ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-vpq5-4rc8-c222
|
Denial of Service in canvas
|
Versions of `canvas` prior to 1.6.10 are vulnerable to Denial of Service. Processing malicious JPEGs or GIFs could crash the node process.
## Recommendation
Upgrade to version 1.6.10
| null |
2020-08-31T18:36:23Z
|
2019-06-05T14:10:45Z
|
MODERATE
| 0
| null |
{'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957', 'https://www.npmjs.com/advisories/804', 'https://hackerone.com/reports/315037', 'https://github.com/advisories/GHSA-vpq5-4rc8-c222'}
| null |
GHSA
|
GHSA-4q97-fh3f-j294
|
Prototype Pollution in tiny-conf
|
All versions of package tiny-conf up to and including version 1.1.0 are vulnerable to Prototype Pollution via the set function.
|
{'CVE-2020-7724'}
|
2021-07-29T22:08:56Z
|
2021-05-10T15:59:24Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05', 'https://snyk.io/vuln/SNYK-JS-TINYCONF-598792', 'https://github.com/advisories/GHSA-4q97-fh3f-j294', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7724'}
| null |
GHSA
|
GHSA-6mqr-q86q-6gwr
|
Authentication Bypass by CSRF Weakness
|
### Impact
CSRF vulnerability that allows user account takeover.
All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
* Executed whether as:
* A before_action callback (the default)
* A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).
* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).
That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
Thanks @waiting-for-dev for reporting and providing a patch 👏
### Patches
Spree 4.3 users should update to spree_auth_devise 4.4.1
Spree 4.2 users should update to spree_auth_devise 4.2.1
### Workarounds
If possible, change your strategy to :exception:
```ruby
class ApplicationController < ActionController::Base
protect_from_forgery with: :exception
end
```
Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:
```ruby
config.after_initialize do
Spree::UsersController.protect_from_forgery with: :exception
end
```
### References
https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
| null |
2022-04-19T19:03:15Z
|
2021-11-18T20:15:09Z
|
CRITICAL
| 9.3
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-6mqr-q86q-6gwr', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-6mqr-q86q-6gwr'}
| null |
GHSA
|
GHSA-84qj-9qf2-q92r
|
Malicious Package in pm-controls
|
Version 1.1.8 of `pm-controls` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-03T00:32:30Z
|
2020-09-03T00:32:30Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/949', 'https://github.com/advisories/GHSA-84qj-9qf2-q92r'}
| null |
GHSA
|
GHSA-63xm-rx5p-xvqr
|
Heap buffer overflow in Tensorflow
|
### Impact
The implementation of `SparseFillEmptyRowsGrad` uses a double indexing pattern:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L263-L269
It is possible for `reverse_index_map(i)` to be an index outside of bounds of `grad_values`, thus resulting in a heap buffer overflow.
### Patches
We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2020-15195'}
|
2021-11-19T15:19:39Z
|
2020-09-25T18:28:29Z
|
HIGH
| 8.5
|
{'CWE-119', 'CWE-122', 'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15195', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-63xm-rx5p-xvqr', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr'}
| null |
GHSA
|
GHSA-vrcc-g6vj-mh5w
|
Denial of service in go-ethereum
|
Go-Ethereum v1.10.9 was discovered to contain an issue which allows attackers to cause a denial of service (DoS) via sending an excessive amount of messages to a node. This is caused by missing memory in the component /ethash/algorithm.go.
|
{'CVE-2021-42219'}
|
2022-03-30T20:05:14Z
|
2022-03-18T00:01:13Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-vrcc-g6vj-mh5w', 'https://docs.google.com/document/d/1dYFSpNZPC0OV-n1mMqdc269u9yYU1XQy/edit?usp=sharing&ouid=112110745137218798745&rtpof=true&sd=true', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42219'}
| null |
GHSA
|
GHSA-6fvx-r7hx-3vh6
|
JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java.
|
JavaMelody before 1.74.0 has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java.
|
{'CVE-2018-15531'}
|
2022-04-27T14:25:07Z
|
2018-10-17T18:28:00Z
|
CRITICAL
| 9.8
|
{'CWE-611'}
|
{'https://github.com/javamelody/javamelody/wiki/ReleaseNotes', 'https://jenkins.io/security/advisory/2018-09-25/', 'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353', 'http://www.openwall.com/lists/oss-security/2018/09/25/3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15531', 'https://github.com/advisories/GHSA-6fvx-r7hx-3vh6'}
| null |
GHSA
|
GHSA-g785-775g-f2g8
|
Downloads Resources over HTTP in haxe
|
Affected versions of `haxe` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe`.
## Recommendation
Update to version 5.0.10 or later.
|
{'CVE-2016-10602'}
|
2021-09-16T20:44:53Z
|
2019-02-18T23:50:21Z
|
HIGH
| 0
|
{'CWE-311', 'CWE-269'}
|
{'https://github.com/advisories/GHSA-g785-775g-f2g8', 'https://nodesecurity.io/advisories/177', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10602', 'https://www.npmjs.com/advisories/177'}
| null |
GHSA
|
GHSA-36mj-6r7r-mqhf
|
User can obtain JWT token even if account is disabled
|
Users can authenticate this way even if their user account is disabled. This is a high risk vulnerability when account disabling is used to block users' access to the system. (Someone who never had an account cannot exploit this vulnerability.) The fix ensures tokens are generated only for enabled user accounts, and is distributed via Composer as ezsystems/ezplatform-rest v1.3.8
| null |
2021-09-29T17:09:23Z
|
2021-09-29T17:09:23Z
|
HIGH
| 0
|
{'CWE-284'}
|
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-007-jwt-auth-possible-for-disabled-users.-username-login-handler-can-t-be-disabled', 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-36mj-6r7r-mqhf', 'https://github.com/advisories/GHSA-36mj-6r7r-mqhf'}
| null |
GHSA
|
GHSA-hpv4-7p9c-mvfr
|
Heap buffer overflow in `FractionalAvgPoolGrad`
|
### Impact
The implementation for `tf.raw_ops.FractionalAvgPoolGrad` can be tricked into accessing data outside of bounds of heap allocated buffers:
```python
import tensorflow as tf
tf.raw_ops.FractionalAvgPoolGrad(
orig_input_tensor_shape=[0,1,2,3],
out_backprop = np.array([[[[541],[541]],[[541],[541]]]]),
row_pooling_sequence=[0, 0, 0, 0, 0],
col_pooling_sequence=[-2, 0, 0, 2, 0],
overlapping=True)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/fractional_avg_pool_op.cc#L205) does not validate that the input tensor is non-empty. Thus, code constructs an empty `EigenDoubleMatrixMap` and then accesses this buffer with indices that are outside of the empty area.
### Patches
We have patched the issue in GitHub commit [0f931751fb20f565c4e94aa6df58d54a003cdb30](https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37651'}
|
2021-08-25T14:43:21Z
|
2021-08-25T14:43:21Z
|
HIGH
| 7.1
|
{'CWE-787', 'CWE-125'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37651', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr', 'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30', 'https://github.com/advisories/GHSA-hpv4-7p9c-mvfr'}
| null |
GHSA
|
GHSA-vg27-hr3v-3cqv
|
open redirect in pollbot
|
(From https://bugzilla.mozilla.org/show_bug.cgi?id=1753838)
Summary:
There was an open redirection vulnerability in the path of:
https://pollbot.services.mozilla.com/ and https://pollbot.stage.mozaws.net/
Description:
An attacker can redirect anyone to malicious sites.
Steps To Reproduce:
Type in this URL:
https://pollbot.services.mozilla.com/%0a/evil.com/
It redirects to that website
evil.com
evil.com was used as an example but this could be any website. Note, the /%0a/ and trailing / are required.
Supporting Material/References:
https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
Impact
Attackers can serve malicious websites that steal passwords or download ransomware to their victims machine due to a redirect and there are a heap of other attack vectors.
|
{'CVE-2022-0637'}
|
2022-04-19T19:03:23Z
|
2022-02-16T23:02:09Z
|
HIGH
| 0
|
{'CWE-601'}
|
{'https://github.com/advisories/GHSA-vg27-hr3v-3cqv', 'https://github.com/mozilla/PollBot/security/advisories/GHSA-vg27-hr3v-3cqv'}
| null |
GHSA
|
GHSA-gwfj-pw2x-h6c2
|
Out of bounds read in simd-json
|
An issue was discovered in the simd-json crate before 0.1.15 for Rust. There is an out-of-bounds read and an incorrect crossing of a page boundary.
|
{'CVE-2019-15550'}
|
2021-08-25T20:43:56Z
|
2021-08-25T20:43:56Z
|
HIGH
| 7.5
|
{'CWE-125'}
|
{'https://rustsec.org/advisories/RUSTSEC-2019-0008.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15550', 'https://github.com/Licenser/simdjson-rs/pull/27', 'https://github.com/advisories/GHSA-gwfj-pw2x-h6c2'}
| null |
GHSA
|
GHSA-3x58-xr87-2fcj
|
Cross-site scripting in bluemonday
|
bluemonday before 1.0.5 allows XSS because certain Go lowercasing converts an uppercase Cyrillic character, defeating a protection mechanism against the "script" string.
|
{'CVE-2021-29272'}
|
2022-03-15T21:37:06Z
|
2021-05-18T21:07:37Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://vuln.ryotak.me/advisories/4', 'https://github.com/microcosm-cc/bluemonday/issues/111', 'https://github.com/microcosm-cc/bluemonday/releases/tag/v1.0.5', 'https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee', 'https://vuln.ryotak.me/advisories/4.txt', 'https://github.com/advisories/GHSA-3x58-xr87-2fcj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29272'}
| null |
GHSA
|
GHSA-8vj3-jgcf-77jv
|
Malicious Package in requeest
|
All versions of `requeest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:04:44Z
|
2020-09-02T20:26:49Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/858', 'https://github.com/advisories/GHSA-8vj3-jgcf-77jv'}
| null |
GHSA
|
GHSA-h2fw-93qx-vrcq
|
SQL Injection in Moodle
|
An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default.
|
{'CVE-2022-0983'}
|
2022-04-05T20:54:47Z
|
2022-03-26T00:00:29Z
|
HIGH
| 8.8
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-h2fw-93qx-vrcq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G4GRMWBGHOJMFXMTORECQNULJK7ZJJ6Y/', 'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1', 'https://bugzilla.redhat.com/show_bug.cgi?id=2064119', 'https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74074', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0983'}
| null |
GHSA
|
GHSA-8cw5-rv98-5c46
|
Arbitrary PHP code execution in Drupal
|
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6, and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in
PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.
|
{'CVE-2019-6339'}
|
2022-01-06T22:30:06Z
|
2022-01-06T22:30:06Z
|
CRITICAL
| 9.8
|
{'CWE-20'}
|
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6339.yaml', 'https://www.drupal.org/sa-core-2019-002', 'https://lists.debian.org/debian-lts-announce/2019/02/msg00004.html', 'https://www.debian.org/security/2019/dsa-4370', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6339', 'https://github.com/advisories/GHSA-8cw5-rv98-5c46'}
| null |
GHSA
|
GHSA-rcp4-jm2v-mr3f
|
Cross-site scripting in Shopizer
|
A stored cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via customer_name in various forms of store administration. It is saved in the database. The code is executed for any user of store administration when information is fetched from the backend, e.g., in admin/customers/list.html.
|
{'CVE-2021-33561'}
|
2021-06-08T23:10:24Z
|
2021-06-08T23:10:24Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271', 'https://www.exploit-db.com/exploits/49901', 'https://github.com/advisories/GHSA-rcp4-jm2v-mr3f', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33561'}
| null |
GHSA
|
GHSA-3jxh-789f-p7m6
|
Cross-site Scripting
|
An issue was discovered in Craft CMS before 3.6.0. In some circumstances, a potential XSS vulnerability existed in connection with front-end forms that accepted user uploads.
|
{'CVE-2021-27902'}
|
2021-07-07T17:11:18Z
|
2021-07-02T18:36:31Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security-1', 'https://github.com/craftcms/cms/commit/8ee85a8f03c143fa2420e7d6f311d95cae3b19ce', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27902', 'https://github.com/advisories/GHSA-3jxh-789f-p7m6', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#360---2021-01-26'}
| null |
GHSA
|
GHSA-3c6g-pvg8-gqw2
|
Command injection in json
|
This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.
|
{'CVE-2020-7712'}
|
2022-02-08T22:04:50Z
|
2021-05-06T18:11:21Z
|
HIGH
| 7.2
|
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7712', 'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931', 'https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E', 'https://github.com/trentm/json/issues/144', 'https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-608932', 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/trentm/json/pull/145', 'https://snyk.io/vuln/SNYK-JS-JSON-597481', 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-3c6g-pvg8-gqw2', 'https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-82j4-vr25-x394
|
Cross-site Scripting in ShowDoc
|
ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
|
{'CVE-2022-0940'}
|
2022-03-23T15:41:45Z
|
2022-03-15T00:01:01Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-82j4-vr25-x394', 'https://github.com/star7th/showdoc/commit/78522520892d4e29cc94148c6ec84a204a607b73', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0940', 'https://huntr.dev/bounties/856bd2e2-db4f-4b7d-9927-222261ae3782'}
| null |
GHSA
|
GHSA-p523-jrph-qjc6
|
Insufficient Session Expiration in shopware
|
### Impact
Automatically invalidate sessions upon password change
### Patches
We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
|
{'CVE-2022-21652'}
|
2022-01-06T23:49:17Z
|
2022-01-06T23:49:17Z
|
LOW
| 3.5
|
{'CWE-613'}
|
{'https://github.com/advisories/GHSA-p523-jrph-qjc6', 'https://github.com/shopware/shopware/commit/47ebd126a94f4b019b6fde64c0df3d18d74ef7d0', 'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-p523-jrph-qjc6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21652'}
| null |
GHSA
|
GHSA-36cg-4jff-5863
|
Data races in signal-simple
|
An issue was discovered in the signal-simple crate through 2020-11-15 for Rust. There are unconditional implementations of Send and Sync for SyncChannel<T>.
|
{'CVE-2020-36446'}
|
2021-08-25T20:59:13Z
|
2021-08-25T20:59:13Z
|
HIGH
| 8.1
|
{'CWE-119', 'CWE-362'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36446', 'https://github.com/advisories/GHSA-36cg-4jff-5863', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/signal-simple/RUSTSEC-2020-0126.md', 'https://rustsec.org/advisories/RUSTSEC-2020-0126.html'}
| null |
GHSA
|
GHSA-c66w-hq56-4q97
|
Network policy may be bypassed by some ICMP Echo Requests
|
## Impact
Under certain conditions, ICMP Echo Request sent to a Cilium endpoint from an actor may bypass a network policy which _disallows_ access from the actor to the endpoint, but _allows_ from the endpoint to the actor. This does _NOT_ apply to UDP and TCP traffic.
The actor is either a pod or a cluster host or a remote host.
The following conditions must be met:
1. Network policies have been created which:
a) do not allow access from the actor to the endpoint;
b) allow access from the endpoint to the actor and does not specify neither protocol nor port.
2. The endpoint has sent ICMP Echo Request to the actor with the ICMP identifier X.
3. The actor sends ICMP Echo Request to the endpoint with the same ICMP identifier X.
4. The request from the actor (3.) is sent before the Cilium's conntrack GC has removed the previously created conntrack entry (2.).
## Detailed description
See https://github.com/cilium/cilium/commit/dfb008a9099c4da1e0fd964c899c43ee13280b0e (v1.9.x), https://github.com/cilium/cilium/commit/ff6ebae6efca1bd991302b464dea428512823e79 (v1.8.x), https://github.com/cilium/cilium/commit/472bbeff75161979c317ab21d563f826291b5f37 (v1.7.x).
## Example
```
$ kubectl run server --image=quay.io/cilium/net-test:v1.0.0 --restart=Never -- sleep 3600
$ kubectl run client --image=quay.io/cilium/net-test:v1.0.0 --restart=Never -- sleep 3600
$ cat <<EOF | kubectl apply -f
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: server-netpol # allow client->server
spec:
podSelector:
matchLabels:
run: server
ingress:
- from:
- podSelector:
matchLabels:
run: client
policyTypes:
- Ingress
---
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: client-netpol # deny any->client
spec:
podSelector:
matchLabels:
run: client
policyTypes:
- Ingress
EOF
$ kubectl exec -ti server -- xping -c1 -x666 $CLIENT_POD_IP
PING 10.154.0.50 (10.154.0.50): 56 data bytes
^C
--- 10.154.0.50 ping statistics ---
1 packets transmitted, 0 packets received, 100% packet loss <--- "client-netpol" policy denied
command terminated with exit code 1
$ kubectl exec -ti client -- xping -c1 -x666 $SERVER_POD_IP
PING 10.154.1.16 (10.154.1.16): 56 data bytes
64 bytes from 10.154.1.16: seq=0 ttl=60 time=0.822 ms
--- 10.154.1.16 ping statistics ---
1 packets transmitted, 1 packets received, 0% packet loss <--- "server-netpol" policy allowed
round-trip min/avg/max = 0.822/0.822/0.822 ms
$ kubectl exec -ti server -- xping -c1 -x666 $CLIENT_POD_IP
PING 10.154.0.50 (10.154.0.50): 56 data bytes
64 bytes from 10.154.0.50: seq=0 ttl=60 time=0.527 ms
--- 10.154.0.50 ping statistics ---
1 packets transmitted, 1 packets received, 0% packet loss <--- "client-netpol" policy bypassed
round-trip min/avg/max = 0.527/0.527/0.527 ms
```
## For more information
If you have any questions or comments about this advisory:
- Open an issue in [Cilium Issues](https://github.com/cilium/cilium/issues)
- Email us at security@cilium.io
| null |
2022-04-19T19:02:50Z
|
2021-05-21T14:32:37Z
|
LOW
| 0
| null |
{'https://github.com/cilium/cilium/security/advisories/GHSA-c66w-hq56-4q97', 'https://github.com/advisories/GHSA-c66w-hq56-4q97'}
| null |
GHSA
|
GHSA-vqcj-wrf2-7v73
|
Out-of-bounds Write
|
In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode.
|
{'CVE-2020-35654'}
|
2021-03-18T19:55:27Z
|
2021-03-18T19:55:27Z
|
HIGH
| 8.8
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-vqcj-wrf2-7v73', 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35654'}
| null |
GHSA
|
GHSA-58w4-w77w-qv3w
|
Reflected XSS with parameters in PostComment
|
### Impact
An attacker could inject malicious web code into the users' web browsers by creating a malicious link.
### Patches
The problem is fixed in 4.2.0
### References
[Cross-site Scripting (XSS) - Reflected (CWE-79) ](https://cwe.mitre.org/data/definitions/79.html)
|
{'CVE-2020-26225'}
|
2022-04-19T19:02:40Z
|
2020-11-16T21:23:29Z
|
MODERATE
| 8.7
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26225', 'https://github.com/advisories/GHSA-58w4-w77w-qv3w', 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-58w4-w77w-qv3w', 'https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf'}
| null |
GHSA
|
GHSA-2cv6-6437-39p2
|
Cross-site Scripting in microweber
|
File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.
|
{'CVE-2022-0930'}
|
2022-03-22T20:03:40Z
|
2022-03-13T00:00:53Z
|
HIGH
| 4.8
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-2cv6-6437-39p2', 'https://github.com/microweber/microweber/commit/33eb4cc0f80c1f86388c1862a8aee1061fa5d72e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0930', 'https://huntr.dev/bounties/d184ce19-9608-42f1-bc3d-06ece2d9a993'}
| null |
GHSA
|
GHSA-533p-g2hq-qr26
|
Command Injection in treekill
|
All versions of `treekill` are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-04T19:40:42Z
|
2020-09-04T17:16:35Z
|
HIGH
| 0
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-533p-g2hq-qr26', 'https://hackerone.com/reports/703415', 'https://www.npmjs.com/advisories/1433'}
| null |
GHSA
|
GHSA-wgx7-jwwm-cgjv
|
Improper Authentication in Apache Spark
|
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
|
{'CVE-2020-9480'}
|
2022-04-27T20:51:31Z
|
2022-02-10T23:05:20Z
|
CRITICAL
| 9.8
|
{'CWE-287', 'CWE-306'}
|
{'https://github.com/advisories/GHSA-wgx7-jwwm-cgjv', 'https://spark.apache.org/security.html#CVE-2020-9480', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9480', 'https://lists.apache.org/thread.html/ree9e87aae81852330290a478692e36ea6db47a52a694545c7d66e3e2@%3Cdev.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a27eaada75222761efc3f7238b5a3b@%3Ccommits.doris.apache.org%3E', 'https://lists.apache.org/thread.html/rb3956440747e41940d552d377d50b144b60085e7ff727adb0e575d8d@%3Ccommits.submarine.apache.org%3E', 'https://lists.apache.org/thread.html/r03ad9fe7c07d6039fba9f2152d345274473cb0af3d8a4794a6645f4b@%3Cuser.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
| null |
GHSA
|
GHSA-45hw-29x7-9x95
|
Arbitrary File Read in Snyk Broker
|
All versions of snyk-broker before 4.79.0 are vulnerable to Arbitrary File Read. It allows partial file reads for users who have access to Snyk's internal network via patch history from GitHub Commits API.
|
{'CVE-2020-7651'}
|
2021-07-29T17:23:09Z
|
2020-06-03T22:02:11Z
|
MODERATE
| 4.3
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-45hw-29x7-9x95', 'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7651', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570610'}
| null |
GHSA
|
GHSA-7v2r-wxmg-mgvc
|
HTTP Request smuggling in tiny_http
|
An issue was discovered in the tiny_http crate through 2020-06-16 for Rust. HTTP Request smuggling can occur via a malformed Transfer-Encoding header.
|
{'CVE-2020-35884'}
|
2021-12-14T15:33:45Z
|
2021-08-25T20:48:56Z
|
MODERATE
| 6.5
|
{'CWE-444'}
|
{'https://github.com/tiny-http/tiny-http/issues/173', 'https://github.com/tiny-http/tiny-http/pull/190', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35884', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VO6SRTCEPEYO2OX647I3H5XUWLFDRDWL/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3JDNRE5RXJOWZZZF5QSCG4GUCSLTHF2/', 'https://rustsec.org/advisories/RUSTSEC-2020-0031.html', 'https://github.com/advisories/GHSA-7v2r-wxmg-mgvc'}
| null |
GHSA
|
GHSA-79rg-7mv3-jrr5
|
Rating Script Service expose XWiki to SQL injection
|
### Impact
This issue impacts only XWiki with the Ratings API installed.
The Rating Script Service expose an API to perform SQL requests without escaping the from and where search arguments.
This might lead to an SQL script injection quite easily for any user having Script rights on XWiki.
### Patches
The problem has been patched in XWiki 12.9RC1.
### Workarounds
The only workaround besides upgrading XWiki would be to uninstall the Ratings API in XWiki from the Extension Manager.
### References
https://jira.xwiki.org/browse/XWIKI-17662
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](http://jira.xwiki.org)
* Email us at our [security mailing list](mailto:security@xwiki.org)
|
{'CVE-2021-21380'}
|
2021-03-25T15:14:39Z
|
2021-03-23T22:48:01Z
|
HIGH
| 7.7
|
{'CWE-89'}
|
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-79rg-7mv3-jrr5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21380', 'https://github.com/advisories/GHSA-79rg-7mv3-jrr5', 'https://jira.xwiki.org/browse/XWIKI-17662'}
| null |
GHSA
|
GHSA-p33m-7w7f-gmj8
|
Uncontrolled Resource Consumption in fun-map
|
fun-map through 3.3.1 is vulnerable to Prototype Pollution. The function assocInM could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
|
{'CVE-2020-7644'}
|
2021-12-10T20:05:07Z
|
2021-12-10T20:05:07Z
|
HIGH
| 8.1
|
{'CWE-915'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7644', 'https://github.com/nathan7/fun-map/blob/master/index.js#L137,', 'https://github.com/advisories/GHSA-p33m-7w7f-gmj8', 'https://snyk.io/vuln/SNYK-JS-FUNMAP-564436'}
| null |
GHSA
|
GHSA-59c7-4xj2-hgvw
|
Moderate severity vulnerability that affects rails-html-sanitizer
|
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
|
{'CVE-2015-7578'}
|
2021-09-01T21:30:33Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578', 'http://www.securitytracker.com/id/1034816', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ', 'https://github.com/advisories/GHSA-59c7-4xj2-hgvw', 'http://www.openwall.com/lists/oss-security/2016/01/25/11', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html'}
| null |
GHSA
|
GHSA-6fw4-hr69-g3rv
|
Prototype Pollution in property-expr
|
The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function.
|
{'CVE-2020-7707'}
|
2021-07-29T22:00:51Z
|
2021-05-06T17:29:47Z
|
CRITICAL
| 9.8
|
{'CWE-915'}
|
{'https://github.com/advisories/GHSA-6fw4-hr69-g3rv', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857', 'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7707', 'https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800'}
| null |
GHSA
|
GHSA-ggxm-pgc9-g7fp
|
Arbitrary Code Execution in rdoc
|
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
|
{'CVE-2021-31799'}
|
2022-04-22T15:44:17Z
|
2021-09-01T18:53:15Z
|
HIGH
| 7
|
{'CWE-74', 'CWE-77'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security-tracker.debian.org/tracker/CVE-2021-31799', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html', 'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31799', 'https://github.com/advisories/GHSA-ggxm-pgc9-g7fp', 'https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/', 'https://security.netapp.com/advisory/ntap-20210902-0004/'}
| null |
GHSA
|
GHSA-c99h-fgqm-6679
|
UnixAuthenticationService in Apache Ranger was updated to correctly handle user input to avoid Stack-based buffer overflow
|
UnixAuthenticationService in Apache Ranger 1.2.0 was updated to correctly handle user input to avoid Stack-based buffer overflow. Versions prior to 1.2.0 should be upgraded to 1.2.0
|
{'CVE-2018-11778'}
|
2022-04-27T13:52:10Z
|
2018-10-17T17:22:23Z
|
HIGH
| 8.8
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-c99h-fgqm-6679', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11778', 'https://lists.apache.org/thread.html/rd88077a781ef38f7687c100f93992f4dda8aa101925050c4af470998@%3Cdev.ranger.apache.org%3E', 'https://seclists.org/oss-sec/2018/q4/11', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://lists.apache.org/thread.html/r04bc435a92911de4b52d2b98f169bd7cf2e8bbeb53b03788df8f932c@%3Cdev.ranger.apache.org%3E'}
| null |
GHSA
|
GHSA-xgf5-5gjr-4hjq
|
Directory Traversal in zjjserver
|
Affected versions of `zjjserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16201'}
|
2021-01-14T15:42:25Z
|
2020-09-01T18:15:20Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/zjjserver', 'https://nodesecurity.io/advisories/427', 'https://github.com/advisories/GHSA-xgf5-5gjr-4hjq', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16201', 'https://www.npmjs.com/advisories/427'}
| null |
GHSA
|
GHSA-6m93-343m-3jrc
|
Cross-site Scripting in HTML2PDF
|
An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document.
|
{'CVE-2021-45394'}
|
2022-01-25T20:48:30Z
|
2022-01-21T23:29:48Z
|
HIGH
| 8.8
|
{'CWE-79', 'CWE-918'}
|
{'https://www.synacktiv.com/sites/default/files/2022-01/html2pdf_ssrf_deserialization.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45394', 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f', 'https://github.com/spipu/html2pdf/blob/master/CHANGELOG.md', 'https://github.com/spipu/html2pdf/releases/tag/v5.2.4', 'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585', 'https://github.com/advisories/GHSA-6m93-343m-3jrc'}
| null |
GHSA
|
GHSA-xrmp-99wj-p6jc
|
Prototype Pollution in deap
|
Versions of `deap` before 1.0.1 are vulnerable to prototype pollution.
## Recommendation
Update to version 1.0.1 or later.
| null |
2021-08-04T21:21:43Z
|
2019-05-31T23:43:09Z
|
HIGH
| 7.3
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-xrmp-99wj-p6jc', 'https://nodesecurity.io/advisories/611', 'https://www.npmjs.com/advisories/611', 'https://hackerone.com/reports/310446', 'https://snyk.io/vuln/npm:deap:20180415'}
| null |
GHSA
|
GHSA-97mp-9g5c-6c93
|
Malicious Package in bs58chcek
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:49:31Z
|
2020-09-04T16:50:48Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-97mp-9g5c-6c93', 'https://www.npmjs.com/advisories/1375'}
| null |
GHSA
|
GHSA-48ww-j4fc-435p
|
Command injection in nodemailer
|
This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails.
|
{'CVE-2020-7769'}
|
2021-07-29T20:31:01Z
|
2021-05-10T19:16:52Z
|
CRITICAL
| 9.8
|
{'CWE-88'}
|
{'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7769', 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834', 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js#L75', 'https://github.com/advisories/GHSA-48ww-j4fc-435p', 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js%23L75', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742', 'https://www.npmjs.com/package/nodemailer'}
| null |
GHSA
|
GHSA-c6p9-24rc-jr5h
|
Remote Code Execution and download tracking in Mintegral SDK
|
"This affects all versions of package com.mintegral.msdk:alphab. The Android SDK distributed by the company contains malicious functionality in this module that tracks: 1. Downloads from Google urls either within Google apps or via browser including file downloads, e-mail attachments and Google Docs links. 2. All apk downloads, either organic or not. Mintegral listens to download events in Android's download manager and detects if the downloaded file's url contains: a. google.com or comes from a Google app (the com.android.vending package) b. Ends with .apk for apk downloads In both cases, the module sends the captured data back to Mintegral's servers. Note that the malicious functionality keeps running even if the app is currently not in focus (running in the background)."
|
{'CVE-2020-7744'}
|
2021-04-22T16:15:15Z
|
2021-04-22T16:15:15Z
|
MODERATE
| 4.7
|
{'CWE-319'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7744', 'https://snyk.io/vuln/SNYK-JAVA-COMMINTEGRALMSDK-1018714', 'https://snyk.io/research/sour-mint-malicious-sdk/', 'https://snyk.io/blog/remote-code-execution-rce-sourmint/', 'https://github.com/advisories/GHSA-c6p9-24rc-jr5h'}
| null |
GHSA
|
GHSA-pq6v-x7gp-7776
|
Source code is downloaded over cleartext HTTP in portaudio
|
An issue was discovered in the portaudio crate through 0.7.0 for Rust. There is a man-in-the-middle issue because the source code is downloaded over cleartext HTTP.
|
{'CVE-2016-10933'}
|
2021-08-25T20:43:09Z
|
2021-08-25T20:43:09Z
|
MODERATE
| 5.9
|
{'CWE-319'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10933', 'https://rustsec.org/advisories/RUSTSEC-2016-0003.html', 'https://github.com/advisories/GHSA-pq6v-x7gp-7776', 'https://github.com/RustAudio/rust-portaudio/issues/144'}
| null |
GHSA
|
GHSA-5v5h-4w2g-gxxc
|
SQL Injection in t3/dce
|
The dce (aka Dynamic Content Element) extension 2.2.0 through 2.6.x before 2.6.2, and 2.7.x before 2.7.1, for TYPO3 allows SQL Injection via a backend user account.
|
{'CVE-2021-31777'}
|
2021-06-08T20:12:23Z
|
2021-06-08T20:12:23Z
|
HIGH
| 7.6
|
{'CWE-89'}
|
{'https://packagist.org/packages/t3/dce', 'https://github.com/advisories/GHSA-5v5h-4w2g-gxxc', 'https://excellium-services.com/cert-xlm-advisory/', 'https://bitbucket.org/ArminVieweg/dce/commits/998a2392f69f2153797c5ace6e8914ca309e70c7', 'http://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-005', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31777'}
| null |
GHSA
|
GHSA-269g-pwp5-87pp
|
TemporaryFolder on unix-like systems does not limit access to created files
|
### Vulnerability
The JUnit4 test rule [TemporaryFolder](https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html) contains a local information disclosure vulnerability.
Example of vulnerable code:
```java
public static class HasTempFolder {
@Rule
public TemporaryFolder folder = new TemporaryFolder();
@Test
public void testUsingTempFolder() throws IOException {
folder.getRoot(); // Previous file permissions: `drwxr-xr-x`; After fix:`drwx------`
File createdFile= folder.newFile("myfile.txt"); // unchanged/irrelevant file permissions
File createdFolder= folder.newFolder("subfolder"); // unchanged/irrelevant file permissions
// ...
}
}
```
### Impact
On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system.
This vulnerability **does not** allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability.
When analyzing the impact of this vulnerability, here are the important questions to ask:
1. Do the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder?
- If yes, this vulnerability impacts you, but only if you also answer 'yes' to question 2.
- If no, this vulnerability does not impact you.
2. Do the JUnit tests ever execute in an environment where the OS has other untrusted users.
_This may apply in CI/CD environments but normally won't be 'yes' for personal developer machines._
- If yes, and you answered 'yes' to question 1, this vulnerability impacts you.
- If no, this vulnerability does not impact you.
### Patches
Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using.
- Java 1.7 and higher users: this vulnerability is fixed in 4.13.1.
- Java 1.6 and lower users: **no patch is available, you must use the workaround below.**
### Workarounds
If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability.
### References
- [CWE-200: Exposure of Sensitive Information to an Unauthorized Actor](https://cwe.mitre.org/data/definitions/200.html)
- Fix commit https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae
#### Similar Vulnerabilities
- Google Guava - https://github.com/google/guava/issues/4011
- Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945
- JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824
### For more information
If you have any questions or comments about this advisory, please pen an issue in [junit-team/junit4](https://github.com/junit-team/junit4/issues).
|
{'CVE-2020-15250'}
|
2022-04-25T23:05:55Z
|
2020-10-12T17:33:00Z
|
MODERATE
| 4.4
|
{'CWE-200', 'CWE-732'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/junit-team/junit4/issues/1676', 'https://lists.apache.org/thread.html/rc49cf1547ef6cac1be4b3c92339b2cae0acacf5acaba13cfa429a872@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r742b44fd75215fc75963b8ecc22b2e4372e68d67d3d859d2b5e8743f@%3Cdev.knox.apache.org%3E', 'https://github.com/advisories/GHSA-269g-pwp5-87pp', 'https://lists.apache.org/thread.html/r925eaae7dd8f77dd61eefc49c1fcf54bd9ecfe605486870d7b1e9390@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rb2ffe2993f4dccc48d832e1a0f1c419477781b6ea16e725ca2276dbb@%3Cdev.knox.apache.org%3E', 'https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html', 'https://lists.apache.org/thread.html/r2b78f23bc2711a76a7fc73ad67b7fcd6817c5cfccefd6f30a4f54943@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rf2ec93f4ca9a97d1958eb4a31b1830f723419ce9bf2018a6e5741d5b@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r01110833b63616ddbef59ae4e10c0fbd0060f0a51206defd4cb4d917@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/raebf13f53cd5d23d990712e3d11c80da9a7bae94a6284050f148ed99@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp', 'https://lists.apache.org/thread.html/rdbdd30510a7c4d0908fd22075c02b75bbc2e0d977ec22249ef3133cb@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r29d703d1986d9b871466ff24082a1828ac8ad27bb0965a93a383872e@%3Cpluto-scm.portals.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15250', 'https://lists.apache.org/thread.html/rf6e5d894d4b03bef537c9d6641272e0197c047c0d1982b4e176d0353@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r5f8841507576f595bb783ccec6a7cb285ea90d4e6f5043eae0e61a41@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r30f502d2f79e8d635361adb8108dcbb73095163fcbd776ee7984a094@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r9710067c7096b83cb6ae8f53a2f6f94e9c042d1bf1d6929f8f2a2b7a@%3Ccommits.knox.apache.org%3E', 'https://github.com/junit-team/junit4/blob/7852b90cfe1cea1e0cdaa19d490c83f0d8684b50/doc/ReleaseNotes4.13.1.md', 'https://lists.apache.org/thread.html/reb700e60b9642eafa4b7922bfee80796394135aa09c7a239ef9f7486@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r687f489b10b0d14e46f626aa88476545e1a2600b24c4ebd3c0d2a10b@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rdef7d1380c86e7c0edf8a0f89a2a8db86fce5e363457d56b722691b4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rea812d8612fdc46842a2a57248cad4b01ddfdb1e9b037c49e68fdbfb@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r09cfbb5aedd76023691bbce9ca4ce2e16bb07dd37554a17efc19935d@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rb2771949c676ca984e58a5cd5ca79c2634dee1945e0406e48e0f8457@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rde385b8b53ed046600ef68dd6b4528dea7566aaddb02c3e702cc28bc@%3Ccommits.creadur.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00003.html', 'https://lists.apache.org/thread.html/rf797d119cc3f51a8d7c3c5cbe50cb4524c8487282b986edde83a9467@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rde8e70b95c992378e8570e4df400c6008a9839eabdfb8f800a3e5af6@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r934208a520b38f5cf0cae199b6b076bfe7d081809528b0eff2459e40@%3Cdev.knox.apache.org%3E', 'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae', 'https://lists.apache.org/thread.html/r95f8ef60c4b3a5284b647bb3132cda08e6fadad888a66b84f49da0b0@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/ra1bdb9efae84794e8ffa2f8474be8290ba57830eefe9714b95da714b@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r717877028482c55acf604d7a0106af4ca05da4208c708fb157b53672@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r500517c23200fb2fdb0b82770a62dd6c88b3521cfb01cfd0c76e3f8b@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r1209986f79359b518d09513ff05a88e5b3c398540e775edea76a4774@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r8b02dc6f18df11ff39eedb3038f1e31e6f90a779b1959bae65107279@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rbaec90e699bc7c7bd9a053f76707a36fda48b6d558f31dc79147dbf9@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E'}
| null |
GHSA
|
GHSA-958r-g534-ccmr
|
Moderate severity vulnerability that affects MadsKristensen.AspNetCore.Miniblog
|
madskristensen Miniblog.Core through 2019-01-16 allows remote attackers to execute arbitrary ASPX code via an IMG element with a data: URL, because SaveFilesToDisk in Controllers/BlogController.cs writes a decoded base64 string to a file without validating the extension.
|
{'CVE-2019-9845'}
|
2021-09-07T20:42:11Z
|
2019-07-05T21:11:13Z
|
CRITICAL
| 9.8
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9845', 'https://github.com/madskristensen/Miniblog.Core/blob/master/src/Controllers/BlogController.cs#L142', 'https://rastating.github.io/miniblog-remote-code-execution/', 'https://github.com/advisories/GHSA-958r-g534-ccmr'}
| null |
GHSA
|
GHSA-wf5p-c75w-w3wh
|
Null pointer dereference in TFLite MLIR optimizations
|
### Impact
An attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service:
This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/compiler/mlir/lite/transforms/optimize.cc#L67-L70) unconditionally dereferences a pointer to an iterator to a vector without checking that the vector has elements:
```cc
bool L2NormalizeReduceAxis(Value sq_op, DenseElementsAttr axis) {
if (sq_op.getType().cast<ShapedType>().getRank() - 1 ==
*axis.getValues<int>().begin() ||
*axis.getValues<int>().begin() == -1) {
// ...
}
// ...
}
```
### Patches
We have patched the issue in GitHub commit [d6b57f461b39fd1aa8c1b870f1b974aac3554955](https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security.
|
{'CVE-2021-37689'}
|
2021-08-25T14:39:36Z
|
2021-08-25T14:39:36Z
|
HIGH
| 7.8
|
{'CWE-476'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37689', 'https://github.com/advisories/GHSA-wf5p-c75w-w3wh', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh', 'https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955'}
| null |
GHSA
|
GHSA-c2vx-49jm-h3f6
|
Pysaml2 does not sanitize XML responses
|
XML External Entity (XXE) vulnerability in PySAML2 4.4.0 and earlier allows remote attackers to read arbitrary files via a crafted SAML XML request or response.
|
{'CVE-2016-10149'}
|
2022-04-26T18:16:33Z
|
2018-07-16T16:50:12Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'http://www.openwall.com/lists/oss-security/2017/01/19/5', 'https://access.redhat.com/errata/RHSA-2017:0938', 'https://github.com/rohe/pysaml2/issues/366', 'http://www.debian.org/security/2017/dsa-3759', 'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b', 'http://www.securityfocus.com/bid/97692', 'https://github.com/rohe/pysaml2/pull/379', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10149', 'https://github.com/advisories/GHSA-c2vx-49jm-h3f6', 'https://access.redhat.com/errata/RHSA-2017:0936', 'https://access.redhat.com/errata/RHSA-2017:0937', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716'}
| null |
GHSA
|
GHSA-fw5q-j9p4-3vxg
|
Blog comment posting, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
|
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS).
Impact: XSS via Arbitrary script execution.
Components are: Blog comment posting
Tested baserCMS Version : 4.4.0 (Latest)
Affected baserCMS Version : 4.0.0 ~ 4.4.0
Patches : https://basercms.net/security/20201029
Found by yama
|
{'CVE-2020-15276'}
|
2022-04-19T19:02:38Z
|
2020-10-30T19:10:20Z
|
LOW
| 7.7
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-fw5q-j9p4-3vxg', 'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/security/advisories/GHSA-fw5q-j9p4-3vxg', 'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15276'}
| null |
GHSA
|
GHSA-h5rh-w6vm-9ghc
|
Denial of service in Grafana
|
The snapshot feature in Grafana before 7.4.2 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.
|
{'CVE-2021-27358'}
|
2022-04-12T22:50:48Z
|
2022-02-15T01:57:18Z
|
HIGH
| 6.9
|
{'CWE-306', 'CWE-400'}
|
{'https://security.netapp.com/advisory/ntap-20210513-0007/', 'https://github.com/grafana/grafana/blob/master/CHANGELOG.md#742-2021-02-17', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27358', 'https://github.com/advisories/GHSA-h5rh-w6vm-9ghc', 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-2/', 'https://github.com/grafana/grafana/pull/31263', 'https://github.com/grafana/grafana/blob/master/CHANGELOG.md'}
| null |
GHSA
|
GHSA-qf9q-q4hh-qph3
|
SQL injection in blazer
|
Blazer before 2.6.0 allows SQL Injection. In certain circumstances, an attacker could get a user to run a query they would not have normally run.
|
{'CVE-2022-29498'}
|
2022-04-29T21:07:18Z
|
2022-04-22T00:00:36Z
|
HIGH
| 7.5
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-qf9q-q4hh-qph3', 'https://github.com/ankane/blazer/issues/392', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29498'}
| null |
GHSA
|
GHSA-xvm2-9xvc-hx7f
|
Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer
|
### Impact
Prior to xlsx-streamer 2.1.0, the XML parser that was used did not apply all the necessary settings to prevent XML Entity Expansion issues.
### Patches
Upgrade to version 2.1.0.
### Workarounds
No known workaround.
### References
https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [monitorjbl/excel-streaming-reader](https://github.com/monitorjbl/excel-streaming-reader)
|
{'CVE-2022-23640'}
|
2022-04-19T19:03:23Z
|
2022-03-02T21:30:54Z
|
CRITICAL
| 9.8
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-xvm2-9xvc-hx7f', 'https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f', 'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23640'}
| null |
GHSA
|
GHSA-mp78-r56v-45qc
|
Moderate severity vulnerability that affects ember-source
|
Cross-site scripting (XSS) vulnerability in Ember.js 1.10.x before 1.10.1 and 1.11.x before 1.11.2.
|
{'CVE-2015-1866'}
|
2021-09-15T20:38:59Z
|
2018-08-28T22:34:31Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://emberjs.com/blog/2015/04/14/security-and-bugfix-releases-ember-1-10-1-1-11-2-1-11-3.html', 'http://www.openwall.com/lists/oss-security/2015/04/14/11', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1866', 'http://www.securityfocus.com/bid/74185', 'https://github.com/advisories/GHSA-mp78-r56v-45qc'}
| null |
GHSA
|
GHSA-c7fm-jx59-wjf6
|
Authorization Bypass Through User-Controlled Key in LiveHelperChat
|
Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v.
|
{'CVE-2022-0266'}
|
2022-01-21T18:50:58Z
|
2022-01-21T18:50:58Z
|
MODERATE
| 6.5
|
{'CWE-639'}
|
{'https://huntr.dev/bounties/1ac267be-3af8-4774-89f2-77234d144d6b', 'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd', 'https://github.com/advisories/GHSA-c7fm-jx59-wjf6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0266'}
| null |
GHSA
|
GHSA-p49h-hjvm-jg3h
|
PCX P mode buffer overflow in Pillow
|
libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.
|
{'CVE-2020-5312'}
|
2021-11-03T18:05:04Z
|
2021-11-03T18:05:04Z
|
HIGH
| 9.8
|
{'CWE-120'}
|
{'https://access.redhat.com/errata/RHSA-2020:0580', 'https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd', 'https://access.redhat.com/errata/RHSA-2020:0578', 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-83.yaml', 'https://usn.ubuntu.com/4272-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://www.debian.org/security/2020/dsa-4631', 'https://access.redhat.com/errata/RHSA-2020:0681', 'https://access.redhat.com/errata/RHSA-2020:0694', 'https://github.com/advisories/GHSA-p49h-hjvm-jg3h', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://access.redhat.com/errata/RHSA-2020:0683', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5312', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/', 'https://access.redhat.com/errata/RHSA-2020:0566'}
| null |
GHSA
|
GHSA-g94p-h263-c26q
|
Cross Site Request Forgery in Mingsoft MCMS
|
MCMS v5.2.7 contains a Cross-Site Request Forgery (CSRF) via /role/saveOrUpdateRole.do. This vulnerability allows attackers to escalate privileges and modify data.
|
{'CVE-2022-27340'}
|
2022-04-26T18:51:08Z
|
2022-04-23T00:03:01Z
|
HIGH
| 0
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27340', 'https://github.com/UDKI11/vul/blob/main/Mcms%E8%B7%A8%E7%AB%99%E8%AF%B7%E6%B1%82%E4%BC%AA%E9%80%A0.docx', 'https://github.com/advisories/GHSA-g94p-h263-c26q'}
| null |
GHSA
|
GHSA-g36h-6r4f-3mqp
|
Regular Expression Denial of Service in string
|
Affected versions of `string` are vulnerable to regular expression denial of service when specifically crafted untrusted user input is passed into the `underscore` or `unescapeHTML` methods.
## Recommendation
There is currently no direct patch for this vulnerability.
Currently, the best solution is to avoid passing user input to the `underscore` and `unescapeHTML` methods.
Alternatively, a user provided patch is available in [Pull Request #217]( https://github.com/jprichardson/string.js/pull/217/commits/eab9511e4efbc8c521e18b6cf2e8565ae50c5a16), however this patch has not been tested, nor has it been merged by the package author.
|
{'CVE-2017-16116'}
|
2021-01-08T18:49:49Z
|
2018-07-24T20:16:11Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://nodesecurity.io/advisories/536', 'https://github.com/jprichardson/string.js/issues/212', 'https://www.npmjs.com/advisories/536', 'https://github.com/advisories/GHSA-g36h-6r4f-3mqp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16116'}
| null |
GHSA
|
GHSA-44vf-8ffm-v2qh
|
Sensitive Data Exposure in rails-session-decoder
|
All versions of `rails-session-decoder` are missing verification of the Message Authentication Code appended to the cookies. This may lead to decryption of cipher text thus exposing encrypted information.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-09-02T15:42:47Z
|
2020-09-02T15:42:47Z
|
HIGH
| 0
| null |
{'https://www.npmjs.com/advisories/753', 'https://github.com/advisories/GHSA-44vf-8ffm-v2qh'}
| null |
GHSA
|
GHSA-p66x-2cv9-qq3v
|
Arbitrary code execution in Apache Commons BeanUtils
|
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
|
{'CVE-2014-0114'}
|
2020-06-10T23:38:01Z
|
2020-06-10T23:38:01Z
|
HIGH
| 0
| null |
{'http://www.mandriva.com/security/advisories?name=MDVSA-2014:095', 'https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5@%3Ccommits.commons.apache.org%3E', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'http://www.vmware.com/security/advisories/VMSA-2014-0008.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'http://marc.info/?l=bugtraq&m=140801096002766&w=2', 'https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5@%3Cissues.commons.apache.org%3E', 'http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://advisories.mageia.org/MGASA-2014-0219.html', 'https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25@%3Cdev.commons.apache.org%3E', 'https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3@%3Cissues.commons.apache.org%3E', 'http://www.ibm.com/support/docview.wss?uid=swg21675496', 'https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/57477', 'http://openwall.com/lists/oss-security/2014/06/15/10', 'http://www.debian.org/security/2014/dsa-2940', 'http://secunia.com/advisories/59246', 'http://www-01.ibm.com/support/docview.wss?uid=swg21674812', 'http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0114', 'http://www.securityfocus.com/bid/67121', 'https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f@%3Cissues.commons.apache.org%3E', 'https://issues.apache.org/jira/browse/BEANUTILS-463', 'https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/60703', 'https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8@%3Cissues.commons.apache.org%3E', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755', 'https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86@%3Cdev.commons.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://secunia.com/advisories/59480', 'https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1@%3Cdev.commons.apache.org%3E', 'http://secunia.com/advisories/59464', 'https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859@%3Cdev.commons.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://security.netapp.com/advisory/ntap-20180629-0006/', 'http://secunia.com/advisories/59014', 'https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/60177', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f@%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3@%3Cissues.commons.apache.org%3E', 'http://www.vmware.com/security/advisories/VMSA-2014-0012.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676931', 'https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f@%3Cnotifications.commons.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/advisories/GHSA-p66x-2cv9-qq3v', 'https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb@%3Cissues.commons.apache.org%3E', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html', 'http://secunia.com/advisories/59430', 'http://secunia.com/advisories/59245', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675689', 'http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html', 'http://secunia.com/advisories/59228', 'https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a@%3Cissues.commons.apache.org%3E', 'http://marc.info/?l=bugtraq&m=141451023707502&w=2', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675898', 'https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2995', 'http://www.securityfocus.com/archive/1/534161/100/0/threaded', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4@%3Cissues.commons.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/59479', 'http://secunia.com/advisories/58710', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21677110', 'http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1091938', 'http://secunia.com/advisories/59118', 'https://security.netapp.com/advisory/ntap-20140911-0001/', 'https://security.gentoo.org/glsa/201607-09', 'http://seclists.org/fulldisclosure/2014/Dec/23', 'http://marc.info/?l=bugtraq&m=140119284401582&w=2', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676110', 'https://access.redhat.com/solutions/869353', 'https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21674128', 'https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/58947', 'https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639@%3Ccommits.commons.apache.org%3E', 'https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6@%3Cissues.commons.apache.org%3E', 'http://secunia.com/advisories/58851', 'http://openwall.com/lists/oss-security/2014/07/08/1', 'http://secunia.com/advisories/59718', 'https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3@%3Cissues.commons.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675266', 'https://snyk.io/vuln/SNYK-JAVA-COMMONSBEANUTILS-30077', 'https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd@%3Ccommits.commons.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676091', 'https://bugzilla.redhat.com/show_bug.cgi?id=1116665', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676375', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675972', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg27042296', 'https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3@%3Cnotifications.commons.apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675387', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676303', 'http://secunia.com/advisories/59704', 'https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263@%3Cissues.commons.apache.org%3E'}
| null |
GHSA
|
GHSA-jr3j-whm4-9wwm
|
Reflected XSS when using flashMessages or languageDictionary
|
### Overview
Versions before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's
- `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage`.
- `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`.
### Am I affected?
You are affected by this vulnerability if you are using `auth0-lock` version `11.30.0` or lower and all of the following conditions apply:
- You are utilizing `flashMessage` feature.
- User input or data from URL parameters is incorporated into the `flashMessage`.
An example of a vulnerable snippet where query parameters are used to populate the `text` property of a `flashMessage`.
```js
var params = new URLSearchParams(location.search);
var errorMessage = params.get('error__message');
var showParams = {};
if (!!errorMessage === true) {
showParams.flashMessage = {
type: 'error',
text: 'We were unable to log you in. ' + errorMessage,
};
}
lock.show(showParams);
```
OR
- You are utilizing `languageDictionary` feature.
- User input or data from URL parameters is used in `languageDictionary` properties.
An example of a vulnerable snippet where query parameters are used to populate the `socialLoginInstructions` property of a `languageDictionary`.
```js
var params = new URLSearchParams(location.search);
var instruction = params.get('instruction');
var options = {
languageDictionary: {
emailInputPlaceholder: "something@youremail.com",
title: "title",
socialLoginInstructions: instruction
},
};
var lock = new Auth0LockPasswordless(
CLIENT_ID,
DOMAIN,
options
);
lock.show()
```
### How to fix that?
Upgrade to version `11.30.1`.
### Will this update impact my users?
The fix uses [DOMPurify](https://github.com/cure53/DOMPurify) to sanitise the `flashMessage` and `languageDictionary` inputs. If you are including inline JavaScript in these fields, like `script` tags or `onclick` attributes, these will be removed.
|
{'CVE-2021-32641'}
|
2021-06-07T18:54:44Z
|
2021-06-04T19:10:34Z
|
HIGH
| 8.1
|
{'CWE-79'}
|
{'https://github.com/auth0/lock/security/advisories/GHSA-jr3j-whm4-9wwm', 'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32641', 'https://github.com/auth0/lock/releases/tag/v11.30.1', 'https://github.com/advisories/GHSA-jr3j-whm4-9wwm'}
| null |
GHSA
|
GHSA-r7cj-8hjg-x622
|
DBAL 3 SQL Injection Security Vulnerability
|
We have released a new version Doctrine DBAL 3.1.4 that fixes a critical SQL injection vulnerability in the LIMIT clause generation API provided by the Platform abstraction.
We advise everyone using Doctrine DBAL 3.0.0 up to 3.1.3 to upgrade to 3.1.4 immediately.
The vulnerability can happen when unsanitized input is passed to many APIs in Doctrine DBAL and ORM that ultimately end up calling `AbstractPlatform::modifyLimitQuery`.
As a workaround you can cast all limit and offset parameters to integers before passing them to Doctrine APIs.
This vulnerability has been assigned [CVE-2021-43608](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43608).
|
{'CVE-2021-43608'}
|
2021-12-16T14:11:44Z
|
2021-11-16T17:25:57Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43608', 'https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622', 'https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html', 'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d', 'https://github.com/doctrine/dbal/releases', 'https://github.com/advisories/GHSA-r7cj-8hjg-x622'}
| null |
GHSA
|
GHSA-2828-9vh6-9m6j
|
Client Denial of Service on TUF
|
### Impact
An attacker who can gain file access to the repository and modify metadata files may cause a denial of service to clients by creating many invalid signatures on a metadata file. Having a large number of signatures to verify will delay the moment when the client will determine the signature is not valid. This delay may be for at least a few minutes, but possibly could be longer especially if multiple files are impacted.
The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue.
### Patches
No fix exists for this issue.
### Workarounds
No workarounds are known for this issue.
### References
* [CVE-2020-6173](https://nvd.nist.gov/vuln/detail/CVE-2020-6173)
* [Issue #973](https://github.com/theupdateframework/tuf/issues/973)
|
{'CVE-2020-6173'}
|
2021-09-23T19:00:17Z
|
2020-08-21T16:25:48Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://github.com/theupdateframework/tuf/security/advisories/GHSA-2828-9vh6-9m6j', 'https://github.com/theupdateframework/tuf/issues/973', 'https://github.com/theupdateframework/tuf/commits/develop', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6173', 'https://github.com/advisories/GHSA-2828-9vh6-9m6j'}
| null |
GHSA
|
GHSA-3p85-p4qg-hcrp
|
pimcore is vulnerable to Cross-site Scripting
|
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-4081'}
|
2021-12-16T14:27:58Z
|
2021-12-16T14:27:58Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a', 'https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3', 'https://github.com/advisories/GHSA-3p85-p4qg-hcrp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4081'}
| null |
GHSA
|
GHSA-g8vp-6hv4-m67c
|
Command Injection in entitlements
|
Versions of `entitlements` prior to 1.3.0 are vulnerable to Command Injection. The package does not validate input on the `entitlements` function and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.
## Recommendation
Upgrade to version 1.3.0 or later.
| null |
2021-09-28T17:04:17Z
|
2020-09-11T21:23:29Z
|
HIGH
| 0
|
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/998', 'https://hackerone.com/reports/341869', 'https://github.com/advisories/GHSA-g8vp-6hv4-m67c'}
| null |
GHSA
|
GHSA-3xxv-p78r-4fc6
|
Cross-site Scripting in apache-airflow
|
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are on Python 3.6. (Those contain the fix for CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336).
|
{'CVE-2021-28359'}
|
2021-06-18T18:43:42Z
|
2021-06-18T18:43:42Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-3xxv-p78r-4fc6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28359'}
| null |
GHSA
|
GHSA-vrw4-w73r-6mm8
|
TimelockController vulnerability in OpenZeppelin Contracts
|
### Impact
A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to "open" allow anyone to use the executor role, thus leaving the timelock at risk of being taken over by an attacker.
### Patches
A fix is included in the following releases of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`:
- 4.3.1
- 3.4.2
- 3.4.2-solc-0.7
Deployed instances of `TimelockController` should be replaced with a fixed version by migrating all assets, ownership, and roles.
### Workarounds
Revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.
### References
[Post-mortem](https://forum.openzeppelin.com/t/timelockcontroller-vulnerability-postmortem/14958).
### Credits
The issue was identified by an anonymous white hat hacker through [Immunefi](https://immunefi.com/).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
|
{'CVE-2021-39168'}
|
2021-09-13T20:30:26Z
|
2021-08-30T16:12:49Z
|
CRITICAL
| 10
|
{'CWE-269'}
|
{'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-vrw4-w73r-6mm8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39168', 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5', 'https://github.com/advisories/GHSA-vrw4-w73r-6mm8'}
| null |
GHSA
|
GHSA-g57j-q48p-9vm2
|
Command injection in Gerapy
|
This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized.
|
{'CVE-2020-7698'}
|
2022-03-21T22:49:53Z
|
2021-05-06T18:52:13Z
|
CRITICAL
| 9.8
|
{'CWE-74'}
|
{'https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2', 'https://snyk.io/vuln/SNYK-PYTHON-GERAPY-572470', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7698', 'https://github.com/advisories/GHSA-g57j-q48p-9vm2'}
| null |
GHSA
|
GHSA-7h5v-85w9-pq6c
|
Denial of service (via resource exhaustion) due to improper input validation in third-party identifier endpoint
|
### Impact
Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion.
### Patches
The issue is fixed by https://github.com/matrix-org/synapse/pull/9855.
### Workarounds
There are no known workarounds.
### References
n/a
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org.
| null |
2021-05-19T23:01:45Z
|
2021-05-19T23:01:45Z
|
MODERATE
| 0
|
{'CWE-400'}
|
{'https://github.com/matrix-org/synapse/security/advisories/GHSA-7h5v-85w9-pq6c', 'https://github.com/advisories/GHSA-7h5v-85w9-pq6c', 'https://github.com/matrix-org/synapse/pull/9855'}
| null |
GHSA
|
GHSA-754h-5r27-7x3r
|
RCE in Symfony
|
Description
-----------
The `CachingHttpClient` class from the HttpClient Symfony component relies on the `HttpCache` class to handle requests. `HttpCache` uses internal headers like `X-Body-Eval` and `X-Body-File` to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by `CachingHttpClient` and if an attacker can control the response for a request being made by the `CachingHttpClient`, remote code execution is possible.
Resolution
----------
HTTP headers designed for internal use in `HttpCache` are now stripped from remote responses before being passed to `HttpCache`.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78) for the 4.4 branch.
Credits
-------
I would like to thank Matthias Pigulla (webfactory GmbH) for reporting and fixing the issue.
|
{'CVE-2020-15094'}
|
2022-03-18T18:31:50Z
|
2020-09-02T17:29:56Z
|
HIGH
| 8
|
{'CWE-212'}
|
{'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VAQJXAKWPMWB7OL6QPG2ZSEQZYYPU5RC/', 'https://github.com/advisories/GHSA-754h-5r27-7x3r', 'https://github.com/symfony/symfony/security/advisories/GHSA-754h-5r27-7x3r', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGUWOEETOFVH4PN3I3YO4QZHQ4AUKF3/', 'https://packagist.org/packages/symfony/symfony', 'https://packagist.org/packages/symfony/http-kernel', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15094'}
| null |
GHSA
|
GHSA-hpr5-wp7c-hh5q
|
Cross-Site Scripting in mrk.js
|
Versions of `mrk.js` before 2.0.1 are vulnerable to cross-site scripting (XSS) when markdown is converted to HTML.
## Recommendation
Update to version 2.0.1 or later and use `mark.sanitizeURL()` for any `src` and `href` attributes when extending the markdown.
| null |
2021-09-23T21:50:21Z
|
2020-09-01T19:37:29Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/heyitsmeuralex/mrk/pull/3', 'https://github.com/advisories/GHSA-hpr5-wp7c-hh5q', 'https://www.npmjs.com/advisories/587'}
| null |
GHSA
|
GHSA-f39r-cpmj-whcg
|
Command Injection in ffmpegdotjs
|
This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23376'}
|
2021-05-06T15:55:21Z
|
2021-05-06T15:55:21Z
|
CRITICAL
| 9.8
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-f39r-cpmj-whcg', 'https://snyk.io/vuln/SNYK-JS-FFMPEGDOTJS-1078542', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23376', 'https://github.com/TRomesh/ffmpegdotjs/blob/b7395daf0bdcb81218340427eb7073cdd28462af/index.js%23L219'}
| null |
GHSA
|
GHSA-x7j7-qp7j-hw3q
|
Cross-site scripting (XSS) from writer field content in the site frontend
|
### Impact
Kirby's [writer field](https://getkirby.com/docs/reference/panel/fields/writer) stores its formatted content as HTML code. Unlike with other field types, it is not possible to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks, otherwise the formatting would be lost.
Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the site frontend or Panel session of other users. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim.
Because the writer field did not securely sanitize its contents on save, it was possible to inject malicious HTML code into the content file by sending it to Kirby's API directly without using the Panel. This malicious HTML code would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site.
This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible.
You are *not* affected if you don't use the writer field in any of your blueprints. The attack can only be performed by logged-in users and only surfaces in the site frontend (i.e. in your templates). The Panel itself is unaffected and will not execute JavaScript that was injected into writer field content.
### Patches
We have patched the vulnerability in [Kirby 3.5.8](https://github.com/getkirby/kirby/releases/tag/3.5.8) by sanitizing all writer field contents on the backend whenever the content is modified via Kirby's API. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability.
### Credits
Thanks to Azrul Ikhwan Zulkifli (@azrultech) from BAE Systems AI Vulnerability Research Team for responsibly reporting the identified issue.
|
{'CVE-2021-41252'}
|
2022-04-19T19:03:14Z
|
2021-11-16T17:04:19Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-x7j7-qp7j-hw3q', 'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc', 'https://github.com/getkirby/kirby/security/advisories/GHSA-x7j7-qp7j-hw3q', 'https://github.com/getkirby/kirby/releases/tag/3.5.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41252'}
| null |
GHSA
|
GHSA-3w5v-p54c-f74x
|
ejs is ivulnerable to remote code execution due to weak input validation
|
nodejs ejs versions older than 2.5.3 is vulnerable to remote code execution due to weak input validation in ejs.renderFile() function
|
{'CVE-2017-1000228'}
|
2022-04-25T22:06:44Z
|
2017-11-30T23:15:19Z
|
CRITICAL
| 9.8
|
{'CWE-20'}
|
{'https://snyk.io/vuln/npm:ejs:20161128', 'https://github.com/advisories/GHSA-3w5v-p54c-f74x', 'http://www.securityfocus.com/bid/101897', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000228'}
| null |
GHSA
|
GHSA-28xr-mwxg-3qc8
|
Command injection in simple-git
|
`simple-git` (maintained as [git-js](https://github.com/steveukx/git-js) named repository on GitHub) is a light weight interface for running git commands in any node.js application.The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover. A fix was released in simple-git@3.6.0.
|
{'CVE-2022-24066'}
|
2022-05-03T22:29:55Z
|
2022-04-02T00:00:13Z
|
HIGH
| 8.1
|
{'CWE-74', 'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820', 'https://gist.github.com/lirantal/a930d902294b833514e821102316426b', 'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306', 'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24066', 'https://github.com/advisories/GHSA-28xr-mwxg-3qc8'}
| null |
GHSA
|
GHSA-568q-9fw5-28wf
|
Moderate severity vulnerability that affects org.postgresql:pgjdbc-aggregate
|
A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker could masquerade as a trusted server by providing a certificate for the wrong host, as long as it was signed by a trusted CA.
|
{'CVE-2018-10936'}
|
2021-01-08T21:16:40Z
|
2018-10-19T16:53:33Z
|
MODERATE
| 0
|
{'CWE-297'}
|
{'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10936', 'http://www.securityfocus.com/bid/105220', 'https://www.postgresql.org/about/news/1883/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10936', 'https://github.com/advisories/GHSA-568q-9fw5-28wf'}
| null |
GHSA
|
GHSA-jjx5-3f36-6927
|
Incorrect buffer size calculation in iced-x86
|
An issue was discovered in the iced-x86 crate through 1.10.3 for Rust. In Decoder::new(), slice.get_unchecked(slice.length()) is used unsafely.
|
{'CVE-2021-38188'}
|
2021-08-25T20:55:47Z
|
2021-08-25T20:55:47Z
|
CRITICAL
| 9.8
|
{'CWE-131'}
|
{'https://rustsec.org/advisories/RUSTSEC-2021-0068.html', 'https://github.com/icedland/iced/issues/168', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38188', 'https://github.com/icedland/iced/commit/3c607a003e03b773108401d109167d1840487dce', 'https://github.com/advisories/GHSA-jjx5-3f36-6927'}
| null |
GHSA
|
GHSA-h3gg-7wx2-cq3h
|
XSS in Flarum Sticky extension
|
### Impact
A change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit.
Any HTML would be injected through Mithril's `m.trust()` helper. This resulted in an HTML injection where `<script>` tags would not be executed. However it was possible to run javascript from other HTML attributes, enabling a cross-site scripting (XSS) attack to be performed.
Since the exploit only happens with the first post of a pinned discussion, an attacker would need the ability to pin their own discussion, or be able to edit a discussion that was previously pinned.
On forums where all pinned posts are authored by your staff, you can be relatively certain the vulnerability has not been exploited.
Forums where some user-created discussions were pinned can look at the first post edit date to find whether the vulnerability might have been exploited. Because Flarum doesn't store the post content history, you cannot be certain if a malicious edit was reverted.
### Patches
The fix will be available in version v0.1.0-beta.16 with Flarum beta 16. The fix has already been back-ported to Flarum beta 15 as version v0.1.0-beta.15.1 of the Sticky extension.
### Workarounds
Forum administrators can disable the Sticky extension until they are able to apply the update. The vulnerability cannot be exploited while the extension is disabled.
### References
- [Release announcement](https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)
- [Pull Request](https://github.com/flarum/sticky/pull/24)
### For more information
If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support).
If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy).
|
{'CVE-2021-21283'}
|
2022-04-19T19:02:46Z
|
2021-01-29T18:13:41Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/flarum/sticky/security/advisories/GHSA-h3gg-7wx2-cq3h', 'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21283', 'https://github.com/advisories/GHSA-h3gg-7wx2-cq3h', 'https://github.com/flarum/sticky/pull/24', 'https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)'}
| null |
GHSA
|
GHSA-jfmf-w293-8xr8
|
Regular expression Denial of Service (ReDoS) in EmailValidator class in V7 compatibility module in Vaadin 8
|
Unsafe validation RegEx in `EmailValidator` component in `com.vaadin:vaadin-compatibility-server` versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
| null |
2022-04-19T19:02:56Z
|
2021-10-13T18:55:52Z
|
HIGH
| 7.5
| null |
{'https://github.com/vaadin/framework/security/advisories/GHSA-jfmf-w293-8xr8', 'https://github.com/advisories/GHSA-jfmf-w293-8xr8', 'https://vaadin.com/security/cve-2021-31409'}
| null |
GHSA
|
GHSA-5r9v-8w62-r26j
|
livehelperchat is vulnerable to Cross-site Scripting
|
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2022-0253'}
|
2022-01-25T19:13:22Z
|
2022-01-21T23:48:25Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0253', 'https://github.com/advisories/GHSA-5r9v-8w62-r26j', 'https://huntr.dev/bounties/ac7f7eba-ee0b-4a50-bd89-29fd9b3e8303', 'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'}
| null |
GHSA
|
GHSA-2pfh-q76x-gwvm
|
Improper Input Validation and Command Injection in Ansible
|
A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.
|
{'CVE-2021-3583'}
|
2021-10-06T13:06:58Z
|
2021-09-23T23:16:38Z
|
HIGH
| 7.1
|
{'CWE-20', 'CWE-77'}
|
{'https://github.com/advisories/GHSA-2pfh-q76x-gwvm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3583', 'https://pypi.org/project/ansible/4.2.0/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1968412', 'https://github.com/ansible/ansible/pull/74960'}
| null |
GHSA
|
GHSA-63m4-fhf2-cmf7
|
Command Execution in windows-cpu
|
Version of `windows-cpu` before 0.1.5 will execute arbitrary code passed into the first argument of the `findLoad` method, resulting in remote code execution.
## Proof of Concept
```
var win = require('windows-cpu');
wind.findLoad('foo & calc.exe');
```
## Recommendation
Update to version 0.1.5 or later.
|
{'CVE-2017-1000219'}
|
2021-09-23T21:42:05Z
|
2020-09-01T16:43:55Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://www.npmjs.com/advisories/336', 'https://github.com/advisories/GHSA-63m4-fhf2-cmf7', 'https://github.com/KyleRoss/windows-cpu/blob/master/index.js#L81', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000219', 'https://nodesecurity.io/advisories/336', 'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'}
| null |
GHSA
|
GHSA-wgjx-hm34-qgf7
|
SQL injection in Centreon
|
SQL injection vulnerabilities in Centreon through 19.04 allow attacks via the svc_id parameter in include/monitoring/status/Services/xml/makeXMLForOneService.php.
|
{'CVE-2019-16194'}
|
2021-08-19T17:12:53Z
|
2020-02-11T20:36:04Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-wgjx-hm34-qgf7', 'https://github.com/centreon/centreon/releases', 'https://github.com/centreon/centreon/pull/7862', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16194'}
| null |
GHSA
|
GHSA-xxxq-chmp-67g4
|
RSA PKCS#1 decryption vulnerability with prepending zeros in jsrsasign
|
### Impact
Jsrsasign supports RSA PKCS#1 v1.5 (i.e. RSAES-PKCS1-v1_5) and RSA-OAEP encryption and decryption. Its encrypted message is represented as BigInteger. When there is a valid encrypted message, a crafted message with prepending zeros can be decrypted by this vulnerability.
- If you don't use RSA PKCS1-v1_5 or RSA-OAEP decryption, this vulnerability is not affected.
- Risk to forge contents of encrypted message is very low.
- Risk to raise memory corruption is low since jsrsasign uses BigInteger class.
### Patches
Users using RSA PKCS1-v1_5 or RSA-OAEP decryption should upgrade to 8.0.18.
### Workarounds
Reject RSA PKCS1-v1_5 or RSA-OAEP encrypted message with unnecessary prepending zeros.
### References
https://nvd.nist.gov/vuln/detail/CVE-2020-14967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14967
https://vuldb.com/?id.157124
https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.Cipher.html#.decrypt
https://github.com/kjur/jsrsasign/issues/439
|
{'CVE-2020-14967'}
|
2021-10-06T22:02:32Z
|
2020-06-26T16:27:08Z
|
CRITICAL
| 9.8
|
{'CWE-119'}
|
{'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14967', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://github.com/kjur/jsrsasign/issues/439', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-xxxq-chmp-67g4', 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.Cipher.html#.decrypt', 'https://github.com/advisories/GHSA-xxxq-chmp-67g4', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14967', 'https://vuldb.com/?id.157124', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://www.npmjs.com/package/jsrsasign'}
| null |
GHSA
|
GHSA-w6ww-fmfx-2x22
|
Misconfigured IP address field in ROA leads to OctoRPKI crash
|
If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash.
## Patches
## For more information
If you have any questions or comments about this advisory email us at security@cloudflare.com
|
{'CVE-2021-3911'}
|
2022-01-13T18:26:33Z
|
2021-11-10T19:56:04Z
|
MODERATE
| 4.2
|
{'CWE-252', 'CWE-20'}
|
{'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-w6ww-fmfx-2x22', 'https://www.debian.org/security/2022/dsa-5041', 'https://github.com/advisories/GHSA-w6ww-fmfx-2x22', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3911'}
| null |
GHSA
|
GHSA-gpqc-4pp7-5954
|
Authentication Bypass by CSRF Weakness
|
### Impact
CSRF vulnerability that allows user account takeover.
All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
* Executed whether as:
* A before_action callback (the default)
* A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).
* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).
That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
Thanks @waiting-for-dev for reporting and providing a patch 👏
### Patches
Spree 4.3 users should update to spree_auth_devise 4.4.1
Spree 4.2 users should update to spree_auth_devise 4.2.1
Spree 4.1 users should update to spree_auth_devise 4.1.1
Older Spree version users should update to spree_auth_devise 4.0.1
### Workarounds
If possible, change your strategy to :exception:
```ruby
class ApplicationController < ActionController::Base
protect_from_forgery with: :exception
end
```
Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:
```ruby
config.after_initialize do
Spree::UsersController.protect_from_forgery with: :exception
end
```
### References
https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
| null |
2022-04-19T19:03:15Z
|
2021-11-18T20:15:35Z
|
CRITICAL
| 9.3
|
{'CWE-352'}
|
{'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-gpqc-4pp7-5954', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/advisories/GHSA-gpqc-4pp7-5954'}
| null |
GHSA
|
GHSA-592v-7frm-h44q
|
Cross-site scripting in LavaLite-CMS
|
Cross Site Scripting (XSS) vulnerability in LavaLite-CMS 5.8.0 via the Menu Links feature.
|
{'CVE-2020-23700'}
|
2021-09-08T17:25:36Z
|
2021-09-08T17:25:36Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23700', 'https://github.com/advisories/GHSA-592v-7frm-h44q', 'https://github.com/LavaLite/cms/issues/319'}
| null |
GHSA
|
GHSA-rhq2-3vr9-6mcr
|
Files on the host computer can be accessed from the Gradio interface
|
### Impact
This is a vulnerability that affects anyone who creates and publicly shares Gradio interfaces using `gradio<2.4.8`. Because of the way that static files were being served, someone who generated a public Gradio link and shared it with others would potentially be exposing the files on the computer that generated the link, while the link was active. An attacker would be able to view the contents of a file on the computer if they knew the exact relative filepath. We do not have any evidence that this was ever exploited, but we treated the issue seriously and immediately took steps to mitigate it (see below)
### Response
1. We worked with @haby0 to immediately patch the issue and released a new version, `gradio 2.5.0`, within 24 hours of the issue being brought to our attention
2. We enabled a notification that is printed to anyone using an older version of gradio telling them to upgrade (see screenshot below)
3. We expanded our test suite to test for this vulnerability ensuring that our patch does not get reverted in future releases of `gradio`

### Patches
The problem has been patched in `gradio>=2.5.0`.
|
{'CVE-2021-43831'}
|
2022-04-19T19:03:17Z
|
2022-01-21T23:43:33Z
|
HIGH
| 8.3
|
{'CWE-22'}
|
{'https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr', 'https://github.com/advisories/GHSA-rhq2-3vr9-6mcr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43831', 'https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781'}
| null |
GHSA
|
GHSA-9hx9-w2j6-rw76
|
Low severity vulnerability that affects show_in_browser
|
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.
|
{'CVE-2013-2105'}
|
2021-09-08T18:57:47Z
|
2017-10-24T18:33:37Z
|
LOW
| 0
|
{'CWE-59'}
|
{'http://vapid.dhs.org/advisories/show_in_browser.html', 'http://www.openwall.com/lists/oss-security/2013/05/18/4', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2105', 'https://github.com/advisories/GHSA-9hx9-w2j6-rw76', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/84378'}
| null |
GHSA
|
GHSA-g95p-88p4-76cm
|
Cross-site Scripting in Gitea
|
Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations.
|
{'CVE-2021-28378'}
|
2021-09-27T20:17:39Z
|
2021-09-27T20:17:39Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://blog.gitea.io/2021/03/gitea-1.13.4-is-released/', 'https://github.com/go-gitea/gitea/pull/14899', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28378', 'https://github.com/PandatiX/CVE-2021-28378', 'https://github.com/go-gitea/gitea/pull/14898', 'https://github.com/advisories/GHSA-g95p-88p4-76cm'}
| null |
GHSA
|
GHSA-xx8c-m748-xr4j
|
Access Restriction Bypass in kubernetes
|
The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object.
|
{'CVE-2016-1905'}
|
2022-04-12T22:01:30Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 7.7
|
{'CWE-284'}
|
{'https://access.redhat.com/errata/RHSA-2016:0070', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1905', 'https://github.com/kubernetes/kubernetes/commit/9e6912384a5bc714f2a780b870944a8cee264a22', 'https://github.com/advisories/GHSA-xx8c-m748-xr4j', 'https://github.com/kubernetes/kubernetes/issues/19479'}
| null |
GHSA
|
GHSA-3pph-2595-cgfh
|
There is a XML external entity expansion (XXE) vulnerability in Apache Solr
|
This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network.
|
{'CVE-2018-1308'}
|
2022-04-27T14:43:39Z
|
2018-10-17T19:55:46Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'https://lists.debian.org/debian-lts-announce/2018/04/msg00025.html', 'https://www.debian.org/security/2018/dsa-4194', 'https://github.com/advisories/GHSA-3pph-2595-cgfh', 'https://mail-archives.apache.org/mod_mbox/www-announce/201804.mbox/%3C000001d3cf68%245ac69af0%241053d0d0%24%40apache.org%3E', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1308', 'https://issues.apache.org/jira/browse/SOLR-11971'}
| null |
GHSA
|
GHSA-w9mf-24h3-9wxf
|
Downloads Resources over HTTP in windows-iedriver
|
Affected versions of `windows-iedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-iedriver`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10689'}
|
2021-01-08T01:56:54Z
|
2019-02-18T23:41:58Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-w9mf-24h3-9wxf', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10689', 'https://nodesecurity.io/advisories/293', 'https://www.npmjs.com/advisories/293'}
| null |
GHSA
|
GHSA-mv26-cx23-vrfg
|
Server-Side Request Forgery in @peertube/embed-api
|
@peertube/embed-api version 4.0.0 and prior is vulnerable to server-side request forgery.
|
{'CVE-2022-0508'}
|
2022-02-11T15:05:03Z
|
2022-02-09T00:00:31Z
|
MODERATE
| 6.5
|
{'CWE-918'}
|
{'https://github.com/advisories/GHSA-mv26-cx23-vrfg', 'https://huntr.dev/bounties/c3724574-b6c9-430b-849b-40dd2b20f23c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0508', 'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832'}
| null |
GHSA
|
GHSA-435p-f82x-mxwm
|
Command injection in Yamale
|
23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale.
|
{'CVE-2021-38305'}
|
2021-08-26T15:21:24Z
|
2021-08-11T15:19:23Z
|
HIGH
| 7.8
|
{'CWE-434', 'CWE-78'}
|
{'https://github.com/23andMe/Yamale/pull/165', 'https://github.com/advisories/GHSA-435p-f82x-mxwm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38305', 'https://github.com/23andMe/Yamale/releases/tag/3.0.8'}
| null |
GHSA
|
GHSA-pwr6-p3fh-grc2
|
Deserialization of Untrusted Data in Magnolia CMS
|
A vulnerability in the Snake YAML parser of Magnolia CMS v6.2.3 and below allows attackers to execute arbitrary code via a crafted YAML file.
|
{'CVE-2021-46364'}
|
2022-03-30T21:10:15Z
|
2022-02-12T00:00:37Z
|
HIGH
| 7.8
|
{'CWE-502'}
|
{'https://github.com/advisories/GHSA-pwr6-p3fh-grc2', 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46364', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46364-YAML%20Deserialization-Magnolia%20CMS'}
| null |
GHSA
|
GHSA-55xh-53m6-936r
|
Improper Verification of Cryptographic Signature in aws-encryption-sdk-java
|
### Impact
This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages.
This update addresses an issue where certain invalid ECDSA signatures incorrectly passed validation. These signatures provide defense in depth and there is no impact on the integrity of decrypted plaintext.
This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages.
For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit.
Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data.
### Patches
Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues.
Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
### Workarounds
None
### For more information
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
| null |
2021-06-01T21:17:36Z
|
2021-06-01T21:17:36Z
|
MODERATE
| 0
|
{'CWE-347'}
|
{'https://github.com/advisories/GHSA-55xh-53m6-936r', 'https://github.com/aws/aws-encryption-sdk-java/security/advisories/GHSA-55xh-53m6-936r'}
| null |
GHSA
|
GHSA-fwcm-636p-68r5
|
Server-side request forgery in CarrierWave
|
### Impact
[CarrierWave download feature](https://github.com/carrierwaveuploader/carrierwave#uploading-files-from-a-remote-location) has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform.
### Patches
Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2).
### Workarounds
Using proper network segmentation and applying the principle of least privilege to outbound connections from application servers can reduce the severity of SSRF vulnerabilities. Ideally the vulnerable gem should run on an isolated server without access to any internal network resources or cloud metadata access.
### References
[Server-Side Request Forgery Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave)
* Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com)
|
{'CVE-2021-21288'}
|
2022-04-19T19:02:45Z
|
2021-02-08T19:16:26Z
|
LOW
| 0
|
{'CWE-918'}
|
{'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08', 'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0', 'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5', 'https://github.com/advisories/GHSA-fwcm-636p-68r5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21288', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://rubygems.org/gems/carrierwave/'}
| null |
GHSA
|
GHSA-8p7v-2jvj-v54r
|
Moderate severity vulnerability that affects apache-airflow
|
A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views.
|
{'CVE-2019-0216'}
|
2021-09-07T20:23:49Z
|
2019-04-12T20:42:25Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'http://www.openwall.com/lists/oss-security/2019/04/10/6', 'http://www.securityfocus.com/bid/107869', 'https://github.com/advisories/GHSA-8p7v-2jvj-v54r', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0216', 'https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231@%3Cdev.airflow.apache.org%3E'}
| null |
GHSA
|
GHSA-8xpj-9j9g-fc9r
|
SQL Injection in elide-datastore-aggregation
|
### Impact
When leveraging the following together:
- Elide Aggregation Data Store for Analytic Queries
- Parameterized Columns (A column that requires a client provided parameter)
- A parameterized column of type TEXT
There is the potential for a hacker to provide a carefully crafted query that would bypass server side authorization filters through SQL injection. A recent patch to Elide 6.1.2 allowed the '-' character to be included in parameterized TEXT columns. This character can be interpreted as SQL comments ('--') and allow the attacker to remove the WHERE clause from the generated query and bypass authorization filters.
### Patches
A [fix](https://github.com/yahoo/elide/pull/2581) is provided in [Elide 6.1.4](https://github.com/yahoo/elide/releases/tag/6.1.4).
### Workarounds
The vulnerability only exists for parameterized columns of type TEXT and only for analytic queries (CRUD is not impacted). Workarounds include leveraging a different type of parameterized column (TIME, MONEY, etc) or not leveraging parameterized columns.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [elide](https://github.com/yahoo/elide)
* Contact us in [Discord](https://discord.com/invite/3vh8ac57cc)
|
{'CVE-2022-24827'}
|
2022-04-18T22:19:45Z
|
2022-04-08T22:43:17Z
|
HIGH
| 8.1
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-8xpj-9j9g-fc9r', 'https://github.com/yahoo/elide/releases/tag/6.1.4', 'https://github.com/yahoo/elide/pull/2581', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24827', 'https://github.com/yahoo/elide/security/advisories/GHSA-8xpj-9j9g-fc9r'}
| null |
GHSA
|
GHSA-4rjf-mxfm-98h5
|
SQL injection vulnerability in the policy admin tool in Apache Ranger
|
SQL injection vulnerability in the policy admin tool in Apache Ranger before 0.5.3 allows remote authenticated administrators to execute arbitrary SQL commands via the eventTime parameter to service/plugins/policies/eventTime.
|
{'CVE-2016-2174'}
|
2022-04-27T13:48:04Z
|
2018-10-17T17:21:29Z
|
HIGH
| 7.2
|
{'CWE-89'}
|
{'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://github.com/advisories/GHSA-4rjf-mxfm-98h5', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2174', 'http://www.openwall.com/lists/oss-security/2016/06/01/3'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.