ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-3f5c-4qxj-vmpf
High severity vulnerability that affects next
ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information.
{'CVE-2017-16877'}
2021-08-31T20:57:52Z
2017-12-05T02:04:14Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16877', 'https://github.com/advisories/GHSA-3f5c-4qxj-vmpf', 'https://github.com/zeit/next.js/releases/tag/2.4.1'}
null
GHSA
GHSA-29mw-wpgm-hmr9
Regular Expression Denial of Service (ReDoS) in lodash
All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) { var ret = "1" for (var i = 0; i < n; i++) { ret += " " } return ret + "1"; } var s = build_blank(50000) var time0 = Date.now(); lo.trim(s) var time_cost0 = Date.now() - time0; console.log("time_cost0: " + time_cost0) var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log("time_cost1: " + time_cost1) var time2 = Date.now(); lo.trimEnd(s) var time_cost2 = Date.now() - time2; console.log("time_cost2: " + time_cost2)
{'CVE-2020-28500'}
2022-04-19T19:03:27Z
2022-01-06T20:30:46Z
MODERATE
5.3
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28500', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/lodash/lodash/pull/5065', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893', 'https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7', 'https://github.com/advisories/GHSA-29mw-wpgm-hmr9', 'https://snyk.io/vuln/SNYK-JS-LODASH-1018905'}
null
GHSA
GHSA-vvjc-q5vr-52q6
Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks
Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks.
{'CVE-2016-8749'}
2022-04-26T19:23:58Z
2018-10-16T23:13:00Z
CRITICAL
9.8
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2017:1832', 'http://www.openwall.com/lists/oss-security/2017/05/22/2', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8749', 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true', 'http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2', 'https://github.com/advisories/GHSA-vvjc-q5vr-52q6', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'http://www.securityfocus.com/bid/97179', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-25mp-g6fv-mqxx
Unexpected server crash in Next.js.
Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue. Note that prior version 0.9.9 package `next` hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
{'CVE-2021-43803'}
2022-04-07T16:06:55Z
2021-12-07T21:12:09Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-25mp-g6fv-mqxx', 'https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264', 'https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx', 'https://github.com/vercel/next.js/releases/tag/v11.1.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43803', 'https://github.com/vercel/next.js/releases/v12.0.5', 'https://github.com/vercel/next.js/pull/32080'}
null
GHSA
GHSA-jvfv-hrrc-6q72
Improper Restriction of XML External Entity Reference in Liquibase
The XMLChangeLogSAXParser() function in Liquibase prior to version 4.8.0 contains an issue that may lead to to Improper Restriction of XML External Entity Reference.
{'CVE-2022-0839'}
2022-03-18T21:12:36Z
2022-03-05T00:00:45Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/advisories/GHSA-jvfv-hrrc-6q72', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0839', 'https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70', 'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381'}
null
GHSA
GHSA-fp5r-v3w9-4333
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
{'CVE-2021-4104'}
2022-04-22T15:36:07Z
2021-12-14T19:49:31Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033', 'https://github.com/advisories/GHSA-fp5r-v3w9-4333', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4104', 'https://security.netapp.com/advisory/ntap-20211223-0007/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126', 'https://www.cve.org/CVERecord?id=CVE-2021-44228', 'https://www.kb.cert.org/vuls/id/930724', 'https://access.redhat.com/security/cve/CVE-2021-4104', 'http://www.openwall.com/lists/oss-security/2022/01/18/3'}
null
GHSA
GHSA-q3w9-g74q-vp5f
Denial of Service in express-fileupload
Versions of `express-fileupload` prior to 1.1.6-alpha.6 are vulnerable to Denial of Service. The package causes server responses to be delayed (up to 30s in internal testing) if the request contains a large `filename` of `.` characters. ## Recommendation Upgrade to version 1.1.6-alpha.6 or later.
null
2020-09-03T21:14:12Z
2020-09-03T21:14:12Z
LOW
0
null
{'https://www.npmjs.com/advisories/1216', 'https://github.com/advisories/GHSA-q3w9-g74q-vp5f'}
null
GHSA
GHSA-w2j5-3rcx-vx7x
Sysctls applied to containers with host IPC or host network namespaces can affect the host
### Impact Before setting the sysctls for a pod, the pods namespaces must be unshared (created). However, in cases where the pod is using a host network or IPC namespace, a bug in CRI-O caused the namespace creating tool [pinns](https://github.com/cri-o/cri-o/tree/main/pinns/) to configure the sysctls of the host. This allows a malicious user to set sysctls on the host, assuming they have access to hostNetwork and hostIPC. Any CRI-O cluster after CRI-O 1.18 that drops the infra container 1.22 and 1.23 clusters drop infra container by default, and are thus vulnerable by default. ### Patches CRI-O versions 1.24.0, 1.23.1, 1.22.2, 1.21.5, 1.20.6, 1.19.5 all have the patches. ### Workarounds Users can set `manage_ns_lifecycle` to false, which causes the sysctls to be configured by the OCI runtime, which typically filter these cases. This option is available in 1.20 and 1.19. Newer versions don't have this option. An admission webhook could also be created to deny pods that use host IPC or network namespaces and also attempt to configure sysctls related to that namespace. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the CRI-O repo](http://github.com/cri-o/cri-o/issues) * To make a report, email your vulnerability to the private [cncf-crio-security@lists.cncf.io](mailto:cncf-crio-security@lists.cncf.io) list with the security details and the details expected for [all CRI-O bug reports](https://github.com/cri-o/cri-o/blob/main/.github/ISSUE_TEMPLATE/bug-report.yml).
null
2022-04-19T19:03:27Z
2022-03-15T20:02:54Z
MODERATE
0
null
{'https://github.com/cri-o/cri-o/security/advisories/GHSA-w2j5-3rcx-vx7x', 'https://github.com/advisories/GHSA-w2j5-3rcx-vx7x'}
null
GHSA
GHSA-hjm9-576q-399p
Moderate severity vulnerability that affects org.esigate:esigate-core
esigate.org esigate version 5.2 and earlier contains a CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in ESI directive with user specified XSLT that can result in Remote Code Execution. This attack appear to be exploitable via Use of another weakness in backend application to reflect ESI directives. This vulnerability appears to have been fixed in 5.3.
{'CVE-2018-1000854'}
2021-09-14T17:25:09Z
2018-12-21T17:46:23Z
CRITICAL
9.8
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000854', 'https://github.com/esigate/esigate/issues/209', 'https://github.com/advisories/GHSA-hjm9-576q-399p'}
null
GHSA
GHSA-w6j4-3gh2-9f5j
High severity vulnerability that affects apache-airflow
A number of HTTP endpoints in the Airflow webserver (both RBAC and classic) did not have adequate protection and were vulnerable to cross-site request forgery attacks.
{'CVE-2019-0229'}
2021-09-21T18:00:40Z
2019-04-18T14:27:40Z
HIGH
8.8
{'CWE-352'}
{'http://www.openwall.com/lists/oss-security/2019/04/10/6', 'http://www.securityfocus.com/bid/107869', 'https://github.com/advisories/GHSA-w6j4-3gh2-9f5j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0229', 'https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231@%3Cdev.airflow.apache.org%3E'}
null
GHSA
GHSA-h39g-q63v-4h9p
Exposure of sensitive information to an unauthorized actor
An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
{'CVE-2021-33038'}
2021-06-21T17:43:02Z
2021-06-01T21:56:23Z
HIGH
7.5
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33038', 'https://gitlab.com/mailman/hyperkitty/-/commit/9025324597d60b2dff740e49b70b15589d6804fa', 'https://github.com/advisories/GHSA-h39g-q63v-4h9p', 'https://gitlab.com/mailman/hyperkitty/-/issues/380', 'https://www.debian.org/security/2021/dsa-4922', 'https://techblog.wikimedia.org/2021/06/11/discovering-and-fixing-cve-2021-33038-in-mailman3/'}
null
GHSA
GHSA-cwcp-6c48-fm7m
Unsafe eval() in summit
Affected versions of `summit` allow attackers to execute arbitrary commands via collection names when using the `PouchDB` driver. ## Recommendation No direct patch is available at this time. Currently, the best option to mitigate the issue is to avoid using the `PouchDB` driver, as the package author has abandoned this feature entirely.
{'CVE-2017-16020'}
2021-01-07T23:32:28Z
2020-09-01T16:39:38Z
MODERATE
0
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16020', 'https://nodesecurity.io/advisories/315', 'https://www.npmjs.com/advisories/315', 'https://github.com/advisories/GHSA-cwcp-6c48-fm7m', 'https://github.com/notduncansmith/summit/issues/23'}
null
GHSA
GHSA-6mv9-qcx2-3hh3
Memory exhaustion in routinator
NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, support the gzip transfer encoding when querying RRDP repositories. This encoding can be used by an RRDP repository to cause an out-of-memory crash in these versions of Routinator. RRDP uses XML which allows arbitrary amounts of white space in the encoded data. The gzip scheme compresses such white space extremely well, leading to very small compressed files that become huge when being decompressed for further processing, big enough that Routinator runs out of memory when parsing input data waiting for the next XML element.
{'CVE-2021-43174'}
2022-01-13T18:24:51Z
2021-11-11T00:55:08Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-6mv9-qcx2-3hh3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43174', 'https://www.nlnetlabs.nl/downloads/routinator/CVE-2021-43172_CVE-2021-43173_CVE-2021-43174.txt', 'https://www.debian.org/security/2022/dsa-5041'}
null
GHSA
GHSA-r7rv-2rph-hvhj
Improper synchronization in buttplug
An issue was discovered in the buttplug crate before 1.0.4 for Rust. ButtplugFutureStateShared does not properly consider (!Send|!Sync) objects, leading to a data race.
{'CVE-2020-36218'}
2021-08-25T20:51:45Z
2021-08-25T20:51:45Z
MODERATE
5.9
{'CWE-662'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0112.html', 'https://github.com/advisories/GHSA-r7rv-2rph-hvhj', 'https://github.com/buttplugio/buttplug-rs/issues/225', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36218'}
null
GHSA
GHSA-544x-2jx9-4pfg
Path traversal in Apache Karaf
Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf Mitigation: Apache Karaf users should upgrade to 4.2.15 or 4.3.6 or later as soon as possible, or use correct path. JIRA Tickets: https://issues.apache.org/jira/browse/KARAF-7326
{'CVE-2022-22932'}
2022-02-04T13:51:19Z
2022-01-28T22:25:03Z
MODERATE
5.3
{'CWE-22'}
{'https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4', 'https://github.com/apache/karaf/pull/1485', 'https://github.com/advisories/GHSA-544x-2jx9-4pfg', 'https://issues.apache.org/jira/browse/KARAF-7326', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22932', 'https://karaf.apache.org/security/cve-2022-22932.txt'}
null
GHSA
GHSA-q47x-6mqq-4w92
Improper Input Validation
repo/setting.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 does not validate the form.MirrorAddress before calling SaveAddress.
{'CVE-2019-11228'}
2022-04-12T22:02:33Z
2022-02-15T01:57:18Z
HIGH
5.3
{'CWE-20'}
{'https://github.com/go-gitea/gitea/pull/6593', 'https://github.com/advisories/GHSA-q47x-6mqq-4w92', 'https://github.com/go-gitea/gitea/pull/6595', 'https://github.com/go-gitea/gitea/releases/tag/v1.8.0-rc3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11228', 'https://github.com/go-gitea/gitea/releases/tag/v1.7.6'}
null
GHSA
GHSA-m54r-vrmv-hw33
Improper Sanitizing of plugin names in helm
### Impact Security researchers at Trail of Bits discovered that plugin names are not sanitized properly. As a result, a malicious plugin author could use characters in a plugin name that would result in unexpected behavior, such as duplicating the name of another plugin or spoofing the output to `helm --help`. ### Patches This issue has been patched in Helm 3.3.2. ### Workarounds Do not install untrusted Helm plugins. Examine the `name` field in the `plugin.yaml` file for a plugin, looking for characters outside of the [a-zA-Z0-9._-] range.
{'CVE-2020-15186'}
2021-11-19T15:28:38Z
2021-05-24T16:57:12Z
LOW
3.4
{'CWE-74', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15186', 'https://github.com/helm/helm/commit/c8d6b01d72c9604e43ee70d0d78fadd54c2d8499', 'https://github.com/advisories/GHSA-m54r-vrmv-hw33', 'https://github.com/helm/helm/security/advisories/GHSA-m54r-vrmv-hw33', 'https://github.com/helm/helm/commit/809e2d999e2c33e20e77f6bff30652d79c287542'}
null
GHSA
GHSA-g585-j55v-38h7
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
{'CVE-2022-0966'}
2022-03-29T21:27:49Z
2022-03-16T00:00:45Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8', 'https://github.com/advisories/GHSA-g585-j55v-38h7', 'https://huntr.dev/bounties/e06c0d55-00a3-4f82-a009-0310b2e402fe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0966'}
null
GHSA
GHSA-4ww3-3rxj-8v6q
High severity vulnerability that affects actionpack
actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.
{'CVE-2011-0449'}
2021-09-01T18:39:13Z
2017-10-24T18:33:38Z
HIGH
0
null
{'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4', 'http://www.vupen.com/english/advisories/2011/0877', 'https://github.com/advisories/GHSA-4ww3-3rxj-8v6q', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'http://securitytracker.com/id?1025061', 'http://secunia.com/advisories/43278', 'http://groups.google.com/group/rubyonrails-security/msg/04345b2e84df5b4f?dmode=source&output=gplain', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0449'}
null
GHSA
GHSA-2r8p-fg3c-wcj4
Heap OOB and CHECK fail in `ResourceGather`
### Impact An attacker can trigger a crash via a `CHECK`-fail in debug builds of TensorFlow using `tf.raw_ops.ResourceGather` or a read from outside the bounds of heap allocated data in the same API in a release build: ```python import tensorflow as tf tensor = tf.constant(value=[[1,2],[3,4],[5,6]],shape=(3,2),dtype=tf.uint32) v = tf.Variable(tensor) tf.raw_ops.ResourceGather( resource=v.handle, indices=[0], dtype=tf.uint32, batch_dims=10, validate_indices=False) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L660-L668) does not check that the `batch_dims` value that the user supplies is less than the rank of the input tensor. Since the implementation uses several for loops over the dimensions of `tensor`, this results in reading data from outside the bounds of heap allocated buffer backing the tensor: ```cc // batch_dims_ = > params.dims() (10 > 2) for (int i = 0; i < batch_dims_; ++i) { result_shape.AddDim(params.dim_size(i)); } for (int i = batch_dims_; i < indices.dims(); ++i) { result_shape.AddDim(indices.dim_size(i)); } for (int i = batch_dims_ + 1; i < params.dims(); ++i) { result_shape.AddDim(params.dim_size(i)); } ``` In debug mode, `.dim_size(i)` validates that the argument is less than `.dims()` using a `DCHECK`. But the `DCHECK` is a no-op in release builds. ### Patches We have patched the issue in GitHub commit [bc9c546ce7015c57c2f15c168b3d9201de679a1d](https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37654'}
2021-08-25T14:43:01Z
2021-08-25T14:43:01Z
HIGH
7.3
{'CWE-125'}
{'https://github.com/advisories/GHSA-2r8p-fg3c-wcj4', 'https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r8p-fg3c-wcj4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37654'}
null
GHSA
GHSA-3fr8-mwpp-8h9p
Cross-site scripting in TileServer GL
An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS.
{'CVE-2020-15500'}
2021-05-17T21:01:15Z
2021-05-17T21:01:15Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-3fr8-mwpp-8h9p', 'http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15500', 'https://github.com/maptiler/tileserver-gl/issues/461'}
null
GHSA
GHSA-38m9-3vg4-rwvp
Cross-site Scripting in microweber
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
{'CVE-2022-0678'}
2022-02-26T01:15:19Z
2022-02-20T00:00:32Z
MODERATE
6.5
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0678', 'https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0', 'https://github.com/advisories/GHSA-38m9-3vg4-rwvp', 'https://github.com/microweber/microweber/commit/2b8fa5aac31e51e2aca83c7ef5d1281ba2e755f8'}
null
GHSA
GHSA-2mhh-w6q8-5hxw
Remote Memory Disclosure in ws
Versions of `ws` prior to 1.0.1 are affected by a remote memory disclosure vulnerability. In certain rare circumstances, applications which allow users to control the arguments of a `client.ping()` call will cause `ws` to send the contents of an allocated but non-zero-filled buffer to the server. This may disclose sensitive information that still exists in memory after previous use of the memory for other tasks. ## Proof of Concept ``` var ws = require('ws') var server = new ws.Server({ port: 9000 }) var client = new ws('ws://localhost:9000') client.on('open', function () { console.log('open') client.ping(50) // this sends a non-zeroed buffer of 50 bytes client.on('pong', function (data) { console.log('got pong') console.log(data) // Data from the client. }) }) ``` ## Recommendation Update to version 1.0.1 or greater.
{'CVE-2016-10518'}
2021-01-08T20:07:04Z
2019-02-18T23:56:42Z
LOW
0
{'CWE-201'}
{'https://github.com/advisories/GHSA-2mhh-w6q8-5hxw', 'https://nodesecurity.io/advisories/67', 'https://www.npmjs.com/advisories/67', 'https://github.com/websockets/ws/releases/tag/1.0.1', 'https://gist.github.com/c0nrad/e92005446c480707a74a', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10518'}
null
GHSA
GHSA-3jqw-crqj-w8qw
Moderate severity vulnerability that affects django
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521.
{'CVE-2011-4137'}
2021-08-31T21:11:03Z
2018-07-23T19:51:35Z
MODERATE
0
null
{'http://openwall.com/lists/oss-security/2011/09/15/5', 'https://hermes.opensuse.org/messages/14700881', 'https://www.djangoproject.com/weblog/2011/sep/09/', 'https://www.djangoproject.com/weblog/2011/sep/10/127/', 'http://openwall.com/lists/oss-security/2011/09/11/1', 'http://secunia.com/advisories/46614', 'https://github.com/advisories/GHSA-3jqw-crqj-w8qw', 'https://nvd.nist.gov/vuln/detail/CVE-2011-4137', 'http://www.debian.org/security/2011/dsa-2332', 'https://bugzilla.redhat.com/show_bug.cgi?id=737366', 'http://openwall.com/lists/oss-security/2011/09/13/2'}
null
GHSA
GHSA-fx3v-553x-3c4q
Stored XSS by authenticated backend user with access to upload files
### Impact Backend users with access to upload files were permitted to upload SVG files without any sanitization applied to the uploaded files. Since SVG files support being parsed as HTML by browsers, this means that they could theoretically upload Javascript that would be executed on a path under the website's domain (i.e. /storage/app/media/evil.svg), but they would have to convince their target to visit that location directly in the target's browser as the backend does not display SVGs inline anywhere, SVGs are only displayed as image resources in the backend and are thus unable to be executed. ### Patches Issue has been patched in Build 469 (v1.0.469) & v1.1.0. ### Workarounds Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469 or v1.1.0. ### References Reported by [Hoan Hoang](https://github.com/hoanhp) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1107" alt="Screen Shot 2020-10-10 at 1 47 49 PM" src="https://user-images.githubusercontent.com/7253840/95663787-378f2b80-0aff-11eb-8dfc-b97d162939da.png">
{'CVE-2020-15249'}
2022-04-19T19:02:38Z
2020-11-23T19:47:59Z
LOW
2.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-fx3v-553x-3c4q', 'https://github.com/octobercms/october/security/advisories/GHSA-fx3v-553x-3c4q', 'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15249'}
null
GHSA
GHSA-7qqr-3pj3-q2f5
XSS issues in the management interface
In system/workplace/ in Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple Reflected and Stored XSS issues in the management interface.
{'CVE-2019-13236'}
2021-08-18T22:25:16Z
2019-11-12T22:58:21Z
MODERATE
6.1
{'CWE-79'}
{'https://twitter.com/aetsu/status/1152096227938459648', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13236', 'https://github.com/advisories/GHSA-7qqr-3pj3-q2f5', 'http://packetstormsecurity.com/files/154283/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://aetsu.github.io/OpenCms', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}
null
GHSA
GHSA-68jc-v27h-vhmw
Unrestricted Upload of File with Dangerous Type in Drupal core.
Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.
{'CVE-2020-13671'}
2022-01-04T19:47:29Z
2021-10-12T16:28:25Z
HIGH
8.8
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13671', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://github.com/advisories/GHSA-68jc-v27h-vhmw', 'https://www.drupal.org/sa-core-2020-012', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/'}
null
GHSA
GHSA-xmc8-cjfr-phx3
Regular Expression Denial of Service in highcharts
Versions of `highcharts` prior to 6.1.0 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. ## Recommendation Upgrade to version 6.1.0 or higher.
{'CVE-2018-20801'}
2021-09-21T22:36:58Z
2019-03-18T15:59:32Z
HIGH
7.5
{'CWE-185'}
{'https://www.npmjs.com/advisories/793', 'https://snyk.io/vuln/npm:highcharts:20180225', 'https://security.netapp.com/advisory/ntap-20190715-0001/', 'https://github.com/advisories/GHSA-xmc8-cjfr-phx3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20801', 'https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa'}
null
GHSA
GHSA-v938-qcc9-rwv8
Use of Uninitialized Resource in buffoon.
An issue was discovered in the buffoon crate through 2020-12-31 for Rust. InputStream::read_exact may read from uninitialized memory locations.
{'CVE-2020-36512'}
2022-01-07T16:24:02Z
2022-01-06T22:17:09Z
CRITICAL
9.8
{'CWE-908'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0154.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/buffoon/RUSTSEC-2020-0154.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36512', 'https://github.com/advisories/GHSA-v938-qcc9-rwv8'}
null
GHSA
GHSA-q8j6-pwqx-pm96
Insecure template handling in Squirrelly
Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of squirrelly is currently 8.0.8. For complete details refer to the referenced GHSL-2021-023.
{'CVE-2021-32819'}
2021-05-17T20:58:02Z
2021-05-17T20:58:02Z
HIGH
8
{'CWE-200'}
{'https://www.npmjs.com/package/squirrelly', 'https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/', 'https://github.com/advisories/GHSA-q8j6-pwqx-pm96', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32819'}
null
GHSA
GHSA-6q8q-rvf4-m4pg
Downloads Resources over HTTP in dalek-browser-chrome
Affected versions of `dalek-browser-chrome` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-chrome`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available - the author of `dalek` recommends [`TestCafé`](http://devexpress.github.io/testcafe/). Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10604'}
2021-06-11T14:21:05Z
2019-02-18T23:50:14Z
HIGH
8.1
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10604', 'https://nodesecurity.io/advisories/199', 'https://github.com/advisories/GHSA-6q8q-rvf4-m4pg', 'https://www.npmjs.com/advisories/199'}
null
GHSA
GHSA-c442-3278-rhrg
Unrestricted File Upload in ShowDoc v2.9.5
Unrestricted File Upload in ShowDoc v2.9.5 allows remote attackers to execute arbitrary code via the 'file_url' parameter in the component AdminUpdateController.class.php'.
{'CVE-2021-36440'}
2021-09-16T19:26:05Z
2021-09-09T17:08:46Z
CRITICAL
9.8
{'CWE-434'}
{'https://github.com/star7th/showdoc/issues/1406', 'https://github.com/advisories/GHSA-c442-3278-rhrg', 'https://github.com/star7th/showdoc/commit/49b992d4c548c8c615a92b6efe8a50c8f1083abf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36440'}
null
GHSA
GHSA-3w76-x94r-pw44
Downloads Resources over HTTP in rs-brightcove
Affected versions of `rs-brightcove` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `rs-brightcove`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10676'}
2021-01-08T20:11:25Z
2019-02-18T23:42:16Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/273', 'https://www.npmjs.com/advisories/273', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10676', 'https://github.com/advisories/GHSA-3w76-x94r-pw44'}
null
GHSA
GHSA-9jg9-6wm2-x7p5
Server-Side Request Forgery in Karaf
In Karaf, JMX authentication takes place using JAAS and authorization takes place using ACL files. By default, only an "admin" can actually invoke on an MBean. However there is a vulnerability there for someone who is not an admin, but has a "viewer" role. In the 'etc/jmx.acl.cfg', such as role can call get*. It's possible to authenticate as a viewer role + invokes on the MLet getMBeansFromURL method, which goes off to a remote server to fetch the desired MBean, which is then registered in Karaf. At this point the attack fails as "viewer" doesn't have the permission to invoke on the MBean. Still, it could act as a SSRF style attack and also it essentially allows a "viewer" role to pollute the MBean registry, which is a kind of privilege escalation. The vulnerability is low as it's possible to add a ACL to limit access. Users should update to Apache Karaf 4.2.9 or newer.
{'CVE-2020-11980'}
2022-02-10T23:04:32Z
2022-02-10T23:04:32Z
MODERATE
6.3
{'CWE-918'}
{'http://karaf.apache.org/security/cve-2020-11980.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11980', 'https://github.com/advisories/GHSA-9jg9-6wm2-x7p5'}
null
GHSA
GHSA-5xp3-jfq3-5q8x
Improper Input Validation in pip
A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.
{'CVE-2021-3572'}
2022-04-22T15:40:09Z
2021-11-15T17:45:01Z
MODERATE
5.7
{'CWE-20'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/pypa/pip/pull/9827', 'https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b', 'https://packetstormsecurity.com/files/162712/USN-4961-1.txt', 'https://github.com/advisories/GHSA-5xp3-jfq3-5q8x', 'https://bugzilla.redhat.com/show_bug.cgi?id=1962856', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3572', 'https://access.redhat.com/errata/RHSA-2021:3254'}
null
GHSA
GHSA-m342-ff57-4jcc
Heap OOB read in `tf.raw_ops.SparseCountSparseOutput`
### Impact The [shape inference functions for `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/ops/count_ops.cc#L43-L50) can trigger a read outside of bounds of heap allocated array: ```python import tensorflow as tf @tf.function def func(): return tf.raw_ops.SparseCountSparseOutput( indices=[1], values=[[1]], dense_shape=[10], weights=[], binary_output= True) func() ``` The function fails to check that the first input (i.e., `indices`) has rank 2: ```cc auto rank = c->Dim(c->input(0), 1); ``` ### Patches We have patched the issue in GitHub commit [701cfaca222a82afbeeb17496bd718baa65a67d2](https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41210'}
2021-11-10T19:01:44Z
2021-11-10T19:01:44Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/advisories/GHSA-m342-ff57-4jcc', 'https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m342-ff57-4jcc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41210'}
null
GHSA
GHSA-rwh9-8xx8-4wfm
Cross-site Scripting in OpenCRX
In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.
{'CVE-2021-25959'}
2021-10-08T21:28:56Z
2021-09-30T20:50:21Z
MODERATE
6.1
{'CWE-79'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25959', 'https://github.com/advisories/GHSA-rwh9-8xx8-4wfm', 'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'}
null
GHSA
GHSA-5h5r-ffc4-c455
strong_password Ruby gem malicious version causing Remote Code Execution vulnerability
The strong_password gem 0.0.7 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 0.0.6.
{'CVE-2019-13354'}
2021-08-17T17:50:52Z
2019-07-08T20:32:35Z
CRITICAL
9.8
{'CWE-94'}
{'https://rubygems.org/gems/strong_password/versions', 'https://github.com/advisories/GHSA-5h5r-ffc4-c455', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13354', 'https://withatwist.dev/strong-password-rubygem-hijacked.html', 'https://github.com/bdmac/strong_password/releases', 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-strong_password-0-0-7/', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/strong_password/CVE-2019-13354.yml'}
null
GHSA
GHSA-68gr-cmcp-g3mj
Directory Traversal in lactate
A crafted `GET` request can be leveraged to traverse the directory structure of a host using the lactate web server package, and request arbitrary files outside of the specified web root. This allows for a remote attacker to gain access to arbitrary files on the filesystem that the process has access to read. Mitigating factors: Only files that the user running `lactate` has permission to read will be accessible via this vulnerability. [Proof of concept](https://hackerone.com/reports/296645): Please globally install the `lactate` package and `cd` to a directory you wish to serve assets from. Next, run `lactate -p 8081` to start serving files from this location. The following cURL request can be used to demonstrate this vulnerability by requesting the target `/etc/passwd` file: ``` curl "http://127.0.0.1:8081/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd" ``` ``` root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin bin:x:2:2:bin:/bin:/usr/sbin/nologin sys:x:3:3:sys:/dev:/usr/sbin/nologin [...] ``` ## Recommendation As there is currently no fix for this issue selecting an alternative static web server would be the best choice.
null
2021-08-16T23:34:11Z
2019-06-14T16:39:31Z
HIGH
7.5
{'CWE-22'}
{'https://snyk.io/vuln/npm:lactate:20180123', 'https://github.com/advisories/GHSA-68gr-cmcp-g3mj', 'https://github.com/RetireJS/retire.js/commit/800c8140884eaa5753a49308f560c925fe97b9a5', 'https://hackerone.com/reports/296645', 'https://www.npmjs.com/advisories/560'}
null
GHSA
GHSA-q93h-jc49-78gg
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
{'CVE-2020-9547'}
2021-10-21T21:13:04Z
2020-05-15T18:59:10Z
CRITICAL
9.8
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html', 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r742ef70d126548dcf7de5be5779355c9d76a9aec71d7a9ef02c6398a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra3e90712f2d59f8cef03fa796f5adf163d32b81fe7b95385f21790e6@%3Cnotifications.zookeeper.apache.org%3E', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-q93h-jc49-78gg', 'https://github.com/FasterXML/jackson-databind/issues/2634', 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/redbe4f1e21bf080f637cf9fbec47729750a2f443a919765360337428@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc0d5d0f72da1ed6fc5e438b1ddb3fa090c73006b55f873cf845375ab@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rd0e958d6d5c5ee16efed73314cd0e445c8dbb4bdcc80fc9d1d6c11fc@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9547', 'https://lists.apache.org/thread.html/r4accb2e0de9679174efd3d113a059bab71ff3ec53e882790d21c1cc1@%3Cnotifications.zookeeper.apache.org%3E'}
null
GHSA
GHSA-pwrf-q7h8-jjr7
Authorization Bypass Through User-Controlled Key in Bagisto
In Webkul Bagisto before 0.1.5, the functionalities for customers to change their own values (such as address, review, orders, etc.) can also be manipulated by other customers.
{'CVE-2019-16403'}
2021-05-10T17:22:10Z
2019-11-08T20:06:24Z
MODERATE
8.8
{'CWE-639'}
{'https://github.com/advisories/GHSA-pwrf-q7h8-jjr7', 'https://github.com/bagisto/bagisto/issues/749', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16403'}
null
GHSA
GHSA-r37h-j483-cjjm
Improper rate limiting in Koel
Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier.
{'CVE-2021-33563'}
2021-06-04T18:50:21Z
2021-06-01T21:38:20Z
HIGH
0
{'CWE-799', 'CWE-916'}
{'https://huntr.dev/bounties/1-other-koel/koel/', 'https://github.com/advisories/GHSA-r37h-j483-cjjm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33563', 'https://github.com/koel/koel/releases/tag/v5.1.4'}
null
GHSA
GHSA-w4pv-w56c-mg4v
Path Traversal in stattic
Versions of `stattic` before 0.3.0 are vulnerable to path traversal allowing a remote attacker to read arbitrary files with any extension from the server that users `stattic`. ## Recommendation Update to version 0.3.0 or later.
{'CVE-2018-3734'}
2021-01-08T01:57:02Z
2018-07-18T21:20:15Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-w4pv-w56c-mg4v', 'https://hackerone.com/reports/319003', 'https://www.npmjs.com/advisories/591', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3734'}
null
GHSA
GHSA-8h46-5m9h-7553
Heap out of bounds write in `RaggedBinCount`
### Impact If the `splits` argument of `RaggedBincount` does not specify a valid [`SparseTensor`](https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow: ```python import tensorflow as tf tf.raw_ops.RaggedBincount(splits=[7,8], values= [5, 16, 51, 76, 29, 27, 54, 95],\ size= 59, weights= [0, 0, 0, 0, 0, 0, 0, 0],\ binary_output=False) ``` This will cause a read from outside the bounds of the `splits` tensor buffer in the [implementation of the `RaggedBincount` op](https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L446): ```cc for (int idx = 0; idx < num_values; ++idx) { while (idx >= splits(batch_idx)) { batch_idx++; } ... if (bin < size) { if (binary_output_) { out(batch_idx - 1, bin) = T(1); } else { T value = (weights_size > 0) ? weights(idx) : T(1); out(batch_idx - 1, bin) += value; } } } ``` Before the `for` loop, `batch_idx` is set to 0. The attacker sets `splits(0)` to be 7, hence the `while` loop does not execute and `batch_idx` remains 0. This then results in writing to `out(-1, bin)`, which is before the heap allocated buffer for the output tensor. ### Patches We have patched the issue in GitHub commit [eebb96c2830d48597d055d247c0e9aebaea94cd5](https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29514'}
2021-05-21T14:20:51Z
2021-05-21T14:20:51Z
LOW
2.5
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29514', 'https://github.com/advisories/GHSA-8h46-5m9h-7553', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8h46-5m9h-7553'}
null
GHSA
GHSA-w6rp-4vj7-v2m8
Missing Authorization in DayByDay CRM
In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the attacker to gain access to the highest privileged user in the application.
{'CVE-2022-22111'}
2022-01-10T21:46:06Z
2022-01-08T00:31:49Z
HIGH
8.8
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22111', 'https://github.com/advisories/GHSA-w6rp-4vj7-v2m8', 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111'}
null
GHSA
GHSA-jc84-3g44-wf2q
Denial of Service in ecstatic
ecstatic have a denial of service vulnerability. Successful exploitation could lead to crash of an application.
{'CVE-2019-10775'}
2020-12-15T16:52:17Z
2020-12-15T16:52:17Z
MODERATE
0
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10775', 'https://github.com/advisories/GHSA-jc84-3g44-wf2q', 'https://snyk.io/vuln/SNYK-JS-ECSTATIC-540354'}
null
GHSA
GHSA-2cf2-2383-h4jv
Improperly Controlled Modification of Dynamically-Determined Object Attributes in querymen
querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks.
{'CVE-2020-7600'}
2021-07-28T18:46:08Z
2021-05-07T16:16:43Z
MODERATE
5.3
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7600', 'https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867', 'https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef', 'https://github.com/advisories/GHSA-2cf2-2383-h4jv'}
null
GHSA
GHSA-xfhp-gmh8-r8v2
Regular Expression Denial of Service (ReDoS)
The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity.
{'CVE-2021-23354'}
2021-03-25T00:18:25Z
2021-03-19T21:22:10Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-xfhp-gmh8-r8v2', 'https://github.com/adaltas/node-printf/issues/31', 'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23354', 'https://github.com/adaltas/node-printf/pull/32', 'https://snyk.io/vuln/SNYK-JS-PRINTF-1072096'}
null
GHSA
GHSA-rqxg-xvcq-3v2f
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillColorRow8 function in utils.cpp when reading an image file by using cv::imread.
{'CVE-2017-12605'}
2021-11-18T15:33:23Z
2021-10-12T22:02:04Z
HIGH
8.8
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-12605', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/advisories/GHSA-rqxg-xvcq-3v2f', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}
null
GHSA
GHSA-8j6j-4h2c-c65p
Arbitrary Code Execution in require-node
Versions of `require-node` prior to 1.3.4 for 1.x and 2.0.4 for 2.x are vulnerable to Arbitrary Code Execution. The package fails to sanitize requests to the `require-node` endpoint, allowing attackers to execute arbitrary code in the server through the injection of OS commands in the request body. ## Recommendation - If you are using 1.x, upgrade to version 1.3.4 or later. - If you are using 2.x, upgrade to version 2.0.4 or later.
null
2021-09-28T17:07:49Z
2020-09-03T17:02:52Z
CRITICAL
0
{'CWE-78'}
{'https://github.com/advisories/GHSA-8j6j-4h2c-c65p', 'https://www.npmjs.com/advisories/1015'}
null
GHSA
GHSA-w6jr-wj64-mc9x
Deserialization of Untrusted Data in Codeigniter4
### Impact Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. ### Patches Upgrade to v4.1.6 or later. ### Workarounds Do not use: - `old()` and form_helper - `RedirectResponse::withInput()` and `redirect()->withInput()` ### References - [PHP Object Injection | OWASP](https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection) ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues) * Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
{'CVE-2022-21647'}
2022-01-06T22:52:41Z
2022-01-06T22:52:41Z
HIGH
7.7
{'CWE-502'}
{'https://github.com/codeigniter4/CodeIgniter4/commit/ce95ed5765256e2f09f3513e7d42790e0d6948f5', 'https://github.com/advisories/GHSA-w6jr-wj64-mc9x', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21647', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-w6jr-wj64-mc9x'}
null
GHSA
GHSA-q4xf-3pmq-3hw8
Improper Restriction of XML External Entity Reference in Apache NiFi
In Apache NiFi 1.0.0 to 1.11.4, the notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE).
{'CVE-2020-13940'}
2022-01-06T20:41:00Z
2022-01-06T20:41:00Z
MODERATE
5.5
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13940', 'https://github.com/advisories/GHSA-q4xf-3pmq-3hw8', 'https://nifi.apache.org/security#CVE-2020-13940', 'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798'}
null
GHSA
GHSA-7vrq-vg6p-32fw
Downloads Resources over HTTP in libxl
Affected versions of `libxl` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libxl`. ## Recommendation The module author recommends installing the bindings using a pinned and verified version of SDK instead of the automated download. More information is available in the modules [README](https://www.npmjs.com/package/libxl).
{'CVE-2016-10585'}
2021-09-16T20:44:28Z
2019-02-18T23:34:48Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://www.npmjs.com/advisories/178', 'https://nodesecurity.io/advisories/178', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10585', 'https://github.com/advisories/GHSA-7vrq-vg6p-32fw'}
null
GHSA
GHSA-x9r5-jxvq-4387
Self XSS on user input in jquery.terminal
### Impact This is low impact and limited XSS, because code for XSS payload is always visible, but attacker can use other techniques to hide the code the victim sees. Also if the application use execHash option and execute code from URL the attacker can use this URL to execute his code. The scope is limited because the javascript code inside html attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible. ### Patches Fixed version 2.31.1 ### Workarounds The user can use formatting that wrap whole user input and it's no op. ```javascript $.terminal.new_formatter([/([\s\S]+)/g, '[[;;]$1]']); ``` The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way). ### References The issue was reported here [jcubic/jquery.terminal#727](https://github.com/jcubic/jquery.terminal/issues/727) ### For more information If you have any questions or comments about this advisory: * Open an issue in [jcubic/jquery.terminal](https://github.com/jcubic/jquery.terminal) * Email us at [jcubic@onet.pl](mailto:jcubic@onet.pl)
{'CVE-2021-43862'}
2022-04-19T19:03:19Z
2022-01-06T22:48:56Z
LOW
3.7
{'CWE-80'}
{'https://github.com/jcubic/jquery.terminal/security/advisories/GHSA-x9r5-jxvq-4387', 'https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a9157f0bc6648f81a84b5', 'https://github.com/jcubic/jquery.terminal/issues/727', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43862', 'https://github.com/jcubic/jquery.terminal/releases/tag/2.31.1', 'https://github.com/advisories/GHSA-x9r5-jxvq-4387'}
null
GHSA
GHSA-v2jq-9475-r5g8
Cross-Site Scripting in bootstrap-tagsinput
All versions of `bootstrap-tagsinput` are vulnerable to cross-site scripting when user input is passed into the `itemTitle` parameter unmodified, as the package fails to properly sanitize or encode user input for that parameter. ## Recommendation This package is not actively maintained, and has not seen an update since 2015. Because of this, the simplest mitigation is to avoid using the `itemTitle` parameter. With over 200 open issues and over 100 open pull requests as of 2/2018, it seems unlikely that the author has any intention of maintaining the module. If avoiding the use of `itemTitle` indefinitely is acceptable, this is a workable solution. If not, the best available mitigation is to use a fork of the module that is actively maintained and provides similar functionality. There are [many such forks to choose from available on github.](https://github.com/bootstrap-tagsinput/bootstrap-tagsinput/network/members).
{'CVE-2016-1000227'}
2021-09-23T21:31:31Z
2020-09-01T15:29:51Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-v2jq-9475-r5g8', 'https://github.com/bootstrap-tagsinput/bootstrap-tagsinput/issues/501', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000227', 'https://www.npmjs.com/advisories/124'}
null
GHSA
GHSA-rv49-54qp-fw42
Path Traversal in servey
Versions of `servey` prior to 3.x are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. ## Recommendation Upgrade to the latest version
null
2021-08-04T20:56:42Z
2019-06-06T15:30:20Z
MODERATE
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/802', 'https://github.com/advisories/GHSA-rv49-54qp-fw42', 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://hackerone.com/reports/355501'}
null
GHSA
GHSA-wf98-vxv9-jqfv
XSS Injection Vulnerability
### Impact Under some circumstances, the Feeds widget on the dashboard could have an XSS vulnerability if a malformed feed was supplied. ### Patches This has been patched in Craft 3.7.29. ### References * https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18 ### For more information If you have any questions or comments about this advisory, email us at [support@craftcms.com](mailto:support@craftcms.com) ---------- Credits: https://github.com/noobpk
null
2022-04-12T21:55:59Z
2022-04-05T18:31:51Z
LOW
0
null
{'https://github.com/advisories/GHSA-wf98-vxv9-jqfv', 'https://github.com/craftcms/cms/security/advisories/GHSA-wf98-vxv9-jqfv'}
null
GHSA
GHSA-8qxj-f9rh-9fg2
Improper Verification of Cryptographic Signature in Pure-Python ECDSA
A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.
{'CVE-2019-14859'}
2022-03-21T22:37:12Z
2020-04-01T16:35:26Z
CRITICAL
9.1
{'CWE-347'}
{'https://github.com/warner/python-ecdsa/issues/114', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14859', 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3', 'https://github.com/advisories/GHSA-8qxj-f9rh-9fg2', 'https://github.com/warner/python-ecdsa/pull/115', 'https://pypi.org/project/ecdsa/0.13.3/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859'}
null
GHSA
GHSA-6vmq-jh76-hq43
Uninitialized memory access in outer_cgi
An issue was discovered in the outer_cgi crate before 0.2.1 for Rust. A user-provided Read instance receives an uninitialized memory buffer from KeyValueReader.
{'CVE-2021-30454'}
2021-08-25T20:55:25Z
2021-08-25T20:55:25Z
CRITICAL
0
{'CWE-119'}
{'https://github.com/SolraBizna/outer_cgi/commit/dd59b3066e616a08e756f72de8dc3ab11b7036c4', 'https://github.com/advisories/GHSA-6vmq-jh76-hq43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30454', 'https://github.com/SolraBizna/outer_cgi/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2021-0051.html'}
null
GHSA
GHSA-wgx2-6432-j3fw
Unsoundness in bigint
An issue was discovered in the bigint crate through 2020-05-07 for Rust. It allows a soundness violation.
{'CVE-2020-35880'}
2021-08-25T20:48:04Z
2021-08-25T20:48:04Z
CRITICAL
9.8
{'CWE-704'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0025.html', 'https://github.com/advisories/GHSA-wgx2-6432-j3fw', 'https://github.com/paritytech/bigint/commit/7e71521a61b009afc94c91135353102658550d42', 'https://github.com/rustsec/advisory-db/pull/290', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35880'}
null
GHSA
GHSA-4627-w373-375v
Malicious Package in grunt-radical
Version 0.0.14 of `grunt-radical` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-11T21:22:24Z
2020-09-11T21:22:24Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-4627-w373-375v', 'https://www.npmjs.com/advisories/935'}
null
GHSA
GHSA-9824-rp6m-xx9w
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-0989'}
2021-03-29T20:59:04Z
2021-03-29T20:59:04Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-9824-rp6m-xx9w', 'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0989', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0989'}
null
GHSA
GHSA-h822-r4r5-v8jg
Polymorphic Typing issue in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
{'CVE-2019-14540'}
2021-08-17T22:28:26Z
2019-09-23T18:33:25Z
CRITICAL
9.8
{'CWE-502'}
{'https://security.netapp.com/advisory/ntap-20191004-0002/', 'https://github.com/advisories/GHSA-h822-r4r5-v8jg', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/a4f2c9fb36642a48912cdec6836ec00e497427717c5d377f8d7ccce6@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016@%3Cissues.hbase.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb@%3Ccommits.hbase.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0@%3Cissues.hbase.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2410', 'https://www.debian.org/security/2019/dsa-4542', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14540', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540@%3Ccommits.nifi.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2449', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/FasterXML/jackson-databind/blob/master/release-notes/VERSION-2.x', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}
null
GHSA
GHSA-xq52-rv6w-397c
Directive injection when using dynamic overrides with user input
### Impact If user-supplied input was passed into `append/override_content_security_policy_directives`, a semicolon could be injected leading to directive injection. This could be used to e.g. override a `script-src` directive. Duplicate directives are ignored and the first one wins. The directives in `secure_headers` are sorted alphabetically so they pretty much all come before `script-src`. A previously undefined directive would receive a value even if `SecureHeaders::OPT_OUT` was supplied. The fixed versions will silently convert the semicolons to spaces and emit a deprecation warning when this happens. This will result in innocuous browser console messages if being exploited/accidentally used. In future releases, we will raise application errors resulting in 500s. > Duplicate script-src directives detected. All but the first instance will be ignored. See https://www.w3.org/TR/CSP3/#parse-serialized-policy > Note: In this case, the user agent SHOULD notify developers that a duplicate directive was ignored. A console warning might be appropriate, for example. ### Patches Depending on what major version you are using, the fixed versions are 6.2.0, 5.1.0, 3.8.0. ### Workarounds If you are passing user input into the above methods, you could filter out the input: ```ruby override_content_security_policy_directives(:frame_src, [user_input.gsub(";", " ")]) ``` ### References Reported in https://github.com/twitter/secure_headers/issues/418 https://www.w3.org/TR/CSP3/#parse-serialized-policy ### For more information If you have any questions or comments about this advisory: * Open an issue in [this repo](https://github.com/twitter/secure_headers/issues/new) * DM @ndm on twitter
{'CVE-2020-5217'}
2021-01-08T21:09:32Z
2020-01-23T02:28:11Z
MODERATE
4.4
{'CWE-95'}
{'https://github.com/twitter/secure_headers/pull/421', 'https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3', 'https://github.com/twitter/secure_headers/issues/418', 'https://github.com/advisories/GHSA-xq52-rv6w-397c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5217', 'https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c'}
null
GHSA
GHSA-4g29-fccr-p59w
Reflected Cross-site Scripting in Shopware storefront
### Impact Not-stored XSS in storefront. Request parameter were directly assigned to the template, so that malicious code could be send via an URL. ### Patches We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-9 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
{'CVE-2022-24873'}
2022-04-29T20:31:19Z
2022-04-28T20:59:24Z
MODERATE
5.4
{'CWE-79'}
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-4g29-fccr-p59w', 'https://github.com/advisories/GHSA-4g29-fccr-p59w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24873', 'https://www.shopware.com/en/changelog-sw5/#5-7-9'}
null
GHSA
GHSA-24fg-p96v-hxh8
Moderate severity vulnerability that affects rails
Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.
{'CVE-2011-0447'}
2021-08-30T15:41:48Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-352'}
{'http://www.debian.org/security/2011/dsa-2247', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html', 'http://secunia.com/advisories/43666', 'http://www.vupen.com/english/advisories/2011/0877', 'http://www.securitytracker.com/id?1025060', 'http://www.vupen.com/english/advisories/2011/0587', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html', 'http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails', 'http://www.securityfocus.com/bid/46291', 'http://secunia.com/advisories/43274', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0447', 'https://github.com/advisories/GHSA-24fg-p96v-hxh8', 'http://groups.google.com/group/rubyonrails-security/msg/c22ea1668c0d181c?dmode=source&output=gplain'}
null
GHSA
GHSA-r2gr-fhmr-66c5
"Arbitrary code execution in socket.io-file"
"The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
{'CVE-2020-24807'}
2021-05-10T18:38:11Z
2021-05-10T18:38:11Z
HIGH
7.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-6495-8jvh-f28x', 'https://github.com/rico345100/socket.io-file', 'https://www.npmjs.com/advisories/1564', 'https://github.com/advisories/GHSA-r2gr-fhmr-66c5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24807', 'https://www.npmjs.com/package/socket.io-file'}
null
GHSA
GHSA-25fx-mxc2-76g7
Unauthorized access to Credit card form exposing payer name and not requiring 3DS
### Impact URL to the payment page done after checkout was created with autoincremented payment id (`/pay-with-paypal/{id}`) and therefore it was easy to access for anyone, not even the order's customer. The problem was, the Credit card form has prefilled "credit card holder" field with the Customer's first and last name. Additionally, the mentioned form did not require a 3D Secure authentication, as well as did not checked the result of the 3D Secure authentication. ### Patches The problem has been patched in Sylius/PayPalPlugin **1.2.4** and **1.3.1** ### Workarounds One can override a `sylius_paypal_plugin_pay_with_paypal_form` route and change its URL parameters to (for example) `{orderToken}/{paymentId}`, then override the `Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction` service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method. Additionally, one could override the `@SyliusPayPalPlugin/payWithPaypal.html.twig` template, to add `contingencies: ['SCA_ALWAYS']` line in `hostedFields.submit(...)` function call (line 421). It would then have to be handled in the function callback. ### For more information If you have any questions or comments about this advisory: - Open an issue in Sylius/PayPalPlugin issues - Email us at security at sylius dot com
{'CVE-2021-41120'}
2021-10-06T17:49:11Z
2021-10-06T17:49:11Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41120', 'https://github.com/Sylius/PayPalPlugin/security/advisories/GHSA-25fx-mxc2-76g7', 'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7', 'https://github.com/advisories/GHSA-25fx-mxc2-76g7'}
null
GHSA
GHSA-2vp8-jv5v-6qh6
Allocation of resources without limits or throttling in keycloak-model-infinispan
A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack.
{'CVE-2021-3637'}
2021-07-14T19:41:47Z
2021-07-13T17:43:23Z
HIGH
7.5
{'CWE-770'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1979638', 'https://github.com/advisories/GHSA-2vp8-jv5v-6qh6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3637'}
null
GHSA
GHSA-v3rr-cph9-2g2q
Moderate severity vulnerability that affects rack-ssl
Cross-site scripting (XSS) vulnerability in lib/rack/ssl.rb in the rack-ssl gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script or HTML via a URI, which might not be properly handled by third-party adapters such as JRuby-Rack.
{'CVE-2014-2538'}
2021-09-20T15:02:21Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-v3rr-cph9-2g2q', 'https://nvd.nist.gov/vuln/detail/CVE-2014-2538', 'http://secunia.com/advisories/57466', 'https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b', 'http://www.openwall.com/lists/oss-security/2014/03/19/20', 'http://www.securityfocus.com/bid/66314', 'http://lists.opensuse.org/opensuse-updates/2014-04/msg00032.html'}
null
GHSA
GHSA-m874-69ww-w7jq
Directory Traversal in whispercast
Affected versions of `whispercast` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16174'}
2021-01-08T18:29:43Z
2018-07-23T20:45:01Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/466', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16174', 'https://www.npmjs.com/advisories/466', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/whispercast', 'https://github.com/advisories/GHSA-m874-69ww-w7jq'}
null
GHSA
GHSA-2v5c-755p-p4gv
Missing TLS certificate verification in faye-websocket
The `Faye::WebSocket::Client` class uses the [`EM::Connection#start_tls`][1] method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is used for the connection. This method does not implement certificate verification by default, meaning that it does not check that the server presents a valid and trusted TLS certificate for the expected hostname. That means that any `wss:` connection made using this library is vulnerable to a man-in-the-middle attack, since it does not confirm the identity of the server it is connected to. This has been a requested feature in EventMachine for many years now; see for example [#275][3], [#378][4], and [#814][5]. In June 2020, [em-http-request][6] published an [advisory][7] related to this problem and fixed it by [implementing TLS verification][8] in their own codebase; although EventMachine does not implement certificate verification itself, it provides an extension point for the caller to implement it, called [`ssl_verify_peer`][9]. Based on this implementation, we have incorporated similar functionality into [faye-websocket for Ruby][10], such that we use the `OpenSSL` module to perform two checks: - The chain of certificates presented by the server is valid and ultimately trusted by your root certificate set -- either your system default root certificates, or a set provided at runtime - The final certificate presented by the server is valid for the hostname used in the request URI; if the connection is made via a proxy we use the hostname from the request, not the proxy's hostname After implementing verification in v1.1.6, em-http-request has elected to leave the `:verify_peer` option switched off by default. We have decided to _enable_ this option by default in faye-websocket, but are publishing a minor release with added functionality for configuring it. We are mindful of the fact that this may break existing programs, but we consider it much more important that all clients have TLS verification turned on by default. A client that is not carrying out verification is either: - talking to the expected server, and will not break under this change - being attacked, and would benefit from being alerted to this fact - deliberately talking to a server that would be rejected by verification The latter case includes situations like talking to a non-public server using a self-signed certificate. We consider this use case to be "working by accident", rather than functionality that was actively supported, and it should be properly and explicitly supported instead. To that end, we have added two new options to the `Faye::WebSocket::Client` constructor: `tls.root_cert_file`, and `tls.verify_peer`. The `:root_cert_file` option lets you provide a different set of root certificates in situations where you don't want to use your system's default root certificates to verify the remote host. It should be a path or an array of paths identifying the certificates to use instead of the defaults. ```rb client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: { root_cert_file: 'path/to/certificate.pem' }) ``` The `:verify_peer` option lets you turn verification off entirely. This should be a last resort and we recommend using the `:root_cert_file` option if possible. ```rb client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: { verify_peer: false }) ``` To get the new behaviour, please upgrade to v0.11.0 of the [Rubygems package][10]. There are, unfortunately, no workarounds for this issue, as you cannot enable `:verify_peer` in EventMachine unless the calling library contains an implementation of `ssl_verify_peer` that actually checks the server's certificates. For further background information on this issue, please see [faye#524][12] and [faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel Morsing][15] for providing invaluable assistance and feedback on this issue. [1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls [2]: https://rubygems.org/gems/eventmachine [3]: https://github.com/eventmachine/eventmachine/issues/275 [4]: https://github.com/eventmachine/eventmachine/pull/378 [5]: https://github.com/eventmachine/eventmachine/issues/814 [6]: https://rubygems.org/gems/em-http-request [7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request [8]: https://github.com/igrigorik/em-http-request/pull/340 [9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer [10]: https://rubygems.org/gems/faye-websocket [12]: https://github.com/faye/faye/issues/524 [13]: https://github.com/faye/faye-websocket-ruby/pull/129 [14]: https://github.com/SpComb [15]: https://github.com/DanielMorsing
{'CVE-2020-15133'}
2021-11-19T15:42:56Z
2020-07-31T17:40:04Z
HIGH
8
{'CWE-295'}
{'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15133', 'https://github.com/faye/faye-websocket-ruby/security/advisories/GHSA-2v5c-755p-p4gv', 'https://github.com/faye/faye/issues/524', 'https://github.com/advisories/GHSA-2v5c-755p-p4gv', 'https://github.com/eventmachine/eventmachine/pull/378', 'https://github.com/faye/faye-websocket-ruby/pull/129', 'https://github.com/igrigorik/em-http-request/pull/340', 'https://github.com/eventmachine/eventmachine/issues/814', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls', 'https://github.com/eventmachine/eventmachine/issues/275'}
null
GHSA
GHSA-qw93-45r3-p66p
Prototype Pollution in merge-options
All versions of `merge-options` are vulnerable to Prototype Pollution ## Recommendation Update to version 1.0.1 or greater.
{'CVE-2018-3752'}
2021-09-16T21:10:32Z
2018-10-09T00:19:57Z
CRITICAL
9.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-qw93-45r3-p66p', 'https://hackerone.com/reports/311336', 'https://www.npmjs.com/advisories/717', 'https://github.com/schnittstabil/merge-options/commit/d4a93bc2890455e0931ac0779667023e6cb101d4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3752'}
null
GHSA
GHSA-q58g-455p-8vw9
In RubyGem excon, interrupted Persistent Connections May Leak Response Data
### Impact There was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this. ### Patches The problem has been patched in 0.71.0, users should upgrade to this or a newer version (if one exists). ### Workarounds Users can workaround the problem by disabling persistent connections, though this may cause performance implications. ### References See the [patch](https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29) for further details. ### For more information If you have any questions or comments about this advisory: * Open an issue in [excon/issues](https://github.com/excon/excon/issues) * Email us at [geemus+github@gmail.com](mailto:geemus+github@gmail.com)
{'CVE-2019-16779'}
2021-10-29T14:10:28Z
2019-12-16T19:30:17Z
MODERATE
5.8
{'CWE-362', 'CWE-664'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16779', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00015.html', 'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html', 'https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9', 'https://github.com/advisories/GHSA-q58g-455p-8vw9'}
null
GHSA
GHSA-gxpj-cx7g-858c
Regular Expression Denial of Service in debug
Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter. As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue. ## Recommendation Version 2.x.x: Update to version 2.6.9 or later. Version 3.x.x: Update to version 3.1.0 or later.
{'CVE-2017-16137'}
2021-01-08T18:45:04Z
2018-08-09T20:18:07Z
LOW
0
{'CWE-400'}
{'https://github.com/visionmedia/debug/pull/504', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16137', 'https://www.npmjs.com/advisories/534', 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E', 'https://nodesecurity.io/advisories/534', 'https://github.com/visionmedia/debug/issues/501', 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E', 'https://github.com/advisories/GHSA-gxpj-cx7g-858c'}
null
GHSA
GHSA-fr52-4hqw-p27f
Nokogiri does not forbid namespace nodes in XPointer ranges
xpointer.c in libxml2 before 2.9.5 (as used in nokogiri before 1.7.1 amongst other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
{'CVE-2016-4658'}
2022-04-26T18:24:05Z
2018-08-21T19:03:26Z
CRITICAL
9.8
{'CWE-119'}
{'https://support.apple.com/HT207141', 'https://support.apple.com/HT207170', 'http://www.securityfocus.com/bid/93054', 'https://support.apple.com/HT207143', 'https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b', 'https://support.apple.com/HT207142', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html', 'http://www.securitytracker.com/id/1036858', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html', 'https://github.com/advisories/GHSA-fr52-4hqw-p27f', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4658', 'http://www.securitytracker.com/id/1038623', 'https://security.gentoo.org/glsa/201701-37'}
null
GHSA
GHSA-j47f-4232-hvv8
Heap out of bounds read in `RaggedCross`
### Impact An attacker can force accesses outside the bounds of heap allocated arrays by passing in invalid tensor values to `tf.raw_ops.RaggedCross`: ```python import tensorflow as tf ragged_values = [] ragged_row_splits = [] sparse_indices = [] sparse_values = [] sparse_shape = [] dense_inputs_elem = tf.constant([], shape=[92, 0], dtype=tf.int64) dense_inputs = [dense_inputs_elem] input_order = "R" hashed_output = False num_buckets = 0 hash_key = 0 tf.raw_ops.RaggedCross(ragged_values=ragged_values, ragged_row_splits=ragged_row_splits, sparse_indices=sparse_indices, sparse_values=sparse_values, sparse_shape=sparse_shape, dense_inputs=dense_inputs, input_order=input_order, hashed_output=hashed_output, num_buckets=num_buckets, hash_key=hash_key, out_values_type=tf.int64, out_row_splits_type=tf.int64) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/efea03b38fb8d3b81762237dc85e579cc5fc6e87/tensorflow/core/kernels/ragged_cross_op.cc#L456-L487) lacks validation for the user supplied arguments: ```cc int next_ragged = 0; int next_sparse = 0; int next_dense = 0; for (char c : input_order_) { if (c == 'R') { TF_RETURN_IF_ERROR(BuildRaggedFeatureReader( ragged_values_list[next_ragged], ragged_splits_list[next_ragged], features)); next_ragged++; } else if (c == 'S') { TF_RETURN_IF_ERROR(BuildSparseFeatureReader( sparse_indices_list[next_sparse], sparse_values_list[next_sparse], batch_size, features)); next_sparse++; } else if (c == 'D') { TF_RETURN_IF_ERROR( BuildDenseFeatureReader(dense_list[next_dense++], features)); } ... } ``` Each of the above branches call a helper function after accessing array elements via a `*_list[next_*]` pattern, followed by incrementing the `next_*` index. However, as there is no validation that the `next_*` values are in the valid range for the corresponding `*_list` arrays, this results in heap OOB reads. ### Patches We have patched the issue in GitHub commit [44b7f486c0143f68b56c34e2d01e146ee445134a](https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29532'}
2021-05-21T14:22:17Z
2021-05-21T14:22:17Z
LOW
2.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-j47f-4232-hvv8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j47f-4232-hvv8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29532', 'https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a'}
null
GHSA
GHSA-5v44-7647-xfw9
Blind SQL injection in PrestaShop productcomments module
### Impact An attacker can use a Blind SQL injection to retrieve data or stop the MySQL service. ### Patches The problem is fixed in 4.2.1
{'CVE-2020-26248'}
2022-04-19T19:02:41Z
2021-01-20T21:33:53Z
LOW
8.2
{'CWE-89'}
{'https://packagist.org/packages/prestashop/productcomments', 'https://github.com/PrestaShop/productcomments/commit/7c2033dd811744e021da8897c80d6c301cd45ffa', 'https://github.com/PrestaShop/productcomments/releases/tag/v4.2.1', 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-5v44-7647-xfw9', 'https://github.com/advisories/GHSA-5v44-7647-xfw9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26248', 'http://packetstormsecurity.com/files/160539/PrestaShop-ProductComments-4.2.0-SQL-Injection.html'}
null
GHSA
GHSA-x7fx-mcc9-27j7
Inappropriate implementation in V8 in CefSharp
High CVE-2020-16013: Inappropriate implementation in V8. - https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013 Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild. There is currently little to no public information on the issue other than it has been flagged as `High` severity.
{'CVE-2020-16013'}
2021-01-14T17:39:17Z
2020-11-27T20:12:55Z
HIGH
0
{'CWE-119', 'CWE-787'}
{'https://github.com/advisories/GHSA-x7fx-mcc9-27j7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16013', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-x7fx-mcc9-27j7', 'https://crbug.com/1147206', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'}
null
GHSA
GHSA-pvh2-pj76-4m96
Specification non-compliance in JUMPI
### Impact In `evm` crate `< 0.31.0`, `JUMPI` opcode's condition is checked after the destination validity check. However, according to Geth and OpenEthereum, the condition check should happen before the destination validity check. ### Patches This is a **high** severity security advisory if you use `evm` crate for Ethereum mainnet. In this case, you should update your library dependency immediately to on or after `0.31.0`. This is a **low** severity security advisory if you use `evm` crate in Frontier or in a standalone blockchain, because there's no security exploit possible with this advisory. It is **not** recommended to update to on or after `0.31.0` until all the normal chain upgrade preparations have been done. If you use Frontier or other `pallet-evm` based Substrate blockchain, please ensure to update your `spec_version` before updating this. For other blockchains, please make sure to follow a hard-fork process before you update this. ### Workarounds If you are dependent on an older version of `evm` and cannot update due to API interface changes, please contact Wei by email (wei@that.world), who will be happy to help you to publish patch releases for older `evm` versions. ### References Fix PR: https://github.com/rust-blockchain/evm/pull/67 ### For more information If you have any questions or comments about this advisory: * Open an issue in the `evm` repo. ### Special thanks Special thanks to @rakita for reporting this issue.
{'CVE-2021-41153'}
2021-10-25T20:07:58Z
2021-10-19T15:28:35Z
HIGH
8.7
{'CWE-670'}
{'https://github.com/rust-blockchain/evm/pull/67', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41153', 'https://github.com/rust-blockchain/evm/security/advisories/GHSA-pvh2-pj76-4m96', 'https://github.com/advisories/GHSA-pvh2-pj76-4m96'}
null
GHSA
GHSA-73q9-7pwj-gm46
icecoder is vulnerable to Cross-site Scripting
icecoder is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3862'}
2022-01-21T23:46:12Z
2022-01-21T23:46:12Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3862', 'https://github.com/advisories/GHSA-73q9-7pwj-gm46', 'https://huntr.dev/bounties/5c9c228e-2a39-4643-bb82-2b02a2b0a601'}
null
GHSA
GHSA-vrxj-4qhw-5vwq
Malicious Package in scryptys
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T14:29:03Z
2020-09-03T17:03:41Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-vrxj-4qhw-5vwq', 'https://www.npmjs.com/advisories/1407'}
null
GHSA
GHSA-mm9x-g8pc-w292
Denial of Service in Netty
The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder.
{'CVE-2020-11612'}
2022-04-25T23:06:20Z
2020-06-15T19:36:16Z
HIGH
7.5
{'CWE-119', 'CWE-400', 'CWE-770'}
{'https://lists.apache.org/thread.html/r88e2b91560c065ed67e62adf8f401c417e4d70256d11ea447215a70c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9addb580456807cd11d6f0c6b6373b7d7161d06d2278866c30c7febb@%3Ccommits.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf803b65b4a57589d79cf2e83d8ece0539018d32864f932f63c972844@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11612', 'https://lists.apache.org/thread.html/r14446ed58208cb6d97b6faa6ebf145f1cf2c70c0886c0c133f4d3b6f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://github.com/netty/netty/pull/9924', 'https://github.com/netty/netty/issues/6168', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r31424427cc6d7db46beac481bdeed9a823fc20bb1b9deede38557f71@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r69b23a94d4ae45394cabae012dd1f4a963996869c44c478eb1c61082@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7836bbdbe95c99d4d725199f0c169927d4e87ba57e4beeeb699c097a@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rd302ddb501fa02c5119120e5fc21df9a1c00e221c490edbe2d7ad365@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfd173eac20d5e5f581c8984b685c836dafea8eb2f7ff85f617704cf1@%3Cdev.zookeeper.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/', 'https://github.com/advisories/GHSA-mm9x-g8pc-w292', 'https://lists.apache.org/thread.html/r2958e4d49ee046e1e561e44fdc114a0d2285927501880f15852a9b53@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5b1ad61552591b747cd31b3a908d5ff2e8f2a8a6847583dd6b7b1ee7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r3195127e46c87a680b5d1d3733470f83b886bfd3b890c50df718bed1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r255ed239e65d0596812362adc474bee96caf7ba042c7ad2f3c62cec7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5a0b1f0b1c3bcd66f5177fbd6f6de2d0f8cae24a13ab2669f274251a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rff8859c0d06b1688344b39097f9685c43b461cf2bc41f60f001704e9@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ref3943adbc3a8813aee0e3a9dd919bacbb27f626be030a3c6d6c7f83@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8a654f11e1172b0effbfd6f8d5b6ca651ae4ac724a976923c268a42f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/re1ea144e91f03175d661b2d3e97c7d74b912e019613fa90419cf63f4@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9c30b7fca4baedebcb46d6e0f90071b30cc4a0e074164d50122ec5ec@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ref2c8a0cbb3b8271e5b9a06457ba78ad2028128627186531730f50ef@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r866288c2ada00ce148b7307cdf869f15f24302b3eb2128af33830997@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4a7e4e23bd84ac24abf30ab5d5edf989c02b555e1eca6a2f28636692@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5030cd8ea5df1e64cf6a7b633eff145992fbca03e8bfc687cd2427ab@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra98e3a8541a09271f96478d5e22c7e3bd1afdf48641c8be25d62d9f9@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/compare/netty-4.1.45.Final...netty-4.1.46.Final', 'https://lists.apache.org/thread.html/r4f4a14d6a608db447b725ec2e96c26ac9664d83cd879aa21e2cfeb24@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://security.netapp.com/advisory/ntap-20201223-0001/', 'https://lists.apache.org/thread.html/rf9f8bcc4ca8d2788f77455ff594468404732a4497baebe319043f4d5@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r281882fdf9ea89aac02fd2f92786693a956aac2ce9840cce87c7df6b@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3ea4918d20d0c1fa26cac74cc7cda001d8990bc43473d062867ef70d@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-3v43-877x-qgmq
Moderate severity vulnerability that affects league/commonmark
## CVE-2019-10010 ### Impact In `league/commonmark` 0.18.2 and below, malicious users can insert double-encoded HTML entities into their Markdown like this: ```md [XSS](javascript&amp;colon;alert%28&#039;XSS&#039;%29) ``` This library would (correctly) unescape the `&amp;` entity to `&` during the parsing step. However, **the renderer step would fail to properly re-escape the resulting `&colon;` string**, thus producing the following malicious HTML output: ```html <p><a href="javascript&colon;alert('XSS')">XSS</a></p> ``` Browsers would interpret `&colon;` as a `:` character and allow the JS to be executed when the link is clicked. This vulnerability was present in the upstream library this project was forked from and therefore exists in all prior versions of `league/commonmark`. ### Solution The new [0.18.3](https://github.com/thephpleague/commonmark/releases/tag/0.18.3) release mirrors [the fix made upstream](https://github.com/commonmark/commonmark.js/commit/c89b35c5fc99bdf1d2181f7f0c9fcb8a1abc27c8) - we no longer attempt to preserve entities when rendering HTML attributes like `href`, `src`, `title`, etc. The `$preserveEntities` parameter of `Xml::escape()` is therefore no longer used internally, so it has been deprecated and marked for removal in the next major release (0.19.0). ### Credits - Mohit Fawaz for identifying the issue - Sebastiaan Knijnenburg and Ross Tuck for responsibly disclosing/relaying the issue - John MacFarlane for investigating it and implementing the upstream fix we mirrored here ### References - https://nvd.nist.gov/vuln/detail/CVE-2019-10010 - https://github.com/thephpleague/commonmark/releases/tag/0.18.3 - https://github.com/thephpleague/commonmark/issues/353 - https://github.com/FriendsOfPHP/security-advisories/blob/master/league/commonmark/CVE-2019-10010.yaml
{'CVE-2019-10010'}
2021-08-31T21:29:59Z
2019-09-17T22:47:47Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/thephpleague/commonmark/releases/tag/0.18.3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10010', 'https://github.com/thephpleague/commonmark/issues/353', 'https://github.com/advisories/GHSA-3v43-877x-qgmq', 'https://github.com/thephpleague/commonmark/security/advisories/GHSA-3v43-877x-qgmq'}
null
GHSA
GHSA-77vh-xpmg-72qh
Clarify `mediaType` handling
### Impact In the OCI Image Specification version 1.0.1 and prior, manifest and index documents are not self-describing and documents with a single digest could be interpreted as either a manifest or an index. ### Patches The Image Specification will be updated to recommend that both manifest and index documents contain a `mediaType` field to identify the type of document. Release [v1.0.2](https://github.com/opencontainers/image-spec/releases/tag/v1.0.2) includes these updates. ### Workarounds Software attempting to deserialize an ambiguous document may reject the document if it contains both “manifests” and “layers” fields or “manifests” and “config” fields. ### References https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/opencontainers/image-spec * Email us at [security@opencontainers.org](mailto:security@opencontainers.org) * https://github.com/opencontainers/image-spec/commits/v1.0.2
null
2021-11-24T19:43:36Z
2021-11-18T16:02:41Z
LOW
3
{'CWE-843'}
{'https://github.com/opencontainers/image-spec/releases/tag/v1.0.2', 'https://github.com/advisories/GHSA-77vh-xpmg-72qh', 'https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c', 'https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh', 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m'}
null
GHSA
GHSA-4wp3-8q92-mh8w
Cross Site Request Forgery in Gitea
Cross Site Request Forgery (CSRF) vulnerability exists in Gitea before 1.5.2 via API routes.This can be dangerous especially with state altering POST requests.
{'CVE-2021-45326'}
2022-02-15T00:18:10Z
2022-02-09T00:00:29Z
HIGH
0
{'CWE-352'}
{'https://github.com/advisories/GHSA-4wp3-8q92-mh8w', 'https://github.com/go-gitea/gitea/pull/4840', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45326', 'https://github.com/go-gitea/gitea/issues/4838', 'https://blog.gitea.io/2018/10/gitea-1.5.2-is-released/'}
null
GHSA
GHSA-84cm-x2q5-8225
Critical severity vulnerability that affects dojox
In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.
{'CVE-2018-15494'}
2021-09-03T22:57:53Z
2018-10-15T22:03:48Z
CRITICAL
9.8
{'CWE-116'}
{'https://github.com/advisories/GHSA-84cm-x2q5-8225', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15494', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00002.html', 'https://dojotoolkit.org/blog/dojo-1-14-released', 'https://github.com/dojo/dojox/pull/283'}
null
GHSA
GHSA-qxx8-292g-2w66
Improper Authentication
### Impact A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an an attacker to have internal knowledge of the bot. ### Patches The problem has been patched in all affected versions. Please see the list of patched versions for the most appropriate one for your individual case. ### Workarounds Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator which throws an exception if the Claims are Skill Claims. For detailed instructions, see the link in the References section. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botbuilder-dotnet) * Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com)
null
2021-03-08T15:50:01Z
2021-03-08T15:50:01Z
HIGH
0
{'CWE-287'}
{'https://github.com/advisories/GHSA-qxx8-292g-2w66', 'https://aka.ms/SkillClaimsValidationDotnet', 'https://www.nuget.org/packages/Microsoft.Bot.Connector/', 'https://github.com/microsoft/botbuilder-dotnet/security/advisories/GHSA-qxx8-292g-2w66'}
null
GHSA
GHSA-2r9c-46v3-43fc
Downloads Resources over HTTP in haxe3
Affected versions of `haxe3` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe3`. ## Recommendation No patch is currently available for this vulnerability. This vulnerability has been left unpatched for several years, despite active maintenance on the package. Because of this, it appears that the package author has accepted the risk, and is unlikely to patch this package in the future. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10688'}
2021-01-08T20:59:02Z
2018-08-17T20:28:13Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/294', 'https://nodesecurity.io/advisories/294', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10688', 'https://github.com/advisories/GHSA-2r9c-46v3-43fc'}
null
GHSA
GHSA-vf26-7gjf-f92r
OS Command Injection in rpi
rpi through 0.0.3 allows execution of arbritary commands. The variable pinNumbver in function GPIO within src/lib/gpio.js is used as part of the arguement of exec function without any sanitization.
{'CVE-2019-10796'}
2021-04-13T15:23:29Z
2021-04-13T15:23:29Z
MODERATE
9.8
{'CWE-78'}
{'https://github.com/xseignard/rpi/blob/master/src/lib/gpio.js#L47', 'https://snyk.io/vuln/SNYK-JS-RPI-548942', 'https://github.com/advisories/GHSA-vf26-7gjf-f92r', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10796'}
null
GHSA
GHSA-9q5w-79cv-947m
Unsafe defaults in `remark-html`
### Impact The documentation of `remark-html` has mentioned that it was safe by default. In practise the default was never safe and had to be opted into. This means arbitrary HTML can be passed through leading to potential XSS attacks. ### Patches The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation. ### Workarounds On older affected versions, pass `sanitize: true`, like so: ```diff - .use(remarkHtml) + .use(remarkHtml, {sanitize: true}) ``` ### References n/a ### For more information If you have any questions or comments about this advisory: * Open an issue in [`remark-html`](https://github.com/remarkjs/remark-html) * Email us at [security@unifiedjs.com](mailto:security@unifiedjs.com)
{'CVE-2021-39199'}
2022-04-19T19:03:07Z
2021-09-07T23:10:56Z
CRITICAL
10
{'CWE-79'}
{'https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m', 'https://github.com/remarkjs/remark-html/releases/tag/14.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39199', 'https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1', 'https://www.npmjs.com/package/remark-html', 'https://github.com/advisories/GHSA-9q5w-79cv-947m'}
null
GHSA
GHSA-wjw6-2cqr-j4qr
Client metadata path-traversal
### Impact In both clients (`tuf/client` and `tuf/ngclient`), there is a path traversal vulnerability that in the worst case can overwrite files ending in `.json` anywhere on the client system on a call to `get_one_valid_targetinfo()`. It occurs because the rolename is used to form the filename, and may contain path traversal characters (ie `../../name.json`). The impact is mitigated by a few facts: * It only affects implementations that allow arbitrary rolename selection for delegated targets metadata * The attack requires the ability to A) insert new metadata for the path-traversing role and B) get the role delegated by an existing targets metadata * The written file content is heavily restricted since it needs to be a valid, signed targets file. The file extension is always .json. ### Patches A fix is available in version 0.19 or newer. ### Workarounds None that do not require code changes. Clients can restrict the allowed character set for rolenames, or they can store metadata in files named in a way that is not vulnerable: neither of these approaches is possible without modifying python-tuf. ### References - [The issue where this was discovered](https://github.com/theupdateframework/python-tuf/issues/1527) - [Proof of Concept demonstrating the flaw](https://github.com/jku/path-traversal-poc) ### For more information If you have any questions or comments about this advisory: * Open an issue in [python-tuf](https://github.com/theupdateframework/python-tuf/issues) * Contact the maintainers by email or Slack
{'CVE-2021-41131'}
2022-04-19T19:03:09Z
2021-10-19T20:14:36Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102', 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr', 'https://github.com/theupdateframework/python-tuf/issues/1527', 'https://github.com/advisories/GHSA-wjw6-2cqr-j4qr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41131'}
null
GHSA
GHSA-8p5p-ff7x-hw7q
Cross-Site Scripting in public
Versions of `public` prior to 0.1.4 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation Upgrade to version 0.1.4 or later.
{'CVE-2018-3747'}
2021-09-07T20:23:17Z
2018-10-10T17:27:58Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-8p5p-ff7x-hw7q', 'https://hackerone.com/reports/329950', 'https://hackerone.com/reports/316346', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3747', 'https://www.npmjs.com/advisories/1000'}
null
GHSA
GHSA-8j34-9876-pvfq
Hugo can execute a binary from the current directory on Windows
## Impact Hugo depends on Go's `os/exec` for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system `%PATH%` on Windows. However, if a malicious file with the same name (`exe` or `bat`) is found in the current working directory at the time of running `hugo`, the malicious command will be invoked instead of the system one. Windows users who run `hugo` inside untrusted Hugo sites are affected. ## Patches Users should upgrade to Hugo v0.79.1.
{'CVE-2020-26284'}
2022-04-19T19:02:43Z
2021-06-23T17:28:26Z
HIGH
7.7
{'CWE-78'}
{'https://github.com/gohugoio/hugo/security/advisories/GHSA-8j34-9876-pvfq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26284', 'https://github.com/advisories/GHSA-8j34-9876-pvfq', 'https://github.com/golang/go/issues/38736'}
null
GHSA
GHSA-ffw3-6mp6-jmvj
Improper Access Control in Airflow
Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue affects Apache Airflow 2.0.0.
{'CVE-2021-26559'}
2021-04-07T21:05:57Z
2021-04-07T21:05:57Z
MODERATE
6.5
{'CWE-284', 'CWE-269'}
{'https://github.com/apache/airflow/blob/486b76438c0679682cf98cb88ed39c4b161cbcc8/CHANGELOG.txt', 'http://www.openwall.com/lists/oss-security/2021/02/17/1', 'https://lists.apache.org/thread.html/r3b3787700279ec361308cbefb7c2cce2acb26891a12ce864e4a13c8d%40%3Cusers.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-ffw3-6mp6-jmvj', 'https://lists.apache.org/thread.html/rd142565996d7ee847b9c14b8a9921dcf80bc6bc160e3d9dca6dfc2f8@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26559'}
null
GHSA
GHSA-vhxc-fhm5-qcp9
Prototype Pollution in bodymen
The package bodymen from 0.0.0 are vulnerable to Prototype Pollution via the handler function which could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. **Note:** This vulnerability derives from an incomplete fix to [CVE-2019-10792](https://security.snyk.io/vuln/SNYK-JS-BODYMEN-548897)
{'CVE-2022-25296'}
2022-03-21T19:38:25Z
2022-03-18T00:01:11Z
MODERATE
6.3
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25296', 'https://github.com/advisories/GHSA-vhxc-fhm5-qcp9'}
null
GHSA
GHSA-jm56-5h66-w453
Repository index file allows for duplicates of the same chart entry in helm
### Impact During a security audit of Helm's code base, security researchers at Trail of Bits identified a bug in which the a Helm repository can contain duplicates of the same chart, with the last one always used. If a repository is compromised, this lowers the level of access that an attacker needs to inject a bad chart into a repository. To perform this attack, an attacker must have write access to the index file (which can occur during a MITM attack on a non-SSL connection). ### Patches This issue has been patched in Helm 3.3.2 and 2.16.11 ### Workarounds - do not install charts from repositories you do not trust - fetch charts using a secure channel of communication (such as TLS) - use `helm pull` to fetch the chart, then review the chart’s content (either manually, or with `helm verify` if it has been signed) to ensure it has not been tampered with - manually review the index file in the Helm repository cache before installing software.
{'CVE-2020-15185'}
2021-05-24T16:57:06Z
2021-05-24T16:57:06Z
LOW
2.2
{'CWE-74', 'CWE-20', 'CWE-694'}
{'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15185', 'https://github.com/helm/helm/commit/055dd41cbe53ce131ab0357524a7f6729e6e40dc', 'https://github.com/advisories/GHSA-jm56-5h66-w453', 'https://github.com/helm/helm/security/advisories/GHSA-jm56-5h66-w453'}
null
GHSA
GHSA-r6j9-8759-g62w
Improper Restriction of XML External Entity Reference in jackson-mapper-asl
A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar to CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.
{'CVE-2019-10172'}
2021-09-28T17:06:06Z
2020-02-04T22:39:19Z
HIGH
7.5
{'CWE-611'}
{'https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html', 'https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d@%3Cissues.hive.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html', 'https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac@%3Ccommon-issues.hadoop.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10172', 'https://github.com/advisories/GHSA-r6j9-8759-g62w', 'https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb@%3Cissues.hive.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10172', 'https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe@%3Cuser.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1@%3Ccommits.cassandra.apache.org%3E'}
null
GHSA
GHSA-mvch-rh6h-2m47
Malicious Package in equest
All versions of `equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:09:55Z
2020-09-11T21:10:29Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-mvch-rh6h-2m47', 'https://www.npmjs.com/advisories/867'}
null
GHSA
GHSA-gc79-gh4f-9g6w
Server Side Template Injection in MCMS
MCMS v5.2.5 was discovered to contain a Server Side Template Injection (SSTI) vulnerability via the Template Management module.
{'CVE-2021-46063'}
2022-03-01T21:32:00Z
2022-02-19T00:01:24Z
CRITICAL
9.1
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-46063', 'https://github.com/advisories/GHSA-gc79-gh4f-9g6w', 'https://github.com/ming-soft/MCMS/issues/59'}
null