ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-4qwp-7c67-jmcc
|
Unauthenticated remote code execution in Ignition
|
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
|
{'CVE-2021-3129'}
|
2022-02-17T18:03:08Z
|
2021-03-29T20:23:46Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3129', 'https://github.com/advisories/GHSA-4qwp-7c67-jmcc', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/facade/ignition/CVE-2021-3129.yaml', 'https://www.ambionics.io/blog/laravel-debug-rce', 'https://github.com/facade/ignition/pull/334', 'http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html', 'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b', 'http://packetstormsecurity.com/files/162094/Ignition-2.5.1-Remote-Code-Execution.html'}
| null |
GHSA
|
GHSA-hc92-9h3m-c39j
|
Incorrect cast in anymap
|
An issue was discovered in the anymap crate through 0.12.1 for Rust. It violates soundness via conversion of a *u8 to a *u64.
|
{'CVE-2021-38187'}
|
2021-08-25T20:55:45Z
|
2021-08-25T20:55:45Z
|
CRITICAL
| 9.8
|
{'CWE-681', 'CWE-704'}
|
{'https://github.com/chris-morgan/anymap/issues/37', 'https://github.com/advisories/GHSA-hc92-9h3m-c39j', 'https://rustsec.org/advisories/RUSTSEC-2021-0065.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38187'}
| null |
GHSA
|
GHSA-66mv-xh68-h6v2
|
Denial of Service in @commercial/hapi
|
Affected versions of `@commercial/hapi` are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to versions 16.8.2, 17.9.2, 18.4.1, 19.1.1 or later.
| null |
2020-09-03T15:48:53Z
|
2020-09-03T15:48:53Z
|
HIGH
| 0
| null |
{'https://www.npmjs.com/advisories/1483', 'https://github.com/advisories/GHSA-66mv-xh68-h6v2'}
| null |
GHSA
|
GHSA-8f89-2fwj-5v5r
|
Improper Input Validation in klona
|
Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona.
|
{'CVE-2020-8125'}
|
2021-04-13T15:41:24Z
|
2021-04-13T15:41:24Z
|
HIGH
| 9.8
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-8f89-2fwj-5v5r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8125', 'https://hackerone.com/reports/778414', 'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'}
| null |
GHSA
|
GHSA-3wc8-659g-r88q
|
Low severity vulnerability that affects org.springframework.batch:spring-batch-core
|
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
|
{'CVE-2019-3774'}
|
2021-01-08T19:57:47Z
|
2019-01-25T16:18:56Z
|
LOW
| 0
|
{'CWE-611'}
|
{'https://lists.apache.org/thread.html/ra8c7573911082e9968f4835943045ad0952232bb6314becf23dc3de5@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r01292194daa9ed3117b34dabec0c26929f6db13b9613fc144f720d52@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r96d90e59bb12af5e5c631dcf7d7d80857a52bf3dc44d5b85553e7fc4@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r0153a08177fcfac7584c7b9ea3027f1e8f18f770126f905b9989190e@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/rf83697efcbcfe1131e31bbc7025cb3ee1db5d9185e9481093b2ef961@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r5fbb63e405d2211c16524d33f52e3b122109d3bc88d5f74623fb212d@%3Ccommits.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/ra329bb85da9da93ac6f9b5fc0fc5446a3af0ee2a62c5de484da0af54@%3Ccommits.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/rfea6eebfebb13bc015f258e7fa31d4e24a4202601be3b307da28d530@%3Ccommits.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r2349237482bcec43632d9d78d7d2804520d9a82f4d8b1fd96bb616b8@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/rcd26a5409af7356b5f69b2fafae3cf621bff8bf155f50e9ccf9ed5f6@%3Cissues.servicemix.apache.org%3E', 'https://github.com/advisories/GHSA-3wc8-659g-r88q', 'https://lists.apache.org/thread.html/r08e7ddc354bdcbf95d88399f18b3d804865034f8bc706095e594b29f@%3Cissues.servicemix.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3774', 'https://lists.apache.org/thread.html/ra62a3bf48ab4e0e9aaed970b03d79a73224d68a4275858c707542f6c@%3Cissues.servicemix.apache.org%3E', 'https://pivotal.io/security/cve-2019-3774', 'https://lists.apache.org/thread.html/r47c7f67a3067ec09262eef0705abc42ea1b646699d9198bcaf8dad02@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/rb9fe3ae33246d7f11604a1c85c861cb013a1e32248a43a0c22457107@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/rcd4945d66d8bb2fc92396af56a70ede4af983a2c98166f1281338346@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/ree71c6425d2cc0e36b77bda6902965a657c1e09c7229459811d66474@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r79991aeb5d0c53c67e400e037c72758a06607752ca2f23b5302dd61f@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/r78645ca0eef44a276e144447fb2087db758b1fb8826d0330b3f0da1a@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/raae74a9290784e20e86fcd4e2525fa8700aeed6f65f3613b5b04bb11@%3Ccommits.servicemix.apache.org%3E'}
| null |
GHSA
|
GHSA-phj8-4cq3-794g
|
Unencrypted storage of client side sessions
|
### Impact
The default configuration of client side sessions results in unencrypted, but signed, data being set as cookie values. This means that if something sensitive goes into the session, it could be read by something with access to the cookies.
Note: the documentation does point this out and encourage users to add an encryption key, but it is not mandatory.
For this to be a vulnerability, some kind of sensitive data would need to be stored in the session and the session cookie would have to leak. For example, the cookies are not configured with httpOnly and an adjacent XSS vulnerability within the site allowed capture of the cookies.
The proposed change is to change the default behaviour to use a randomly generated encryption key. This would mean that sessions do not survive app restarts, but this is already the behaviour given the random signing key.
### Patches
As of version 1.9.0, a securely randomly generated signing key is used.
### Workarounds
Supply an encryption key, as per the documentation recommendation.
### References
- https://github.com/ratpack/ratpack/pull/1590
|
{'CVE-2021-29481'}
|
2022-04-19T19:02:48Z
|
2021-07-01T17:02:13Z
|
MODERATE
| 6.5
|
{'CWE-312'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29481', 'https://github.com/ratpack/ratpack/pull/1590', 'https://github.com/advisories/GHSA-phj8-4cq3-794g', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-phj8-4cq3-794g'}
| null |
GHSA
|
GHSA-54cr-gv8w-8324
|
Malicious Package in xoc
|
Version 1.0.7 of `xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.7 of this module is found installed you will want to replace it with a version before or after 1.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-01T20:36:22Z
|
2020-09-01T20:36:22Z
|
CRITICAL
| 0
| null |
{'https://github.com/advisories/GHSA-54cr-gv8w-8324', 'https://www.npmjs.com/advisories/638'}
| null |
GHSA
|
GHSA-9wcg-jrwf-8gg7
|
Prototype Pollution in express-fileupload
|
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
|
{'CVE-2020-7699'}
|
2022-05-04T02:19:37Z
|
2020-08-05T14:53:16Z
|
CRITICAL
| 9.8
|
{'CWE-915'}
|
{'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f', 'https://security.netapp.com/advisory/ntap-20200821-0003/', 'https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969', 'https://github.com/richardgirges/express-fileupload/pull/237', 'https://github.com/advisories/GHSA-9wcg-jrwf-8gg7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7699', 'https://github.com/richardgirges/express-fileupload/issues/236'}
| null |
GHSA
|
GHSA-m242-wc86-8768
|
Moderate severity vulnerability that affects python-fedora
|
python-fedora 0.8.0 and lower is vulnerable to an open redirect resulting in loss of CSRF protection
|
{'CVE-2017-1002150'}
|
2021-12-02T22:53:40Z
|
2018-07-13T15:17:05Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929.patch', 'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929', 'https://github.com/advisories/GHSA-m242-wc86-8768', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002150'}
| null |
GHSA
|
GHSA-vm28-mrm7-fpjq
|
High severity vulnerability that affects sfpagent
|
lib/sfpagent/bsig.rb in the sfpagent gem before 0.4.15 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the module name in a JSON request.
|
{'CVE-2014-2888'}
|
2021-09-20T22:09:31Z
|
2017-10-24T18:33:36Z
|
HIGH
| 0
|
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-2888', 'https://github.com/advisories/GHSA-vm28-mrm7-fpjq', 'http://seclists.org/fulldisclosure/2014/Apr/243', 'http://www.openwall.com/lists/oss-security/2014/04/18/4', 'http://www.vapid.dhs.org/advisories/spfagent-remotecmd.html', 'http://www.openwall.com/lists/oss-security/2014/04/16/1'}
| null |
GHSA
|
GHSA-g3qw-9pgp-xpj4
|
Out-of-bounds Read in njwt
|
Versions of `njwt` prior to 1.0.0 are vulnerable to out-of-bounds reads when a number is passed into the `base64urlEncode` function.
On Node.js 6.x or lower this can expose sensitive information and on any other version of Node.js this creates a Denial of Service vulnerability.
## Recommendation
Upgrade to version 1.0.0.
| null |
2021-09-24T20:41:40Z
|
2020-09-01T21:08:44Z
|
LOW
| 0
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-g3qw-9pgp-xpj4', 'https://www.npmjs.com/advisories/679', 'https://hackerone.com/reports/321704'}
| null |
GHSA
|
GHSA-27pv-q55r-222g
|
Path traversal in github.com/ipfs/go-ipfs
|
### Impact
It is currently possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when `ipfs get` is done on an affected DAG.
1. The only affected command is `ipfs get`.
2. The gateway is not affected.
### Patches
Traversal fix patched in https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227
`tar-utils` patch applied to go-ipfs via https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2
### Workarounds
Upgrade to go-ipfs 0.8 or later.
### References
Binaries for the patched versions of go-ipfs are available on the IPFS distributions site, https://dist.ipfs.io/go-ipfs
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ipfs](https://github.com/ipfs/go-ipfs)
* Email us at [security@ipfs.io](mailto:security@ipfs.io)
|
{'CVE-2020-26279'}
|
2022-04-19T19:02:51Z
|
2021-06-23T17:27:44Z
|
HIGH
| 7.7
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-27pv-q55r-222g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26279', 'https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2', 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-27pv-q55r-222g', 'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227'}
| null |
GHSA
|
GHSA-h896-mx9x-g32g
|
XML External Entity injection in Apache Camel
|
Apache Camel prior to 2.24.0 contains an XML external entity injection (XXE) vulnerability (CWE-611) due to using an outdated vulnerable JSON-lib library. This affects only the camel-xmljson component, which was removed.
|
{'CVE-2019-0188'}
|
2021-01-22T20:47:38Z
|
2019-05-29T18:15:50Z
|
HIGH
| 0
|
{'CWE-611'}
|
{'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/84ba9b79e801a4148dde73d1969cdae0247d11ff63de7ce11b394dc5@%3Ccommits.tamaya.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/00118387610522b107cbdcec5369ddd512b576ff0236a02bfca12f44@%3Cusers.camel.apache.org%3E', 'https://github.com/advisories/GHSA-h896-mx9x-g32g', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0188', 'https://lists.apache.org/thread.html/61601cda2c5f9832184ea14647b0c0589c94126a460c8eb196be1313@%3Ccommits.tamaya.apache.org%3E', 'https://lists.apache.org/thread.html/45349f8bd98c1c13a84beddede18fe79b8619ebab99d90f1fb43d7ab@%3Cdev.tamaya.apache.org%3E', 'https://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.asc', 'https://lists.apache.org/thread.html/6fefbd90f7fb4c8412d85ea3e9e97a4b76b47e206f502c73c29dc0b7@%3Ccommits.tamaya.apache.org%3E', 'https://lists.apache.org/thread.html/fe74d173689600d9a395d026f0bf5d154c0bf7bd195ecfbc2c987036@%3Cdev.tamaya.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/05/24/2', 'http://www.securityfocus.com/bid/108422', 'https://lists.apache.org/thread.html/eed73fc18d4fa3e2341cd0ab101b47f06b16c7efc1cb73791c524c9d@%3Cdev.tamaya.apache.org%3E', 'http://jvn.jp/en/jp/JVN71498764/index.html', 'https://lists.apache.org/thread.html/63d1cec8541befeb59dbed23a6b227bdcca7674aa234fb43354dac82@%3Ccommits.tamaya.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
| null |
GHSA
|
GHSA-vfq6-hq5r-27r6
|
Potential account hijack via password reset form in Django
|
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
|
{'CVE-2019-19844'}
|
2022-03-21T20:49:09Z
|
2020-01-16T22:35:12Z
|
CRITICAL
| 9.8
|
{'CWE-640'}
|
{'https://usn.ubuntu.com/4224-1/', 'https://security.gentoo.org/glsa/202004-17', 'https://github.com/advisories/GHSA-vfq6-hq5r-27r6', 'https://seclists.org/bugtraq/2020/Jan/9', 'http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html', 'https://github.com/django/django/commit/f4cff43bf921fcea6a29b726eb66767f67753fa2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19844', 'https://github.com/django/django/commit/5b1fbcef7a8bec991ebe7b2a18b5d5a95d72cb70', 'https://www.djangoproject.com/weblog/2019/dec/18/security-releases/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/', 'https://www.debian.org/security/2020/dsa-4598', 'https://security.netapp.com/advisory/ntap-20200110-0003/', 'https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0'}
| null |
GHSA
|
GHSA-2h3h-vw8r-82rp
|
Weak JSON Web Token in yapi-vendor
|
Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used as a source of randomness in jwt signing. Math.random does not provide cryptographically secure random numbers. This has been patched in version 1.9.3.
|
{'CVE-2021-27884'}
|
2021-07-22T15:58:18Z
|
2021-03-26T16:49:26Z
|
MODERATE
| 5.1
|
{'CWE-330'}
|
{'https://github.com/YMFE/yapi/issues/2117', 'https://github.com/YMFE/yapi/issues/2263', 'https://github.com/advisories/GHSA-2h3h-vw8r-82rp', 'https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27884'}
| null |
GHSA
|
GHSA-4mrx-6fxm-8jpg
|
Buffer Overflow in vyper
|
### Impact
Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun.
### Patches
0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b)
### Workarounds
Use .vy interfaces.
|
{'CVE-2022-24788'}
|
2022-04-22T19:54:12Z
|
2022-04-20T20:31:44Z
|
HIGH
| 7.1
|
{'CWE-119', 'CWE-120'}
|
{'https://github.com/advisories/GHSA-4mrx-6fxm-8jpg', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24788', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg', 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}
| null |
GHSA
|
GHSA-4gwh-2pqx-f5cc
|
Cross-site Scripting in LibreNMS
|
LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php.
|
{'CVE-2021-44277'}
|
2021-12-03T20:48:42Z
|
2021-12-03T20:48:42Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44277', 'https://github.com/advisories/GHSA-4gwh-2pqx-f5cc', 'https://github.com/librenms/librenms/pull/13554'}
| null |
GHSA
|
GHSA-76wf-9vgp-pj7w
|
Unencrypted md5 plaintext hash in metadata in AWS S3 Crypto SDK for golang
|
### Summary
The golang AWS S3 Crypto SDK was impacted by an issue that can result in loss of confidentiality. An attacker with read access to an encrypted S3 bucket was able to recover the plaintext without accessing the encryption key.
### Risk/Severity
The vulnerability poses insider risks/privilege escalation risks, circumventing KMS controls for stored data.
### Impact
The issue has been fully mitigated by AWS as of Aug. 5th by disallowing the header in question.
The S3 crypto library tries to store an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext in an offline attack, if the hash is readable to the attacker. In order to be impacted by this issue, the attacker has to be able to guess the plaintext as a whole. The attack is theoretically valid if the plaintext entropy is below the key size, i.e. if it is easier to brute force the plaintext instead of the key itself, but practically feasible only for short plaintexts or plaintexts otherwise accessible to the attacker in order to create a rainbow table.
The issue has been fixed server-side by AWS as of Aug 5th, by blocking the related metadata field. No S3 objects are affected anymore.
### Mitigation
The header in question is no longer served by AWS, making this attack fully mitigated as of Aug. 5th.
### Proof of concept
A [Proof of concept](https://github.com/sophieschmieg/exploits/tree/master/aws_s3_crypto_poc) is available in a separate github repository, this particular issue can be found at [here](https://github.com/sophieschmieg/exploits/blob/master/aws_s3_crypto_poc/exploit/hash_exploit.go):
```golang
func HashExploit(bucket string, key string, input *OfflineAttackInput) (string, error) {
_, header, err := input.S3Mock.GetObjectDirect(bucket, key)
length, err := strconv.Atoi(header.Get("X-Amz-Meta-X-Amz-Unencrypted-Content-Length"))
plaintextMd5 := header.Get("X-Amz-Meta-X-Amz-Unencrypted-Content-Md5")
blocks := length / 16
possiblePlaintextNum := 1
segNum := len(input.PossiblePlaintextSegments)
for i := 0; i < blocks; i++ {
possiblePlaintextNum *= segNum
}
for i := 0; i < possiblePlaintextNum; i++ {
w := i
guess := ""
for j := 0; j < blocks; j++ {
guess += input.PossiblePlaintextSegments[w%segNum]
w /= segNum
}
guessMd5 := md5.Sum([]byte(guess))
if plaintextMd5 == base64.StdEncoding.EncodeToString(guessMd5[:]) {
return guess, nil
}
}
return "", fmt.Errorf("No plaintext found!")
}
```
The PoC will only work on old versions of the library, as the hash has been removed from being calculated as well.
| null |
2022-04-19T19:02:31Z
|
2022-02-11T23:26:12Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-76wf-9vgp-pj7w', 'https://github.com/google/security-research/security/advisories/GHSA-76wf-9vgp-pj7w'}
| null |
GHSA
|
GHSA-v3j6-xf77-8r9c
|
Use-after-free in actix-http
|
An issue was discovered in the actix-http crate before 2.0.0-alpha.1 for Rust. There is a use-after-free in BodyStream.
|
{'CVE-2020-35901'}
|
2021-08-25T20:49:39Z
|
2021-08-25T20:49:39Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35901', 'https://rustsec.org/advisories/RUSTSEC-2020-0048.html', 'https://github.com/actix/actix-web/issues/1321', 'https://github.com/advisories/GHSA-v3j6-xf77-8r9c'}
| null |
GHSA
|
GHSA-fwr5-q9rx-294f
|
Moderate severity vulnerability that affects django
|
The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.
|
{'CVE-2010-4534'}
|
2021-09-10T20:11:22Z
|
2018-07-23T19:51:40Z
|
MODERATE
| 0
| null |
{'http://www.securityfocus.com/bid/45562', 'http://secunia.com/advisories/42913', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html', 'http://code.djangoproject.com/changeset/15031', 'http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/', 'http://www.openwall.com/lists/oss-security/2011/01/03/5', 'http://www.djangoproject.com/weblog/2010/dec/22/security/', 'https://bugzilla.redhat.com/show_bug.cgi?id=665373', 'https://nvd.nist.gov/vuln/detail/CVE-2010-4534', 'http://secunia.com/advisories/42715', 'http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/', 'http://www.ubuntu.com/usn/USN-1040-1', 'http://www.securityfocus.com/archive/1/515446', 'http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0580.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html', 'http://www.vupen.com/english/advisories/2011/0048', 'https://github.com/advisories/GHSA-fwr5-q9rx-294f', 'http://www.vupen.com/english/advisories/2011/0098', 'http://secunia.com/advisories/42827', 'http://www.openwall.com/lists/oss-security/2010/12/23/4'}
| null |
GHSA
|
GHSA-39wj-j3jc-858m
|
XSS vulnerability leveraged through referrers could allow un-authorized admin access in Mautic
|
### Impact
This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic.
This vulnerability was reported by Naveen Sunkavally at Horizon3.ai.
### Patches
Upgrade to 3.2.4 or 2.16.5.
Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff
Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Post in https://forum.mautic.org/c/support
* Email us at security@mautic.org
|
{'CVE-2020-35124'}
|
2022-04-19T19:02:44Z
|
2021-01-19T20:43:56Z
|
CRITICAL
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35124', 'https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce', 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4', 'https://forum.mautic.org/c/announcements/16', 'https://github.com/advisories/GHSA-39wj-j3jc-858m', 'https://github.com/mautic/mautic/security/advisories/GHSA-39wj-j3jc-858m', 'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57', 'https://packagist.org/packages/mautic/core'}
| null |
GHSA
|
GHSA-95cg-3r4g-7w6j
|
Malicious Package in js-rha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:10:33Z
|
2020-09-03T23:01:29Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-95cg-3r4g-7w6j', 'https://www.npmjs.com/advisories/1283'}
| null |
GHSA
|
GHSA-p9j6-4pjr-gp48
|
Path Traversal in MPXJ
|
common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations.
|
{'CVE-2020-35460'}
|
2021-01-22T20:50:55Z
|
2020-12-18T18:28:23Z
|
MODERATE
| 5.3
|
{'CWE-22'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d', 'http://www.mpxj.org/changes-report.html#a8.3.5', 'https://github.com/advisories/GHSA-p9j6-4pjr-gp48', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35460'}
| null |
GHSA
|
GHSA-7cr9-rmqr-fpqp
|
Path traversal in FreeTAKServer-UI
|
An issue in the ?filename= argument of the route /DataPackageTable in FreeTAKServer-UI v1.9.8 allows attackers to place arbitrary files anywhere on the system.
|
{'CVE-2022-25511'}
|
2022-03-28T22:34:58Z
|
2022-03-12T00:00:37Z
|
MODERATE
| 6.5
|
{'CWE-22'}
|
{'https://github.com/FreeTAKTeam/UI/issues/29', 'https://github.com/advisories/GHSA-7cr9-rmqr-fpqp', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25511'}
| null |
GHSA
|
GHSA-wv4p-jp67-jr97
|
Data races in magnetic
|
An issue was discovered in the magnetic crate before 2.0.1 for Rust. MPMCConsumer and MPMCProducer allow cross-thread sending of a non-Send type.
|
{'CVE-2020-35925'}
|
2021-08-25T20:50:05Z
|
2021-08-25T20:50:05Z
|
MODERATE
| 5.5
|
{'CWE-362'}
|
{'https://github.com/johnshaw/magnetic/issues/9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35925', 'https://rustsec.org/advisories/RUSTSEC-2020-0088.html', 'https://github.com/advisories/GHSA-wv4p-jp67-jr97'}
| null |
GHSA
|
GHSA-cwfw-4gq5-mrqx
|
Regular Expression Denial of Service (ReDoS) in braces
|
A vulnerability was found in Braces versions prior to 2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
|
{'CVE-2018-1109'}
|
2022-01-06T20:42:03Z
|
2022-01-06T20:42:03Z
|
LOW
| 0
|
{'CWE-400'}
|
{'https://snyk.io/vuln/npm:braces:20180219', 'https://bugzilla.redhat.com/show_bug.cgi?id=1547272', 'https://github.com/advisories/GHSA-cwfw-4gq5-mrqx', 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1109'}
| null |
GHSA
|
GHSA-6xh7-4v2w-36q6
|
ASP.NET Core fails to properly validate web requests
|
A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.
|
{'CVE-2017-0247'}
|
2022-04-26T19:07:09Z
|
2018-10-16T19:58:05Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-0247', 'https://github.com/advisories/GHSA-6xh7-4v2w-36q6', 'https://github.com/aspnet/Announcements/issues/239', 'https://technet.microsoft.com/en-us/library/security/4021279.aspx', 'https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS'}
| null |
GHSA
|
GHSA-5frh-8cmj-gc59
|
High severity vulnerability that affects System.Management.Automation
|
## Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability
# Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability
## Executive Summary
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement.
An attacker who successfully exploited this vulnerability could circumvent PowerShell Core Constrained Language Mode on the machine.
To exploit the vulnerability,
an attacker would first have access to the local machine where PowerShell is running in Constrained Language mode.
By doing that an attacker could leverage script debugging to abuse signed modules in an unintended way.
The update addresses the vulnerability by correcting how PowerShell functions in Constrained Language Mode.
System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).)
## Discussion
Please use PowerShell/PowerShell#TBD for discussion of this advisory.
## <a name="affected-software">Affected Software</a>
The vulnerability affects PowerShell Core prior to the following versions:
| PowerShell Core Version | Fixed in |
|-------------------------|-------------------|
| 6.1 | 6.1.5 |
| 6.2 | 6.2.2 |
## Advisory FAQ
### How do I know if I am affected?
If all of the following are true:
1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected.
1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`.
### How do I update to an unaffected version?
Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in PowerShell Core,
please email details to secure@microsoft.com.
### Support
You can ask questions about this issue on GitHub in the PowerShell organization.
This is located at https://github.com/PowerShell/.
The Announcements repo (https://github.com/PowerShell/Announcements)
will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions.
### What if the update breaks my script or module?
You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core.
This should be treated as a temporary measure.
Therefore, the script or module should be updated to work with the patched version of PowerShell Core.
### Acknowledgments
Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure.
See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information.
### External Links
[CVE-2019-1167](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167)
### Revisions
V1.0 (July 16, 2019): Advisory published.
*Version 1.0*
*Last Updated 2019-07-16*
|
{'CVE-2019-1167'}
|
2021-09-01T21:47:16Z
|
2019-07-17T19:14:18Z
|
MODERATE
| 4.1
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1167', 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-5frh-8cmj-gc59', 'https://github.com/advisories/GHSA-5frh-8cmj-gc59', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167'}
| null |
GHSA
|
GHSA-w7q7-vjp8-7jv4
|
SQL Injection in typeorm
|
Versions of `typeorm` before 0.1.15 are vulnerable to SQL Injection. Field names are not properly validated allowing attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
Upgrade to version 0.1.15
| null |
2021-08-04T20:56:26Z
|
2019-06-06T15:30:16Z
|
HIGH
| 0
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-w7q7-vjp8-7jv4', 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://www.npmjs.com/advisories/800', 'https://hackerone.com/reports/319458'}
| null |
GHSA
|
GHSA-www2-v7xj-xrc6
|
High severity vulnerability that affects urllib3
|
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
|
{'CVE-2018-20060'}
|
2022-03-24T16:43:20Z
|
2018-12-12T15:52:07Z
|
CRITICAL
| 9.8
|
{'CWE-200'}
|
{'https://access.redhat.com/errata/RHSA-2019:2272', 'https://bugzilla.redhat.com/show_bug.cgi?id=1649153', 'https://github.com/urllib3/urllib3/issues/1316', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXLAXHM3Z6DUCXZ7ZXZ2EAYJXWDCZFCT/', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWP36YW3KSVLXDBY3QJKDYEPCIMN3VQZ/', 'https://github.com/urllib3/urllib3/pull/1346', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SJERZEJDSUYQP7BNBXMBHRHGY26HRZD/', 'https://github.com/advisories/GHSA-www2-v7xj-xrc6', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html', 'https://usn.ubuntu.com/3990-1/', 'https://github.com/urllib3/urllib3/blob/master/CHANGES.rst', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20060'}
| null |
GHSA
|
GHSA-8v67-x8q5-3x3g
|
Cross-Site Scripting in simditor
|
Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 2.3.22 or later.
|
{'CVE-2018-19048'}
|
2021-08-04T14:53:06Z
|
2019-05-14T04:01:27Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/hkglue/simditor_demo.git', 'https://www.npmjs.com/advisories/884', 'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048', 'https://github.com/hkglue/simditor_dom_xss/blob/master/README.md', 'https://github.com/advisories/GHSA-8v67-x8q5-3x3g', 'https://snyk.io/vuln/SNYK-JS-SIMDITOR-174638', 'https://github.com/mycolorway/simditor/releases/tag/v2.3.22'}
| null |
GHSA
|
GHSA-wv67-q8rr-grjp
|
Prototype Pollution in jquery
|
Versions of `jquery` prior to 3.4.0 are vulnerable to Prototype Pollution. The extend() method allows an attacker to modify the prototype for `Object` causing changes in properties that will exist on all objects.
## Recommendation
Upgrade to version 3.4.0 or later.
|
{'CVE-2019-5428'}
|
2020-08-31T18:36:09Z
|
2019-04-23T15:59:10Z
|
MODERATE
| 0
| null |
{'https://github.com/jquery/jquery/pull/4333', 'https://github.com/advisories/GHSA-wv67-q8rr-grjp', 'https://hackerone.com/reports/454365', 'https://www.npmjs.com/advisories/796', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5428', 'https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/'}
| null |
GHSA
|
GHSA-98vv-pw6r-q6q4
|
Uncontrolled Resource Consumption in pillow
|
The package pillow from 0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.
|
{'CVE-2021-23437'}
|
2021-09-22T13:54:07Z
|
2021-09-07T23:08:10Z
|
HIGH
| 7.5
|
{'CWE-400', 'CWE-125'}
|
{'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23437', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/', 'https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html', 'https://github.com/advisories/GHSA-98vv-pw6r-q6q4'}
| null |
GHSA
|
GHSA-3jq8-jg75-rqv6
|
Moderate severity vulnerability that affects org.apache.nifi:nifi
|
The template upload API endpoint accepted requests from different domain when sent in conjunction with ARP spoofing + man in the middle (MiTM) attack, resulting in a CSRF attack. The required attack vector is complex, requiring a scenario with client certificate authentication, same subnet access, and injecting malicious code into an unprotected (plaintext HTTP) website which the targeted user later visits, but the possible damage warranted a Severe severity level. Mitigation: The fix to apply Cross-Origin Resource Sharing (CORS) policy request filtering was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
|
{'CVE-2018-17195'}
|
2021-08-31T21:07:34Z
|
2018-12-20T22:02:45Z
|
HIGH
| 7.5
|
{'CWE-863', 'CWE-319'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-17195', 'https://github.com/advisories/GHSA-3jq8-jg75-rqv6', 'https://nifi.apache.org/security.html#CVE-2018-17195'}
| null |
GHSA
|
GHSA-wm47-8v5p-wjpj
|
Possible request smuggling in HTTP/2 due missing validation
|
### Impact
If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1.
If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling.
In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked.
An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. A sample attack request looks like:
```
POST / HTTP/2
:authority:: externaldomain.com
Content-Length: 4
asdfGET /evilRedirect HTTP/1.1
Host: internaldomain.com
```
Users are only affected if all of this is `true`:
* `HTTP2MultiplexCodec` or `Http2FrameCodec` is used
* `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects
* These HTTP/1.1 objects are forwarded to another remote peer.
### Patches
This has been patched in 4.1.60.Final
### Workarounds
The user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`.
### References
Related change to workaround the problem: https://github.com/Netflix/zuul/pull/980
|
{'CVE-2021-21295'}
|
2022-04-25T20:27:22Z
|
2021-03-09T18:49:49Z
|
MODERATE
| 5.9
|
{'CWE-444'}
|
{'https://lists.apache.org/thread.html/r905b92099998291956eebf4f1c5d95f5a0cbcece2946cc46d32274fd@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rbadcbcb50195f00bbd196403865ced521ca70787999583c07be38d0e@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21295', 'https://lists.apache.org/thread.html/re6207ebe2ca4d44f2a6deee695ad6f27fd29d78980f1d46ed1574f91@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r1bca0b81193b74a451fc6d687ab58ef3a1f5ec40f6c61561d8dd9509@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r393a339ab0b63ef9e6502253eeab26e7643b3e69738d5948b2b1d064@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r22adb45fe902aeafcd0a1c4db13984224a667676c323c66db3af38a1@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/racc191a1f70a4f13155e8002c61bddef2870b26441971c697436ad5d@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6a122c25e352eb134d01e7f4fc4d345a491c5ee9453fef6fc754d15b@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re4f70b62843e92163fab03b65e2aa8078693293a0c36f1cc260079ed@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rae198f44c3f7ac5264045e6ba976be1703cff38dcf1609916e50210d@%3Ccommits.servicecomb.apache.org%3E', 'https://github.com/advisories/GHSA-wm47-8v5p-wjpj', 'https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra83096bcbfe6e1f4d54449f8a013117a0536404e9d307ab4a0d34f81@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r67e6a636cbc1958383a1cd72b7fd0cd7493360b1dd0e6c12f5761798@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcf3752209a8b04996373bf57fdc808b3bfaa2be8702698a0323641f8@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r22b2f34447d71c9a0ad9079b7860323d5584fb9b40eb42668c21eaf1@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rdc096e13ac4501ea2e2b03a197682a313b85d3d3ec89d5ae5551b384@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r96ce18044880c33634c4b3fcecc57b8b90673c9364d63eba00385523@%3Cjira.kafka.apache.org%3E', 'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4', 'https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E', 'https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj', 'https://lists.apache.org/thread.html/r837bbcbf12e335e83ab448b1bd2c1ad7e86efdc14034b23811422e6a@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5470456cf1409a99893ae9dd57439799f6dc1a60fda90e11570f66fe@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r268850f26639ebe249356ed6d8edb54ee8943be6f200f770784fb190@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rf87b870a22aa5c77c27900967b518a71a7d954c2952860fce3794b60@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/reafc834062486adfc7be5bb8f7b7793be0d33f483678a094c3f9d468@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rbed09768f496244a2e138dbbe6d2847ddf796c9c8ef9e50f2e3e30d9@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rb95d42ce220ed4a4683aa17833b5006d657bc4254bc5cb03cd5e6bfb@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rcfc154eb2de23d2dc08a56100341161e1a40a8ea86c693735437e8f2@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r040a5e4d9cca2f98354b58a70b27099672276f66995c4e2e39545d0b@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r15f66ada9a5faf4bac69d9e7c4521cedfefa62df9509881603791969@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r3c293431c781696681abbfe1c573c2d9dcdae6fd3ff330ea22f0433f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r27b7e5a588ec826b15f38c40be500c50073400019ce7b8adfd07fece@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3ff9e735ca33612d900607dc139ebd38a64cadc6bce292e53eb86d7f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r16c4b55ac82be72f28adad4f8061477e5f978199d5725691dcc82c24@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r3c4596b9b37f5ae91628ccf169d33cd5a0da4b16b6c39d5bad8e03f3@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r5fc5786cdd640b1b0a3c643237ce0011f0a08a296b11c0e2c669022c@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r312ce5bd3c6bf08c138349b507b6f1c25fe9cf40b6f2b0014c9d12b1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r6aee7e3566cb3e51eeed2fd8786704d91f80a7581e00a787ba9f37f6@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r9051e4f484a970b5566dc1870ecd9c1eb435214e2652cf3ea4d0c0cc@%3Cjira.kafka.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210604-0003/', 'https://lists.apache.org/thread.html/rcfc535afd413d9934d6ee509dce234dac41fa3747a7555befb17447e@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r5232e33a1f3b310a3e083423f736f3925ebdb150844d60ac582809f8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r70cebada51bc6d49138272437d8a28fe971d0197334ef906b575044c@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r86cd38a825ab2344f3e6cad570528852f29a4ffdf56ab67d75c36edf@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rc165e36ca7cb5417aec3f21bbc4ec00fb38ecebdd96a82cfab9bd56f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E', 'https://github.com/Netflix/zuul/pull/980', 'https://lists.apache.org/thread.html/rd25c88aad0e76240dd09f0eb34bdab924933946429e068a167adcb73@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r04a3e0d9f53421fb946c60cc54762b7151dc692eb4e39970a7579052@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r6a29316d758db628a1df49ca219d64caf493999b52cc77847bfba675@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}
| null |
GHSA
|
GHSA-8r7q-r9mx-35rh
|
Mishandling of format strings in rusqlite
|
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated because rusqlite::trace::log mishandles format strings.
|
{'CVE-2020-35869'}
|
2021-08-25T20:47:18Z
|
2021-08-25T20:47:18Z
|
CRITICAL
| 9.8
|
{'CWE-134'}
|
{'https://github.com/advisories/GHSA-8r7q-r9mx-35rh', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/rusqlite/rusqlite/commit/2327d3b774927fdf48903c0bdc1ca7ec93c7c8d0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35869', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}
| null |
GHSA
|
GHSA-c4hh-fg8x-6h9p
|
Malicious Package in buffer-xnr
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:04:34Z
|
2020-09-03T21:57:29Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-c4hh-fg8x-6h9p', 'https://www.npmjs.com/advisories/1247'}
| null |
GHSA
|
GHSA-3x83-p476-vv95
|
Downloads Resources over HTTP in selenium-standalone-painful
|
Affected versions of `selenium-standalone-painful` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-standalone-painful`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10679'}
|
2021-01-08T19:58:07Z
|
2019-02-18T23:54:40Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/284', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10679', 'https://nodesecurity.io/advisories/284', 'https://github.com/advisories/GHSA-3x83-p476-vv95'}
| null |
GHSA
|
GHSA-778x-2mqv-w6xw
|
Moderate severity vulnerability that affects org.keycloak:keycloak-core
|
Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.
|
{'CVE-2016-8629'}
|
2021-01-08T19:17:05Z
|
2018-10-18T16:48:01Z
|
MODERATE
| 0
|
{'CWE-284'}
|
{'https://access.redhat.com/errata/RHSA-2017:0872', 'https://bugzilla.redhat.com/show_bug.cgi?id=1388988', 'http://rhn.redhat.com/errata/RHSA-2017-0876.html', 'https://access.redhat.com/errata/RHSA-2017:0873', 'http://www.securityfocus.com/bid/97392', 'https://github.com/advisories/GHSA-778x-2mqv-w6xw', 'http://www.securitytracker.com/id/1038180', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8629'}
| null |
GHSA
|
GHSA-79gr-58r3-pwm3
|
Forbid serializing AbstractAdapter and TagAwareAdapter instances
|
An issue was discovered in Symfony 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. Serializing certain cache adapter interfaces could result in remote code injection. This is related to symfony/cache.
|
{'CVE-2019-18889'}
|
2021-08-19T15:17:26Z
|
2019-12-02T18:07:16Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://symfony.com/cve-2019-18889', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18889.yaml', 'https://symfony.com/blog/cve-2019-18889-forbid-serializing-abstractadapter-and-tagawareadapter-instances', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://github.com/advisories/GHSA-79gr-58r3-pwm3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18889'}
| null |
GHSA
|
GHSA-wwwg-6r7f-9c9h
|
Malicious Package in file-logging
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:15:33Z
|
2020-09-03T19:43:28Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1126', 'https://github.com/advisories/GHSA-wwwg-6r7f-9c9h'}
| null |
GHSA
|
GHSA-cxvr-r92m-q9hw
|
XSS in Dolibarr
|
Dolibarr before 11.0.4 allows XSS.
|
{'CVE-2020-13094'}
|
2021-08-25T21:14:11Z
|
2020-05-21T21:08:47Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'http://packetstormsecurity.com/files/157752/Dolibarr-11.0.3-Cross-Site-Scripting.html', 'https://github.com/Dolibarr/dolibarr/blob/11.0.4/ChangeLog', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13094', 'https://github.com/advisories/GHSA-cxvr-r92m-q9hw', 'https://www.dolibarr.org/dolibarr-erp-crm-11-0-4-maintenance-release-for-branch-11-0-is-available.php'}
| null |
GHSA
|
GHSA-vv38-4xcj-q4rw
|
Cross-site Scripting in Apache Knox SSO
|
When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user outside the normal request flow through a XSS or phishing campaign.
|
{'CVE-2021-42357'}
|
2022-01-25T20:49:40Z
|
2022-01-21T23:52:00Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'http://www.openwall.com/lists/oss-security/2022/01/17/2', 'https://github.com/advisories/GHSA-vv38-4xcj-q4rw', 'https://lists.apache.org/thread/b7v5dkpyqb51nw0lvz4cybhgrfhk1g7j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42357'}
| null |
GHSA
|
GHSA-33gc-6cw9-w3g4
|
Deserialization of Untrusted Data in topthink/framework
|
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php.
|
{'CVE-2021-36564'}
|
2021-12-10T20:23:19Z
|
2021-12-10T20:23:19Z
|
CRITICAL
| 0
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36564', 'https://github.com/advisories/GHSA-33gc-6cw9-w3g4', 'https://github.com/top-think/framework/issues/2559'}
| null |
GHSA
|
GHSA-cqcc-mm6x-vmvw
|
Persistent Cross-site Scripting vulnerability in PrivateBin
|
In PrivateBin < v1.4.0 a cross-site scripting (XSS) vulnerability was found. The vulnerability is present since attachments with image preview got introduced in v0.21 of the project, which was at the time still called ZeroBin. The issue is caused by the fact that SVGs can contain JavaScript. This can allow an attacker to execute code, if the user opens a paste with a specifically crafted SVG attachment, and interacts with the preview image and the instance isn't protected by an appropriate content security policy.
As a consequence, we have mitigated the vulnerability in the preview and urge server administrators to either **upgrade** to a version with the fix or to ensure the content security policy of their instance is set correctly, ideally both. Additionally, we expanded our [directory listing tool with a checking mechanism](https://privatebin.info/directory/check) and **highly suggest server administrators to check their instance there** and, should there be a warning regarding the content security policy **adjust the CSP to our suggested one**, as it is shown in the configuration preset.
## Proof of concept
The vulnerability can be triggered as following:
1. Create the following SVG as a file:
```svg
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
<script type="text/javascript">
alert(document.domain);
</script>
</svg>
```
2. Upload it as an attachment to a PrivateBin instance that has attachments enabled and hasn't set the recommended content security policy (in particular, one that has either no content security policy set or that allows `*` or `blob:` as a `script-src`).
3. Open the paste. (In a real attack scenario this would be done by the victim.)
4. The SVG is rendered safely as a preview, and script isn't yet executed.
5. Now (depending on your device) right-click or long tap on the image and open it in a new tab.
6. Now a `blob:` URI opens in a new tab with the image and the modal is shown, therefore the script got executed.
## Impact
We tried to reproduce the vulnerability and in our assessment, we found out the following:
1. Any users who use our recommended _Content Security Policy_ (CSP), even older, less strict ones, are **not affected** by this vulnerability, if a [CSP compatible browser](https://caniuse.com/contentsecuritypolicy) is used. All the browsers we tested with did pass on the CSP to the new tab that is opened when viewing the SVG by itself.
As PrivateBin ships with a [built-in CSP](https://github.com/PrivateBin/PrivateBin/wiki/Configuration#cspheader), we consider this a strong defence in depth against these and related issues. That said, we think the CSP should only be the last layer of defence and as such, we decided to still apply further mitigations for this security issue.
2. Instances that do not have attachments enabled, are not affected. Even when attachments are uploaded using a third-party client, they can't be rendered when the administrator disables them (the HTML element that they would render in isn't present and before 1.4 this caused an error, we now catch the error and only display the paste text) and thus potential exploits in the attachment file do not apply.
3. The inline preview (step 4 above) does _not_ execute the script, because [browsers explicitly restrict SVGs if the they are is embedded in an `img` tag](https://developer.mozilla.org/en-US/docs/Web/SVG/SVG_as_an_Image#restrictions) to prevent such security issues in images. Thus, [SVGs in `img` tags itself can be considered safe](https://www.w3.org/TR/CSP2/#which-policy-applies).
However, when the user opens the SVG in a new tab, this browser security feature is circumvented. That's why the exploit steps above explain to open the SVG in a new tab. That being said, the impact of the vulnerability is reduced by two factors:
1. The attack explicitly requires **user-interaction**, i.e. the user has to be tricked into opening the preview in a new tab for some reason. This could realistically be achieved with some social engineering: The markdown formatted text part of the paste could include such an instruction as a big, bold title, or the SVG could be very large and have very small text, which the user might want to zoom into, in order to read.
2. Potential exploit code can only run in a new tab. It still has the same origin (as can be seen in the PoC above, because the domain/origin the script is running on, is shown). However, though, sensitive information like the paste content, potential comments or encryption key (in the URL) is not accessible to the attacker as the context is now a blob-URL – and would anyway consist mostly of things the attacker initially created itself.
That said, [the same origin policy applies](https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy) and thus, what an attacker could do is read e.g. cookies and local storage data saved in the same origin. As PrivateBin itself does not use any of that, the impact of this vulnerability is limited. However, as PrivateBin is a software for self-hosting, it cannot be excluded that other services run in the same origin (e.g. on the same domain). That's why server administrators may need to evaluate the impact of running arbitrary JavaScript code on their domain/origin where PrivateBin is hosted by themselves.
To summarize, this shows a fairly limited impact, given even if the CSP had not caught the issue, the user still needs to interact with the page and the exploit code cannot access or exfiltrate any data of the PrivateBin instance.
**Note:** However, take our assessment only as a basis for your own assessment. As explained, depending on your environment, the actual risk may vary if you are hosting other services on the same domain as PrivateBin.
As for the metrics, the impact assessment we have done with [CVSS v3.1](https://nvd.nist.gov/vuln-metrics/cvss) results in this:
[AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:X/IR:X/AR:X/MAV:N/MAC:L/MPR:N/MUI:R/MS:U/MC:X/MI:X/MA:X](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:X/IR:X/AR:X/MAV:N/MAC:L/MPR:N/MUI:R/MS:U/MC:X/MI:X/MA:X&version=3.1)
### Real-life impact
We found two affected instances in our instance lists (wiki, directory) that did not serve a correct Content Security Policy header, had attachments enabled and thus are vulnerable to this attack. We didn't manage to get into contact with the administrators of these sites, though.
In addition to that, we found that multiple instances do seem to either strip our CSP or have it changed to an unsafe setting and have thus expanded our directory service to verify whether our recommend CSP is used or not. (see below)
We have no reports that indicate this vulnerability was or is being actively exploited at the time of this report.
## Patches
To fix the problem, we took the following measures (in no particular order):
* We apply [DOMpurify](https://github.com/cure53/DOMPurify/) (a library we already use to sanitize user-submitted HTML via the Markdown format) to the SVG preview, too. It strips script tags and other uncommon security-relevant and potentially malicious tags/properties from the SVG file.
So whether you open the SVG in a new tab or not and whether CSP is present and enabled or not does not matter any more, as the displayed SVG is sanitized.
* As a further defence in depth mechanism we now send the CSP both as an HTTP header, as well as a meta tag. This protects instance with mis-configured web servers, CDNs, proxy or similar, from stripping or breaking the CSP headers, as they still get the CSP inside of the HTML content itself. Please note though, that the [meta tag approach is not as strong as the HTTP header approach](https://content-security-policy.com/examples/meta/) and should thus only be considered as a fallback.
* The [PrivateBin Directory](https://privatebin.info/) now also scans whether the recommend Content-Security-Policy header is used on a given instance. If you do not want to have your website appear in the list, but check it manually [you can use a separate check page](https://privatebin.info/directory/check) there.
The code-changes in PrivateBin can be found in https://github.com/PrivateBin/PrivateBin/pull/906.
**Note:** Please note that we explicitly chose to _not_ apply _DOMPurify_ if you download the (SVG) attachment with the download button. Subsequently, if a user would manually opens the downloaded SVG in the browser, it will be opened from the `file://` protocol and thus from a [different origin](https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy), so all reference to the download location is lost and no more security risk is associated with that, than opening any website or local HTML file. Thus, the SVG file with stay intact in it's original form, if you download the attachment.
We consider the execution of code from attachments outside of the PrivateBin instance's context to be out of scope to mitigate (i.e. malware in executables, office documents macros, PDF scripts), as all of these require client side mitigations to be applied to all such downloaded file types, independent on where they get downloaded from.
## Workarounds
We strongly recommend you to upgrade to our latest release, especially as we also upgraded outdated and potential vulnerable libraries (see below). However, here are two workarounds that may help you to mitigate this vulnerability:
* Update the [CSP in your configuration file](https://github.com/PrivateBin/PrivateBin/wiki/Configuration#cspheader) to the latest recommended settings and check that it isn't getting reverted or overwritten by your web server, reverse proxy or CDN, i.e. using [our offered check service](https://privatebin.info/directory/check).
* Deploying PrivateBin on a separate domain may limit the scope of the vulnerability to PrivateBin itself and thus, as described in the “Impact” section, effectively prevent any damage by the vulnerability to other resources you are hosting.
* As explained in the impact assessment, disabling attachments also prevents this issue.
## References
We highly encourage server administrators and others involved with the PrivateBin project to read-up on how Content-Security-Policies work, especially should you consider to manually adjust it:
* https://content-security-policy.com/
* https://developer.mozilla.org/docs/Web/HTTP/CSP
* https://developers.google.com/web/fundamentals/security/csp/
Also please note that if multiple headers are set (as e.g. done via our now introduced meta tag) [browsers should apply the most restrictive set of the policies](https://stackoverflow.com/a/51153816/5008962), [as per the CSP specification](https://www.w3.org/TR/CSP2/#enforcing-multiple-policies).
## For more information
Please notice we also upgraded [jQuery](https://github.com/PrivateBin/PrivateBin/pull/880) that was reported to us as being vulnerable both by [our automated container security scanning](https://github.com/PrivateBin/docker-nginx-fpm-alpine/issues/69#issue-1006943396) as well as [by users](https://github.com/PrivateBin/PrivateBin/issues/864).
By doing so, we also updated all [other dependencies we use](https://github.com/PrivateBin/PrivateBin/pull/888). Our tooling identified the following vulnerabilities in jQuery:
* CVE-2020-11023
* CVE-2020-11022
In [a limited assessment about these when we were made aware of them](https://github.com/PrivateBin/docker-nginx-fpm-alpine/issues/69#issuecomment-928261418) we could not find any immediate risk, but nevertheless, we encourage users to upgrade to be on the safe side.
Finally, we also [upgraded zlib](https://github.com/PrivateBin/PrivateBin/pull/909) to address CVE-2018-25032.
## Timeline
* 2022-02-22 – Initial contact by reporter.
* 2022-02-25 – Reporter sends in a detailed report.
* 2022-02-26 – Report gets reviewed, initial findings around the content security get shared and reporter withdraws report.
* 2022-04-09 – Vulnerability details published.
## Credits
This vulnerability was reported by Ian Budd, [Nethemba s.r.o](https://www.nethemba.com/), which we'd like to thank for that.
In general, we'd like to thank everyone reporting issues and potential vulnerabilities to us.
If you think you have found a vulnerability or potential security risk, [we'd kindly ask you to follow our security policy](https://github.com/PrivateBin/PrivateBin/blob/master/SECURITY.md) and report it to us. We then assess the report and will take the actions we deem necessary to address it.
|
{'CVE-2022-24833'}
|
2022-04-12T21:33:22Z
|
2022-04-12T20:45:22Z
|
HIGH
| 8.2
|
{'CWE-79'}
|
{'https://github.com/PrivateBin/PrivateBin/commit/2a4d572c1e9eb9b608d32b0cc0cb3b6c3b684eab', 'https://github.com/advisories/GHSA-cqcc-mm6x-vmvw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24833', 'https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-cqcc-mm6x-vmvw'}
| null |
GHSA
|
GHSA-hpv8-9rq5-hq7w
|
Generated Code Contains Local Information Disclosure Vulnerability
|
### Impact
**This vulnerability impacts generated code.** If this code was generated as a one-off occasion, not as a part of an automated CI/CD process, this code will remain vulnerable until fixed manually!
On Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used.
#### Java Code
The method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability.
- https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/kotlin-client/infrastructure/ApiClient.kt.mustache#L209
- https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/finch/api.mustache#L84
- https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/okhttp-gson/ApiClient.mustache#L831-L834
- https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/jersey2/ApiClient.mustache#L630-L633
### Patches
Fix has been applied to the master branch with:
* https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2
included in release: 2.4.19
### Workarounds
Users can remediate the vulnerability in non patched version by manually (or programmatically e.g. in CI) updating the generated source code to use `java.nio.files.Files` temporary file creation instead of `java.io.File`, e.g. by changing
```java
if (tempFolderPath == null)
return File.createTempFile(prefix, suffix);
else
return File.createTempFile(prefix, suffix, new File(tempFolderPath));
```
to
```java
if (tempFolderPath == null)
return Files.createTempFile(prefix, suffix).toFile();
else
return Files.createTempFile(Paths.get(tempFolderPath), prefix, suffix).toFile();
```
or generally changing:
```java
File.createTempFile(prefix, suffix);
```
to
```java
Files.createTempFile(prefix, suffix).toFile();
```
### References
* [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
* [CWE-200: Exposure of Sensitive Information to an Unauthorized Actor](https://cwe.mitre.org/data/definitions/200.html)
* [CWE-732: Incorrect Permission Assignment for Critical Resource](https://cwe.mitre.org/data/definitions/732.html)
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@swagger.io](mailto:security@swagger.io)
#### Original vulnerability report
> I'm performing OSS security research under the GitHub Security Lab Bug Bounty program.
> I've been using a custom CodeQL query to find local temporary directory vulnerabilities in OSS with three custom CodeQL queries.
>
> - https://github.com/github/codeql/pull/4388/files#diff-71d36c0f2bd0b08e32866f873f1c906cdc17277e0ad327c0c6cd2c882f30de4f
> - https://github.com/github/codeql/pull/4388/files#diff-1893a18a8bf43c011d61a7889d0139b998a5a78701a30fe7722eddd4c506aaac
> - https://github.com/github/codeql/pull/4473
>
> The code generated by the Swagger Generator contains a local information disclosure vulnerability. The system temporary directory, on unix-like systems is shared between multiple users. Information written to this directory, or directories created under this directory that do not correctly set the posix standard permissions can have these directories read/modified by other users.
>
> ---
>
> This code exists in the code generator, in the generated code.
>
> In this case, I believe this is only a local information disclosure. IE. another user can read the information, not replace it.
>
> In particular, the method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability.
>
> This is because `File.createTempFile` creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system.
>
> - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/kotlin-client/infrastructure/ApiClient.kt.mustache#L209
> - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/finch/api.mustache#L84
> - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/okhttp-gson/ApiClient.mustache#L831-L834
> - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/jersey2/ApiClient.mustache#L630-L633
>
> The fix here is to switch to the `Files` API, instead of `File` as that appropriately sets the file permissions.
>
|
{'CVE-2021-21364'}
|
2022-04-19T19:02:48Z
|
2021-03-11T03:09:18Z
|
LOW
| 6.2
|
{'CWE-200', 'CWE-732', 'CWE-378'}
|
{'https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2', 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w', 'https://github.com/advisories/GHSA-hpv8-9rq5-hq7w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21364'}
| null |
GHSA
|
GHSA-jg4f-jqm5-4mgq
|
Ansible fails to properly sanitize fact variables sent from the Ansible controller
|
Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.
|
{'CVE-2016-8628'}
|
2022-04-26T18:42:21Z
|
2018-10-10T17:23:14Z
|
CRITICAL
| 9.1
|
{'CWE-77'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8628', 'https://access.redhat.com/errata/RHSA-2016:2778', 'https://github.com/advisories/GHSA-jg4f-jqm5-4mgq', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8628', 'https://github.com/ansible/ansible/commit/35938b907dfcd1106ca40b794f0db446bdb8cf09', 'http://www.securityfocus.com/bid/94109'}
| null |
GHSA
|
GHSA-xj7h-g7rh-gjcw
|
Cross-site Scripting in Subrion CMS
|
Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the `q` parameter in the Kickstart template.
|
{'CVE-2020-18324'}
|
2022-03-15T00:23:06Z
|
2022-03-05T00:00:45Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-18324', 'https://github.com/hamm0nz/CVE-2020-18324', 'https://github.com/advisories/GHSA-xj7h-g7rh-gjcw'}
| null |
GHSA
|
GHSA-69r6-7h4f-9p7q
|
Malicious Package in discord.js-user
|
All versions of `discord.js-user` contain malicious code. The package uploads the user's Discord token to a remote server.
## Recommendation
Remove the package from your environment. Ensure any compromised tokens are invalidated.
| null |
2021-09-29T20:32:47Z
|
2020-09-03T20:41:01Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1177', 'https://github.com/advisories/GHSA-69r6-7h4f-9p7q'}
| null |
GHSA
|
GHSA-f2vv-v9cg-qhh7
|
Assertion failure based denial of service in Tensorflow
|
### Impact
The [implementation of `*Bincount` operations](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc) allows malicious users to cause denial of service by passing in arguments which would trigger a `CHECK`-fail:
```python
import tensorflow as tf
tf.raw_ops.DenseBincount(
input=[[0], [1], [2]],
size=[1],
weights=[3,2,1],
binary_output=False)
```
There are several conditions that the input arguments must satisfy. Some are not caught during shape inference and others are not caught during kernel implementation. This results in `CHECK` failures later when the output tensors get allocated.
### Patches
We have patched the issue in GitHub commit [7019ce4f68925fd01cdafde26f8d8c938f47e6f9](https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
|
{'CVE-2022-21737'}
|
2022-02-11T16:23:03Z
|
2022-02-09T23:43:48Z
|
MODERATE
| 6.5
|
{'CWE-754', 'CWE-617'}
|
{'https://github.com/advisories/GHSA-f2vv-v9cg-qhh7', 'https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21737', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2vv-v9cg-qhh7'}
| null |
GHSA
|
GHSA-4fh8-pm7g-pmxq
|
Authentication bypass in Apache Hadoop
|
Web endpoint authentication check is broken in Apache Hadoop 3.0.0-alpha4, 3.0.0-beta1, and 3.0.0. Authenticated users may impersonate any user even if no proxy user is configured.
|
{'CVE-2018-11764'}
|
2022-02-10T20:28:06Z
|
2022-02-10T20:28:06Z
|
HIGH
| 8.8
|
{'CWE-306'}
|
{'https://github.com/advisories/GHSA-4fh8-pm7g-pmxq', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11764', 'https://lists.apache.org/thread.html/r790ad0a049cde713b93589ecfd4dd2766fda0fc6807eedb6cf69f5c1%40%3Cgeneral.hadoop.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20201103-0003/'}
| null |
GHSA
|
GHSA-m2h2-264f-f486
|
angular vulnerable to regular expression denial of service (ReDoS)
|
AngularJS lets users write client-side web applications. The package angular after 1.7.0 is vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value.
**Note:**
1. This package has been deprecated and is no longer maintained.
2. The vulnerable versions are 1.7.0 and higher.
|
{'CVE-2022-25844'}
|
2022-05-04T20:12:03Z
|
2022-05-03T00:00:44Z
|
MODERATE
| 5.3
|
{'CWE-1333'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737', 'https://stackblitz.com/edit/angularjs-material-blank-zvtdvb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25844', 'https://github.com/advisories/GHSA-m2h2-264f-f486', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735'}
| null |
GHSA
|
GHSA-77pc-q5q7-qg9h
|
Moderate severity vulnerability that affects rails-html-sanitizer
|
Withdrawn, accidental duplicate publish.
Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.
| null |
2021-12-03T14:25:22Z
|
2018-09-17T21:58:30Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-77pc-q5q7-qg9h', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580'}
| null |
GHSA
|
GHSA-hqhp-5p83-hx96
|
Regular Expression Denial of Service in prismjs
|
Prism is a lightweight, robust, and elegant syntax highlighting library. The prismjs package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted HTML comment as input may cause an application to consume an excessive amount of CPU.
|
{'CVE-2021-3801'}
|
2022-05-04T03:23:17Z
|
2021-09-20T20:44:48Z
|
MODERATE
| 6.5
|
{'CWE-400'}
|
{'https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a', 'https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3801', 'https://github.com/advisories/GHSA-hqhp-5p83-hx96'}
| null |
GHSA
|
GHSA-hf4q-52x6-4p57
|
Unrestricted file upload leads to stored cross-site scripting in Microweber
|
Microweber prior to version 1.2.12 allows unrestricted file upload, which could lead to stored cross-site scripting.
|
{'CVE-2022-0906'}
|
2022-03-29T21:07:51Z
|
2022-03-11T00:02:36Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0906', 'https://github.com/advisories/GHSA-hf4q-52x6-4p57', 'https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8'}
| null |
GHSA
|
GHSA-v567-q267-phpg
|
pimcore is vulnerable to Cross-site Scripting
|
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2022-0257'}
|
2022-01-25T20:49:26Z
|
2022-01-21T23:50:11Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/bad2073c-bbd5-4425-b3e9-c336b73ddda6', 'https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d', 'https://github.com/advisories/GHSA-v567-q267-phpg', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0257'}
| null |
GHSA
|
GHSA-3cj3-jrrp-9rxf
|
Unchecked Return Value in xcb
|
An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because transmutation to the wrong type can happen after xcb::base::cast_event uses std::mem::transmute to return a reference to an arbitrary type.
|
{'CVE-2021-26958'}
|
2021-08-25T20:53:18Z
|
2021-08-25T20:53:18Z
|
HIGH
| 8.8
|
{'CWE-252'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26958', 'https://rustsec.org/advisories/RUSTSEC-2021-0019.html', 'https://github.com/advisories/GHSA-3cj3-jrrp-9rxf', 'https://github.com/RustSec/advisory-db/issues/653'}
| null |
GHSA
|
GHSA-9xw9-pvgv-6p76
|
Insufficient Error Handling in http-proxy
|
Affected versions of `http-proxy` are vulnerable to a denial of service attack, wherein an attacker can force an error which will cause the server to crash.
## Recommendation
Update to version 0.7.0 or later.
|
{'CVE-2017-16014'}
|
2021-01-08T20:58:13Z
|
2018-11-09T17:47:52Z
|
MODERATE
| 0
|
{'CWE-703'}
|
{'https://github.com/nodejitsu/node-http-proxy/pull/101', 'https://github.com/advisories/GHSA-9xw9-pvgv-6p76', 'https://nodesecurity.io/advisories/323', 'https://www.npmjs.com/advisories/323', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16014'}
| null |
GHSA
|
GHSA-cr79-9pwf-r6f5
|
Downloads Resources over HTTP in prince
|
Affected versions of `prince` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `prince`.
## Recommendation
Update to version 1.4.6 or later.
|
{'CVE-2016-10591'}
|
2021-09-16T20:42:48Z
|
2019-02-18T23:34:24Z
|
HIGH
| 0
|
{'CWE-311', 'CWE-269'}
|
{'https://nodesecurity.io/advisories/185', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10591', 'https://www.npmjs.com/advisories/185', 'https://github.com/advisories/GHSA-cr79-9pwf-r6f5'}
| null |
GHSA
|
GHSA-692h-g37c-qv44
|
Malicious Package in sj-tw-sec
|
All versions of `sj-tw-sec` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T16:15:24Z
|
2020-09-03T23:25:30Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-692h-g37c-qv44', 'https://www.npmjs.com/advisories/1309'}
| null |
GHSA
|
GHSA-32hw-3pvh-vcvc
|
XSS vulnerability on password reset page
|
### Impact
For Mautic versions prior to 3.3.4, there is an XSS vulnerability on Mautic's password reset page where a vulnerable parameter, "bundle," in the URL could allow an attacker to execute Javascript code. The attacker would be required to convince or trick the target into clicking a password reset URL with the vulnerable parameter utilized.
### Patches
Upgrade to 3.3.4 or 4.0.0
### Workarounds
No
### References
https://github.com/mautic/mautic/releases/tag/3.3.4
https://github.com/mautic/mautic/releases/tag/4.0.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2021-27909'}
|
2022-04-19T19:03:06Z
|
2021-09-01T18:40:56Z
|
MODERATE
| 6.3
|
{'CWE-79'}
|
{'https://github.com/mautic/mautic/security/advisories/GHSA-32hw-3pvh-vcvc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27909', 'https://github.com/advisories/GHSA-32hw-3pvh-vcvc'}
| null |
GHSA
|
GHSA-67mm-m3wx-j7fr
|
Command injection in gitlog
|
The gitlog function in src/index.ts in gitlog before 4.0.4 has a command injection vulnerability.
|
{'CVE-2021-26541'}
|
2022-04-27T19:13:34Z
|
2021-04-13T15:15:29Z
|
CRITICAL
| 9.8
|
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26541', 'https://advisory.checkmarx.net/advisory/CX-2020-4301', 'https://github.com/domharrington/node-gitlog/pull/65/commits/bb22ffb2c907e0284f887ab625e12b88c31f4bf4', 'https://github.com/domharrington/node-gitlog/pull/65', 'https://www.npmjs.com/package/gitlog', 'https://github.com/advisories/GHSA-67mm-m3wx-j7fr'}
| null |
GHSA
|
GHSA-38f5-ghc2-fcmv
|
Code Injection in cryo
|
All versions of `cryo` are vulnerable to code injection due to an Insecure implementation of deserialization.
## Proof of concept
```
var Cryo = require('cryo');
var frozen = '{"root":"_CRYO_REF_3","references":[{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\"); return 1111;}"},{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\");return 2222;}"},{"contents":{"toString":"_CRYO_REF_0","valueOf":"_CRYO_REF_1"},"value":"_CRYO_OBJECT_"},{"contents":{"__proto__":"_CRYO_REF_2"},"value":"_CRYO_OBJECT_"}]}'
var hydrated = Cryo.parse(frozen);
console.log(hydrated);
```
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
|
{'CVE-2018-3784'}
|
2021-01-08T20:03:11Z
|
2018-08-21T17:02:43Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-38f5-ghc2-fcmv', 'https://hackerone.com/reports/350418', 'https://www.npmjs.com/advisories/690', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3784'}
| null |
GHSA
|
GHSA-69mf-2cw2-38m8
|
Malicious Package in js-shc3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:13:23Z
|
2020-09-03T23:04:40Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1286', 'https://github.com/advisories/GHSA-69mf-2cw2-38m8'}
| null |
GHSA
|
GHSA-xg75-3277-gvvj
|
Directory Traversal in serve
|
Versions of `serve` before 7.1.3 are vulnerable to Directory Traversal. File paths are not sanitized leading to unauthorized access of system files.
## Recommendation
Upgrade to version 7.1.3 or later
|
{'CVE-2019-5417'}
|
2021-09-21T22:30:47Z
|
2019-03-25T18:04:01Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-xg75-3277-gvvj', 'https://www.npmjs.com/advisories/795', 'https://hackerone.com/reports/358645', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5417'}
| null |
GHSA
|
GHSA-x7rv-cr6v-4vm4
|
Moderate severity vulnerability that affects loofah
|
Loofah allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments.
Users are affected if running Loofah < 2.2.1, but only:
* when running on MRI or RBX,
* in combination with libxml2 >= 2.9.2.
Please note: JRuby users are not affected.
|
{'CVE-2018-8048'}
|
2021-09-21T22:16:47Z
|
2018-03-21T11:57:11Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-x7rv-cr6v-4vm4', 'https://www.debian.org/security/2018/dsa-4171', 'https://github.com/flavorjones/loofah/issues/144', 'https://security.netapp.com/advisory/ntap-20191122-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8048', 'http://www.openwall.com/lists/oss-security/2018/03/19/5'}
| null |
GHSA
|
GHSA-9c8h-2mv3-49ww
|
Division by 0 in most convolution operators
|
### Impact
Most implementations of convolution operators in TensorFlow are affected by a division by 0 vulnerability where an attacker can trigger a denial of service via a crash:
```python
import tensorflow as tf
tf.compat.v1.disable_v2_behavior()
tf.raw_ops.Conv2D(
input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32),
filter = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32),
strides = [1, 1, 1, 1],
padding = "SAME")
```
The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/framework/common_shape_fns.cc#L577) is missing several validations before doing divisions and modulo operations.
### Patches
We have patched the issue in GitHub commit [8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4](https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security.
|
{'CVE-2021-37675'}
|
2021-08-25T14:41:29Z
|
2021-08-25T14:41:29Z
|
MODERATE
| 5.5
|
{'CWE-369'}
|
{'https://github.com/advisories/GHSA-9c8h-2mv3-49ww', 'https://github.com/tensorflow/tensorflow/commit/8a793b5d7f59e37ac7f3cd0954a750a2fe76bad4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37675', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-2mv3-49ww'}
| null |
GHSA
|
GHSA-65p7-pjj8-ggmr
|
Member account takeover
|
### Impact
An error in the implementation of the member email change functionality allows unauthenticated users to change the email address of arbitrary member accounts to one they control by crafting a request to the relevant API endpoint, and validating the new address via magic link sent to the new email address.
Ghost(Pro) has already been patched. Self-hosters are impacted if running Ghost a version between 3.18.0 and 4.15.0 with members functionality enabled.
### Patches
Fixed in 4.15.1, all 4.x sites should upgrade as soon as possible.
Fixed in 3.42.6, all 3.x sites should upgrade as soon as possible.
### Workarounds
The patch in 4.15.1 and 3.42.6 adds a new authenticated endpoint for updating member email addresses. Updating Ghost is the quickest complete solution.
As a workaround, if for any reason you cannot update your Ghost instance, you can block the `POST /members/api/send-magic-link/` endpoint, which will also disable member login and signup for your site.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@ghost.org](mailto:security@ghost.org)
| null |
2022-04-19T19:03:10Z
|
2021-09-23T23:18:42Z
|
MODERATE
| 6.5
| null |
{'https://github.com/advisories/GHSA-65p7-pjj8-ggmr', 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-65p7-pjj8-ggmr'}
| null |
GHSA
|
GHSA-6hfq-h8hq-87mf
|
HTTP Request Smuggling in hyper
|
### Summary
hyper's HTTP server code had a flaw that incorrectly understands some requests with multiple transfer-encoding headers to have a chunked payload, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that understands the request payload boundary differently can result in "request smuggling" or "desync attacks".
### Vulnerability
The flaw was introduced in https://github.com/hyperium/hyper/commit/26417fc24a7d05df538e0f39239b373c5c3d61f6, released in v0.12.0.
Consider this example request:
```
POST /yolo HTTP/1.1
Transfer-Encoding: chunked
Transfer-Encoding: cow
```
This request *should* be rejected, according to RFC 7230, since it has a `Transfer-Encoding` header, but after folding, it does not end in `chunked`. hyper would notice the `chunked` in the first line, and then check the second line, and thanks to a missing boolean assignment, *not* set the error condition. hyper would treat the payload as being `chunked`. By differing from the spec, it is possible to send requests like these to endpoints that have different HTTP implementations, with different interpretations of the payload semantics, and cause "desync attacks".
There are several parts of the spec that must also be checked, and hyper correctly handles all of those. Additionally, hyper's *client* does not allow sending requests with improper headers, so the misunderstanding cannot be propagated further.
Read more about desync attacks: https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
### Impact
To determine if vulnerable, all these things must be true:
- **Using hyper as an HTTP *server*.** The client is not affected.
- **Using HTTP/1.1.** HTTP/2 does not use `transfer-encoding`.
- **Using a vulnerable HTTP proxy upstream to hyper.** If an upstream proxy correctly rejects the illegal transfer-encoding headers, the desync attack cannot succeed. If there is *no* proxy upstream of hyper, hyper cannot *start* the desync attack, as the client will repair the headers before forwarding.
### Patches
We have released and backported the following patch versions:
- v0.14.3
- v0.13.10
### Workarounds
Besides upgrading hyper, you can take the following options:
- Reject requests that contain a `transfer-encoding` header.
- Ensure any upstream proxy handles `transfer-encoding` correctly.
### Credits
This issue was initially reported by ZeddYu Lu From Qi An Xin Technology Research Institute.
|
{'CVE-2021-21299'}
|
2022-04-19T19:02:46Z
|
2021-08-25T20:56:18Z
|
MODERATE
| 4.8
|
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21299', 'https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn', 'https://rustsec.org/advisories/RUSTSEC-2021-0020.html', 'https://github.com/advisories/GHSA-6hfq-h8hq-87mf', 'https://github.com/hyperium/hyper/commit/8f93123efef5c1361086688fe4f34c83c89cec02', 'https://github.com/hyperium/hyper/security/advisories/GHSA-6hfq-h8hq-87mf'}
| null |
GHSA
|
GHSA-cgjv-rghq-qhgp
|
Path Traversal in algo-httpserv
|
Versions of `algo-httpserv` prior to 1.1.2 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.
## Recommendation
Upgrade to version 1.1.2 or later.
| null |
2021-08-17T22:22:49Z
|
2019-09-11T23:00:57Z
|
HIGH
| 8.6
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/889', 'https://snyk.io/vuln/SNYK-JS-ALGOHTTPSERV-174741', 'https://github.com/advisories/GHSA-cgjv-rghq-qhgp', 'https://github.com/AlgoRythm-Dylan/httpserv/commit/bcfe9d4316c2b59aab3a64a38905376026888735'}
| null |
GHSA
|
GHSA-vfvf-mqq8-rwqc
|
Sanitization bypass using HTML Entities in marked
|
Affected versions of `marked` are susceptible to a cross-site scripting vulnerability in link components when `sanitize:true` is configured.
## Proof of Concept
This flaw exists because link URIs containing HTML entities get processed in an abnormal manner. Any HTML Entities get parsed on a best-effort basis and included in the resulting link, while if that parsing fails that character is omitted.
For example:
A link URI such as
```
javascript֍ocument;alert(1)
```
Renders a valid link that when clicked will execute `alert(1)`.
## Recommendation
Update to version 0.3.6 or later.
|
{'CVE-2016-10531'}
|
2021-01-08T01:57:26Z
|
2019-02-18T23:58:20Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/chjj/marked/pull/592', 'https://nodesecurity.io/advisories/101', 'https://github.com/advisories/GHSA-vfvf-mqq8-rwqc', 'https://www.npmjs.com/advisories/101', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10531', 'https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523'}
| null |
GHSA
|
GHSA-j3cr-j9jx-mf4p
|
Downloads Resources over HTTP in redis-srvr
|
Affected versions of `redis-srvr` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `redis-srvr`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10639'}
|
2021-01-08T18:37:51Z
|
2019-02-18T23:47:07Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-j3cr-j9jx-mf4p', 'https://nodesecurity.io/advisories/238', 'https://www.npmjs.com/advisories/238', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10639'}
| null |
GHSA
|
GHSA-vp6r-mrq9-8f4h
|
Data race in syncpool
|
An issue was discovered in the syncpool crate before 0.1.6 for Rust. There is an unconditional implementation of Send for Bucket2.
|
{'CVE-2020-36462'}
|
2021-08-25T20:58:11Z
|
2021-08-25T20:58:11Z
|
HIGH
| 8.1
|
{'CWE-362', 'CWE-77'}
|
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/syncpool/RUSTSEC-2020-0142.md', 'https://rustsec.org/advisories/RUSTSEC-2020-0142.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36462', 'https://github.com/Chopinsky/byte_buffer/issues/2', 'https://github.com/advisories/GHSA-vp6r-mrq9-8f4h'}
| null |
GHSA
|
GHSA-m3jw-62m7-jjcm
|
Out-of-bounds read in typed-ast and cpython may allow an attacker to crash the interpreter process (handle_keywordonly_args case).
|
typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)
|
{'CVE-2019-19274'}
|
2021-08-18T22:47:51Z
|
2019-12-02T18:02:02Z
|
HIGH
| 7.5
|
{'CWE-125'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5H4Q6LFVRX7SFXLBEJMNQFI4T5SCEA/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19274', 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e', 'https://github.com/advisories/GHSA-m3jw-62m7-jjcm', 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c', 'https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b', 'https://bugs.python.org/issue36495', 'https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce'}
| null |
GHSA
|
GHSA-q3g3-h9r4-prrc
|
Reference binding to nullptr and heap OOB in binary cwise ops
|
### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in all binary cwise operations that don't require broadcasting (e.g., gradients of binary cwise operations):
```python
import tensorflow as tf
tf.raw_ops.SqrtGrad(y=[4, 16],dy=[])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/cwise_ops_common.h#L264) assumes that the two inputs have exactly the same number of elements but does not check that. Hence, when the eigen functor executes it triggers heap OOB reads and undefined behavior due to binding to nullptr.
### Patches
We have patched the issue in GitHub commit [93f428fd1768df147171ed674fee1fc5ab8309ec](https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37659'}
|
2021-08-25T14:42:47Z
|
2021-08-25T14:42:47Z
|
HIGH
| 7.3
|
{'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc', 'https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37659', 'https://github.com/advisories/GHSA-q3g3-h9r4-prrc'}
| null |
GHSA
|
GHSA-46j3-r4pj-4835
|
The host name verification missing in Apache Tomcat
|
The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.
|
{'CVE-2018-8034'}
|
2022-04-28T19:55:04Z
|
2018-10-17T16:32:43Z
|
HIGH
| 7.5
|
{'CWE-295'}
|
{'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html', 'https://access.redhat.com/errata/RHSA-2019:0451', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1041374', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-46j3-r4pj-4835', 'https://access.redhat.com/errata/RHSA-2019:1159', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/104895', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0130', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://security.netapp.com/advisory/ntap-20180817-0001/', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0450', 'https://access.redhat.com/errata/RHSA-2019:1161', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E', 'https://usn.ubuntu.com/3723-1/', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1160', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2205', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1162', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1529', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:0131', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8034', 'https://www.debian.org/security/2018/dsa-4281'}
| null |
GHSA
|
GHSA-jjgw-jf33-7fg9
|
Directory Traversal in mfrs
|
Affected versions of `mfrs` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16193'}
|
2021-01-14T15:40:49Z
|
2020-09-01T18:22:48Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-jjgw-jf33-7fg9', 'https://www.npmjs.com/advisories/437', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrs', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16193', 'https://nodesecurity.io/advisories/437'}
| null |
GHSA
|
GHSA-jcjx-c3j3-44pr
|
Insufficient Session Expiration in @cyyynthia/tokenize
|
### Impact
A bug introduced in version 1.1.0 made Tokenize generate faulty tokens with NaN as a generation date. As a result, tokens would not properly expire and remain valid regardless of the `lastTokenReset` field.
### Patches
Version 1.1.3 contains a patch that'll invalidate these faulty tokens and make new ones behave as expected.
### Workarounds
None. Tokens do not hold the necessary information to perform invalidation anymore.
### References
PR #1
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/cyyynthia/tokenize](https://github.com/cyyynthia/tokenize)
* Email us at [cynthia@cynthia.dev](mailto:cynthia@cynthia.dev)
| null |
2022-04-19T19:03:14Z
|
2021-11-10T16:44:12Z
|
HIGH
| 0
|
{'CWE-613'}
|
{'https://github.com/advisories/GHSA-jcjx-c3j3-44pr', 'https://github.com/cyyynthia/tokenize/security/advisories/GHSA-jcjx-c3j3-44pr'}
| null |
GHSA
|
GHSA-3j78-7m59-r7gv
|
Private data exposure via REST API in BuddyPress
|
In BuddyPress before 5.1.2, requests to a certain REST API endpoint can result in private user data getting exposed. Authentication is not needed.
This has been patched in version 5.1.2.
|
{'CVE-2020-5244'}
|
2021-01-08T20:29:12Z
|
2020-02-24T17:18:26Z
|
HIGH
| 8
|
{'CWE-284'}
|
{'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-3j78-7m59-r7gv', 'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5244', 'https://buddypress.org/2020/01/buddypress-5-1-2/', 'https://github.com/advisories/GHSA-3j78-7m59-r7gv'}
| null |
GHSA
|
GHSA-xrg9-wwrq-xmx9
|
Missing Authorization
|
Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
|
{'CVE-2021-21661'}
|
2021-06-16T20:03:43Z
|
2021-06-16T17:11:30Z
|
MODERATE
| 4.3
|
{'CWE-862'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21661', 'http://www.openwall.com/lists/oss-security/2021/06/10/14', 'https://github.com/advisories/GHSA-xrg9-wwrq-xmx9', 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-2370'}
| null |
GHSA
|
GHSA-gvvv-w559-2hg6
|
Data races in scottqueue
|
An issue was discovered in the scottqueue crate through 2020-11-15 for Rust. There are unconditional implementations of Send and Sync for Queue<T>. This allows (1) creating data races to a `T: !Sync` and (2) sending `T: !Send` to other threads, resulting in memory corruption or other undefined behavior.
|
{'CVE-2020-36453'}
|
2021-08-25T20:57:17Z
|
2021-08-25T20:57:17Z
|
HIGH
| 8.1
|
{'CWE-362'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36453', 'https://github.com/rossdylan/rust-scottqueue/issues/1', 'https://github.com/advisories/GHSA-gvvv-w559-2hg6', 'https://rustsec.org/advisories/RUSTSEC-2020-0133.html'}
| null |
GHSA
|
GHSA-q73m-3q7r-fpf7
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
|
{'CVE-2022-0957'}
|
2022-03-29T21:27:35Z
|
2022-03-16T00:00:48Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/star7th/showdoc/commit/d1c9ed0d77ea5d56f09be0c492361dca8af745bb', 'https://github.com/advisories/GHSA-q73m-3q7r-fpf7', 'https://huntr.dev/bounties/b4918d45-b635-40db-bb4b-34035e1aca21', 'https://github.com/star7th/showdoc/pull/1632', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0957'}
| null |
GHSA
|
GHSA-rv6q-p3x7-43fx
|
Malicious Package in bitcoimjs-lib
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:42:01Z
|
2020-09-04T16:37:50Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1364', 'https://github.com/advisories/GHSA-rv6q-p3x7-43fx'}
| null |
GHSA
|
GHSA-xr8h-53xr-jhcm
|
Path Traversal in marked-tree
|
This affects all versions up to and including version 0.8.1 of package marked-tree. There is no path sanitization in the path provided at fs.readFile in index.js.
|
{'CVE-2020-7682'}
|
2021-05-07T16:06:43Z
|
2021-05-07T16:06:43Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-xr8h-53xr-jhcm', 'https://snyk.io/vuln/SNYK-JS-MARKEDTREE-590121', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7682'}
| null |
GHSA
|
GHSA-h65g-jfqg-2w6m
|
Server-Side Request Forgery in calibreweb
|
calibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is a result of incomplete SSRF protection that can be bypassed via an HTTP redirect. An HTTP server set up to respond with a 302 redirect may redirect a request to `localhost`.
|
{'CVE-2022-0767'}
|
2022-03-15T21:52:59Z
|
2022-03-08T00:00:31Z
|
CRITICAL
| 9.9
|
{'CWE-918'}
|
{'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0767', 'https://github.com/advisories/GHSA-h65g-jfqg-2w6m', 'https://huntr.dev/bounties/b26fc127-9b6a-4be7-a455-58aefbb62d9e'}
| null |
GHSA
|
GHSA-g6rj-rv7j-xwp4
|
Denial of service
|
An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on Image.open prior to Image.load.
|
{'CVE-2021-28675'}
|
2021-07-16T14:33:38Z
|
2021-06-08T18:49:11Z
|
MODERATE
| 5.5
|
{'CWE-233', 'CWE-252'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/python-pillow/Pillow/pull/5377/commits/22e9bee4ef225c0edbb9323f94c26cee0c623497', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28675', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28675-fix-dos-in-psdimageplugin', 'https://github.com/advisories/GHSA-g6rj-rv7j-xwp4'}
| null |
GHSA
|
GHSA-77m6-x95j-75r5
|
Data races in ticketed_lock
|
An issue was discovered in the ticketed_lock crate before 0.3.0 for Rust. There are unconditional implementations of Send for ReadTicket<T> and WriteTicket<T>.
|
{'CVE-2020-36439'}
|
2021-08-25T20:58:58Z
|
2021-08-25T20:58:58Z
|
HIGH
| 8.1
|
{'CWE-119', 'CWE-362'}
|
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ticketed_lock/RUSTSEC-2020-0119.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36439', 'https://rustsec.org/advisories/RUSTSEC-2020-0119.html', 'https://github.com/advisories/GHSA-77m6-x95j-75r5'}
| null |
GHSA
|
GHSA-23v3-qfrj-wmgh
|
Moderate severity vulnerability that affects actionpack
|
Withdrawn, accidental duplicate publish.
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
| null |
2021-12-03T14:19:53Z
|
2018-09-17T21:54:22Z
|
MODERATE
| 0
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2014-7818', 'https://github.com/advisories/GHSA-23v3-qfrj-wmgh'}
| null |
GHSA
|
GHSA-7889-rm5j-hpgg
|
Clipboard feature vulnerability allowing to inject arbitrary HTML into the editor using paste functionality
|
### Affected packages
The vulnerability has been discovered in [clipboard](https://ckeditor.com/cke4/addon/clipboard) plugin. All plugins with [clipboard](https://ckeditor.com/cke4/addon/clipboard) plugin dependency are affected:
* [clipboard](https://ckeditor.com/cke4/addon/clipboard)
* [pastetext](https://ckeditor.com/cke4/addon/pastetext)
* [pastetools](https://ckeditor.com/cke4/addon/pastetools)
* [widget](https://ckeditor.com/cke4/addon/widget)
* [uploadwidget](https://ckeditor.com/cke4/addon/uploadwidget)
* [autolink](https://ckeditor.com/cke4/addon/autolink)
* [tableselection](https://ckeditor.com/cke4/addon/tableselection)
### Impact
A potential vulnerability has been discovered in CKEditor 4 [Clipboard](https://ckeditor.com/cke4/addon/clipboard) package. The vulnerability allowed to abuse paste functionality using malformed HTML, which could result in injecting arbitrary HTML into the editor. It affects all users using the CKEditor 4 plugins listed above at version >= 4.5.2.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.16.2.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank Anton Subbotin ([skavans](https://github.com/skavans)) for recognizing and reporting this vulnerability.
|
{'CVE-2021-32809'}
|
2022-04-26T18:06:31Z
|
2021-08-23T19:40:57Z
|
MODERATE
| 4.6
|
{'CWE-94', 'CWE-79'}
|
{'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32809', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7889-rm5j-hpgg', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://github.com/advisories/GHSA-7889-rm5j-hpgg', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-8g3r-968r-c644
|
Malicious Package in jw-sha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-10-01T14:37:57Z
|
2020-09-03T23:15:58Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1296', 'https://github.com/advisories/GHSA-8g3r-968r-c644'}
| null |
GHSA
|
GHSA-fg7r-2g4j-5cgr
|
Race Condition in tokio
|
An issue was discovered in the tokio crate before 1.8.4, and 1.9.x through 1.13.x before 1.13.1, for Rust. In certain circumstances involving a closed oneshot channel, there is a data race and memory corruption.
|
{'CVE-2021-45710'}
|
2022-01-07T18:26:28Z
|
2022-01-06T22:04:37Z
|
HIGH
| 8.1
|
{'CWE-362'}
|
{'https://github.com/advisories/GHSA-fg7r-2g4j-5cgr', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0124.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0124.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45710'}
| null |
GHSA
|
GHSA-r854-96gq-rfg3
|
Python Image Library (PIL) allows symlink attacks
|
The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.
|
{'CVE-2014-1933'}
|
2021-08-25T21:10:34Z
|
2020-05-18T17:41:19Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-r854-96gq-rfg3', 'http://www.ubuntu.com/usn/USN-2168-1', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1933', 'http://www.securityfocus.com/bid/65513', 'https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7', 'http://www.openwall.com/lists/oss-security/2014/02/11/1', 'https://security.gentoo.org/glsa/201612-52', 'http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html', 'http://www.openwall.com/lists/oss-security/2014/02/10/15'}
| null |
GHSA
|
GHSA-363h-vj6q-3cmj
|
Rosetta-Flash JSONP Vulnerability in hapi
|
This description taken from the pull request provided by Patrick Kettner.
Versions 6.1.0 and earlier of hapi are vulnerable to a rosetta-flash attack, which can be used by attackers to send data across domains and break the browser same-origin-policy.
## Recommendation
- Update hapi to version 6.1.1 or later.
Alternatively, a solution previously implemented by Google, Facebook, and Github is to prepend callbacks with an empty inline comment. This will cause the flash parser to break on invalid inputs and prevent the issue, and how the issue has been resolved internally in hapi.
|
{'CVE-2014-4671'}
|
2021-09-23T19:28:29Z
|
2020-08-31T22:45:35Z
|
MODERATE
| 0
|
{'CWE-352'}
|
{'http://secunia.com/advisories/59774', 'http://www.securityfocus.com/bid/68457', 'http://helpx.adobe.com/security/products/flash-player/apsb14-17.html', 'http://secunia.com/advisories/59837', 'https://github.com/advisories/GHSA-363h-vj6q-3cmj', 'http://rhn.redhat.com/errata/RHSA-2014-0860.html', 'http://security.gentoo.org/glsa/glsa-201407-02.xml', 'https://github.com/spumko/hapi/pull/1766', 'https://www.npmjs.com/advisories/12', 'https://github.com/patrickkettner', 'http://www.securitytracker.com/id/1030533', 'http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/', 'https://nvd.nist.gov/vuln/detail/CVE-2014-4671'}
| null |
GHSA
|
GHSA-2c8c-84w2-j38j
|
Improper Restriction of XML External Entity Reference in Plone
|
Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role).
|
{'CVE-2020-28736'}
|
2021-04-07T21:14:00Z
|
2021-04-07T21:14:00Z
|
HIGH
| 8.8
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-2c8c-84w2-j38j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28736', 'https://github.com/plone/Products.CMFPlone/issues/3209', 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt', 'https://www.misakikata.com/codes/plone/python-en.html'}
| null |
GHSA
|
GHSA-wfjw-w6pv-8p7f
|
Observable Response Discrepancy in Flask-AppBuilder
|
### Impact
User enumeration in database authentication in Flask-AppBuilder < 3.4.4. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in.
### Patches
Upgrade to 3.4.4
### Workarounds
### References
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
|
{'CVE-2022-21659'}
|
2022-04-19T19:03:19Z
|
2022-02-01T00:47:53Z
|
MODERATE
| 5.3
|
{'CWE-203'}
|
{'https://github.com/advisories/GHSA-wfjw-w6pv-8p7f', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-wfjw-w6pv-8p7f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21659', 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1775'}
| null |
GHSA
|
GHSA-9p29-94hp-8rvc
|
XSS in qiita-markdown
|
Increments Qiita::Markdown before 0.34.0 allows XSS via a crafted gist link, a different vulnerability than CVE-2021-28796.
|
{'CVE-2021-28833'}
|
2021-08-02T17:22:07Z
|
2021-08-02T17:22:07Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-9p29-94hp-8rvc', 'https://github.com/increments/qiita-markdown/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28833', 'https://vuln.ryotak.me/advisories/50'}
| null |
GHSA
|
GHSA-9mx2-prfp-8hqp
|
Prototype Pollution in simpl-schema
|
This affects the package simpl-schema before 1.10.2. Attacker controlled input into a schema could result in remote code execution within the scope of the surrounding application.
|
{'CVE-2020-7742'}
|
2021-05-10T18:38:47Z
|
2021-05-10T18:38:47Z
|
HIGH
| 7.5
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-9mx2-prfp-8hqp', 'https://github.com/longshotlabs/simpl-schema/releases/tag/1.10.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7742', 'https://github.com/longshotlabs/simpl-schema/commit/50128841fa7fc2d137c36a397054279144caea3d', 'https://snyk.io/vuln/SNYK-JS-SIMPLSCHEMA-1016157'}
| null |
GHSA
|
GHSA-hrpq-r399-whgw
|
Sandbox Breakout / Arbitrary Code Execution in safe-eval
|
All versions of `safe-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through Error objects. This may allow attackers to execute arbitrary code in the system.
Evaluating the payload
```
(function (){
var ex = new Error
ex.__proto__ = null
ex.stack = {
match: x => {
return x.constructor.constructor("throw process.env")()
}
}
return ex
})()
```
prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2020-7710'}
|
2021-07-29T22:01:25Z
|
2020-08-25T23:40:53Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7710', 'https://www.npmjs.com/advisories/1322', 'https://github.com/advisories/GHSA-hrpq-r399-whgw', 'https://github.com/hacksparrow/safe-eval/issues/19', 'https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076'}
| null |
GHSA
|
GHSA-xwg3-gjxh-c8pm
|
Malicious Package in ngx-context-menu
|
Version 0.0.26 of `ngx-context-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-03T19:14:32Z
|
2020-09-03T19:14:32Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/1105', 'https://github.com/advisories/GHSA-xwg3-gjxh-c8pm'}
| null |
GHSA
|
GHSA-8w26-6f25-cm9x
|
Unsafe Deserialization in jackson-databind
|
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.
|
{'CVE-2020-36185'}
|
2022-04-22T17:27:49Z
|
2021-12-09T19:16:02Z
|
HIGH
| 8.1
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-8w26-6f25-cm9x', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind/issues/2998', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36185', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.