ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-4qwp-7c67-jmcc
Unauthenticated remote code execution in Ignition
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
{'CVE-2021-3129'}
2022-02-17T18:03:08Z
2021-03-29T20:23:46Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3129', 'https://github.com/advisories/GHSA-4qwp-7c67-jmcc', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/facade/ignition/CVE-2021-3129.yaml', 'https://www.ambionics.io/blog/laravel-debug-rce', 'https://github.com/facade/ignition/pull/334', 'http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html', 'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b', 'http://packetstormsecurity.com/files/162094/Ignition-2.5.1-Remote-Code-Execution.html'}
null
GHSA
GHSA-hc92-9h3m-c39j
Incorrect cast in anymap
An issue was discovered in the anymap crate through 0.12.1 for Rust. It violates soundness via conversion of a *u8 to a *u64.
{'CVE-2021-38187'}
2021-08-25T20:55:45Z
2021-08-25T20:55:45Z
CRITICAL
9.8
{'CWE-681', 'CWE-704'}
{'https://github.com/chris-morgan/anymap/issues/37', 'https://github.com/advisories/GHSA-hc92-9h3m-c39j', 'https://rustsec.org/advisories/RUSTSEC-2021-0065.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38187'}
null
GHSA
GHSA-66mv-xh68-h6v2
Denial of Service in @commercial/hapi
Affected versions of `@commercial/hapi` are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to versions 16.8.2, 17.9.2, 18.4.1, 19.1.1 or later.
null
2020-09-03T15:48:53Z
2020-09-03T15:48:53Z
HIGH
0
null
{'https://www.npmjs.com/advisories/1483', 'https://github.com/advisories/GHSA-66mv-xh68-h6v2'}
null
GHSA
GHSA-8f89-2fwj-5v5r
Improper Input Validation in klona
Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona.
{'CVE-2020-8125'}
2021-04-13T15:41:24Z
2021-04-13T15:41:24Z
HIGH
9.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-8f89-2fwj-5v5r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8125', 'https://hackerone.com/reports/778414', 'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'}
null
GHSA
GHSA-3wc8-659g-r88q
Low severity vulnerability that affects org.springframework.batch:spring-batch-core
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
{'CVE-2019-3774'}
2021-01-08T19:57:47Z
2019-01-25T16:18:56Z
LOW
0
{'CWE-611'}
{'https://lists.apache.org/thread.html/ra8c7573911082e9968f4835943045ad0952232bb6314becf23dc3de5@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r01292194daa9ed3117b34dabec0c26929f6db13b9613fc144f720d52@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r96d90e59bb12af5e5c631dcf7d7d80857a52bf3dc44d5b85553e7fc4@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r0153a08177fcfac7584c7b9ea3027f1e8f18f770126f905b9989190e@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/rf83697efcbcfe1131e31bbc7025cb3ee1db5d9185e9481093b2ef961@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r5fbb63e405d2211c16524d33f52e3b122109d3bc88d5f74623fb212d@%3Ccommits.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/ra329bb85da9da93ac6f9b5fc0fc5446a3af0ee2a62c5de484da0af54@%3Ccommits.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/rfea6eebfebb13bc015f258e7fa31d4e24a4202601be3b307da28d530@%3Ccommits.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r2349237482bcec43632d9d78d7d2804520d9a82f4d8b1fd96bb616b8@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/rcd26a5409af7356b5f69b2fafae3cf621bff8bf155f50e9ccf9ed5f6@%3Cissues.servicemix.apache.org%3E', 'https://github.com/advisories/GHSA-3wc8-659g-r88q', 'https://lists.apache.org/thread.html/r08e7ddc354bdcbf95d88399f18b3d804865034f8bc706095e594b29f@%3Cissues.servicemix.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3774', 'https://lists.apache.org/thread.html/ra62a3bf48ab4e0e9aaed970b03d79a73224d68a4275858c707542f6c@%3Cissues.servicemix.apache.org%3E', 'https://pivotal.io/security/cve-2019-3774', 'https://lists.apache.org/thread.html/r47c7f67a3067ec09262eef0705abc42ea1b646699d9198bcaf8dad02@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/rb9fe3ae33246d7f11604a1c85c861cb013a1e32248a43a0c22457107@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/rcd4945d66d8bb2fc92396af56a70ede4af983a2c98166f1281338346@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/ree71c6425d2cc0e36b77bda6902965a657c1e09c7229459811d66474@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r79991aeb5d0c53c67e400e037c72758a06607752ca2f23b5302dd61f@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r78645ca0eef44a276e144447fb2087db758b1fb8826d0330b3f0da1a@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/raae74a9290784e20e86fcd4e2525fa8700aeed6f65f3613b5b04bb11@%3Ccommits.servicemix.apache.org%3E'}
null
GHSA
GHSA-phj8-4cq3-794g
Unencrypted storage of client side sessions
### Impact The default configuration of client side sessions results in unencrypted, but signed, data being set as cookie values. This means that if something sensitive goes into the session, it could be read by something with access to the cookies. Note: the documentation does point this out and encourage users to add an encryption key, but it is not mandatory. For this to be a vulnerability, some kind of sensitive data would need to be stored in the session and the session cookie would have to leak. For example, the cookies are not configured with httpOnly and an adjacent XSS vulnerability within the site allowed capture of the cookies. The proposed change is to change the default behaviour to use a randomly generated encryption key. This would mean that sessions do not survive app restarts, but this is already the behaviour given the random signing key. ### Patches As of version 1.9.0, a securely randomly generated signing key is used. ### Workarounds Supply an encryption key, as per the documentation recommendation. ### References - https://github.com/ratpack/ratpack/pull/1590
{'CVE-2021-29481'}
2022-04-19T19:02:48Z
2021-07-01T17:02:13Z
MODERATE
6.5
{'CWE-312'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29481', 'https://github.com/ratpack/ratpack/pull/1590', 'https://github.com/advisories/GHSA-phj8-4cq3-794g', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-phj8-4cq3-794g'}
null
GHSA
GHSA-54cr-gv8w-8324
Malicious Package in xoc
Version 1.0.7 of `xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.7 of this module is found installed you will want to replace it with a version before or after 1.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-09-01T20:36:22Z
2020-09-01T20:36:22Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-54cr-gv8w-8324', 'https://www.npmjs.com/advisories/638'}
null
GHSA
GHSA-9wcg-jrwf-8gg7
Prototype Pollution in express-fileupload
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
{'CVE-2020-7699'}
2022-05-04T02:19:37Z
2020-08-05T14:53:16Z
CRITICAL
9.8
{'CWE-915'}
{'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f', 'https://security.netapp.com/advisory/ntap-20200821-0003/', 'https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969', 'https://github.com/richardgirges/express-fileupload/pull/237', 'https://github.com/advisories/GHSA-9wcg-jrwf-8gg7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7699', 'https://github.com/richardgirges/express-fileupload/issues/236'}
null
GHSA
GHSA-m242-wc86-8768
Moderate severity vulnerability that affects python-fedora
python-fedora 0.8.0 and lower is vulnerable to an open redirect resulting in loss of CSRF protection
{'CVE-2017-1002150'}
2021-12-02T22:53:40Z
2018-07-13T15:17:05Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929.patch', 'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929', 'https://github.com/advisories/GHSA-m242-wc86-8768', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002150'}
null
GHSA
GHSA-vm28-mrm7-fpjq
High severity vulnerability that affects sfpagent
lib/sfpagent/bsig.rb in the sfpagent gem before 0.4.15 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the module name in a JSON request.
{'CVE-2014-2888'}
2021-09-20T22:09:31Z
2017-10-24T18:33:36Z
HIGH
0
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-2888', 'https://github.com/advisories/GHSA-vm28-mrm7-fpjq', 'http://seclists.org/fulldisclosure/2014/Apr/243', 'http://www.openwall.com/lists/oss-security/2014/04/18/4', 'http://www.vapid.dhs.org/advisories/spfagent-remotecmd.html', 'http://www.openwall.com/lists/oss-security/2014/04/16/1'}
null
GHSA
GHSA-g3qw-9pgp-xpj4
Out-of-bounds Read in njwt
Versions of `njwt` prior to 1.0.0 are vulnerable to out-of-bounds reads when a number is passed into the `base64urlEncode` function. On Node.js 6.x or lower this can expose sensitive information and on any other version of Node.js this creates a Denial of Service vulnerability. ## Recommendation Upgrade to version 1.0.0.
null
2021-09-24T20:41:40Z
2020-09-01T21:08:44Z
LOW
0
{'CWE-125'}
{'https://github.com/advisories/GHSA-g3qw-9pgp-xpj4', 'https://www.npmjs.com/advisories/679', 'https://hackerone.com/reports/321704'}
null
GHSA
GHSA-27pv-q55r-222g
Path traversal in github.com/ipfs/go-ipfs
### Impact It is currently possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when `ipfs get` is done on an affected DAG. 1. The only affected command is `ipfs get`. 2. The gateway is not affected. ### Patches Traversal fix patched in https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227 `tar-utils` patch applied to go-ipfs via https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2 ### Workarounds Upgrade to go-ipfs 0.8 or later. ### References Binaries for the patched versions of go-ipfs are available on the IPFS distributions site, https://dist.ipfs.io/go-ipfs ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ipfs](https://github.com/ipfs/go-ipfs) * Email us at [security@ipfs.io](mailto:security@ipfs.io)
{'CVE-2020-26279'}
2022-04-19T19:02:51Z
2021-06-23T17:27:44Z
HIGH
7.7
{'CWE-22'}
{'https://github.com/advisories/GHSA-27pv-q55r-222g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26279', 'https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2', 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-27pv-q55r-222g', 'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227'}
null
GHSA
GHSA-h896-mx9x-g32g
XML External Entity injection in Apache Camel
Apache Camel prior to 2.24.0 contains an XML external entity injection (XXE) vulnerability (CWE-611) due to using an outdated vulnerable JSON-lib library. This affects only the camel-xmljson component, which was removed.
{'CVE-2019-0188'}
2021-01-22T20:47:38Z
2019-05-29T18:15:50Z
HIGH
0
{'CWE-611'}
{'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/84ba9b79e801a4148dde73d1969cdae0247d11ff63de7ce11b394dc5@%3Ccommits.tamaya.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/00118387610522b107cbdcec5369ddd512b576ff0236a02bfca12f44@%3Cusers.camel.apache.org%3E', 'https://github.com/advisories/GHSA-h896-mx9x-g32g', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0188', 'https://lists.apache.org/thread.html/61601cda2c5f9832184ea14647b0c0589c94126a460c8eb196be1313@%3Ccommits.tamaya.apache.org%3E', 'https://lists.apache.org/thread.html/45349f8bd98c1c13a84beddede18fe79b8619ebab99d90f1fb43d7ab@%3Cdev.tamaya.apache.org%3E', 'https://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.asc', 'https://lists.apache.org/thread.html/6fefbd90f7fb4c8412d85ea3e9e97a4b76b47e206f502c73c29dc0b7@%3Ccommits.tamaya.apache.org%3E', 'https://lists.apache.org/thread.html/fe74d173689600d9a395d026f0bf5d154c0bf7bd195ecfbc2c987036@%3Cdev.tamaya.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/05/24/2', 'http://www.securityfocus.com/bid/108422', 'https://lists.apache.org/thread.html/eed73fc18d4fa3e2341cd0ab101b47f06b16c7efc1cb73791c524c9d@%3Cdev.tamaya.apache.org%3E', 'http://jvn.jp/en/jp/JVN71498764/index.html', 'https://lists.apache.org/thread.html/63d1cec8541befeb59dbed23a6b227bdcca7674aa234fb43354dac82@%3Ccommits.tamaya.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
GHSA
GHSA-vfq6-hq5r-27r6
Potential account hijack via password reset form in Django
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
{'CVE-2019-19844'}
2022-03-21T20:49:09Z
2020-01-16T22:35:12Z
CRITICAL
9.8
{'CWE-640'}
{'https://usn.ubuntu.com/4224-1/', 'https://security.gentoo.org/glsa/202004-17', 'https://github.com/advisories/GHSA-vfq6-hq5r-27r6', 'https://seclists.org/bugtraq/2020/Jan/9', 'http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html', 'https://github.com/django/django/commit/f4cff43bf921fcea6a29b726eb66767f67753fa2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19844', 'https://github.com/django/django/commit/5b1fbcef7a8bec991ebe7b2a18b5d5a95d72cb70', 'https://www.djangoproject.com/weblog/2019/dec/18/security-releases/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/', 'https://www.debian.org/security/2020/dsa-4598', 'https://security.netapp.com/advisory/ntap-20200110-0003/', 'https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0'}
null
GHSA
GHSA-2h3h-vw8r-82rp
Weak JSON Web Token in yapi-vendor
Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used as a source of randomness in jwt signing. Math.random does not provide cryptographically secure random numbers. This has been patched in version 1.9.3.
{'CVE-2021-27884'}
2021-07-22T15:58:18Z
2021-03-26T16:49:26Z
MODERATE
5.1
{'CWE-330'}
{'https://github.com/YMFE/yapi/issues/2117', 'https://github.com/YMFE/yapi/issues/2263', 'https://github.com/advisories/GHSA-2h3h-vw8r-82rp', 'https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27884'}
null
GHSA
GHSA-4mrx-6fxm-8jpg
Buffer Overflow in vyper
### Impact Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. ### Patches 0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b) ### Workarounds Use .vy interfaces.
{'CVE-2022-24788'}
2022-04-22T19:54:12Z
2022-04-20T20:31:44Z
HIGH
7.1
{'CWE-119', 'CWE-120'}
{'https://github.com/advisories/GHSA-4mrx-6fxm-8jpg', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24788', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg', 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}
null
GHSA
GHSA-4gwh-2pqx-f5cc
Cross-site Scripting in LibreNMS
LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php.
{'CVE-2021-44277'}
2021-12-03T20:48:42Z
2021-12-03T20:48:42Z
MODERATE
0
{'CWE-79'}
{'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44277', 'https://github.com/advisories/GHSA-4gwh-2pqx-f5cc', 'https://github.com/librenms/librenms/pull/13554'}
null
GHSA
GHSA-76wf-9vgp-pj7w
Unencrypted md5 plaintext hash in metadata in AWS S3 Crypto SDK for golang
### Summary The golang AWS S3 Crypto SDK was impacted by an issue that can result in loss of confidentiality. An attacker with read access to an encrypted S3 bucket was able to recover the plaintext without accessing the encryption key. ### Risk/Severity The vulnerability poses insider risks/privilege escalation risks, circumventing KMS controls for stored data. ### Impact The issue has been fully mitigated by AWS as of Aug. 5th by disallowing the header in question. The S3 crypto library tries to store an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext in an offline attack, if the hash is readable to the attacker. In order to be impacted by this issue, the attacker has to be able to guess the plaintext as a whole. The attack is theoretically valid if the plaintext entropy is below the key size, i.e. if it is easier to brute force the plaintext instead of the key itself, but practically feasible only for short plaintexts or plaintexts otherwise accessible to the attacker in order to create a rainbow table. The issue has been fixed server-side by AWS as of Aug 5th, by blocking the related metadata field. No S3 objects are affected anymore. ### Mitigation The header in question is no longer served by AWS, making this attack fully mitigated as of Aug. 5th. ### Proof of concept A [Proof of concept](https://github.com/sophieschmieg/exploits/tree/master/aws_s3_crypto_poc) is available in a separate github repository, this particular issue can be found at [here](https://github.com/sophieschmieg/exploits/blob/master/aws_s3_crypto_poc/exploit/hash_exploit.go): ```golang func HashExploit(bucket string, key string, input *OfflineAttackInput) (string, error) { _, header, err := input.S3Mock.GetObjectDirect(bucket, key) length, err := strconv.Atoi(header.Get("X-Amz-Meta-X-Amz-Unencrypted-Content-Length")) plaintextMd5 := header.Get("X-Amz-Meta-X-Amz-Unencrypted-Content-Md5") blocks := length / 16 possiblePlaintextNum := 1 segNum := len(input.PossiblePlaintextSegments) for i := 0; i < blocks; i++ { possiblePlaintextNum *= segNum } for i := 0; i < possiblePlaintextNum; i++ { w := i guess := "" for j := 0; j < blocks; j++ { guess += input.PossiblePlaintextSegments[w%segNum] w /= segNum } guessMd5 := md5.Sum([]byte(guess)) if plaintextMd5 == base64.StdEncoding.EncodeToString(guessMd5[:]) { return guess, nil } } return "", fmt.Errorf("No plaintext found!") } ``` The PoC will only work on old versions of the library, as the hash has been removed from being calculated as well.
null
2022-04-19T19:02:31Z
2022-02-11T23:26:12Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-76wf-9vgp-pj7w', 'https://github.com/google/security-research/security/advisories/GHSA-76wf-9vgp-pj7w'}
null
GHSA
GHSA-v3j6-xf77-8r9c
Use-after-free in actix-http
An issue was discovered in the actix-http crate before 2.0.0-alpha.1 for Rust. There is a use-after-free in BodyStream.
{'CVE-2020-35901'}
2021-08-25T20:49:39Z
2021-08-25T20:49:39Z
HIGH
7.5
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35901', 'https://rustsec.org/advisories/RUSTSEC-2020-0048.html', 'https://github.com/actix/actix-web/issues/1321', 'https://github.com/advisories/GHSA-v3j6-xf77-8r9c'}
null
GHSA
GHSA-fwr5-q9rx-294f
Moderate severity vulnerability that affects django
The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.
{'CVE-2010-4534'}
2021-09-10T20:11:22Z
2018-07-23T19:51:40Z
MODERATE
0
null
{'http://www.securityfocus.com/bid/45562', 'http://secunia.com/advisories/42913', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html', 'http://code.djangoproject.com/changeset/15031', 'http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/', 'http://www.openwall.com/lists/oss-security/2011/01/03/5', 'http://www.djangoproject.com/weblog/2010/dec/22/security/', 'https://bugzilla.redhat.com/show_bug.cgi?id=665373', 'https://nvd.nist.gov/vuln/detail/CVE-2010-4534', 'http://secunia.com/advisories/42715', 'http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/', 'http://www.ubuntu.com/usn/USN-1040-1', 'http://www.securityfocus.com/archive/1/515446', 'http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html', 'http://www.vupen.com/english/advisories/2011/0048', 'https://github.com/advisories/GHSA-fwr5-q9rx-294f', 'http://www.vupen.com/english/advisories/2011/0098', 'http://secunia.com/advisories/42827', 'http://www.openwall.com/lists/oss-security/2010/12/23/4'}
null
GHSA
GHSA-39wj-j3jc-858m
XSS vulnerability leveraged through referrers could allow un-authorized admin access in Mautic
### Impact This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic. This vulnerability was reported by Naveen Sunkavally at Horizon3.ai. ### Patches Upgrade to 3.2.4 or 2.16.5. Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Post in https://forum.mautic.org/c/support * Email us at security@mautic.org
{'CVE-2020-35124'}
2022-04-19T19:02:44Z
2021-01-19T20:43:56Z
CRITICAL
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35124', 'https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce', 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4', 'https://forum.mautic.org/c/announcements/16', 'https://github.com/advisories/GHSA-39wj-j3jc-858m', 'https://github.com/mautic/mautic/security/advisories/GHSA-39wj-j3jc-858m', 'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57', 'https://packagist.org/packages/mautic/core'}
null
GHSA
GHSA-95cg-3r4g-7w6j
Malicious Package in js-rha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:10:33Z
2020-09-03T23:01:29Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-95cg-3r4g-7w6j', 'https://www.npmjs.com/advisories/1283'}
null
GHSA
GHSA-p9j6-4pjr-gp48
Path Traversal in MPXJ
common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations.
{'CVE-2020-35460'}
2021-01-22T20:50:55Z
2020-12-18T18:28:23Z
MODERATE
5.3
{'CWE-22'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d', 'http://www.mpxj.org/changes-report.html#a8.3.5', 'https://github.com/advisories/GHSA-p9j6-4pjr-gp48', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35460'}
null
GHSA
GHSA-7cr9-rmqr-fpqp
Path traversal in FreeTAKServer-UI
An issue in the ?filename= argument of the route /DataPackageTable in FreeTAKServer-UI v1.9.8 allows attackers to place arbitrary files anywhere on the system.
{'CVE-2022-25511'}
2022-03-28T22:34:58Z
2022-03-12T00:00:37Z
MODERATE
6.5
{'CWE-22'}
{'https://github.com/FreeTAKTeam/UI/issues/29', 'https://github.com/advisories/GHSA-7cr9-rmqr-fpqp', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25511'}
null
GHSA
GHSA-wv4p-jp67-jr97
Data races in magnetic
An issue was discovered in the magnetic crate before 2.0.1 for Rust. MPMCConsumer and MPMCProducer allow cross-thread sending of a non-Send type.
{'CVE-2020-35925'}
2021-08-25T20:50:05Z
2021-08-25T20:50:05Z
MODERATE
5.5
{'CWE-362'}
{'https://github.com/johnshaw/magnetic/issues/9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35925', 'https://rustsec.org/advisories/RUSTSEC-2020-0088.html', 'https://github.com/advisories/GHSA-wv4p-jp67-jr97'}
null
GHSA
GHSA-cwfw-4gq5-mrqx
Regular Expression Denial of Service (ReDoS) in braces
A vulnerability was found in Braces versions prior to 2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
{'CVE-2018-1109'}
2022-01-06T20:42:03Z
2022-01-06T20:42:03Z
LOW
0
{'CWE-400'}
{'https://snyk.io/vuln/npm:braces:20180219', 'https://bugzilla.redhat.com/show_bug.cgi?id=1547272', 'https://github.com/advisories/GHSA-cwfw-4gq5-mrqx', 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1109'}
null
GHSA
GHSA-6xh7-4v2w-36q6
ASP.NET Core fails to properly validate web requests
A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.
{'CVE-2017-0247'}
2022-04-26T19:07:09Z
2018-10-16T19:58:05Z
HIGH
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-0247', 'https://github.com/advisories/GHSA-6xh7-4v2w-36q6', 'https://github.com/aspnet/Announcements/issues/239', 'https://technet.microsoft.com/en-us/library/security/4021279.aspx', 'https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS'}
null
GHSA
GHSA-5frh-8cmj-gc59
High severity vulnerability that affects System.Management.Automation
## Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability # Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability ## Executive Summary A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could circumvent PowerShell Core Constrained Language Mode on the machine. To exploit the vulnerability, an attacker would first have access to the local machine where PowerShell is running in Constrained Language mode. By doing that an attacker could leverage script debugging to abuse signed modules in an unintended way. The update addresses the vulnerability by correcting how PowerShell functions in Constrained Language Mode. System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).) ## Discussion Please use PowerShell/PowerShell#TBD for discussion of this advisory. ## <a name="affected-software">Affected Software</a> The vulnerability affects PowerShell Core prior to the following versions: | PowerShell Core Version | Fixed in | |-------------------------|-------------------| | 6.1 | 6.1.5 | | 6.2 | 6.2.2 | ## Advisory FAQ ### How do I know if I am affected? If all of the following are true: 1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected. 1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`. ### How do I update to an unaffected version? Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core. ## Other Information ### Reporting Security Issues If you have found a potential security issue in PowerShell Core, please email details to secure@microsoft.com. ### Support You can ask questions about this issue on GitHub in the PowerShell organization. This is located at https://github.com/PowerShell/. The Announcements repo (https://github.com/PowerShell/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions. ### What if the update breaks my script or module? You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core. This should be treated as a temporary measure. Therefore, the script or module should be updated to work with the patched version of PowerShell Core. ### Acknowledgments Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information. ### External Links [CVE-2019-1167](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167) ### Revisions V1.0 (July 16, 2019): Advisory published. *Version 1.0* *Last Updated 2019-07-16*
{'CVE-2019-1167'}
2021-09-01T21:47:16Z
2019-07-17T19:14:18Z
MODERATE
4.1
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1167', 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-5frh-8cmj-gc59', 'https://github.com/advisories/GHSA-5frh-8cmj-gc59', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167'}
null
GHSA
GHSA-w7q7-vjp8-7jv4
SQL Injection in typeorm
Versions of `typeorm` before 0.1.15 are vulnerable to SQL Injection. Field names are not properly validated allowing attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation Upgrade to version 0.1.15
null
2021-08-04T20:56:26Z
2019-06-06T15:30:16Z
HIGH
0
{'CWE-89'}
{'https://github.com/advisories/GHSA-w7q7-vjp8-7jv4', 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://www.npmjs.com/advisories/800', 'https://hackerone.com/reports/319458'}
null
GHSA
GHSA-www2-v7xj-xrc6
High severity vulnerability that affects urllib3
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
{'CVE-2018-20060'}
2022-03-24T16:43:20Z
2018-12-12T15:52:07Z
CRITICAL
9.8
{'CWE-200'}
{'https://access.redhat.com/errata/RHSA-2019:2272', 'https://bugzilla.redhat.com/show_bug.cgi?id=1649153', 'https://github.com/urllib3/urllib3/issues/1316', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXLAXHM3Z6DUCXZ7ZXZ2EAYJXWDCZFCT/', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWP36YW3KSVLXDBY3QJKDYEPCIMN3VQZ/', 'https://github.com/urllib3/urllib3/pull/1346', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SJERZEJDSUYQP7BNBXMBHRHGY26HRZD/', 'https://github.com/advisories/GHSA-www2-v7xj-xrc6', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html', 'https://usn.ubuntu.com/3990-1/', 'https://github.com/urllib3/urllib3/blob/master/CHANGES.rst', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20060'}
null
GHSA
GHSA-8v67-x8q5-3x3g
Cross-Site Scripting in simditor
Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 2.3.22 or later.
{'CVE-2018-19048'}
2021-08-04T14:53:06Z
2019-05-14T04:01:27Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/hkglue/simditor_demo.git', 'https://www.npmjs.com/advisories/884', 'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048', 'https://github.com/hkglue/simditor_dom_xss/blob/master/README.md', 'https://github.com/advisories/GHSA-8v67-x8q5-3x3g', 'https://snyk.io/vuln/SNYK-JS-SIMDITOR-174638', 'https://github.com/mycolorway/simditor/releases/tag/v2.3.22'}
null
GHSA
GHSA-wv67-q8rr-grjp
Prototype Pollution in jquery
Versions of `jquery` prior to 3.4.0 are vulnerable to Prototype Pollution. The extend() method allows an attacker to modify the prototype for `Object` causing changes in properties that will exist on all objects. ## Recommendation Upgrade to version 3.4.0 or later.
{'CVE-2019-5428'}
2020-08-31T18:36:09Z
2019-04-23T15:59:10Z
MODERATE
0
null
{'https://github.com/jquery/jquery/pull/4333', 'https://github.com/advisories/GHSA-wv67-q8rr-grjp', 'https://hackerone.com/reports/454365', 'https://www.npmjs.com/advisories/796', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5428', 'https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/'}
null
GHSA
GHSA-98vv-pw6r-q6q4
Uncontrolled Resource Consumption in pillow
The package pillow from 0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.
{'CVE-2021-23437'}
2021-09-22T13:54:07Z
2021-09-07T23:08:10Z
HIGH
7.5
{'CWE-400', 'CWE-125'}
{'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23437', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/', 'https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html', 'https://github.com/advisories/GHSA-98vv-pw6r-q6q4'}
null
GHSA
GHSA-3jq8-jg75-rqv6
Moderate severity vulnerability that affects org.apache.nifi:nifi
The template upload API endpoint accepted requests from different domain when sent in conjunction with ARP spoofing + man in the middle (MiTM) attack, resulting in a CSRF attack. The required attack vector is complex, requiring a scenario with client certificate authentication, same subnet access, and injecting malicious code into an unprotected (plaintext HTTP) website which the targeted user later visits, but the possible damage warranted a Severe severity level. Mitigation: The fix to apply Cross-Origin Resource Sharing (CORS) policy request filtering was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
{'CVE-2018-17195'}
2021-08-31T21:07:34Z
2018-12-20T22:02:45Z
HIGH
7.5
{'CWE-863', 'CWE-319'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-17195', 'https://github.com/advisories/GHSA-3jq8-jg75-rqv6', 'https://nifi.apache.org/security.html#CVE-2018-17195'}
null
GHSA
GHSA-wm47-8v5p-wjpj
Possible request smuggling in HTTP/2 due missing validation
### Impact If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. A sample attack request looks like: ``` POST / HTTP/2 :authority:: externaldomain.com Content-Length: 4 asdfGET /evilRedirect HTTP/1.1 Host: internaldomain.com ``` Users are only affected if all of this is `true`: * `HTTP2MultiplexCodec` or `Http2FrameCodec` is used * `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects * These HTTP/1.1 objects are forwarded to another remote peer. ### Patches This has been patched in 4.1.60.Final ### Workarounds The user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`. ### References Related change to workaround the problem: https://github.com/Netflix/zuul/pull/980
{'CVE-2021-21295'}
2022-04-25T20:27:22Z
2021-03-09T18:49:49Z
MODERATE
5.9
{'CWE-444'}
{'https://lists.apache.org/thread.html/r905b92099998291956eebf4f1c5d95f5a0cbcece2946cc46d32274fd@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rbadcbcb50195f00bbd196403865ced521ca70787999583c07be38d0e@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21295', 'https://lists.apache.org/thread.html/re6207ebe2ca4d44f2a6deee695ad6f27fd29d78980f1d46ed1574f91@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r1bca0b81193b74a451fc6d687ab58ef3a1f5ec40f6c61561d8dd9509@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r393a339ab0b63ef9e6502253eeab26e7643b3e69738d5948b2b1d064@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r22adb45fe902aeafcd0a1c4db13984224a667676c323c66db3af38a1@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/racc191a1f70a4f13155e8002c61bddef2870b26441971c697436ad5d@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6a122c25e352eb134d01e7f4fc4d345a491c5ee9453fef6fc754d15b@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re4f70b62843e92163fab03b65e2aa8078693293a0c36f1cc260079ed@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rae198f44c3f7ac5264045e6ba976be1703cff38dcf1609916e50210d@%3Ccommits.servicecomb.apache.org%3E', 'https://github.com/advisories/GHSA-wm47-8v5p-wjpj', 'https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra83096bcbfe6e1f4d54449f8a013117a0536404e9d307ab4a0d34f81@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r67e6a636cbc1958383a1cd72b7fd0cd7493360b1dd0e6c12f5761798@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcf3752209a8b04996373bf57fdc808b3bfaa2be8702698a0323641f8@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r22b2f34447d71c9a0ad9079b7860323d5584fb9b40eb42668c21eaf1@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rdc096e13ac4501ea2e2b03a197682a313b85d3d3ec89d5ae5551b384@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r96ce18044880c33634c4b3fcecc57b8b90673c9364d63eba00385523@%3Cjira.kafka.apache.org%3E', 'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4', 'https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E', 'https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj', 'https://lists.apache.org/thread.html/r837bbcbf12e335e83ab448b1bd2c1ad7e86efdc14034b23811422e6a@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5470456cf1409a99893ae9dd57439799f6dc1a60fda90e11570f66fe@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r268850f26639ebe249356ed6d8edb54ee8943be6f200f770784fb190@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rf87b870a22aa5c77c27900967b518a71a7d954c2952860fce3794b60@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/reafc834062486adfc7be5bb8f7b7793be0d33f483678a094c3f9d468@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rbed09768f496244a2e138dbbe6d2847ddf796c9c8ef9e50f2e3e30d9@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rb95d42ce220ed4a4683aa17833b5006d657bc4254bc5cb03cd5e6bfb@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rcfc154eb2de23d2dc08a56100341161e1a40a8ea86c693735437e8f2@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r040a5e4d9cca2f98354b58a70b27099672276f66995c4e2e39545d0b@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r15f66ada9a5faf4bac69d9e7c4521cedfefa62df9509881603791969@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r3c293431c781696681abbfe1c573c2d9dcdae6fd3ff330ea22f0433f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r27b7e5a588ec826b15f38c40be500c50073400019ce7b8adfd07fece@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3ff9e735ca33612d900607dc139ebd38a64cadc6bce292e53eb86d7f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r16c4b55ac82be72f28adad4f8061477e5f978199d5725691dcc82c24@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r3c4596b9b37f5ae91628ccf169d33cd5a0da4b16b6c39d5bad8e03f3@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r5fc5786cdd640b1b0a3c643237ce0011f0a08a296b11c0e2c669022c@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r312ce5bd3c6bf08c138349b507b6f1c25fe9cf40b6f2b0014c9d12b1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r6aee7e3566cb3e51eeed2fd8786704d91f80a7581e00a787ba9f37f6@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r9051e4f484a970b5566dc1870ecd9c1eb435214e2652cf3ea4d0c0cc@%3Cjira.kafka.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210604-0003/', 'https://lists.apache.org/thread.html/rcfc535afd413d9934d6ee509dce234dac41fa3747a7555befb17447e@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r5232e33a1f3b310a3e083423f736f3925ebdb150844d60ac582809f8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r70cebada51bc6d49138272437d8a28fe971d0197334ef906b575044c@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r86cd38a825ab2344f3e6cad570528852f29a4ffdf56ab67d75c36edf@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rc165e36ca7cb5417aec3f21bbc4ec00fb38ecebdd96a82cfab9bd56f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E', 'https://github.com/Netflix/zuul/pull/980', 'https://lists.apache.org/thread.html/rd25c88aad0e76240dd09f0eb34bdab924933946429e068a167adcb73@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r04a3e0d9f53421fb946c60cc54762b7151dc692eb4e39970a7579052@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r6a29316d758db628a1df49ca219d64caf493999b52cc77847bfba675@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}
null
GHSA
GHSA-8r7q-r9mx-35rh
Mishandling of format strings in rusqlite
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated because rusqlite::trace::log mishandles format strings.
{'CVE-2020-35869'}
2021-08-25T20:47:18Z
2021-08-25T20:47:18Z
CRITICAL
9.8
{'CWE-134'}
{'https://github.com/advisories/GHSA-8r7q-r9mx-35rh', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/rusqlite/rusqlite/commit/2327d3b774927fdf48903c0bdc1ca7ec93c7c8d0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35869', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}
null
GHSA
GHSA-c4hh-fg8x-6h9p
Malicious Package in buffer-xnr
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:04:34Z
2020-09-03T21:57:29Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-c4hh-fg8x-6h9p', 'https://www.npmjs.com/advisories/1247'}
null
GHSA
GHSA-3x83-p476-vv95
Downloads Resources over HTTP in selenium-standalone-painful
Affected versions of `selenium-standalone-painful` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-standalone-painful`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10679'}
2021-01-08T19:58:07Z
2019-02-18T23:54:40Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/284', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10679', 'https://nodesecurity.io/advisories/284', 'https://github.com/advisories/GHSA-3x83-p476-vv95'}
null
GHSA
GHSA-778x-2mqv-w6xw
Moderate severity vulnerability that affects org.keycloak:keycloak-core
Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.
{'CVE-2016-8629'}
2021-01-08T19:17:05Z
2018-10-18T16:48:01Z
MODERATE
0
{'CWE-284'}
{'https://access.redhat.com/errata/RHSA-2017:0872', 'https://bugzilla.redhat.com/show_bug.cgi?id=1388988', 'http://rhn.redhat.com/errata/RHSA-2017-0876.html', 'https://access.redhat.com/errata/RHSA-2017:0873', 'http://www.securityfocus.com/bid/97392', 'https://github.com/advisories/GHSA-778x-2mqv-w6xw', 'http://www.securitytracker.com/id/1038180', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8629'}
null
GHSA
GHSA-79gr-58r3-pwm3
Forbid serializing AbstractAdapter and TagAwareAdapter instances
An issue was discovered in Symfony 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. Serializing certain cache adapter interfaces could result in remote code injection. This is related to symfony/cache.
{'CVE-2019-18889'}
2021-08-19T15:17:26Z
2019-12-02T18:07:16Z
CRITICAL
9.8
{'CWE-94'}
{'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://symfony.com/cve-2019-18889', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18889.yaml', 'https://symfony.com/blog/cve-2019-18889-forbid-serializing-abstractadapter-and-tagawareadapter-instances', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://github.com/advisories/GHSA-79gr-58r3-pwm3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18889'}
null
GHSA
GHSA-wwwg-6r7f-9c9h
Malicious Package in file-logging
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:15:33Z
2020-09-03T19:43:28Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1126', 'https://github.com/advisories/GHSA-wwwg-6r7f-9c9h'}
null
GHSA
GHSA-cxvr-r92m-q9hw
XSS in Dolibarr
Dolibarr before 11.0.4 allows XSS.
{'CVE-2020-13094'}
2021-08-25T21:14:11Z
2020-05-21T21:08:47Z
MODERATE
5.4
{'CWE-79'}
{'http://packetstormsecurity.com/files/157752/Dolibarr-11.0.3-Cross-Site-Scripting.html', 'https://github.com/Dolibarr/dolibarr/blob/11.0.4/ChangeLog', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13094', 'https://github.com/advisories/GHSA-cxvr-r92m-q9hw', 'https://www.dolibarr.org/dolibarr-erp-crm-11-0-4-maintenance-release-for-branch-11-0-is-available.php'}
null
GHSA
GHSA-vv38-4xcj-q4rw
Cross-site Scripting in Apache Knox SSO
When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign.
{'CVE-2021-42357'}
2022-01-25T20:49:40Z
2022-01-21T23:52:00Z
MODERATE
6.1
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2022/01/17/2', 'https://github.com/advisories/GHSA-vv38-4xcj-q4rw', 'https://lists.apache.org/thread/b7v5dkpyqb51nw0lvz4cybhgrfhk1g7j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42357'}
null
GHSA
GHSA-33gc-6cw9-w3g4
Deserialization of Untrusted Data in topthink/framework
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php.
{'CVE-2021-36564'}
2021-12-10T20:23:19Z
2021-12-10T20:23:19Z
CRITICAL
0
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36564', 'https://github.com/advisories/GHSA-33gc-6cw9-w3g4', 'https://github.com/top-think/framework/issues/2559'}
null
GHSA
GHSA-cqcc-mm6x-vmvw
Persistent Cross-site Scripting vulnerability in PrivateBin
In PrivateBin < v1.4.0 a cross-site scripting (XSS) vulnerability was found. The vulnerability is present since attachments with image preview got introduced in v0.21 of the project, which was at the time still called ZeroBin. The issue is caused by the fact that SVGs can contain JavaScript. This can allow an attacker to execute code, if the user opens a paste with a specifically crafted SVG attachment, and interacts with the preview image and the instance isn't protected by an appropriate content security policy. As a consequence, we have mitigated the vulnerability in the preview and urge server administrators to either **upgrade** to a version with the fix or to ensure the content security policy of their instance is set correctly, ideally both. Additionally, we expanded our [directory listing tool with a checking mechanism](https://privatebin.info/directory/check) and **highly suggest server administrators to check their instance there** and, should there be a warning regarding the content security policy **adjust the CSP to our suggested one**, as it is shown in the configuration preset. ## Proof of concept The vulnerability can be triggered as following: 1. Create the following SVG as a file: ```svg <?xml version="1.0" standalone="no"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"> <svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg"> <polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/> <script type="text/javascript"> alert(document.domain); </script> </svg> ``` 2. Upload it as an attachment to a PrivateBin instance that has attachments enabled and hasn't set the recommended content security policy (in particular, one that has either no content security policy set or that allows `*` or `blob:` as a `script-src`). 3. Open the paste. (In a real attack scenario this would be done by the victim.) 4. The SVG is rendered safely as a preview, and script isn't yet executed. 5. Now (depending on your device) right-click or long tap on the image and open it in a new tab. 6. Now a `blob:` URI opens in a new tab with the image and the modal is shown, therefore the script got executed. ## Impact We tried to reproduce the vulnerability and in our assessment, we found out the following: 1. Any users who use our recommended _Content Security Policy_ (CSP), even older, less strict ones, are **not affected** by this vulnerability, if a [CSP compatible browser](https://caniuse.com/contentsecuritypolicy) is used. All the browsers we tested with did pass on the CSP to the new tab that is opened when viewing the SVG by itself. As PrivateBin ships with a [built-in CSP](https://github.com/PrivateBin/PrivateBin/wiki/Configuration#cspheader), we consider this a strong defence in depth against these and related issues. That said, we think the CSP should only be the last layer of defence and as such, we decided to still apply further mitigations for this security issue. 2. Instances that do not have attachments enabled, are not affected. Even when attachments are uploaded using a third-party client, they can't be rendered when the administrator disables them (the HTML element that they would render in isn't present and before 1.4 this caused an error, we now catch the error and only display the paste text) and thus potential exploits in the attachment file do not apply. 3. The inline preview (step 4 above) does _not_ execute the script, because [browsers explicitly restrict SVGs if the they are is embedded in an `img` tag](https://developer.mozilla.org/en-US/docs/Web/SVG/SVG_as_an_Image#restrictions) to prevent such security issues in images. Thus, [SVGs in `img` tags itself can be considered safe](https://www.w3.org/TR/CSP2/#which-policy-applies). However, when the user opens the SVG in a new tab, this browser security feature is circumvented. That's why the exploit steps above explain to open the SVG in a new tab. That being said, the impact of the vulnerability is reduced by two factors: 1. The attack explicitly requires **user-interaction**, i.e. the user has to be tricked into opening the preview in a new tab for some reason. This could realistically be achieved with some social engineering: The markdown formatted text part of the paste could include such an instruction as a big, bold title, or the SVG could be very large and have very small text, which the user might want to zoom into, in order to read. 2. Potential exploit code can only run in a new tab. It still has the same origin (as can be seen in the PoC above, because the domain/origin the script is running on, is shown). However, though, sensitive information like the paste content, potential comments or encryption key (in the URL) is not accessible to the attacker as the context is now a blob-URL – and would anyway consist mostly of things the attacker initially created itself. That said, [the same origin policy applies](https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy) and thus, what an attacker could do is read e.g. cookies and local storage data saved in the same origin. As PrivateBin itself does not use any of that, the impact of this vulnerability is limited. However, as PrivateBin is a software for self-hosting, it cannot be excluded that other services run in the same origin (e.g. on the same domain). That's why server administrators may need to evaluate the impact of running arbitrary JavaScript code on their domain/origin where PrivateBin is hosted by themselves. To summarize, this shows a fairly limited impact, given even if the CSP had not caught the issue, the user still needs to interact with the page and the exploit code cannot access or exfiltrate any data of the PrivateBin instance. **Note:** However, take our assessment only as a basis for your own assessment. As explained, depending on your environment, the actual risk may vary if you are hosting other services on the same domain as PrivateBin. As for the metrics, the impact assessment we have done with [CVSS v3.1](https://nvd.nist.gov/vuln-metrics/cvss) results in this: [AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:X/IR:X/AR:X/MAV:N/MAC:L/MPR:N/MUI:R/MS:U/MC:X/MI:X/MA:X](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:X/IR:X/AR:X/MAV:N/MAC:L/MPR:N/MUI:R/MS:U/MC:X/MI:X/MA:X&version=3.1) ### Real-life impact We found two affected instances in our instance lists (wiki, directory) that did not serve a correct Content Security Policy header, had attachments enabled and thus are vulnerable to this attack. We didn't manage to get into contact with the administrators of these sites, though. In addition to that, we found that multiple instances do seem to either strip our CSP or have it changed to an unsafe setting and have thus expanded our directory service to verify whether our recommend CSP is used or not. (see below) We have no reports that indicate this vulnerability was or is being actively exploited at the time of this report. ## Patches To fix the problem, we took the following measures (in no particular order): * We apply [DOMpurify](https://github.com/cure53/DOMPurify/) (a library we already use to sanitize user-submitted HTML via the Markdown format) to the SVG preview, too. It strips script tags and other uncommon security-relevant and potentially malicious tags/properties from the SVG file. So whether you open the SVG in a new tab or not and whether CSP is present and enabled or not does not matter any more, as the displayed SVG is sanitized. * As a further defence in depth mechanism we now send the CSP both as an HTTP header, as well as a meta tag. This protects instance with mis-configured web servers, CDNs, proxy or similar, from stripping or breaking the CSP headers, as they still get the CSP inside of the HTML content itself. Please note though, that the [meta tag approach is not as strong as the HTTP header approach](https://content-security-policy.com/examples/meta/) and should thus only be considered as a fallback. * The [PrivateBin Directory](https://privatebin.info/) now also scans whether the recommend Content-Security-Policy header is used on a given instance. If you do not want to have your website appear in the list, but check it manually [you can use a separate check page](https://privatebin.info/directory/check) there. The code-changes in PrivateBin can be found in https://github.com/PrivateBin/PrivateBin/pull/906. **Note:** Please note that we explicitly chose to _not_ apply _DOMPurify_ if you download the (SVG) attachment with the download button. Subsequently, if a user would manually opens the downloaded SVG in the browser, it will be opened from the `file://` protocol and thus from a [different origin](https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy), so all reference to the download location is lost and no more security risk is associated with that, than opening any website or local HTML file. Thus, the SVG file with stay intact in it's original form, if you download the attachment. We consider the execution of code from attachments outside of the PrivateBin instance's context to be out of scope to mitigate (i.e. malware in executables, office documents macros, PDF scripts), as all of these require client side mitigations to be applied to all such downloaded file types, independent on where they get downloaded from. ## Workarounds We strongly recommend you to upgrade to our latest release, especially as we also upgraded outdated and potential vulnerable libraries (see below). However, here are two workarounds that may help you to mitigate this vulnerability: * Update the [CSP in your configuration file](https://github.com/PrivateBin/PrivateBin/wiki/Configuration#cspheader) to the latest recommended settings and check that it isn't getting reverted or overwritten by your web server, reverse proxy or CDN, i.e. using [our offered check service](https://privatebin.info/directory/check). * Deploying PrivateBin on a separate domain may limit the scope of the vulnerability to PrivateBin itself and thus, as described in the “Impact” section, effectively prevent any damage by the vulnerability to other resources you are hosting. * As explained in the impact assessment, disabling attachments also prevents this issue. ## References We highly encourage server administrators and others involved with the PrivateBin project to read-up on how Content-Security-Policies work, especially should you consider to manually adjust it: * https://content-security-policy.com/ * https://developer.mozilla.org/docs/Web/HTTP/CSP * https://developers.google.com/web/fundamentals/security/csp/ Also please note that if multiple headers are set (as e.g. done via our now introduced meta tag) [browsers should apply the most restrictive set of the policies](https://stackoverflow.com/a/51153816/5008962), [as per the CSP specification](https://www.w3.org/TR/CSP2/#enforcing-multiple-policies). ## For more information Please notice we also upgraded [jQuery](https://github.com/PrivateBin/PrivateBin/pull/880) that was reported to us as being vulnerable both by [our automated container security scanning](https://github.com/PrivateBin/docker-nginx-fpm-alpine/issues/69#issue-1006943396) as well as [by users](https://github.com/PrivateBin/PrivateBin/issues/864). By doing so, we also updated all [other dependencies we use](https://github.com/PrivateBin/PrivateBin/pull/888). Our tooling identified the following vulnerabilities in jQuery: * CVE-2020-11023 * CVE-2020-11022 In [a limited assessment about these when we were made aware of them](https://github.com/PrivateBin/docker-nginx-fpm-alpine/issues/69#issuecomment-928261418) we could not find any immediate risk, but nevertheless, we encourage users to upgrade to be on the safe side. Finally, we also [upgraded zlib](https://github.com/PrivateBin/PrivateBin/pull/909) to address CVE-2018-25032. ## Timeline * 2022-02-22 – Initial contact by reporter. * 2022-02-25 – Reporter sends in a detailed report. * 2022-02-26 – Report gets reviewed, initial findings around the content security get shared and reporter withdraws report. * 2022-04-09 – Vulnerability details published. ## Credits This vulnerability was reported by Ian Budd, [Nethemba s.r.o](https://www.nethemba.com/), which we'd like to thank for that. In general, we'd like to thank everyone reporting issues and potential vulnerabilities to us. If you think you have found a vulnerability or potential security risk, [we'd kindly ask you to follow our security policy](https://github.com/PrivateBin/PrivateBin/blob/master/SECURITY.md) and report it to us. We then assess the report and will take the actions we deem necessary to address it.
{'CVE-2022-24833'}
2022-04-12T21:33:22Z
2022-04-12T20:45:22Z
HIGH
8.2
{'CWE-79'}
{'https://github.com/PrivateBin/PrivateBin/commit/2a4d572c1e9eb9b608d32b0cc0cb3b6c3b684eab', 'https://github.com/advisories/GHSA-cqcc-mm6x-vmvw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24833', 'https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-cqcc-mm6x-vmvw'}
null
GHSA
GHSA-hpv8-9rq5-hq7w
Generated Code Contains Local Information Disclosure Vulnerability
### Impact **This vulnerability impacts generated code.** If this code was generated as a one-off occasion, not as a part of an automated CI/CD process, this code will remain vulnerable until fixed manually! On Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used. #### Java Code The method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability. - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/kotlin-client/infrastructure/ApiClient.kt.mustache#L209 - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/finch/api.mustache#L84 - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/okhttp-gson/ApiClient.mustache#L831-L834 - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/jersey2/ApiClient.mustache#L630-L633 ### Patches Fix has been applied to the master branch with: * https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2 included in release: 2.4.19 ### Workarounds Users can remediate the vulnerability in non patched version by manually (or programmatically e.g. in CI) updating the generated source code to use `java.nio.files.Files` temporary file creation instead of `java.io.File`, e.g. by changing ```java if (tempFolderPath == null) return File.createTempFile(prefix, suffix); else return File.createTempFile(prefix, suffix, new File(tempFolderPath)); ``` to ```java if (tempFolderPath == null) return Files.createTempFile(prefix, suffix).toFile(); else return Files.createTempFile(Paths.get(tempFolderPath), prefix, suffix).toFile(); ``` or generally changing: ```java File.createTempFile(prefix, suffix); ``` to ```java Files.createTempFile(prefix, suffix).toFile(); ``` ### References * [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) * [CWE-200: Exposure of Sensitive Information to an Unauthorized Actor](https://cwe.mitre.org/data/definitions/200.html) * [CWE-732: Incorrect Permission Assignment for Critical Resource](https://cwe.mitre.org/data/definitions/732.html) ### For more information If you have any questions or comments about this advisory: * Email us at [security@swagger.io](mailto:security@swagger.io) #### Original vulnerability report > I'm performing OSS security research under the GitHub Security Lab Bug Bounty program. > I've been using a custom CodeQL query to find local temporary directory vulnerabilities in OSS with three custom CodeQL queries. > > - https://github.com/github/codeql/pull/4388/files#diff-71d36c0f2bd0b08e32866f873f1c906cdc17277e0ad327c0c6cd2c882f30de4f > - https://github.com/github/codeql/pull/4388/files#diff-1893a18a8bf43c011d61a7889d0139b998a5a78701a30fe7722eddd4c506aaac > - https://github.com/github/codeql/pull/4473 > > The code generated by the Swagger Generator contains a local information disclosure vulnerability. The system temporary directory, on unix-like systems is shared between multiple users. Information written to this directory, or directories created under this directory that do not correctly set the posix standard permissions can have these directories read/modified by other users. > > --- > > This code exists in the code generator, in the generated code. > > In this case, I believe this is only a local information disclosure. IE. another user can read the information, not replace it. > > In particular, the method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability. > > This is because `File.createTempFile` creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system. > > - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/kotlin-client/infrastructure/ApiClient.kt.mustache#L209 > - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/finch/api.mustache#L84 > - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/okhttp-gson/ApiClient.mustache#L831-L834 > - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/jersey2/ApiClient.mustache#L630-L633 > > The fix here is to switch to the `Files` API, instead of `File` as that appropriately sets the file permissions. >
{'CVE-2021-21364'}
2022-04-19T19:02:48Z
2021-03-11T03:09:18Z
LOW
6.2
{'CWE-200', 'CWE-732', 'CWE-378'}
{'https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2', 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w', 'https://github.com/advisories/GHSA-hpv8-9rq5-hq7w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21364'}
null
GHSA
GHSA-jg4f-jqm5-4mgq
Ansible fails to properly sanitize fact variables sent from the Ansible controller
Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.
{'CVE-2016-8628'}
2022-04-26T18:42:21Z
2018-10-10T17:23:14Z
CRITICAL
9.1
{'CWE-77'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8628', 'https://access.redhat.com/errata/RHSA-2016:2778', 'https://github.com/advisories/GHSA-jg4f-jqm5-4mgq', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8628', 'https://github.com/ansible/ansible/commit/35938b907dfcd1106ca40b794f0db446bdb8cf09', 'http://www.securityfocus.com/bid/94109'}
null
GHSA
GHSA-xj7h-g7rh-gjcw
Cross-site Scripting in Subrion CMS
Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the `q` parameter in the Kickstart template.
{'CVE-2020-18324'}
2022-03-15T00:23:06Z
2022-03-05T00:00:45Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-18324', 'https://github.com/hamm0nz/CVE-2020-18324', 'https://github.com/advisories/GHSA-xj7h-g7rh-gjcw'}
null
GHSA
GHSA-69r6-7h4f-9p7q
Malicious Package in discord.js-user
All versions of `discord.js-user` contain malicious code. The package uploads the user's Discord token to a remote server. ## Recommendation Remove the package from your environment. Ensure any compromised tokens are invalidated.
null
2021-09-29T20:32:47Z
2020-09-03T20:41:01Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1177', 'https://github.com/advisories/GHSA-69r6-7h4f-9p7q'}
null
GHSA
GHSA-f2vv-v9cg-qhh7
Assertion failure based denial of service in Tensorflow
### Impact The [implementation of `*Bincount` operations](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc) allows malicious users to cause denial of service by passing in arguments which would trigger a `CHECK`-fail: ```python import tensorflow as tf tf.raw_ops.DenseBincount( input=[[0], [1], [2]], size=[1], weights=[3,2,1], binary_output=False) ``` There are several conditions that the input arguments must satisfy. Some are not caught during shape inference and others are not caught during kernel implementation. This results in `CHECK` failures later when the output tensors get allocated. ### Patches We have patched the issue in GitHub commit [7019ce4f68925fd01cdafde26f8d8c938f47e6f9](https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
{'CVE-2022-21737'}
2022-02-11T16:23:03Z
2022-02-09T23:43:48Z
MODERATE
6.5
{'CWE-754', 'CWE-617'}
{'https://github.com/advisories/GHSA-f2vv-v9cg-qhh7', 'https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21737', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2vv-v9cg-qhh7'}
null
GHSA
GHSA-4fh8-pm7g-pmxq
Authentication bypass in Apache Hadoop
Web endpoint authentication check is broken in Apache Hadoop 3.0.0-alpha4, 3.0.0-beta1, and 3.0.0. Authenticated users may impersonate any user even if no proxy user is configured.
{'CVE-2018-11764'}
2022-02-10T20:28:06Z
2022-02-10T20:28:06Z
HIGH
8.8
{'CWE-306'}
{'https://github.com/advisories/GHSA-4fh8-pm7g-pmxq', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11764', 'https://lists.apache.org/thread.html/r790ad0a049cde713b93589ecfd4dd2766fda0fc6807eedb6cf69f5c1%40%3Cgeneral.hadoop.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20201103-0003/'}
null
GHSA
GHSA-m2h2-264f-f486
angular vulnerable to regular expression denial of service (ReDoS)
AngularJS lets users write client-side web applications. The package angular after 1.7.0 is vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value. **Note:** 1. This package has been deprecated and is no longer maintained. 2. The vulnerable versions are 1.7.0 and higher.
{'CVE-2022-25844'}
2022-05-04T20:12:03Z
2022-05-03T00:00:44Z
MODERATE
5.3
{'CWE-1333'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737', 'https://stackblitz.com/edit/angularjs-material-blank-zvtdvb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25844', 'https://github.com/advisories/GHSA-m2h2-264f-f486', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735'}
null
GHSA
GHSA-77pc-q5q7-qg9h
Moderate severity vulnerability that affects rails-html-sanitizer
Withdrawn, accidental duplicate publish. Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.
null
2021-12-03T14:25:22Z
2018-09-17T21:58:30Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-77pc-q5q7-qg9h', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580'}
null
GHSA
GHSA-hqhp-5p83-hx96
Regular Expression Denial of Service in prismjs
Prism is a lightweight, robust, and elegant syntax highlighting library. The prismjs package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted HTML comment as input may cause an application to consume an excessive amount of CPU.
{'CVE-2021-3801'}
2022-05-04T03:23:17Z
2021-09-20T20:44:48Z
MODERATE
6.5
{'CWE-400'}
{'https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a', 'https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3801', 'https://github.com/advisories/GHSA-hqhp-5p83-hx96'}
null
GHSA
GHSA-hf4q-52x6-4p57
Unrestricted file upload leads to stored cross-site scripting in Microweber
Microweber prior to version 1.2.12 allows unrestricted file upload, which could lead to stored cross-site scripting.
{'CVE-2022-0906'}
2022-03-29T21:07:51Z
2022-03-11T00:02:36Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0906', 'https://github.com/advisories/GHSA-hf4q-52x6-4p57', 'https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8'}
null
GHSA
GHSA-v567-q267-phpg
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0257'}
2022-01-25T20:49:26Z
2022-01-21T23:50:11Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/bad2073c-bbd5-4425-b3e9-c336b73ddda6', 'https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d', 'https://github.com/advisories/GHSA-v567-q267-phpg', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0257'}
null
GHSA
GHSA-3cj3-jrrp-9rxf
Unchecked Return Value in xcb
An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because transmutation to the wrong type can happen after xcb::base::cast_event uses std::mem::transmute to return a reference to an arbitrary type.
{'CVE-2021-26958'}
2021-08-25T20:53:18Z
2021-08-25T20:53:18Z
HIGH
8.8
{'CWE-252'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26958', 'https://rustsec.org/advisories/RUSTSEC-2021-0019.html', 'https://github.com/advisories/GHSA-3cj3-jrrp-9rxf', 'https://github.com/RustSec/advisory-db/issues/653'}
null
GHSA
GHSA-9xw9-pvgv-6p76
Insufficient Error Handling in http-proxy
Affected versions of `http-proxy` are vulnerable to a denial of service attack, wherein an attacker can force an error which will cause the server to crash. ## Recommendation Update to version 0.7.0 or later.
{'CVE-2017-16014'}
2021-01-08T20:58:13Z
2018-11-09T17:47:52Z
MODERATE
0
{'CWE-703'}
{'https://github.com/nodejitsu/node-http-proxy/pull/101', 'https://github.com/advisories/GHSA-9xw9-pvgv-6p76', 'https://nodesecurity.io/advisories/323', 'https://www.npmjs.com/advisories/323', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16014'}
null
GHSA
GHSA-cr79-9pwf-r6f5
Downloads Resources over HTTP in prince
Affected versions of `prince` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `prince`. ## Recommendation Update to version 1.4.6 or later.
{'CVE-2016-10591'}
2021-09-16T20:42:48Z
2019-02-18T23:34:24Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://nodesecurity.io/advisories/185', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10591', 'https://www.npmjs.com/advisories/185', 'https://github.com/advisories/GHSA-cr79-9pwf-r6f5'}
null
GHSA
GHSA-692h-g37c-qv44
Malicious Package in sj-tw-sec
All versions of `sj-tw-sec` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T16:15:24Z
2020-09-03T23:25:30Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-692h-g37c-qv44', 'https://www.npmjs.com/advisories/1309'}
null
GHSA
GHSA-32hw-3pvh-vcvc
XSS vulnerability on password reset page
### Impact For Mautic versions prior to 3.3.4, there is an XSS vulnerability on Mautic's password reset page where a vulnerable parameter, "bundle," in the URL could allow an attacker to execute Javascript code. The attacker would be required to convince or trick the target into clicking a password reset URL with the vulnerable parameter utilized. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2021-27909'}
2022-04-19T19:03:06Z
2021-09-01T18:40:56Z
MODERATE
6.3
{'CWE-79'}
{'https://github.com/mautic/mautic/security/advisories/GHSA-32hw-3pvh-vcvc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27909', 'https://github.com/advisories/GHSA-32hw-3pvh-vcvc'}
null
GHSA
GHSA-67mm-m3wx-j7fr
Command injection in gitlog
The gitlog function in src/index.ts in gitlog before 4.0.4 has a command injection vulnerability.
{'CVE-2021-26541'}
2022-04-27T19:13:34Z
2021-04-13T15:15:29Z
CRITICAL
9.8
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26541', 'https://advisory.checkmarx.net/advisory/CX-2020-4301', 'https://github.com/domharrington/node-gitlog/pull/65/commits/bb22ffb2c907e0284f887ab625e12b88c31f4bf4', 'https://github.com/domharrington/node-gitlog/pull/65', 'https://www.npmjs.com/package/gitlog', 'https://github.com/advisories/GHSA-67mm-m3wx-j7fr'}
null
GHSA
GHSA-38f5-ghc2-fcmv
Code Injection in cryo
All versions of `cryo` are vulnerable to code injection due to an Insecure implementation of deserialization. ## Proof of concept ``` var Cryo = require('cryo'); var frozen = '{"root":"_CRYO_REF_3","references":[{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\"); return 1111;}"},{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\");return 2222;}"},{"contents":{"toString":"_CRYO_REF_0","valueOf":"_CRYO_REF_1"},"value":"_CRYO_OBJECT_"},{"contents":{"__proto__":"_CRYO_REF_2"},"value":"_CRYO_OBJECT_"}]}' var hydrated = Cryo.parse(frozen); console.log(hydrated); ``` ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
{'CVE-2018-3784'}
2021-01-08T20:03:11Z
2018-08-21T17:02:43Z
HIGH
0
{'CWE-94'}
{'https://github.com/advisories/GHSA-38f5-ghc2-fcmv', 'https://hackerone.com/reports/350418', 'https://www.npmjs.com/advisories/690', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3784'}
null
GHSA
GHSA-69mf-2cw2-38m8
Malicious Package in js-shc3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:13:23Z
2020-09-03T23:04:40Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1286', 'https://github.com/advisories/GHSA-69mf-2cw2-38m8'}
null
GHSA
GHSA-xg75-3277-gvvj
Directory Traversal in serve
Versions of `serve` before 7.1.3 are vulnerable to Directory Traversal. File paths are not sanitized leading to unauthorized access of system files. ## Recommendation Upgrade to version 7.1.3 or later
{'CVE-2019-5417'}
2021-09-21T22:30:47Z
2019-03-25T18:04:01Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-xg75-3277-gvvj', 'https://www.npmjs.com/advisories/795', 'https://hackerone.com/reports/358645', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5417'}
null
GHSA
GHSA-x7rv-cr6v-4vm4
Moderate severity vulnerability that affects loofah
Loofah allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments. Users are affected if running Loofah < 2.2.1, but only: * when running on MRI or RBX, * in combination with libxml2 >= 2.9.2. Please note: JRuby users are not affected.
{'CVE-2018-8048'}
2021-09-21T22:16:47Z
2018-03-21T11:57:11Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-x7rv-cr6v-4vm4', 'https://www.debian.org/security/2018/dsa-4171', 'https://github.com/flavorjones/loofah/issues/144', 'https://security.netapp.com/advisory/ntap-20191122-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8048', 'http://www.openwall.com/lists/oss-security/2018/03/19/5'}
null
GHSA
GHSA-9c8h-2mv3-49ww
Division by 0 in most convolution operators
### Impact Most implementations of convolution operators in TensorFlow are affected by a division by 0 vulnerability where an attacker can trigger a denial of service via a crash: ```python import tensorflow as tf tf.compat.v1.disable_v2_behavior() tf.raw_ops.Conv2D( input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32), filter = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32), strides = [1, 1, 1, 1], padding = "SAME") ``` The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/framework/common_shape_fns.cc#L577) is missing several validations before doing divisions and modulo operations. ### Patches We have patched the issue in GitHub commit [8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4](https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37675'}
2021-08-25T14:41:29Z
2021-08-25T14:41:29Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-9c8h-2mv3-49ww', 'https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37675', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-2mv3-49ww'}
null
GHSA
GHSA-65p7-pjj8-ggmr
Member account takeover
### Impact An error in the implementation of the member email change functionality allows unauthenticated users to change the email address of arbitrary member accounts to one they control by crafting a request to the relevant API endpoint, and validating the new address via magic link sent to the new email address. Ghost(Pro) has already been patched. Self-hosters are impacted if running Ghost a version between 3.18.0 and 4.15.0 with members functionality enabled. ### Patches Fixed in 4.15.1, all 4.x sites should upgrade as soon as possible. Fixed in 3.42.6, all 3.x sites should upgrade as soon as possible. ### Workarounds The patch in 4.15.1 and 3.42.6 adds a new authenticated endpoint for updating member email addresses. Updating Ghost is the quickest complete solution. As a workaround, if for any reason you cannot update your Ghost instance, you can block the `POST /members/api/send-magic-link/` endpoint, which will also disable member login and signup for your site. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org)
null
2022-04-19T19:03:10Z
2021-09-23T23:18:42Z
MODERATE
6.5
null
{'https://github.com/advisories/GHSA-65p7-pjj8-ggmr', 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-65p7-pjj8-ggmr'}
null
GHSA
GHSA-6hfq-h8hq-87mf
HTTP Request Smuggling in hyper
### Summary hyper's HTTP server code had a flaw that incorrectly understands some requests with multiple transfer-encoding headers to have a chunked payload, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that understands the request payload boundary differently can result in "request smuggling" or "desync attacks". ### Vulnerability The flaw was introduced in https://github.com/hyperium/hyper/commit/26417fc24a7d05df538e0f39239b373c5c3d61f6, released in v0.12.0. Consider this example request: ``` POST /yolo HTTP/1.1 Transfer-Encoding: chunked Transfer-Encoding: cow ``` This request *should* be rejected, according to RFC 7230, since it has a `Transfer-Encoding` header, but after folding, it does not end in `chunked`. hyper would notice the `chunked` in the first line, and then check the second line, and thanks to a missing boolean assignment, *not* set the error condition. hyper would treat the payload as being `chunked`. By differing from the spec, it is possible to send requests like these to endpoints that have different HTTP implementations, with different interpretations of the payload semantics, and cause "desync attacks". There are several parts of the spec that must also be checked, and hyper correctly handles all of those. Additionally, hyper's *client* does not allow sending requests with improper headers, so the misunderstanding cannot be propagated further. Read more about desync attacks: https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn ### Impact To determine if vulnerable, all these things must be true: - **Using hyper as an HTTP *server*.** The client is not affected. - **Using HTTP/1.1.** HTTP/2 does not use `transfer-encoding`. - **Using a vulnerable HTTP proxy upstream to hyper.** If an upstream proxy correctly rejects the illegal transfer-encoding headers, the desync attack cannot succeed. If there is *no* proxy upstream of hyper, hyper cannot *start* the desync attack, as the client will repair the headers before forwarding. ### Patches We have released and backported the following patch versions: - v0.14.3 - v0.13.10 ### Workarounds Besides upgrading hyper, you can take the following options: - Reject requests that contain a `transfer-encoding` header. - Ensure any upstream proxy handles `transfer-encoding` correctly. ### Credits This issue was initially reported by ZeddYu Lu From Qi An Xin Technology Research Institute.
{'CVE-2021-21299'}
2022-04-19T19:02:46Z
2021-08-25T20:56:18Z
MODERATE
4.8
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21299', 'https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn', 'https://rustsec.org/advisories/RUSTSEC-2021-0020.html', 'https://github.com/advisories/GHSA-6hfq-h8hq-87mf', 'https://github.com/hyperium/hyper/commit/8f93123efef5c1361086688fe4f34c83c89cec02', 'https://github.com/hyperium/hyper/security/advisories/GHSA-6hfq-h8hq-87mf'}
null
GHSA
GHSA-cgjv-rghq-qhgp
Path Traversal in algo-httpserv
Versions of `algo-httpserv` prior to 1.1.2 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. ## Recommendation Upgrade to version 1.1.2 or later.
null
2021-08-17T22:22:49Z
2019-09-11T23:00:57Z
HIGH
8.6
{'CWE-22'}
{'https://www.npmjs.com/advisories/889', 'https://snyk.io/vuln/SNYK-JS-ALGOHTTPSERV-174741', 'https://github.com/advisories/GHSA-cgjv-rghq-qhgp', 'https://github.com/AlgoRythm-Dylan/httpserv/commit/bcfe9d4316c2b59aab3a64a38905376026888735'}
null
GHSA
GHSA-vfvf-mqq8-rwqc
Sanitization bypass using HTML Entities in marked
Affected versions of `marked` are susceptible to a cross-site scripting vulnerability in link components when `sanitize:true` is configured. ## Proof of Concept This flaw exists because link URIs containing HTML entities get processed in an abnormal manner. Any HTML Entities get parsed on a best-effort basis and included in the resulting link, while if that parsing fails that character is omitted. For example: A link URI such as ``` javascript&#x58document;alert&#40;1&#41; ``` Renders a valid link that when clicked will execute `alert(1)`. ## Recommendation Update to version 0.3.6 or later.
{'CVE-2016-10531'}
2021-01-08T01:57:26Z
2019-02-18T23:58:20Z
HIGH
0
{'CWE-79'}
{'https://github.com/chjj/marked/pull/592', 'https://nodesecurity.io/advisories/101', 'https://github.com/advisories/GHSA-vfvf-mqq8-rwqc', 'https://www.npmjs.com/advisories/101', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10531', 'https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523'}
null
GHSA
GHSA-j3cr-j9jx-mf4p
Downloads Resources over HTTP in redis-srvr
Affected versions of `redis-srvr` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `redis-srvr`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10639'}
2021-01-08T18:37:51Z
2019-02-18T23:47:07Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-j3cr-j9jx-mf4p', 'https://nodesecurity.io/advisories/238', 'https://www.npmjs.com/advisories/238', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10639'}
null
GHSA
GHSA-vp6r-mrq9-8f4h
Data race in syncpool
An issue was discovered in the syncpool crate before 0.1.6 for Rust. There is an unconditional implementation of Send for Bucket2.
{'CVE-2020-36462'}
2021-08-25T20:58:11Z
2021-08-25T20:58:11Z
HIGH
8.1
{'CWE-362', 'CWE-77'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/syncpool/RUSTSEC-2020-0142.md', 'https://rustsec.org/advisories/RUSTSEC-2020-0142.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36462', 'https://github.com/Chopinsky/byte_buffer/issues/2', 'https://github.com/advisories/GHSA-vp6r-mrq9-8f4h'}
null
GHSA
GHSA-m3jw-62m7-jjcm
Out-of-bounds read in typed-ast and cpython may allow an attacker to crash the interpreter process (handle_keywordonly_args case).
typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)
{'CVE-2019-19274'}
2021-08-18T22:47:51Z
2019-12-02T18:02:02Z
HIGH
7.5
{'CWE-125'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5H4Q6LFVRX7SFXLBEJMNQFI4T5SCEA/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19274', 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e', 'https://github.com/advisories/GHSA-m3jw-62m7-jjcm', 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c', 'https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b', 'https://bugs.python.org/issue36495', 'https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce'}
null
GHSA
GHSA-q3g3-h9r4-prrc
Reference binding to nullptr and heap OOB in binary cwise ops
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in all binary cwise operations that don't require broadcasting (e.g., gradients of binary cwise operations): ```python import tensorflow as tf tf.raw_ops.SqrtGrad(y=[4, 16],dy=[]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/cwise_ops_common.h#L264) assumes that the two inputs have exactly the same number of elements but does not check that. Hence, when the eigen functor executes it triggers heap OOB reads and undefined behavior due to binding to nullptr. ### Patches We have patched the issue in GitHub commit [93f428fd1768df147171ed674fee1fc5ab8309ec](https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37659'}
2021-08-25T14:42:47Z
2021-08-25T14:42:47Z
HIGH
7.3
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc', 'https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37659', 'https://github.com/advisories/GHSA-q3g3-h9r4-prrc'}
null
GHSA
GHSA-46j3-r4pj-4835
The host name verification missing in Apache Tomcat
The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.
{'CVE-2018-8034'}
2022-04-28T19:55:04Z
2018-10-17T16:32:43Z
HIGH
7.5
{'CWE-295'}
{'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html', 'https://access.redhat.com/errata/RHSA-2019:0451', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1041374', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-46j3-r4pj-4835', 'https://access.redhat.com/errata/RHSA-2019:1159', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/104895', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0130', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://security.netapp.com/advisory/ntap-20180817-0001/', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0450', 'https://access.redhat.com/errata/RHSA-2019:1161', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E', 'https://usn.ubuntu.com/3723-1/', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1160', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2205', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1162', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1529', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:0131', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8034', 'https://www.debian.org/security/2018/dsa-4281'}
null
GHSA
GHSA-jjgw-jf33-7fg9
Directory Traversal in mfrs
Affected versions of `mfrs` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16193'}
2021-01-14T15:40:49Z
2020-09-01T18:22:48Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-jjgw-jf33-7fg9', 'https://www.npmjs.com/advisories/437', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrs', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16193', 'https://nodesecurity.io/advisories/437'}
null
GHSA
GHSA-jcjx-c3j3-44pr
Insufficient Session Expiration in @cyyynthia/tokenize
### Impact A bug introduced in version 1.1.0 made Tokenize generate faulty tokens with NaN as a generation date. As a result, tokens would not properly expire and remain valid regardless of the `lastTokenReset` field. ### Patches Version 1.1.3 contains a patch that'll invalidate these faulty tokens and make new ones behave as expected. ### Workarounds None. Tokens do not hold the necessary information to perform invalidation anymore. ### References PR #1 ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/cyyynthia/tokenize](https://github.com/cyyynthia/tokenize) * Email us at [cynthia@cynthia.dev](mailto:cynthia@cynthia.dev)
null
2022-04-19T19:03:14Z
2021-11-10T16:44:12Z
HIGH
0
{'CWE-613'}
{'https://github.com/advisories/GHSA-jcjx-c3j3-44pr', 'https://github.com/cyyynthia/tokenize/security/advisories/GHSA-jcjx-c3j3-44pr'}
null
GHSA
GHSA-3j78-7m59-r7gv
Private data exposure via REST API in BuddyPress
In BuddyPress before 5.1.2, requests to a certain REST API endpoint can result in private user data getting exposed. Authentication is not needed. This has been patched in version 5.1.2.
{'CVE-2020-5244'}
2021-01-08T20:29:12Z
2020-02-24T17:18:26Z
HIGH
8
{'CWE-284'}
{'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-3j78-7m59-r7gv', 'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5244', 'https://buddypress.org/2020/01/buddypress-5-1-2/', 'https://github.com/advisories/GHSA-3j78-7m59-r7gv'}
null
GHSA
GHSA-xrg9-wwrq-xmx9
Missing Authorization
Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
{'CVE-2021-21661'}
2021-06-16T20:03:43Z
2021-06-16T17:11:30Z
MODERATE
4.3
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21661', 'http://www.openwall.com/lists/oss-security/2021/06/10/14', 'https://github.com/advisories/GHSA-xrg9-wwrq-xmx9', 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-2370'}
null
GHSA
GHSA-gvvv-w559-2hg6
Data races in scottqueue
An issue was discovered in the scottqueue crate through 2020-11-15 for Rust. There are unconditional implementations of Send and Sync for Queue<T>. This allows (1) creating data races to a `T: !Sync` and (2) sending `T: !Send` to other threads, resulting in memory corruption or other undefined behavior.
{'CVE-2020-36453'}
2021-08-25T20:57:17Z
2021-08-25T20:57:17Z
HIGH
8.1
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36453', 'https://github.com/rossdylan/rust-scottqueue/issues/1', 'https://github.com/advisories/GHSA-gvvv-w559-2hg6', 'https://rustsec.org/advisories/RUSTSEC-2020-0133.html'}
null
GHSA
GHSA-q73m-3q7r-fpf7
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
{'CVE-2022-0957'}
2022-03-29T21:27:35Z
2022-03-16T00:00:48Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/star7th/showdoc/commit/d1c9ed0d77ea5d56f09be0c492361dca8af745bb', 'https://github.com/advisories/GHSA-q73m-3q7r-fpf7', 'https://huntr.dev/bounties/b4918d45-b635-40db-bb4b-34035e1aca21', 'https://github.com/star7th/showdoc/pull/1632', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0957'}
null
GHSA
GHSA-rv6q-p3x7-43fx
Malicious Package in bitcoimjs-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:42:01Z
2020-09-04T16:37:50Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1364', 'https://github.com/advisories/GHSA-rv6q-p3x7-43fx'}
null
GHSA
GHSA-xr8h-53xr-jhcm
Path Traversal in marked-tree
This affects all versions up to and including version 0.8.1 of package marked-tree. There is no path sanitization in the path provided at fs.readFile in index.js.
{'CVE-2020-7682'}
2021-05-07T16:06:43Z
2021-05-07T16:06:43Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-xr8h-53xr-jhcm', 'https://snyk.io/vuln/SNYK-JS-MARKEDTREE-590121', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7682'}
null
GHSA
GHSA-h65g-jfqg-2w6m
Server-Side Request Forgery in calibreweb
calibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is a result of incomplete SSRF protection that can be bypassed via an HTTP redirect. An HTTP server set up to respond with a 302 redirect may redirect a request to `localhost`.
{'CVE-2022-0767'}
2022-03-15T21:52:59Z
2022-03-08T00:00:31Z
CRITICAL
9.9
{'CWE-918'}
{'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0767', 'https://github.com/advisories/GHSA-h65g-jfqg-2w6m', 'https://huntr.dev/bounties/b26fc127-9b6a-4be7-a455-58aefbb62d9e'}
null
GHSA
GHSA-g6rj-rv7j-xwp4
Denial of service
An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on Image.open prior to Image.load.
{'CVE-2021-28675'}
2021-07-16T14:33:38Z
2021-06-08T18:49:11Z
MODERATE
5.5
{'CWE-233', 'CWE-252'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/python-pillow/Pillow/pull/5377/commits/22e9bee4ef225c0edbb9323f94c26cee0c623497', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28675', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28675-fix-dos-in-psdimageplugin', 'https://github.com/advisories/GHSA-g6rj-rv7j-xwp4'}
null
GHSA
GHSA-77m6-x95j-75r5
Data races in ticketed_lock
An issue was discovered in the ticketed_lock crate before 0.3.0 for Rust. There are unconditional implementations of Send for ReadTicket<T> and WriteTicket<T>.
{'CVE-2020-36439'}
2021-08-25T20:58:58Z
2021-08-25T20:58:58Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ticketed_lock/RUSTSEC-2020-0119.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36439', 'https://rustsec.org/advisories/RUSTSEC-2020-0119.html', 'https://github.com/advisories/GHSA-77m6-x95j-75r5'}
null
GHSA
GHSA-23v3-qfrj-wmgh
Moderate severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
null
2021-12-03T14:19:53Z
2018-09-17T21:54:22Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2014-7818', 'https://github.com/advisories/GHSA-23v3-qfrj-wmgh'}
null
GHSA
GHSA-7889-rm5j-hpgg
Clipboard feature vulnerability allowing to inject arbitrary HTML into the editor using paste functionality
### Affected packages The vulnerability has been discovered in [clipboard](https://ckeditor.com/cke4/addon/clipboard) plugin. All plugins with [clipboard](https://ckeditor.com/cke4/addon/clipboard) plugin dependency are affected: * [clipboard](https://ckeditor.com/cke4/addon/clipboard) * [pastetext](https://ckeditor.com/cke4/addon/pastetext) * [pastetools](https://ckeditor.com/cke4/addon/pastetools) * [widget](https://ckeditor.com/cke4/addon/widget) * [uploadwidget](https://ckeditor.com/cke4/addon/uploadwidget) * [autolink](https://ckeditor.com/cke4/addon/autolink) * [tableselection](https://ckeditor.com/cke4/addon/tableselection) ### Impact A potential vulnerability has been discovered in CKEditor 4 [Clipboard](https://ckeditor.com/cke4/addon/clipboard) package. The vulnerability allowed to abuse paste functionality using malformed HTML, which could result in injecting arbitrary HTML into the editor. It affects all users using the CKEditor 4 plugins listed above at version >= 4.5.2. ### Patches The problem has been recognized and patched. The fix will be available in version 4.16.2. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank Anton Subbotin ([skavans](https://github.com/skavans)) for recognizing and reporting this vulnerability.
{'CVE-2021-32809'}
2022-04-26T18:06:31Z
2021-08-23T19:40:57Z
MODERATE
4.6
{'CWE-94', 'CWE-79'}
{'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32809', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7889-rm5j-hpgg', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://github.com/advisories/GHSA-7889-rm5j-hpgg', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-8g3r-968r-c644
Malicious Package in jw-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T14:37:57Z
2020-09-03T23:15:58Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1296', 'https://github.com/advisories/GHSA-8g3r-968r-c644'}
null
GHSA
GHSA-fg7r-2g4j-5cgr
Race Condition in tokio
An issue was discovered in the tokio crate before 1.8.4, and 1.9.x through 1.13.x before 1.13.1, for Rust. In certain circumstances involving a closed oneshot channel, there is a data race and memory corruption.
{'CVE-2021-45710'}
2022-01-07T18:26:28Z
2022-01-06T22:04:37Z
HIGH
8.1
{'CWE-362'}
{'https://github.com/advisories/GHSA-fg7r-2g4j-5cgr', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0124.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0124.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45710'}
null
GHSA
GHSA-r854-96gq-rfg3
Python Image Library (PIL) allows symlink attacks
The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.
{'CVE-2014-1933'}
2021-08-25T21:10:34Z
2020-05-18T17:41:19Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-r854-96gq-rfg3', 'http://www.ubuntu.com/usn/USN-2168-1', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1933', 'http://www.securityfocus.com/bid/65513', 'https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7', 'http://www.openwall.com/lists/oss-security/2014/02/11/1', 'https://security.gentoo.org/glsa/201612-52', 'http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html', 'http://www.openwall.com/lists/oss-security/2014/02/10/15'}
null
GHSA
GHSA-363h-vj6q-3cmj
Rosetta-Flash JSONP Vulnerability in hapi
This description taken from the pull request provided by Patrick Kettner. Versions 6.1.0 and earlier of hapi are vulnerable to a rosetta-flash attack, which can be used by attackers to send data across domains and break the browser same-origin-policy. ## Recommendation - Update hapi to version 6.1.1 or later. Alternatively, a solution previously implemented by Google, Facebook, and Github is to prepend callbacks with an empty inline comment. This will cause the flash parser to break on invalid inputs and prevent the issue, and how the issue has been resolved internally in hapi.
{'CVE-2014-4671'}
2021-09-23T19:28:29Z
2020-08-31T22:45:35Z
MODERATE
0
{'CWE-352'}
{'http://secunia.com/advisories/59774', 'http://www.securityfocus.com/bid/68457', 'http://helpx.adobe.com/security/products/flash-player/apsb14-17.html', 'http://secunia.com/advisories/59837', 'https://github.com/advisories/GHSA-363h-vj6q-3cmj', 'http://rhn.redhat.com/errata/RHSA-2014-0860.html', 'http://security.gentoo.org/glsa/glsa-201407-02.xml', 'https://github.com/spumko/hapi/pull/1766', 'https://www.npmjs.com/advisories/12', 'https://github.com/patrickkettner', 'http://www.securitytracker.com/id/1030533', 'http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/', 'https://nvd.nist.gov/vuln/detail/CVE-2014-4671'}
null
GHSA
GHSA-2c8c-84w2-j38j
Improper Restriction of XML External Entity Reference in Plone
Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role).
{'CVE-2020-28736'}
2021-04-07T21:14:00Z
2021-04-07T21:14:00Z
HIGH
8.8
{'CWE-611'}
{'https://github.com/advisories/GHSA-2c8c-84w2-j38j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28736', 'https://github.com/plone/Products.CMFPlone/issues/3209', 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt', 'https://www.misakikata.com/codes/plone/python-en.html'}
null
GHSA
GHSA-wfjw-w6pv-8p7f
Observable Response Discrepancy in Flask-AppBuilder
### Impact User enumeration in database authentication in Flask-AppBuilder < 3.4.4. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in. ### Patches Upgrade to 3.4.4 ### Workarounds ### References ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)
{'CVE-2022-21659'}
2022-04-19T19:03:19Z
2022-02-01T00:47:53Z
MODERATE
5.3
{'CWE-203'}
{'https://github.com/advisories/GHSA-wfjw-w6pv-8p7f', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-wfjw-w6pv-8p7f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21659', 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1775'}
null
GHSA
GHSA-9p29-94hp-8rvc
XSS in qiita-markdown
Increments Qiita::Markdown before 0.34.0 allows XSS via a crafted gist link, a different vulnerability than CVE-2021-28796.
{'CVE-2021-28833'}
2021-08-02T17:22:07Z
2021-08-02T17:22:07Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-9p29-94hp-8rvc', 'https://github.com/increments/qiita-markdown/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28833', 'https://vuln.ryotak.me/advisories/50'}
null
GHSA
GHSA-9mx2-prfp-8hqp
Prototype Pollution in simpl-schema
This affects the package simpl-schema before 1.10.2. Attacker controlled input into a schema could result in remote code execution within the scope of the surrounding application.
{'CVE-2020-7742'}
2021-05-10T18:38:47Z
2021-05-10T18:38:47Z
HIGH
7.5
{'CWE-1321'}
{'https://github.com/advisories/GHSA-9mx2-prfp-8hqp', 'https://github.com/longshotlabs/simpl-schema/releases/tag/1.10.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7742', 'https://github.com/longshotlabs/simpl-schema/commit/50128841fa7fc2d137c36a397054279144caea3d', 'https://snyk.io/vuln/SNYK-JS-SIMPLSCHEMA-1016157'}
null
GHSA
GHSA-hrpq-r399-whgw
Sandbox Breakout / Arbitrary Code Execution in safe-eval
All versions of `safe-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through Error objects. This may allow attackers to execute arbitrary code in the system. Evaluating the payload ``` (function (){ var ex = new Error ex.__proto__ = null ex.stack = { match: x => { return x.constructor.constructor("throw process.env")() } } return ex })() ``` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2020-7710'}
2021-07-29T22:01:25Z
2020-08-25T23:40:53Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7710', 'https://www.npmjs.com/advisories/1322', 'https://github.com/advisories/GHSA-hrpq-r399-whgw', 'https://github.com/hacksparrow/safe-eval/issues/19', 'https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076'}
null
GHSA
GHSA-xwg3-gjxh-c8pm
Malicious Package in ngx-context-menu
Version 0.0.26 of `ngx-context-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T19:14:32Z
2020-09-03T19:14:32Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/1105', 'https://github.com/advisories/GHSA-xwg3-gjxh-c8pm'}
null
GHSA
GHSA-8w26-6f25-cm9x
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.
{'CVE-2020-36185'}
2022-04-22T17:27:49Z
2021-12-09T19:16:02Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-8w26-6f25-cm9x', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind/issues/2998', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36185', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null