr5h
Remote Code Execution and download tracking in Mintegral SDK
"This affects all versions of package com.mintegral.msdk:alphab. The Android SDK distributed by the company contains malicious functionality in this module that tracks: 1. Downloads from Google urls either within Google apps or via browser including file downloads, e-mail attachments and Google Docs links. 2. All apk downloads, either organic or not. Mintegral listens to download events in Android's download manager and detects if the downloaded file's url contains: a. google.com or comes from a Google app (the com.android.vending package) b. Ends with .apk for apk downloads In both cases, the module sends the captured data back to Mintegral's servers. Note that the malicious functionality keeps running even if the app is currently not in focus (running in the background)."
{'CVE-2020-7744'}
2021-04-22T16:15:15Z
2021-04-22T16:15:15Z
MODERATE
4.7
{'CWE-319'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7744', 'https://snyk.io/vuln/SNYK-JAVA-COMMINTEGRALMSDK-1018714', 'https://snyk.io/research/sour-mint-malicious-sdk/', 'https://snyk.io/blog/remote-code-execution-rce-sourmint/', 'https://github.com/advisories/GHSA-c6p9-24rc-jr5h'}
null
GHSA
GHSA-pq6v-x7gp-7776
Source code is downloaded over cleartext HTTP in portaudio
An issue was discovered in the portaudio crate through 0.7.0 for Rust. There is a man-in-the-middle issue because the source code is downloaded over cleartext HTTP.
{'CVE-2016-10933'}
2021-08-25T20:43:09Z
2021-08-25T20:43:09Z
MODERATE
5.9
{'CWE-319'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10933', 'https://rustsec.org/advisories/RUSTSEC-2016-0003.html', 'https://github.com/advisories/GHSA-pq6v-x7gp-7776', 'https://github.com/RustAudio/rust-portaudio/issues/144'}
null
GHSA
GHSA-5v5h-4w2g-gxxc
SQL Injection in t3/dce
The dce (aka Dynamic Content Element) extension 2.2.0 through 2.6.x before 2.6.2, and 2.7.x before 2.7.1, for TYPO3 allows SQL Injection via a backend user account.
{'CVE-2021-31777'}
2021-06-08T20:12:23Z
2021-06-08T20:12:23Z
HIGH
7.6
{'CWE-89'}
{'https://packagist.org/packages/t3/dce', 'https://github.com/advisories/GHSA-5v5h-4w2g-gxxc', 'https://excellium-services.com/cert-xlm-advisory/', 'https://bitbucket.org/ArminVieweg/dce/commits/998a2392f69f2153797c5ace6e8914ca309e70c7', 'http://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-005', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31777'}
null
GHSA
GHSA-269g-pwp5-87pp
TemporaryFolder on unix-like systems does not limit access to created files
### Vulnerability The JUnit4 test rule [TemporaryFolder](https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html) contains a local information disclosure vulnerability. Example of vulnerable code: ```java public static class HasTempFolder { @Rule public TemporaryFolder folder = new TemporaryFolder(); @Test public void testUsingTempFolder() throws IOException { folder.getRoot(); // Previous file permissions: `drwxr-xr-x`; After fix:`drwx------` File createdFile= folder.newFile("myfile.txt"); // unchanged/irrelevant file permissions File createdFolder= folder.newFolder("subfolder"); // unchanged/irrelevant file permissions // ... } } ``` ### Impact On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability **does not** allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. When analyzing the impact of this vulnerability, here are the important questions to ask: 1. Do the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder? - If yes, this vulnerability impacts you, but only if you also answer 'yes' to question 2. - If no, this vulnerability does not impact you. 2. Do the JUnit tests ever execute in an environment where the OS has other untrusted users. _This may apply in CI/CD environments but normally won't be 'yes' for personal developer machines._ - If yes, and you answered 'yes' to question 1, this vulnerability impacts you. - If no, this vulnerability does not impact you. ### Patches Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. - Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. - Java 1.6 and lower users: **no patch is available, you must use the workaround below.** ### Workarounds If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. ### References - [CWE-200: Exposure of Sensitive Information to an Unauthorized Actor](https://cwe.mitre.org/data/definitions/200.html) - Fix commit https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae #### Similar Vulnerabilities - Google Guava - https://github.com/google/guava/issues/4011 - Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945 - JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824 ### For more information If you have any questions or comments about this advisory, please pen an issue in [junit-team/junit4](https://github.com/junit-team/junit4/issues).
{'CVE-2020-15250'}
2022-04-25T23:05:55Z
2020-10-12T17:33:00Z
MODERATE
4.4
{'CWE-200', 'CWE-732'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/junit-team/junit4/issues/1676', 'https://lists.apache.org/thread.html/rc49cf1547ef6cac1be4b3c92339b2cae0acacf5acaba13cfa429a872@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r742b44fd75215fc75963b8ecc22b2e4372e68d67d3d859d2b5e8743f@%3Cdev.knox.apache.org%3E', 'https://github.com/advisories/GHSA-269g-pwp5-87pp', 'https://lists.apache.org/thread.html/r925eaae7dd8f77dd61eefc49c1fcf54bd9ecfe605486870d7b1e9390@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rb2ffe2993f4dccc48d832e1a0f1c419477781b6ea16e725ca2276dbb@%3Cdev.knox.apache.org%3E', 'https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html', 'https://lists.apache.org/thread.html/r2b78f23bc2711a76a7fc73ad67b7fcd6817c5cfccefd6f30a4f54943@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rf2ec93f4ca9a97d1958eb4a31b1830f723419ce9bf2018a6e5741d5b@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r01110833b63616ddbef59ae4e10c0fbd0060f0a51206defd4cb4d917@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/raebf13f53cd5d23d990712e3d11c80da9a7bae94a6284050f148ed99@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp', 'https://lists.apache.org/thread.html/rdbdd30510a7c4d0908fd22075c02b75bbc2e0d977ec22249ef3133cb@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r29d703d1986d9b871466ff24082a1828ac8ad27bb0965a93a383872e@%3Cpluto-scm.portals.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15250', 'https://lists.apache.org/thread.html/rf6e5d894d4b03bef537c9d6641272e0197c047c0d1982b4e176d0353@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r5f8841507576f595bb783ccec6a7cb285ea90d4e6f5043eae0e61a41@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r30f502d2f79e8d635361adb8108dcbb73095163fcbd776ee7984a094@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r9710067c7096b83cb6ae8f53a2f6f94e9c042d1bf1d6929f8f2a2b7a@%3Ccommits.knox.apache.org%3E', 'https://github.com/junit-team/junit4/blob/7852b90cfe1cea1e0cdaa19d490c83f0d8684b50/doc/ReleaseNotes4.13.1.md', 'https://lists.apache.org/thread.html/reb700e60b9642eafa4b7922bfee80796394135aa09c7a239ef9f7486@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r687f489b10b0d14e46f626aa88476545e1a2600b24c4ebd3c0d2a10b@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rdef7d1380c86e7c0edf8a0f89a2a8db86fce5e363457d56b722691b4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rea812d8612fdc46842a2a57248cad4b01ddfdb1e9b037c49e68fdbfb@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r09cfbb5aedd76023691bbce9ca4ce2e16bb07dd37554a17efc19935d@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rb2771949c676ca984e58a5cd5ca79c2634dee1945e0406e48e0f8457@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rde385b8b53ed046600ef68dd6b4528dea7566aaddb02c3e702cc28bc@%3Ccommits.creadur.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00003.html', 'https://lists.apache.org/thread.html/rf797d119cc3f51a8d7c3c5cbe50cb4524c8487282b986edde83a9467@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rde8e70b95c992378e8570e4df400c6008a9839eabdfb8f800a3e5af6@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r934208a520b38f5cf0cae199b6b076bfe7d081809528b0eff2459e40@%3Cdev.knox.apache.org%3E', 'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae', 'https://lists.apache.org/thread.html/r95f8ef60c4b3a5284b647bb3132cda08e6fadad888a66b84f49da0b0@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/ra1bdb9efae84794e8ffa2f8474be8290ba57830eefe9714b95da714b@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r717877028482c55acf604d7a0106af4ca05da4208c708fb157b53672@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r500517c23200fb2fdb0b82770a62dd6c88b3521cfb01cfd0c76e3f8b@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r1209986f79359b518d09513ff05a88e5b3c398540e775edea76a4774@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r8b02dc6f18df11ff39eedb3038f1e31e6f90a779b1959bae65107279@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rbaec90e699bc7c7bd9a053f76707a36fda48b6d558f31dc79147dbf9@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E'}
null
GHSA
GHSA-958r-g534-ccmr
Moderate severity vulnerability that affects MadsKristensen.AspNetCore.Miniblog
madskristensen Miniblog.Core through 2019-01-16 allows remote attackers to execute arbitrary ASPX code via an IMG element with a data: URL, because SaveFilesToDisk in Controllers/BlogController.cs writes a decoded base64 string to a file without validating the extension.
{'CVE-2019-9845'}
2021-09-07T20:42:11Z
2019-07-05T21:11:13Z
CRITICAL
9.8
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9845', 'https://github.com/madskristensen/Miniblog.Core/blob/master/src/Controllers/BlogController.cs#L142', 'https://rastating.github.io/miniblog-remote-code-execution/', 'https://github.com/advisories/GHSA-958r-g534-ccmr'}
null
GHSA
GHSA-wf5p-c75w-w3wh
Null pointer dereference in TFLite MLIR optimizations
### Impact An attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service: This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/compiler/mlir/lite/transforms/optimize.cc#L67-L70) unconditionally dereferences a pointer to an iterator to a vector without checking that the vector has elements: ```cc bool L2NormalizeReduceAxis(Value sq_op, DenseElementsAttr axis) { if (sq_op.getType().cast<ShapedType>().getRank() - 1 == *axis.getValues<int>().begin() || *axis.getValues<int>().begin() == -1) { // ... } // ... } ``` ### Patches We have patched the issue in GitHub commit [d6b57f461b39fd1aa8c1b870f1b974aac3554955](https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37689'}
2021-08-25T14:39:36Z
2021-08-25T14:39:36Z
HIGH
7.8
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37689', 'https://github.com/advisories/GHSA-wf5p-c75w-w3wh', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh', 'https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955'}
null
GHSA
GHSA-c2vx-49jm-h3f6
Pysaml2 does not sanitize XML responses
XML External Entity (XXE) vulnerability in PySAML2 4.4.0 and earlier allows remote attackers to read arbitrary files via a crafted SAML XML request or response.
{'CVE-2016-10149'}
2022-04-26T18:16:33Z
2018-07-16T16:50:12Z
HIGH
7.5
{'CWE-611'}
{'http://www.openwall.com/lists/oss-security/2017/01/19/5', 'https://access.redhat.com/errata/RHSA-2017:0938', 'https://github.com/rohe/pysaml2/issues/366', 'http://www.debian.org/security/2017/dsa-3759', 'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b', 'http://www.securityfocus.com/bid/97692', 'https://github.com/rohe/pysaml2/pull/379', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10149', 'https://github.com/advisories/GHSA-c2vx-49jm-h3f6', 'https://access.redhat.com/errata/RHSA-2017:0936', 'https://access.redhat.com/errata/RHSA-2017:0937', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716'}
null
GHSA
GHSA-fw5q-j9p4-3vxg
Blog comment posting, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS). Impact: XSS via Arbitrary script execution. Components are: Blog comment posting Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by yama
{'CVE-2020-15276'}
2022-04-19T19:02:38Z
2020-10-30T19:10:20Z
LOW
7.7
{'CWE-79'}
{'https://github.com/advisories/GHSA-fw5q-j9p4-3vxg', 'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/security/advisories/GHSA-fw5q-j9p4-3vxg', 'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15276'}
null
GHSA
GHSA-h5rh-w6vm-9ghc
Denial of service in Grafana
The snapshot feature in Grafana before 7.4.2 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.
{'CVE-2021-27358'}
2022-04-12T22:50:48Z
2022-02-15T01:57:18Z
HIGH
6.9
{'CWE-306', 'CWE-400'}
{'https://security.netapp.com/advisory/ntap-20210513-0007/', 'https://github.com/grafana/grafana/blob/master/CHANGELOG.md#742-2021-02-17', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27358', 'https://github.com/advisories/GHSA-h5rh-w6vm-9ghc', 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-2/', 'https://github.com/grafana/grafana/pull/31263', 'https://github.com/grafana/grafana/blob/master/CHANGELOG.md'}
null
GHSA
GHSA-qf9q-q4hh-qph3
SQL injection in blazer
Blazer before 2.6.0 allows SQL Injection. In certain circumstances, an attacker could get a user to run a query they would not have normally run.
{'CVE-2022-29498'}
2022-04-29T21:07:18Z
2022-04-22T00:00:36Z
HIGH
7.5
{'CWE-89'}
{'https://github.com/advisories/GHSA-qf9q-q4hh-qph3', 'https://github.com/ankane/blazer/issues/392', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29498'}
null
GHSA
GHSA-xvm2-9xvc-hx7f
Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer
### Impact Prior to xlsx-streamer 2.1.0, the XML parser that was used did not apply all the necessary settings to prevent XML Entity Expansion issues. ### Patches Upgrade to version 2.1.0. ### Workarounds No known workaround. ### References https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73 ### For more information If you have any questions or comments about this advisory: * Open an issue in [monitorjbl/excel-streaming-reader](https://github.com/monitorjbl/excel-streaming-reader)
{'CVE-2022-23640'}
2022-04-19T19:03:23Z
2022-03-02T21:30:54Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/advisories/GHSA-xvm2-9xvc-hx7f', 'https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f', 'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23640'}
null
GHSA
GHSA-mp78-r56v-45qc
Moderate severity vulnerability that affects ember-source
Cross-site scripting (XSS) vulnerability in Ember.js 1.10.x before 1.10.1 and 1.11.x before 1.11.2.
{'CVE-2015-1866'}
2021-09-15T20:38:59Z
2018-08-28T22:34:31Z
MODERATE
6.1
{'CWE-79'}
{'https://emberjs.com/blog/2015/04/14/security-and-bugfix-releases-ember-1-10-1-1-11-2-1-11-3.html', 'http://www.openwall.com/lists/oss-security/2015/04/14/11', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1866', 'http://www.securityfocus.com/bid/74185', 'https://github.com/advisories/GHSA-mp78-r56v-45qc'}
null
GHSA
GHSA-c7fm-jx59-wjf6
Authorization Bypass Through User-Controlled Key in LiveHelperChat
Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v.
{'CVE-2022-0266'}
2022-01-21T18:50:58Z
2022-01-21T18:50:58Z
MODERATE
6.5
{'CWE-639'}
{'https://huntr.dev/bounties/1ac267be-3af8-4774-89f2-77234d144d6b', 'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd', 'https://github.com/advisories/GHSA-c7fm-jx59-wjf6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0266'}
null
GHSA
GHSA-p49h-hjvm-jg3h
PCX P mode buffer overflow in Pillow
libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.
{'CVE-2020-5312'}
2021-11-03T18:05:04Z
2021-11-03T18:05:04Z
HIGH
9.8
{'CWE-120'}
{'https://access.redhat.com/errata/RHSA-2020:0580', 'https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd', 'https://access.redhat.com/errata/RHSA-2020:0578', 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-83.yaml', 'https://usn.ubuntu.com/4272-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://www.debian.org/security/2020/dsa-4631', 'https://access.redhat.com/errata/RHSA-2020:0681', 'https://access.redhat.com/errata/RHSA-2020:0694', 'https://github.com/advisories/GHSA-p49h-hjvm-jg3h', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://access.redhat.com/errata/RHSA-2020:0683', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5312', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/', 'https://access.redhat.com/errata/RHSA-2020:0566'}
null
GHSA
GHSA-g94p-h263-c26q
Cross Site Request Forgery in Mingsoft MCMS
MCMS v5.2.7 contains a Cross-Site Request Forgery (CSRF) via /role/saveOrUpdateRole.do. This vulnerability allows attackers to escalate privileges and modify data.
{'CVE-2022-27340'}
2022-04-26T18:51:08Z
2022-04-23T00:03:01Z
HIGH
0
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27340', 'https://github.com/UDKI11/vul/blob/main/Mcms%E8%B7%A8%E7%AB%99%E8%AF%B7%E6%B1%82%E4%BC%AA%E9%80%A0.docx', 'https://github.com/advisories/GHSA-g94p-h263-c26q'}
null
GHSA
GHSA-g36h-6r4f-3mqp
Regular Expression Denial of Service in string
Affected versions of `string` are vulnerable to regular expression denial of service when specifically crafted untrusted user input is passed into the `underscore` or `unescapeHTML` methods. ## Recommendation There is currently no direct patch for this vulnerability. Currently, the best solution is to avoid passing user input to the `underscore` and `unescapeHTML` methods. Alternatively, a user provided patch is available in [Pull Request #217]( https://github.com/jprichardson/string.js/pull/217/commits/eab9511e4efbc8c521e18b6cf2e8565ae50c5a16), however this patch has not been tested, nor has it been merged by the package author.
{'CVE-2017-16116'}
2021-01-08T18:49:49Z
2018-07-24T20:16:11Z
HIGH
0
{'CWE-400'}
{'https://nodesecurity.io/advisories/536', 'https://github.com/jprichardson/string.js/issues/212', 'https://www.npmjs.com/advisories/536', 'https://github.com/advisories/GHSA-g36h-6r4f-3mqp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16116'}
null
GHSA
GHSA-44vf-8ffm-v2qh
Sensitive Data Exposure in rails-session-decoder
All versions of `rails-session-decoder` are missing verification of the Message Authentication Code appended to the cookies. This may lead to decryption of cipher text thus exposing encrypted information. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-09-02T15:42:47Z
2020-09-02T15:42:47Z
HIGH
0
null
{'https://www.npmjs.com/advisories/753', 'https://github.com/advisories/GHSA-44vf-8ffm-v2qh'}
null
GHSA
GHSA-p66x-2cv9-qq3v
Arbitrary code execution in Apache Commons BeanUtils
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
{'CVE-2014-0114'}
2020-06-10T23:38:01Z
2020-06-10T23:38:01Z
HIGH
0
null
{'http://www.mandriva.com/security/advisories?name=MDVSA-2014:095', 'https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5@%3Ccommits.commons.apache.org%3E', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'http://www.vmware.com/security/advisories/VMSA-2014-0008.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'http://marc.info/?l=bugtraq&m=140801096002766&w=2', 'https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5@%3Cissues.commons.apache.org%3E', 'http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://advisories.mageia.org/MGASA-2014-0219.html', 'https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25@%3Cdev.commons.apache.org%3E', 'https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3@%3Cissues.commons.apache.org%3E', 'http://www.ibm.com/support/docview.wss?uid=swg21675496', 'https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/57477', 'http://openwall.com/lists/oss-security/2014/06/15/10', 'http://www.debian.org/security/2014/dsa-2940', 'http://secunia.com/advisories/59246', 'http://www-01.ibm.com/support/docview.wss?uid=swg21674812', 'http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0114', 'http://www.securityfocus.com/bid/67121', 'https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f@%3Cissues.commons.apache.org%3E', 'https://issues.apache.org/jira/browse/BEANUTILS-463', 'https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/60703', 'https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8@%3Cissues.commons.apache.org%3E', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755', 'https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86@%3Cdev.commons.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://secunia.com/advisories/59480', 'https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1@%3Cdev.commons.apache.org%3E', 'http://secunia.com/advisories/59464', 'https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859@%3Cdev.commons.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://security.netapp.com/advisory/ntap-20180629-0006/', 'http://secunia.com/advisories/59014', 'https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/60177', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f@%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3@%3Cissues.commons.apache.org%3E', 'http://www.vmware.com/security/advisories/VMSA-2014-0012.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676931', 'https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f@%3Cnotifications.commons.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/advisories/GHSA-p66x-2cv9-qq3v', 'https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb@%3Cissues.commons.apache.org%3E', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html', 'http://secunia.com/advisories/59430', 'http://secunia.com/advisories/59245', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675689', 'http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html', 'http://secunia.com/advisories/59228', 'https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a@%3Cissues.commons.apache.org%3E', 'http://marc.info/?l=bugtraq&m=141451023707502&w=2', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675898', 'https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2995', 'http://www.securityfocus.com/archive/1/534161/100/0/threaded', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4@%3Cissues.commons.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/59479', 'http://secunia.com/advisories/58710', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21677110', 'http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1091938', 'http://secunia.com/advisories/59118', 'https://security.netapp.com/advisory/ntap-20140911-0001/', 'https://security.gentoo.org/glsa/201607-09', 'http://seclists.org/fulldisclosure/2014/Dec/23', 'http://marc.info/?l=bugtraq&m=140119284401582&w=2', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676110', 'https://access.redhat.com/solutions/869353', 'https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21674128', 'https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/58947', 'https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639@%3Ccommits.commons.apache.org%3E', 'https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/58851', 'http://openwall.com/lists/oss-security/2014/07/08/1', 'http://secunia.com/advisories/59718', 'https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3@%3Cissues.commons.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675266', 'https://snyk.io/vuln/SNYK-JAVA-COMMONSBEANUTILS-30077', 'https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd@%3Ccommits.commons.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676091', 'https://bugzilla.redhat.com/show_bug.cgi?id=1116665', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676375', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675972', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg27042296', 'https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3@%3Cnotifications.commons.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675387', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676303', 'http://secunia.com/advisories/59704', 'https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263@%3Cissues.commons.apache.org%3E'}
null
GHSA
GHSA-jr3j-whm4-9wwm
Reflected XSS when using flashMessages or languageDictionary
### Overview Versions before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's - `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage`. - `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`. ### Am I affected? You are affected by this vulnerability if you are using `auth0-lock` version `11.30.0` or lower and all of the following conditions apply: - You are utilizing `flashMessage` feature. - User input or data from URL parameters is incorporated into the `flashMessage`. An example of a vulnerable snippet where query parameters are used to populate the `text` property of a `flashMessage`. ```js var params = new URLSearchParams(location.search); var errorMessage = params.get('error__message'); var showParams = {}; if (!!errorMessage === true) { showParams.flashMessage = { type: 'error', text: 'We were unable to log you in. ' + errorMessage, }; } lock.show(showParams); ``` OR - You are utilizing `languageDictionary` feature. - User input or data from URL parameters is used in `languageDictionary` properties. An example of a vulnerable snippet where query parameters are used to populate the `socialLoginInstructions` property of a `languageDictionary`. ```js var params = new URLSearchParams(location.search); var instruction = params.get('instruction'); var options = { languageDictionary: { emailInputPlaceholder: "something@youremail.com", title: "title", socialLoginInstructions: instruction }, }; var lock = new Auth0LockPasswordless( CLIENT_ID, DOMAIN, options ); lock.show() ``` ### How to fix that? Upgrade to version `11.30.1`. ### Will this update impact my users? The fix uses [DOMPurify](https://github.com/cure53/DOMPurify) to sanitise the `flashMessage` and `languageDictionary` inputs. If you are including inline JavaScript in these fields, like `script` tags or `onclick` attributes, these will be removed.
{'CVE-2021-32641'}
2021-06-07T18:54:44Z
2021-06-04T19:10:34Z
HIGH
8.1
{'CWE-79'}
{'https://github.com/auth0/lock/security/advisories/GHSA-jr3j-whm4-9wwm', 'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32641', 'https://github.com/auth0/lock/releases/tag/v11.30.1', 'https://github.com/advisories/GHSA-jr3j-whm4-9wwm'}
null
GHSA
GHSA-r7cj-8hjg-x622
DBAL 3 SQL Injection Security Vulnerability
We have released a new version Doctrine DBAL 3.1.4 that fixes a critical SQL injection vulnerability in the LIMIT clause generation API provided by the Platform abstraction. We advise everyone using Doctrine DBAL 3.0.0 up to 3.1.3 to upgrade to 3.1.4 immediately. The vulnerability can happen when unsanitized input is passed to many APIs in Doctrine DBAL and ORM that ultimately end up calling `AbstractPlatform::modifyLimitQuery`. As a workaround you can cast all limit and offset parameters to integers before passing them to Doctrine APIs. This vulnerability has been assigned [CVE-2021-43608](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43608).
{'CVE-2021-43608'}
2021-12-16T14:11:44Z
2021-11-16T17:25:57Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43608', 'https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622', 'https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html', 'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d', 'https://github.com/doctrine/dbal/releases', 'https://github.com/advisories/GHSA-r7cj-8hjg-x622'}
null
GHSA
GHSA-2828-9vh6-9m6j
Client Denial of Service on TUF
### Impact An attacker who can gain file access to the repository and modify metadata files may cause a denial of service to clients by creating many invalid signatures on a metadata file. Having a large number of signatures to verify will delay the moment when the client will determine the signature is not valid. This delay may be for at least a few minutes, but possibly could be longer especially if multiple files are impacted. The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue. ### Patches No fix exists for this issue. ### Workarounds No workarounds are known for this issue. ### References * [CVE-2020-6173](https://nvd.nist.gov/vuln/detail/CVE-2020-6173) * [Issue #973](https://github.com/theupdateframework/tuf/issues/973)
{'CVE-2020-6173'}
2021-09-23T19:00:17Z
2020-08-21T16:25:48Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/theupdateframework/tuf/security/advisories/GHSA-2828-9vh6-9m6j', 'https://github.com/theupdateframework/tuf/issues/973', 'https://github.com/theupdateframework/tuf/commits/develop', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6173', 'https://github.com/advisories/GHSA-2828-9vh6-9m6j'}
null
GHSA
GHSA-3p85-p4qg-hcrp
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4081'}
2021-12-16T14:27:58Z
2021-12-16T14:27:58Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a', 'https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3', 'https://github.com/advisories/GHSA-3p85-p4qg-hcrp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4081'}
null
GHSA
GHSA-g8vp-6hv4-m67c
Command Injection in entitlements
Versions of `entitlements` prior to 1.3.0 are vulnerable to Command Injection. The package does not validate input on the `entitlements` function and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system. ## Recommendation Upgrade to version 1.3.0 or later.
null
2021-09-28T17:04:17Z
2020-09-11T21:23:29Z
HIGH
0
{'CWE-77'}
{'https://www.npmjs.com/advisories/998', 'https://hackerone.com/reports/341869', 'https://github.com/advisories/GHSA-g8vp-6hv4-m67c'}
null
GHSA
GHSA-3xxv-p78r-4fc6
Cross-site Scripting in apache-airflow
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are on Python 3.6. (Those contain the fix for CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336).
{'CVE-2021-28359'}
2021-06-18T18:43:42Z
2021-06-18T18:43:42Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-3xxv-p78r-4fc6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28359'}
null
GHSA
GHSA-vrw4-w73r-6mm8
TimelockController vulnerability in OpenZeppelin Contracts
### Impact A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to "open" allow anyone to use the executor role, thus leaving the timelock at risk of being taken over by an attacker. ### Patches A fix is included in the following releases of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`: - 4.3.1 - 3.4.2 - 3.4.2-solc-0.7 Deployed instances of `TimelockController` should be replaced with a fixed version by migrating all assets, ownership, and roles. ### Workarounds Revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining. ### References [Post-mortem](https://forum.openzeppelin.com/t/timelockcontroller-vulnerability-postmortem/14958). ### Credits The issue was identified by an anonymous white hat hacker through [Immunefi](https://immunefi.com/). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
{'CVE-2021-39168'}
2021-09-13T20:30:26Z
2021-08-30T16:12:49Z
CRITICAL
10
{'CWE-269'}
{'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-vrw4-w73r-6mm8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39168', 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5', 'https://github.com/advisories/GHSA-vrw4-w73r-6mm8'}
null
GHSA
GHSA-g57j-q48p-9vm2
Command injection in Gerapy
This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized.
{'CVE-2020-7698'}
2022-03-21T22:49:53Z
2021-05-06T18:52:13Z
CRITICAL
9.8
{'CWE-74'}
{'https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2', 'https://snyk.io/vuln/SNYK-PYTHON-GERAPY-572470', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7698', 'https://github.com/advisories/GHSA-g57j-q48p-9vm2'}
null
GHSA
GHSA-7h5v-85w9-pq6c
Denial of service (via resource exhaustion) due to improper input validation in third-party identifier endpoint
### Impact Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. ### Patches The issue is fixed by https://github.com/matrix-org/synapse/pull/9855. ### Workarounds There are no known workarounds. ### References n/a ### For more information If you have any questions or comments about this advisory, email us at security@matrix.org.
null
2021-05-19T23:01:45Z
2021-05-19T23:01:45Z
MODERATE
0
{'CWE-400'}
{'https://github.com/matrix-org/synapse/security/advisories/GHSA-7h5v-85w9-pq6c', 'https://github.com/advisories/GHSA-7h5v-85w9-pq6c', 'https://github.com/matrix-org/synapse/pull/9855'}
null
GHSA
GHSA-754h-5r27-7x3r
RCE in Symfony
Description ----------- The `CachingHttpClient` class from the HttpClient Symfony component relies on the `HttpCache` class to handle requests. `HttpCache` uses internal headers like `X-Body-Eval` and `X-Body-File` to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by `CachingHttpClient` and if an attacker can control the response for a request being made by the `CachingHttpClient`, remote code execution is possible. Resolution ---------- HTTP headers designed for internal use in `HttpCache` are now stripped from remote responses before being passed to `HttpCache`. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78) for the 4.4 branch. Credits ------- I would like to thank Matthias Pigulla (webfactory GmbH) for reporting and fixing the issue.
{'CVE-2020-15094'}
2022-03-18T18:31:50Z
2020-09-02T17:29:56Z
HIGH
8
{'CWE-212'}
{'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VAQJXAKWPMWB7OL6QPG2ZSEQZYYPU5RC/', 'https://github.com/advisories/GHSA-754h-5r27-7x3r', 'https://github.com/symfony/symfony/security/advisories/GHSA-754h-5r27-7x3r', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGUWOEETOFVH4PN3I3YO4QZHQ4AUKF3/', 'https://packagist.org/packages/symfony/symfony', 'https://packagist.org/packages/symfony/http-kernel', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15094'}
null
GHSA
GHSA-hpr5-wp7c-hh5q
Cross-Site Scripting in mrk.js
Versions of `mrk.js` before 2.0.1 are vulnerable to cross-site scripting (XSS) when markdown is converted to HTML. ## Recommendation Update to version 2.0.1 or later and use `mark.sanitizeURL()` for any `src` and `href` attributes when extending the markdown.
null
2021-09-23T21:50:21Z
2020-09-01T19:37:29Z
HIGH
0
{'CWE-79'}
{'https://github.com/heyitsmeuralex/mrk/pull/3', 'https://github.com/advisories/GHSA-hpr5-wp7c-hh5q', 'https://www.npmjs.com/advisories/587'}
null
GHSA
GHSA-f39r-cpmj-whcg
Command Injection in ffmpegdotjs
This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23376'}
2021-05-06T15:55:21Z
2021-05-06T15:55:21Z
CRITICAL
9.8
{'CWE-77'}
{'https://github.com/advisories/GHSA-f39r-cpmj-whcg', 'https://snyk.io/vuln/SNYK-JS-FFMPEGDOTJS-1078542', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23376', 'https://github.com/TRomesh/ffmpegdotjs/blob/b7395daf0bdcb81218340427eb7073cdd28462af/index.js%23L219'}
null
GHSA
GHSA-x7j7-qp7j-hw3q
Cross-site scripting (XSS) from writer field content in the site frontend
### Impact Kirby's [writer field](https://getkirby.com/docs/reference/panel/fields/writer) stores its formatted content as HTML code. Unlike with other field types, it is not possible to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks, otherwise the formatting would be lost. Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the site frontend or Panel session of other users. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. Because the writer field did not securely sanitize its contents on save, it was possible to inject malicious HTML code into the content file by sending it to Kirby's API directly without using the Panel. This malicious HTML code would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. You are *not* affected if you don't use the writer field in any of your blueprints. The attack can only be performed by logged-in users and only surfaces in the site frontend (i.e. in your templates). The Panel itself is unaffected and will not execute JavaScript that was injected into writer field content. ### Patches We have patched the vulnerability in [Kirby 3.5.8](https://github.com/getkirby/kirby/releases/tag/3.5.8) by sanitizing all writer field contents on the backend whenever the content is modified via Kirby's API. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. ### Credits Thanks to Azrul Ikhwan Zulkifli (@azrultech) from BAE Systems AI Vulnerability Research Team for responsibly reporting the identified issue.
{'CVE-2021-41252'}
2022-04-19T19:03:14Z
2021-11-16T17:04:19Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-x7j7-qp7j-hw3q', 'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc', 'https://github.com/getkirby/kirby/security/advisories/GHSA-x7j7-qp7j-hw3q', 'https://github.com/getkirby/kirby/releases/tag/3.5.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41252'}
null
GHSA
GHSA-3w5v-p54c-f74x
ejs is ivulnerable to remote code execution due to weak input validation
nodejs ejs versions older than 2.5.3 is vulnerable to remote code execution due to weak input validation in ejs.renderFile() function
{'CVE-2017-1000228'}
2022-04-25T22:06:44Z
2017-11-30T23:15:19Z
CRITICAL
9.8
{'CWE-20'}
{'https://snyk.io/vuln/npm:ejs:20161128', 'https://github.com/advisories/GHSA-3w5v-p54c-f74x', 'http://www.securityfocus.com/bid/101897', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000228'}
null
GHSA
GHSA-28xr-mwxg-3qc8
Command injection in simple-git
`simple-git` (maintained as [git-js](https://github.com/steveukx/git-js) named repository on GitHub) is a light weight interface for running git commands in any node.js application.The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover. A fix was released in simple-git@3.6.0.
{'CVE-2022-24066'}
2022-05-03T22:29:55Z
2022-04-02T00:00:13Z
HIGH
8.1
{'CWE-74', 'CWE-77'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820', 'https://gist.github.com/lirantal/a930d902294b833514e821102316426b', 'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306', 'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24066', 'https://github.com/advisories/GHSA-28xr-mwxg-3qc8'}
null
GHSA
GHSA-568q-9fw5-28wf
Moderate severity vulnerability that affects org.postgresql:pgjdbc-aggregate
A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker could masquerade as a trusted server by providing a certificate for the wrong host, as long as it was signed by a trusted CA.
{'CVE-2018-10936'}
2021-01-08T21:16:40Z
2018-10-19T16:53:33Z
MODERATE
0
{'CWE-297'}
{'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10936', 'http://www.securityfocus.com/bid/105220', 'https://www.postgresql.org/about/news/1883/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10936', 'https://github.com/advisories/GHSA-568q-9fw5-28wf'}
null
GHSA
GHSA-jjx5-3f36-6927
Incorrect buffer size calculation in iced-x86
An issue was discovered in the iced-x86 crate through 1.10.3 for Rust. In Decoder::new(), slice.get_unchecked(slice.length()) is used unsafely.
{'CVE-2021-38188'}
2021-08-25T20:55:47Z
2021-08-25T20:55:47Z
CRITICAL
9.8
{'CWE-131'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0068.html', 'https://github.com/icedland/iced/issues/168', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38188', 'https://github.com/icedland/iced/commit/3c607a003e03b773108401d109167d1840487dce', 'https://github.com/advisories/GHSA-jjx5-3f36-6927'}
null
GHSA
GHSA-h3gg-7wx2-cq3h
XSS in Flarum Sticky extension
### Impact A change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit. Any HTML would be injected through Mithril's `m.trust()` helper. This resulted in an HTML injection where `<script>` tags would not be executed. However it was possible to run javascript from other HTML attributes, enabling a cross-site scripting (XSS) attack to be performed. Since the exploit only happens with the first post of a pinned discussion, an attacker would need the ability to pin their own discussion, or be able to edit a discussion that was previously pinned. On forums where all pinned posts are authored by your staff, you can be relatively certain the vulnerability has not been exploited. Forums where some user-created discussions were pinned can look at the first post edit date to find whether the vulnerability might have been exploited. Because Flarum doesn't store the post content history, you cannot be certain if a malicious edit was reverted. ### Patches The fix will be available in version v0.1.0-beta.16 with Flarum beta 16. The fix has already been back-ported to Flarum beta 15 as version v0.1.0-beta.15.1 of the Sticky extension. ### Workarounds Forum administrators can disable the Sticky extension until they are able to apply the update. The vulnerability cannot be exploited while the extension is disabled. ### References - [Release announcement](https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151) - [Pull Request](https://github.com/flarum/sticky/pull/24) ### For more information If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support). If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy).
{'CVE-2021-21283'}
2022-04-19T19:02:46Z
2021-01-29T18:13:41Z
MODERATE
0
{'CWE-79'}
{'https://github.com/flarum/sticky/security/advisories/GHSA-h3gg-7wx2-cq3h', 'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21283', 'https://github.com/advisories/GHSA-h3gg-7wx2-cq3h', 'https://github.com/flarum/sticky/pull/24', 'https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)'}
null
GHSA
GHSA-jfmf-w293-8xr8
Regular expression Denial of Service (ReDoS) in EmailValidator class in V7 compatibility module in Vaadin 8
Unsafe validation RegEx in `EmailValidator` component in `com.vaadin:vaadin-compatibility-server` versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
null
2022-04-19T19:02:56Z
2021-10-13T18:55:52Z
HIGH
7.5
null
{'https://github.com/vaadin/framework/security/advisories/GHSA-jfmf-w293-8xr8', 'https://github.com/advisories/GHSA-jfmf-w293-8xr8', 'https://vaadin.com/security/cve-2021-31409'}
null
GHSA
GHSA-5r9v-8w62-r26j
livehelperchat is vulnerable to Cross-site Scripting
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0253'}
2022-01-25T19:13:22Z
2022-01-21T23:48:25Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0253', 'https://github.com/advisories/GHSA-5r9v-8w62-r26j', 'https://huntr.dev/bounties/ac7f7eba-ee0b-4a50-bd89-29fd9b3e8303', 'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'}
null
GHSA
GHSA-2pfh-q76x-gwvm
Improper Input Validation and Command Injection in Ansible
A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.
{'CVE-2021-3583'}
2021-10-06T13:06:58Z
2021-09-23T23:16:38Z
HIGH
7.1
{'CWE-20', 'CWE-77'}
{'https://github.com/advisories/GHSA-2pfh-q76x-gwvm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3583', 'https://pypi.org/project/ansible/4.2.0/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1968412', 'https://github.com/ansible/ansible/pull/74960'}
null
GHSA
GHSA-63m4-fhf2-cmf7
Command Execution in windows-cpu
Version of `windows-cpu` before 0.1.5 will execute arbitrary code passed into the first argument of the `findLoad` method, resulting in remote code execution. ## Proof of Concept ``` var win = require('windows-cpu'); wind.findLoad('foo & calc.exe'); ``` ## Recommendation Update to version 0.1.5 or later.
{'CVE-2017-1000219'}
2021-09-23T21:42:05Z
2020-09-01T16:43:55Z
CRITICAL
9.8
{'CWE-78'}
{'https://www.npmjs.com/advisories/336', 'https://github.com/advisories/GHSA-63m4-fhf2-cmf7', 'https://github.com/KyleRoss/windows-cpu/blob/master/index.js#L81', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000219', 'https://nodesecurity.io/advisories/336', 'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'}
null
GHSA
GHSA-wgjx-hm34-qgf7
SQL injection in Centreon
SQL injection vulnerabilities in Centreon through 19.04 allow attacks via the svc_id parameter in include/monitoring/status/Services/xml/makeXMLForOneService.php.
{'CVE-2019-16194'}
2021-08-19T17:12:53Z
2020-02-11T20:36:04Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-wgjx-hm34-qgf7', 'https://github.com/centreon/centreon/releases', 'https://github.com/centreon/centreon/pull/7862', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16194'}
null
GHSA
GHSA-xxxq-chmp-67g4
RSA PKCS#1 decryption vulnerability with prepending zeros in jsrsasign
### Impact Jsrsasign supports RSA PKCS#1 v1.5 (i.e. RSAES-PKCS1-v1_5) and RSA-OAEP encryption and decryption. Its encrypted message is represented as BigInteger. When there is a valid encrypted message, a crafted message with prepending zeros can be decrypted by this vulnerability. - If you don't use RSA PKCS1-v1_5 or RSA-OAEP decryption, this vulnerability is not affected. - Risk to forge contents of encrypted message is very low. - Risk to raise memory corruption is low since jsrsasign uses BigInteger class. ### Patches Users using RSA PKCS1-v1_5 or RSA-OAEP decryption should upgrade to 8.0.18. ### Workarounds Reject RSA PKCS1-v1_5 or RSA-OAEP encrypted message with unnecessary prepending zeros. ### References https://nvd.nist.gov/vuln/detail/CVE-2020-14967 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14967 https://vuldb.com/?id.157124 https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.Cipher.html#.decrypt https://github.com/kjur/jsrsasign/issues/439
{'CVE-2020-14967'}
2021-10-06T22:02:32Z
2020-06-26T16:27:08Z
CRITICAL
9.8
{'CWE-119'}
{'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14967', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://github.com/kjur/jsrsasign/issues/439', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-xxxq-chmp-67g4', 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.Cipher.html#.decrypt', 'https://github.com/advisories/GHSA-xxxq-chmp-67g4', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14967', 'https://vuldb.com/?id.157124', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://www.npmjs.com/package/jsrsasign'}
null
GHSA
GHSA-w6ww-fmfx-2x22
Misconfigured IP address field in ROA leads to OctoRPKI crash
If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash. ## Patches ## For more information If you have any questions or comments about this advisory email us at security@cloudflare.com
{'CVE-2021-3911'}
2022-01-13T18:26:33Z
2021-11-10T19:56:04Z
MODERATE
4.2
{'CWE-252', 'CWE-20'}
{'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-w6ww-fmfx-2x22', 'https://www.debian.org/security/2022/dsa-5041', 'https://github.com/advisories/GHSA-w6ww-fmfx-2x22', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3911'}
null
GHSA
GHSA-gpqc-4pp7-5954
Authentication Bypass by CSRF Weakness
### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: * Executed whether as: * A before_action callback (the default) * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). * Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. Thanks @waiting-for-dev for reporting and providing a patch 👏 ### Patches Spree 4.3 users should update to spree_auth_devise 4.4.1 Spree 4.2 users should update to spree_auth_devise 4.2.1 Spree 4.1 users should update to spree_auth_devise 4.1.1 Older Spree version users should update to spree_auth_devise 4.0.1 ### Workarounds If possible, change your strategy to :exception: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` ### References https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
null
2022-04-19T19:03:15Z
2021-11-18T20:15:35Z
CRITICAL
9.3
{'CWE-352'}
{'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-gpqc-4pp7-5954', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/advisories/GHSA-gpqc-4pp7-5954'}
null
GHSA
GHSA-592v-7frm-h44q
Cross-site scripting in LavaLite-CMS
Cross Site Scripting (XSS) vulnerability in LavaLite-CMS 5.8.0 via the Menu Links feature.
{'CVE-2020-23700'}
2021-09-08T17:25:36Z
2021-09-08T17:25:36Z
MODERATE
4.8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23700', 'https://github.com/advisories/GHSA-592v-7frm-h44q', 'https://github.com/LavaLite/cms/issues/319'}
null
GHSA
GHSA-rhq2-3vr9-6mcr
Files on the host computer can be accessed from the Gradio interface
### Impact This is a vulnerability that affects anyone who creates and publicly shares Gradio interfaces using `gradio<2.4.8`. Because of the way that static files were being served, someone who generated a public Gradio link and shared it with others would potentially be exposing the files on the computer that generated the link, while the link was active. An attacker would be able to view the contents of a file on the computer if they knew the exact relative filepath. We do not have any evidence that this was ever exploited, but we treated the issue seriously and immediately took steps to mitigate it (see below) ### Response 1. We worked with @haby0 to immediately patch the issue and released a new version, `gradio 2.5.0`, within 24 hours of the issue being brought to our attention 2. We enabled a notification that is printed to anyone using an older version of gradio telling them to upgrade (see screenshot below) 3. We expanded our test suite to test for this vulnerability ensuring that our patch does not get reverted in future releases of `gradio` ![image](https://user-images.githubusercontent.com/1778297/146251425-f36b519b-6d4a-4dfb-8d89-c1ed005979d3.png) ### Patches The problem has been patched in `gradio>=2.5.0`.
{'CVE-2021-43831'}
2022-04-19T19:03:17Z
2022-01-21T23:43:33Z
HIGH
8.3
{'CWE-22'}
{'https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr', 'https://github.com/advisories/GHSA-rhq2-3vr9-6mcr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43831', 'https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781'}
null
GHSA
GHSA-9hx9-w2j6-rw76
Low severity vulnerability that affects show_in_browser
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.
{'CVE-2013-2105'}
2021-09-08T18:57:47Z
2017-10-24T18:33:37Z
LOW
0
{'CWE-59'}
{'http://vapid.dhs.org/advisories/show_in_browser.html', 'http://www.openwall.com/lists/oss-security/2013/05/18/4', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2105', 'https://github.com/advisories/GHSA-9hx9-w2j6-rw76', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/84378'}
null
GHSA
GHSA-g95p-88p4-76cm
Cross-site Scripting in Gitea
Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations.
{'CVE-2021-28378'}
2021-09-27T20:17:39Z
2021-09-27T20:17:39Z
MODERATE
5.4
{'CWE-79'}
{'https://blog.gitea.io/2021/03/gitea-1.13.4-is-released/', 'https://github.com/go-gitea/gitea/pull/14899', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28378', 'https://github.com/PandatiX/CVE-2021-28378', 'https://github.com/go-gitea/gitea/pull/14898', 'https://github.com/advisories/GHSA-g95p-88p4-76cm'}
null
GHSA
GHSA-xx8c-m748-xr4j
Access Restriction Bypass in kubernetes
The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object.
{'CVE-2016-1905'}
2022-04-12T22:01:30Z
2022-02-15T01:57:18Z
MODERATE
7.7
{'CWE-284'}
{'https://access.redhat.com/errata/RHSA-2016:0070', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1905', 'https://github.com/kubernetes/kubernetes/commit/9e6912384a5bc714f2a780b870944a8cee264a22', 'https://github.com/advisories/GHSA-xx8c-m748-xr4j', 'https://github.com/kubernetes/kubernetes/issues/19479'}
null
GHSA
GHSA-3pph-2595-cgfh
There is a XML external entity expansion (XXE) vulnerability in Apache Solr
This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network.
{'CVE-2018-1308'}
2022-04-27T14:43:39Z
2018-10-17T19:55:46Z
HIGH
7.5
{'CWE-611'}
{'https://lists.debian.org/debian-lts-announce/2018/04/msg00025.html', 'https://www.debian.org/security/2018/dsa-4194', 'https://github.com/advisories/GHSA-3pph-2595-cgfh', 'https://mail-archives.apache.org/mod_mbox/www-announce/201804.mbox/%3C000001d3cf68%245ac69af0%241053d0d0%24%40apache.org%3E', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1308', 'https://issues.apache.org/jira/browse/SOLR-11971'}
null
GHSA
GHSA-w9mf-24h3-9wxf
Downloads Resources over HTTP in windows-iedriver
Affected versions of `windows-iedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-iedriver`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10689'}
2021-01-08T01:56:54Z
2019-02-18T23:41:58Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-w9mf-24h3-9wxf', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10689', 'https://nodesecurity.io/advisories/293', 'https://www.npmjs.com/advisories/293'}
null
GHSA
GHSA-mv26-cx23-vrfg
Server-Side Request Forgery in @peertube/embed-api
@peertube/embed-api version 4.0.0 and prior is vulnerable to server-side request forgery.
{'CVE-2022-0508'}
2022-02-11T15:05:03Z
2022-02-09T00:00:31Z
MODERATE
6.5
{'CWE-918'}
{'https://github.com/advisories/GHSA-mv26-cx23-vrfg', 'https://huntr.dev/bounties/c3724574-b6c9-430b-849b-40dd2b20f23c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0508', 'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832'}
null
GHSA
GHSA-435p-f82x-mxwm
Command injection in Yamale
23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale.
{'CVE-2021-38305'}
2021-08-26T15:21:24Z
2021-08-11T15:19:23Z
HIGH
7.8
{'CWE-434', 'CWE-78'}
{'https://github.com/23andMe/Yamale/pull/165', 'https://github.com/advisories/GHSA-435p-f82x-mxwm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38305', 'https://github.com/23andMe/Yamale/releases/tag/3.0.8'}
null
GHSA
GHSA-pwr6-p3fh-grc2
Deserialization of Untrusted Data in Magnolia CMS
A vulnerability in the Snake YAML parser of Magnolia CMS v6.2.3 and below allows attackers to execute arbitrary code via a crafted YAML file.
{'CVE-2021-46364'}
2022-03-30T21:10:15Z
2022-02-12T00:00:37Z
HIGH
7.8
{'CWE-502'}
{'https://github.com/advisories/GHSA-pwr6-p3fh-grc2', 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46364', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46364-YAML%20Deserialization-Magnolia%20CMS'}
null
GHSA
GHSA-55xh-53m6-936r
Improper Verification of Cryptographic Signature in aws-encryption-sdk-java
### Impact This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. This update addresses an issue where certain invalid ECDSA signatures incorrectly passed validation. These signatures provide defense in depth and there is no impact on the integrity of decrypted plaintext. This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. ### Patches Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x ### Workarounds None ### For more information https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
null
2021-06-01T21:17:36Z
2021-06-01T21:17:36Z
MODERATE
0
{'CWE-347'}
{'https://github.com/advisories/GHSA-55xh-53m6-936r', 'https://github.com/aws/aws-encryption-sdk-java/security/advisories/GHSA-55xh-53m6-936r'}
null
GHSA
GHSA-fwcm-636p-68r5
Server-side request forgery in CarrierWave
### Impact [CarrierWave download feature](https://github.com/carrierwaveuploader/carrierwave#uploading-files-from-a-remote-location) has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform. ### Patches Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2). ### Workarounds Using proper network segmentation and applying the principle of least privilege to outbound connections from application servers can reduce the severity of SSRF vulnerabilities. Ideally the vulnerable gem should run on an isolated server without access to any internal network resources or cloud metadata access. ### References [Server-Side Request Forgery Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave) * Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com)
{'CVE-2021-21288'}
2022-04-19T19:02:45Z
2021-02-08T19:16:26Z
LOW
0
{'CWE-918'}
{'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08', 'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0', 'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5', 'https://github.com/advisories/GHSA-fwcm-636p-68r5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21288', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://rubygems.org/gems/carrierwave/'}
null
GHSA
GHSA-8p7v-2jvj-v54r
Moderate severity vulnerability that affects apache-airflow
A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views.
{'CVE-2019-0216'}
2021-09-07T20:23:49Z
2019-04-12T20:42:25Z
MODERATE
4.8
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2019/04/10/6', 'http://www.securityfocus.com/bid/107869', 'https://github.com/advisories/GHSA-8p7v-2jvj-v54r', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0216', 'https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231@%3Cdev.airflow.apache.org%3E'}
null
GHSA
GHSA-8xpj-9j9g-fc9r
SQL Injection in elide-datastore-aggregation
### Impact When leveraging the following together: - Elide Aggregation Data Store for Analytic Queries - Parameterized Columns (A column that requires a client provided parameter) - A parameterized column of type TEXT There is the potential for a hacker to provide a carefully crafted query that would bypass server side authorization filters through SQL injection. A recent patch to Elide 6.1.2 allowed the '-' character to be included in parameterized TEXT columns. This character can be interpreted as SQL comments ('--') and allow the attacker to remove the WHERE clause from the generated query and bypass authorization filters. ### Patches A [fix](https://github.com/yahoo/elide/pull/2581) is provided in [Elide 6.1.4](https://github.com/yahoo/elide/releases/tag/6.1.4). ### Workarounds The vulnerability only exists for parameterized columns of type TEXT and only for analytic queries (CRUD is not impacted). Workarounds include leveraging a different type of parameterized column (TIME, MONEY, etc) or not leveraging parameterized columns. ### For more information If you have any questions or comments about this advisory: * Open an issue in [elide](https://github.com/yahoo/elide) * Contact us in [Discord](https://discord.com/invite/3vh8ac57cc)
{'CVE-2022-24827'}
2022-04-18T22:19:45Z
2022-04-08T22:43:17Z
HIGH
8.1
{'CWE-89'}
{'https://github.com/advisories/GHSA-8xpj-9j9g-fc9r', 'https://github.com/yahoo/elide/releases/tag/6.1.4', 'https://github.com/yahoo/elide/pull/2581', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24827', 'https://github.com/yahoo/elide/security/advisories/GHSA-8xpj-9j9g-fc9r'}
null
GHSA
GHSA-4rjf-mxfm-98h5
SQL injection vulnerability in the policy admin tool in Apache Ranger
SQL injection vulnerability in the policy admin tool in Apache Ranger before 0.5.3 allows remote authenticated administrators to execute arbitrary SQL commands via the eventTime parameter to service/plugins/policies/eventTime.
{'CVE-2016-2174'}
2022-04-27T13:48:04Z
2018-10-17T17:21:29Z
HIGH
7.2
{'CWE-89'}
{'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://github.com/advisories/GHSA-4rjf-mxfm-98h5', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2174', 'http://www.openwall.com/lists/oss-security/2016/06/01/3'}
null