ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-3f5c-4qxj-vmpf | High severity vulnerability that affects next | ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information. | {'CVE-2017-16877'} | 2021-08-31T20:57:52Z | 2017-12-05T02:04:14Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16877', 'https://github.com/advisories/GHSA-3f5c-4qxj-vmpf', 'https://github.com/zeit/next.js/releases/tag/2.4.1'} | null |
GHSA | GHSA-29mw-wpgm-hmr9 | Regular Expression Denial of Service (ReDoS) in lodash | All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) { var ret = "1" for (var i = 0; i < n; i++) { ret += " " } return ret + "1"; } var s = build_blank(50000) var time0 = Date.now(); lo.trim(s) var time_cost0 = Date.now() - time0; console.log("time_cost0: " + time_cost0) var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log("time_cost1: " + time_cost1) var time2 = Date.now(); lo.trimEnd(s) var time_cost2 = Date.now() - time2; console.log("time_cost2: " + time_cost2) | {'CVE-2020-28500'} | 2022-04-19T19:03:27Z | 2022-01-06T20:30:46Z | MODERATE | 5.3 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28500', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/lodash/lodash/pull/5065', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893', 'https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7', 'https://github.com/advisories/GHSA-29mw-wpgm-hmr9', 'https://snyk.io/vuln/SNYK-JS-LODASH-1018905'} | null |
GHSA | GHSA-vvjc-q5vr-52q6 | Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks | Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks. | {'CVE-2016-8749'} | 2022-04-26T19:23:58Z | 2018-10-16T23:13:00Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2017:1832', 'http://www.openwall.com/lists/oss-security/2017/05/22/2', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8749', 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true', 'http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2', 'https://github.com/advisories/GHSA-vvjc-q5vr-52q6', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'http://www.securityfocus.com/bid/97179', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'} | null |
GHSA | GHSA-25mp-g6fv-mqxx | Unexpected server crash in Next.js. | Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue. Note that prior version 0.9.9 package `next` hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions. | {'CVE-2021-43803'} | 2022-04-07T16:06:55Z | 2021-12-07T21:12:09Z | HIGH | 7.5 | {'CWE-20'} | {'https://github.com/advisories/GHSA-25mp-g6fv-mqxx', 'https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264', 'https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx', 'https://github.com/vercel/next.js/releases/tag/v11.1.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43803', 'https://github.com/vercel/next.js/releases/v12.0.5', 'https://github.com/vercel/next.js/pull/32080'} | null |
GHSA | GHSA-jvfv-hrrc-6q72 | Improper Restriction of XML External Entity Reference in Liquibase | The XMLChangeLogSAXParser() function in Liquibase prior to version 4.8.0 contains an issue that may lead to to Improper Restriction of XML External Entity Reference. | {'CVE-2022-0839'} | 2022-03-18T21:12:36Z | 2022-03-05T00:00:45Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://github.com/advisories/GHSA-jvfv-hrrc-6q72', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0839', 'https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70', 'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381'} | null |
GHSA | GHSA-fp5r-v3w9-4333 | JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data | JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. | {'CVE-2021-4104'} | 2022-04-22T15:36:07Z | 2021-12-14T19:49:31Z | HIGH | 8.1 | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033', 'https://github.com/advisories/GHSA-fp5r-v3w9-4333', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4104', 'https://security.netapp.com/advisory/ntap-20211223-0007/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126', 'https://www.cve.org/CVERecord?id=CVE-2021-44228', 'https://www.kb.cert.org/vuls/id/930724', 'https://access.redhat.com/security/cve/CVE-2021-4104', 'http://www.openwall.com/lists/oss-security/2022/01/18/3'} | null |
GHSA | GHSA-q3w9-g74q-vp5f | Denial of Service in express-fileupload | Versions of `express-fileupload` prior to 1.1.6-alpha.6 are vulnerable to Denial of Service. The package causes server responses to be delayed (up to 30s in internal testing) if the request contains a large `filename` of `.` characters.
## Recommendation
Upgrade to version 1.1.6-alpha.6 or later. | null | 2020-09-03T21:14:12Z | 2020-09-03T21:14:12Z | LOW | 0 | null | {'https://www.npmjs.com/advisories/1216', 'https://github.com/advisories/GHSA-q3w9-g74q-vp5f'} | null |
GHSA | GHSA-w2j5-3rcx-vx7x | Sysctls applied to containers with host IPC or host network namespaces can affect the host | ### Impact
Before setting the sysctls for a pod, the pods namespaces must be unshared (created). However, in cases where the pod is using a host network or IPC namespace, a bug in CRI-O caused the namespace creating tool [pinns](https://github.com/cri-o/cri-o/tree/main/pinns/) to configure the sysctls of the host. This allows a malicious user to set sysctls on the host, assuming they have access to hostNetwork and hostIPC.
Any CRI-O cluster after CRI-O 1.18 that drops the infra container
1.22 and 1.23 clusters drop infra container by default, and are thus vulnerable by default.
### Patches
CRI-O versions 1.24.0, 1.23.1, 1.22.2, 1.21.5, 1.20.6, 1.19.5 all have the patches.
### Workarounds
Users can set `manage_ns_lifecycle` to false, which causes the sysctls to be configured by the OCI runtime, which typically filter these cases. This option is available in 1.20 and 1.19. Newer versions don't have this option.
An admission webhook could also be created to deny pods that use host IPC or network namespaces and also attempt to configure sysctls related to that namespace.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CRI-O repo](http://github.com/cri-o/cri-o/issues)
* To make a report, email your vulnerability to the private
[cncf-crio-security@lists.cncf.io](mailto:cncf-crio-security@lists.cncf.io) list
with the security details and the details expected for [all CRI-O bug
reports](https://github.com/cri-o/cri-o/blob/main/.github/ISSUE_TEMPLATE/bug-report.yml). | null | 2022-04-19T19:03:27Z | 2022-03-15T20:02:54Z | MODERATE | 0 | null | {'https://github.com/cri-o/cri-o/security/advisories/GHSA-w2j5-3rcx-vx7x', 'https://github.com/advisories/GHSA-w2j5-3rcx-vx7x'} | null |
GHSA | GHSA-hjm9-576q-399p | Moderate severity vulnerability that affects org.esigate:esigate-core | esigate.org esigate version 5.2 and earlier contains a CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in ESI directive with user specified XSLT that can result in Remote Code Execution. This attack appear to be exploitable via Use of another weakness in backend application to reflect ESI directives. This vulnerability appears to have been fixed in 5.3. | {'CVE-2018-1000854'} | 2021-09-14T17:25:09Z | 2018-12-21T17:46:23Z | CRITICAL | 9.8 | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1000854', 'https://github.com/esigate/esigate/issues/209', 'https://github.com/advisories/GHSA-hjm9-576q-399p'} | null |
GHSA | GHSA-w6j4-3gh2-9f5j | High severity vulnerability that affects apache-airflow | A number of HTTP endpoints in the Airflow webserver (both RBAC and classic) did not have adequate protection and were vulnerable to cross-site request forgery attacks. | {'CVE-2019-0229'} | 2021-09-21T18:00:40Z | 2019-04-18T14:27:40Z | HIGH | 8.8 | {'CWE-352'} | {'http://www.openwall.com/lists/oss-security/2019/04/10/6', 'http://www.securityfocus.com/bid/107869', 'https://github.com/advisories/GHSA-w6j4-3gh2-9f5j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0229', 'https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231@%3Cdev.airflow.apache.org%3E'} | null |
GHSA | GHSA-h39g-q63v-4h9p | Exposure of sensitive information to an unauthorized actor | An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3. | {'CVE-2021-33038'} | 2021-06-21T17:43:02Z | 2021-06-01T21:56:23Z | HIGH | 7.5 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-33038', 'https://gitlab.com/mailman/hyperkitty/-/commit/9025324597d60b2dff740e49b70b15589d6804fa', 'https://github.com/advisories/GHSA-h39g-q63v-4h9p', 'https://gitlab.com/mailman/hyperkitty/-/issues/380', 'https://www.debian.org/security/2021/dsa-4922', 'https://techblog.wikimedia.org/2021/06/11/discovering-and-fixing-cve-2021-33038-in-mailman3/'} | null |
GHSA | GHSA-cwcp-6c48-fm7m | Unsafe eval() in summit | Affected versions of `summit` allow attackers to execute arbitrary commands via collection names when using the `PouchDB` driver.
## Recommendation
No direct patch is available at this time.
Currently, the best option to mitigate the issue is to avoid using the `PouchDB` driver, as the package author has abandoned this feature entirely. | {'CVE-2017-16020'} | 2021-01-07T23:32:28Z | 2020-09-01T16:39:38Z | MODERATE | 0 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16020', 'https://nodesecurity.io/advisories/315', 'https://www.npmjs.com/advisories/315', 'https://github.com/advisories/GHSA-cwcp-6c48-fm7m', 'https://github.com/notduncansmith/summit/issues/23'} | null |
GHSA | GHSA-6mv9-qcx2-3hh3 | Memory exhaustion in routinator | NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, support the gzip transfer encoding when querying RRDP repositories. This encoding can be used by an RRDP repository to cause an out-of-memory crash in these versions of Routinator. RRDP uses XML which allows arbitrary amounts of white space in the encoded data. The gzip scheme compresses such white space extremely well, leading to very small compressed files that become huge when being decompressed for further processing, big enough that Routinator runs out of memory when parsing input data waiting for the next XML element. | {'CVE-2021-43174'} | 2022-01-13T18:24:51Z | 2021-11-11T00:55:08Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-6mv9-qcx2-3hh3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43174', 'https://www.nlnetlabs.nl/downloads/routinator/CVE-2021-43172_CVE-2021-43173_CVE-2021-43174.txt', 'https://www.debian.org/security/2022/dsa-5041'} | null |
GHSA | GHSA-r7rv-2rph-hvhj | Improper synchronization in buttplug | An issue was discovered in the buttplug crate before 1.0.4 for Rust. ButtplugFutureStateShared does not properly consider (!Send|!Sync) objects, leading to a data race. | {'CVE-2020-36218'} | 2021-08-25T20:51:45Z | 2021-08-25T20:51:45Z | MODERATE | 5.9 | {'CWE-662'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0112.html', 'https://github.com/advisories/GHSA-r7rv-2rph-hvhj', 'https://github.com/buttplugio/buttplug-rs/issues/225', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36218'} | null |
GHSA | GHSA-544x-2jx9-4pfg | Path traversal in Apache Karaf | Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf Mitigation: Apache Karaf users should upgrade to 4.2.15 or 4.3.6 or later as soon as possible, or use correct path. JIRA Tickets: https://issues.apache.org/jira/browse/KARAF-7326 | {'CVE-2022-22932'} | 2022-02-04T13:51:19Z | 2022-01-28T22:25:03Z | MODERATE | 5.3 | {'CWE-22'} | {'https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4', 'https://github.com/apache/karaf/pull/1485', 'https://github.com/advisories/GHSA-544x-2jx9-4pfg', 'https://issues.apache.org/jira/browse/KARAF-7326', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22932', 'https://karaf.apache.org/security/cve-2022-22932.txt'} | null |
GHSA | GHSA-q47x-6mqq-4w92 | Improper Input Validation | repo/setting.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 does not validate the form.MirrorAddress before calling SaveAddress. | {'CVE-2019-11228'} | 2022-04-12T22:02:33Z | 2022-02-15T01:57:18Z | HIGH | 5.3 | {'CWE-20'} | {'https://github.com/go-gitea/gitea/pull/6593', 'https://github.com/advisories/GHSA-q47x-6mqq-4w92', 'https://github.com/go-gitea/gitea/pull/6595', 'https://github.com/go-gitea/gitea/releases/tag/v1.8.0-rc3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11228', 'https://github.com/go-gitea/gitea/releases/tag/v1.7.6'} | null |
GHSA | GHSA-m54r-vrmv-hw33 | Improper Sanitizing of plugin names in helm | ### Impact
Security researchers at Trail of Bits discovered that plugin names are not sanitized properly. As a result, a malicious plugin author could use characters in a plugin name that would result in unexpected behavior, such as duplicating the name of another plugin or spoofing the output to `helm --help`.
### Patches
This issue has been patched in Helm 3.3.2.
### Workarounds
Do not install untrusted Helm plugins. Examine the `name` field in the `plugin.yaml` file for a plugin, looking for characters outside of the [a-zA-Z0-9._-] range. | {'CVE-2020-15186'} | 2021-11-19T15:28:38Z | 2021-05-24T16:57:12Z | LOW | 3.4 | {'CWE-74', 'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15186', 'https://github.com/helm/helm/commit/c8d6b01d72c9604e43ee70d0d78fadd54c2d8499', 'https://github.com/advisories/GHSA-m54r-vrmv-hw33', 'https://github.com/helm/helm/security/advisories/GHSA-m54r-vrmv-hw33', 'https://github.com/helm/helm/commit/809e2d999e2c33e20e77f6bff30652d79c287542'} | null |
GHSA | GHSA-g585-j55v-38h7 | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload. | {'CVE-2022-0966'} | 2022-03-29T21:27:49Z | 2022-03-16T00:00:45Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8', 'https://github.com/advisories/GHSA-g585-j55v-38h7', 'https://huntr.dev/bounties/e06c0d55-00a3-4f82-a009-0310b2e402fe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0966'} | null |
GHSA | GHSA-4ww3-3rxj-8v6q | High severity vulnerability that affects actionpack | actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters. | {'CVE-2011-0449'} | 2021-09-01T18:39:13Z | 2017-10-24T18:33:38Z | HIGH | 0 | null | {'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4', 'http://www.vupen.com/english/advisories/2011/0877', 'https://github.com/advisories/GHSA-4ww3-3rxj-8v6q', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'http://securitytracker.com/id?1025061', 'http://secunia.com/advisories/43278', 'http://groups.google.com/group/rubyonrails-security/msg/04345b2e84df5b4f?dmode=source&output=gplain', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0449'} | null |
GHSA | GHSA-2r8p-fg3c-wcj4 | Heap OOB and CHECK fail in `ResourceGather` | ### Impact
An attacker can trigger a crash via a `CHECK`-fail in debug builds of TensorFlow using `tf.raw_ops.ResourceGather` or a read from outside the bounds of heap allocated data in the same API in a release build:
```python
import tensorflow as tf
tensor = tf.constant(value=[[1,2],[3,4],[5,6]],shape=(3,2),dtype=tf.uint32)
v = tf.Variable(tensor)
tf.raw_ops.ResourceGather(
resource=v.handle,
indices=[0],
dtype=tf.uint32,
batch_dims=10,
validate_indices=False)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L660-L668) does not check that the `batch_dims` value that the user supplies is less than the rank of the input tensor.
Since the implementation uses several for loops over the dimensions of `tensor`, this results in reading data from outside the bounds of heap allocated buffer backing the tensor:
```cc
// batch_dims_ = > params.dims() (10 > 2)
for (int i = 0; i < batch_dims_; ++i) {
result_shape.AddDim(params.dim_size(i));
}
for (int i = batch_dims_; i < indices.dims(); ++i) {
result_shape.AddDim(indices.dim_size(i));
}
for (int i = batch_dims_ + 1; i < params.dims(); ++i) {
result_shape.AddDim(params.dim_size(i));
}
```
In debug mode, `.dim_size(i)` validates that the argument is less than `.dims()` using a `DCHECK`. But the `DCHECK` is a no-op in release builds.
### Patches
We have patched the issue in GitHub commit [bc9c546ce7015c57c2f15c168b3d9201de679a1d](https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37654'} | 2021-08-25T14:43:01Z | 2021-08-25T14:43:01Z | HIGH | 7.3 | {'CWE-125'} | {'https://github.com/advisories/GHSA-2r8p-fg3c-wcj4', 'https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r8p-fg3c-wcj4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37654'} | null |
GHSA | GHSA-3fr8-mwpp-8h9p | Cross-site scripting in TileServer GL | An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS. | {'CVE-2020-15500'} | 2021-05-17T21:01:15Z | 2021-05-17T21:01:15Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-3fr8-mwpp-8h9p', 'http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15500', 'https://github.com/maptiler/tileserver-gl/issues/461'} | null |
GHSA | GHSA-38m9-3vg4-rwvp | Cross-site Scripting in microweber | microweber prior to version 1.2.11 is vulnerable to cross-site scripting. | {'CVE-2022-0678'} | 2022-02-26T01:15:19Z | 2022-02-20T00:00:32Z | MODERATE | 6.5 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0678', 'https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0', 'https://github.com/advisories/GHSA-38m9-3vg4-rwvp', 'https://github.com/microweber/microweber/commit/2b8fa5aac31e51e2aca83c7ef5d1281ba2e755f8'} | null |
GHSA | GHSA-2mhh-w6q8-5hxw | Remote Memory Disclosure in ws | Versions of `ws` prior to 1.0.1 are affected by a remote memory disclosure vulnerability.
In certain rare circumstances, applications which allow users to control the arguments of a `client.ping()` call will cause `ws` to send the contents of an allocated but non-zero-filled buffer to the server. This may disclose sensitive information that still exists in memory after previous use of the memory for other tasks.
## Proof of Concept
```
var ws = require('ws')
var server = new ws.Server({ port: 9000 })
var client = new ws('ws://localhost:9000')
client.on('open', function () {
console.log('open')
client.ping(50) // this sends a non-zeroed buffer of 50 bytes
client.on('pong', function (data) {
console.log('got pong')
console.log(data) // Data from the client.
})
})
```
## Recommendation
Update to version 1.0.1 or greater. | {'CVE-2016-10518'} | 2021-01-08T20:07:04Z | 2019-02-18T23:56:42Z | LOW | 0 | {'CWE-201'} | {'https://github.com/advisories/GHSA-2mhh-w6q8-5hxw', 'https://nodesecurity.io/advisories/67', 'https://www.npmjs.com/advisories/67', 'https://github.com/websockets/ws/releases/tag/1.0.1', 'https://gist.github.com/c0nrad/e92005446c480707a74a', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10518'} | null |
GHSA | GHSA-3jqw-crqj-w8qw | Moderate severity vulnerability that affects django | The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521. | {'CVE-2011-4137'} | 2021-08-31T21:11:03Z | 2018-07-23T19:51:35Z | MODERATE | 0 | null | {'http://openwall.com/lists/oss-security/2011/09/15/5', 'https://hermes.opensuse.org/messages/14700881', 'https://www.djangoproject.com/weblog/2011/sep/09/', 'https://www.djangoproject.com/weblog/2011/sep/10/127/', 'http://openwall.com/lists/oss-security/2011/09/11/1', 'http://secunia.com/advisories/46614', 'https://github.com/advisories/GHSA-3jqw-crqj-w8qw', 'https://nvd.nist.gov/vuln/detail/CVE-2011-4137', 'http://www.debian.org/security/2011/dsa-2332', 'https://bugzilla.redhat.com/show_bug.cgi?id=737366', 'http://openwall.com/lists/oss-security/2011/09/13/2'} | null |
GHSA | GHSA-fx3v-553x-3c4q | Stored XSS by authenticated backend user with access to upload files | ### Impact
Backend users with access to upload files were permitted to upload SVG files without any sanitization applied to the uploaded files. Since SVG files support being parsed as HTML by browsers, this means that they could theoretically upload Javascript that would be executed on a path under the website's domain (i.e. /storage/app/media/evil.svg), but they would have to convince their target to visit that location directly in the target's browser as the backend does not display SVGs inline anywhere, SVGs are only displayed as image resources in the backend and are thus unable to be executed.
### Patches
Issue has been patched in Build 469 (v1.0.469) & v1.1.0.
### Workarounds
Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469 or v1.1.0.
### References
Reported by [Hoan Hoang](https://github.com/hoanhp)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1107" alt="Screen Shot 2020-10-10 at 1 47 49 PM" src="https://user-images.githubusercontent.com/7253840/95663787-378f2b80-0aff-11eb-8dfc-b97d162939da.png"> | {'CVE-2020-15249'} | 2022-04-19T19:02:38Z | 2020-11-23T19:47:59Z | LOW | 2.8 | {'CWE-79'} | {'https://github.com/advisories/GHSA-fx3v-553x-3c4q', 'https://github.com/octobercms/october/security/advisories/GHSA-fx3v-553x-3c4q', 'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15249'} | null |
GHSA | GHSA-7qqr-3pj3-q2f5 | XSS issues in the management interface | In system/workplace/ in Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple Reflected and Stored XSS issues in the management interface. | {'CVE-2019-13236'} | 2021-08-18T22:25:16Z | 2019-11-12T22:58:21Z | MODERATE | 6.1 | {'CWE-79'} | {'https://twitter.com/aetsu/status/1152096227938459648', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13236', 'https://github.com/advisories/GHSA-7qqr-3pj3-q2f5', 'http://packetstormsecurity.com/files/154283/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://aetsu.github.io/OpenCms', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'} | null |
GHSA | GHSA-68jc-v27h-vhmw | Unrestricted Upload of File with Dangerous Type in Drupal core. | Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74. | {'CVE-2020-13671'} | 2022-01-04T19:47:29Z | 2021-10-12T16:28:25Z | HIGH | 8.8 | {'CWE-434'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13671', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://github.com/advisories/GHSA-68jc-v27h-vhmw', 'https://www.drupal.org/sa-core-2020-012', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/'} | null |
GHSA | GHSA-xmc8-cjfr-phx3 | Regular Expression Denial of Service in highcharts | Versions of `highcharts` prior to 6.1.0 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
## Recommendation
Upgrade to version 6.1.0 or higher. | {'CVE-2018-20801'} | 2021-09-21T22:36:58Z | 2019-03-18T15:59:32Z | HIGH | 7.5 | {'CWE-185'} | {'https://www.npmjs.com/advisories/793', 'https://snyk.io/vuln/npm:highcharts:20180225', 'https://security.netapp.com/advisory/ntap-20190715-0001/', 'https://github.com/advisories/GHSA-xmc8-cjfr-phx3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20801', 'https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa'} | null |
GHSA | GHSA-v938-qcc9-rwv8 | Use of Uninitialized Resource in buffoon. | An issue was discovered in the buffoon crate through 2020-12-31 for Rust. InputStream::read_exact may read from uninitialized memory locations. | {'CVE-2020-36512'} | 2022-01-07T16:24:02Z | 2022-01-06T22:17:09Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0154.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/buffoon/RUSTSEC-2020-0154.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36512', 'https://github.com/advisories/GHSA-v938-qcc9-rwv8'} | null |
GHSA | GHSA-q8j6-pwqx-pm96 | Insecure template handling in Squirrelly | Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of squirrelly is currently 8.0.8. For complete details refer to the referenced GHSL-2021-023. | {'CVE-2021-32819'} | 2021-05-17T20:58:02Z | 2021-05-17T20:58:02Z | HIGH | 8 | {'CWE-200'} | {'https://www.npmjs.com/package/squirrelly', 'https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/', 'https://github.com/advisories/GHSA-q8j6-pwqx-pm96', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32819'} | null |
GHSA | GHSA-6q8q-rvf4-m4pg | Downloads Resources over HTTP in dalek-browser-chrome | Affected versions of `dalek-browser-chrome` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-chrome`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available - the author of `dalek` recommends [`TestCafé`](http://devexpress.github.io/testcafe/).
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10604'} | 2021-06-11T14:21:05Z | 2019-02-18T23:50:14Z | HIGH | 8.1 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10604', 'https://nodesecurity.io/advisories/199', 'https://github.com/advisories/GHSA-6q8q-rvf4-m4pg', 'https://www.npmjs.com/advisories/199'} | null |
GHSA | GHSA-c442-3278-rhrg | Unrestricted File Upload in ShowDoc v2.9.5 | Unrestricted File Upload in ShowDoc v2.9.5 allows remote attackers to execute arbitrary code via the 'file_url' parameter in the component AdminUpdateController.class.php'. | {'CVE-2021-36440'} | 2021-09-16T19:26:05Z | 2021-09-09T17:08:46Z | CRITICAL | 9.8 | {'CWE-434'} | {'https://github.com/star7th/showdoc/issues/1406', 'https://github.com/advisories/GHSA-c442-3278-rhrg', 'https://github.com/star7th/showdoc/commit/49b992d4c548c8c615a92b6efe8a50c8f1083abf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36440'} | null |
GHSA | GHSA-3w76-x94r-pw44 | Downloads Resources over HTTP in rs-brightcove | Affected versions of `rs-brightcove` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `rs-brightcove`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10676'} | 2021-01-08T20:11:25Z | 2019-02-18T23:42:16Z | HIGH | 0 | {'CWE-311'} | {'https://nodesecurity.io/advisories/273', 'https://www.npmjs.com/advisories/273', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10676', 'https://github.com/advisories/GHSA-3w76-x94r-pw44'} | null |
GHSA | GHSA-9jg9-6wm2-x7p5 | Server-Side Request Forgery in Karaf | In Karaf, JMX authentication takes place using JAAS and authorization takes place using ACL files. By default, only an "admin" can actually invoke on an MBean. However there is a vulnerability there for someone who is not an admin, but has a "viewer" role. In the 'etc/jmx.acl.cfg', such as role can call get*. It's possible to authenticate as a viewer role + invokes on the MLet getMBeansFromURL method, which goes off to a remote server to fetch the desired MBean, which is then registered in Karaf. At this point the attack fails as "viewer" doesn't have the permission to invoke on the MBean. Still, it could act as a SSRF style attack and also it essentially allows a "viewer" role to pollute the MBean registry, which is a kind of privilege escalation. The vulnerability is low as it's possible to add a ACL to limit access. Users should update to Apache Karaf 4.2.9 or newer. | {'CVE-2020-11980'} | 2022-02-10T23:04:32Z | 2022-02-10T23:04:32Z | MODERATE | 6.3 | {'CWE-918'} | {'http://karaf.apache.org/security/cve-2020-11980.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11980', 'https://github.com/advisories/GHSA-9jg9-6wm2-x7p5'} | null |
GHSA | GHSA-5xp3-jfq3-5q8x | Improper Input Validation in pip | A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1. | {'CVE-2021-3572'} | 2022-04-22T15:40:09Z | 2021-11-15T17:45:01Z | MODERATE | 5.7 | {'CWE-20'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/pypa/pip/pull/9827', 'https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b', 'https://packetstormsecurity.com/files/162712/USN-4961-1.txt', 'https://github.com/advisories/GHSA-5xp3-jfq3-5q8x', 'https://bugzilla.redhat.com/show_bug.cgi?id=1962856', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3572', 'https://access.redhat.com/errata/RHSA-2021:3254'} | null |
GHSA | GHSA-m342-ff57-4jcc | Heap OOB read in `tf.raw_ops.SparseCountSparseOutput` | ### Impact
The [shape inference functions for `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/ops/count_ops.cc#L43-L50) can trigger a read outside of bounds of heap allocated array:
```python
import tensorflow as tf
@tf.function
def func():
return tf.raw_ops.SparseCountSparseOutput(
indices=[1],
values=[[1]],
dense_shape=[10],
weights=[],
binary_output= True)
func()
```
The function fails to check that the first input (i.e., `indices`) has rank 2:
```cc
auto rank = c->Dim(c->input(0), 1);
```
### Patches
We have patched the issue in GitHub commit [701cfaca222a82afbeeb17496bd718baa65a67d2](https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41210'} | 2021-11-10T19:01:44Z | 2021-11-10T19:01:44Z | HIGH | 7.1 | {'CWE-125'} | {'https://github.com/advisories/GHSA-m342-ff57-4jcc', 'https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m342-ff57-4jcc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41210'} | null |
GHSA | GHSA-rwh9-8xx8-4wfm | Cross-site Scripting in OpenCRX | In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance. | {'CVE-2021-25959'} | 2021-10-08T21:28:56Z | 2021-09-30T20:50:21Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25959', 'https://github.com/advisories/GHSA-rwh9-8xx8-4wfm', 'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'} | null |
GHSA | GHSA-5h5r-ffc4-c455 | strong_password Ruby gem malicious version causing Remote Code Execution vulnerability | The strong_password gem 0.0.7 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 0.0.6. | {'CVE-2019-13354'} | 2021-08-17T17:50:52Z | 2019-07-08T20:32:35Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://rubygems.org/gems/strong_password/versions', 'https://github.com/advisories/GHSA-5h5r-ffc4-c455', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13354', 'https://withatwist.dev/strong-password-rubygem-hijacked.html', 'https://github.com/bdmac/strong_password/releases', 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-strong_password-0-0-7/', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/strong_password/CVE-2019-13354.yml'} | null |
GHSA | GHSA-68gr-cmcp-g3mj | Directory Traversal in lactate | A crafted `GET` request can be leveraged to traverse the directory structure of a host using the lactate web server package, and request arbitrary files outside of the specified web root. This allows for a remote attacker to gain access to arbitrary files on the filesystem that the process has access to read.
Mitigating factors:
Only files that the user running `lactate` has permission to read will be accessible via this vulnerability.
[Proof of concept](https://hackerone.com/reports/296645):
Please globally install the `lactate` package and `cd` to a directory you wish to serve assets from. Next, run `lactate -p 8081` to start serving files from this location.
The following cURL request can be used to demonstrate this vulnerability by requesting the target `/etc/passwd` file:
```
curl "http://127.0.0.1:8081/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
```
```
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
[...]
```
## Recommendation
As there is currently no fix for this issue selecting an alternative static web server would be the best choice. | null | 2021-08-16T23:34:11Z | 2019-06-14T16:39:31Z | HIGH | 7.5 | {'CWE-22'} | {'https://snyk.io/vuln/npm:lactate:20180123', 'https://github.com/advisories/GHSA-68gr-cmcp-g3mj', 'https://github.com/RetireJS/retire.js/commit/800c8140884eaa5753a49308f560c925fe97b9a5', 'https://hackerone.com/reports/296645', 'https://www.npmjs.com/advisories/560'} | null |
GHSA | GHSA-q93h-jc49-78gg | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). | {'CVE-2020-9547'} | 2021-10-21T21:13:04Z | 2020-05-15T18:59:10Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html', 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r742ef70d126548dcf7de5be5779355c9d76a9aec71d7a9ef02c6398a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra3e90712f2d59f8cef03fa796f5adf163d32b81fe7b95385f21790e6@%3Cnotifications.zookeeper.apache.org%3E', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-q93h-jc49-78gg', 'https://github.com/FasterXML/jackson-databind/issues/2634', 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/redbe4f1e21bf080f637cf9fbec47729750a2f443a919765360337428@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc0d5d0f72da1ed6fc5e438b1ddb3fa090c73006b55f873cf845375ab@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rd0e958d6d5c5ee16efed73314cd0e445c8dbb4bdcc80fc9d1d6c11fc@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9547', 'https://lists.apache.org/thread.html/r4accb2e0de9679174efd3d113a059bab71ff3ec53e882790d21c1cc1@%3Cnotifications.zookeeper.apache.org%3E'} | null |
GHSA | GHSA-pwrf-q7h8-jjr7 | Authorization Bypass Through User-Controlled Key in Bagisto | In Webkul Bagisto before 0.1.5, the functionalities for customers to change their own values (such as address, review, orders, etc.) can also be manipulated by other customers. | {'CVE-2019-16403'} | 2021-05-10T17:22:10Z | 2019-11-08T20:06:24Z | MODERATE | 8.8 | {'CWE-639'} | {'https://github.com/advisories/GHSA-pwrf-q7h8-jjr7', 'https://github.com/bagisto/bagisto/issues/749', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16403'} | null |
GHSA | GHSA-r37h-j483-cjjm | Improper rate limiting in Koel | Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier. | {'CVE-2021-33563'} | 2021-06-04T18:50:21Z | 2021-06-01T21:38:20Z | HIGH | 0 | {'CWE-799', 'CWE-916'} | {'https://huntr.dev/bounties/1-other-koel/koel/', 'https://github.com/advisories/GHSA-r37h-j483-cjjm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33563', 'https://github.com/koel/koel/releases/tag/v5.1.4'} | null |
GHSA | GHSA-w4pv-w56c-mg4v | Path Traversal in stattic | Versions of `stattic` before 0.3.0 are vulnerable to path traversal allowing a remote attacker to read arbitrary files with any extension from the server that users `stattic`.
## Recommendation
Update to version 0.3.0 or later. | {'CVE-2018-3734'} | 2021-01-08T01:57:02Z | 2018-07-18T21:20:15Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-w4pv-w56c-mg4v', 'https://hackerone.com/reports/319003', 'https://www.npmjs.com/advisories/591', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3734'} | null |
GHSA | GHSA-8h46-5m9h-7553 | Heap out of bounds write in `RaggedBinCount` | ### Impact
If the `splits` argument of `RaggedBincount` does not specify a valid [`SparseTensor`](https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow:
```python
import tensorflow as tf
tf.raw_ops.RaggedBincount(splits=[7,8], values= [5, 16, 51, 76, 29, 27, 54, 95],\
size= 59, weights= [0, 0, 0, 0, 0, 0, 0, 0],\
binary_output=False)
```
This will cause a read from outside the bounds of the `splits` tensor buffer in the [implementation of the `RaggedBincount` op](https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L446):
```cc
for (int idx = 0; idx < num_values; ++idx) {
while (idx >= splits(batch_idx)) {
batch_idx++;
}
...
if (bin < size) {
if (binary_output_) {
out(batch_idx - 1, bin) = T(1);
} else {
T value = (weights_size > 0) ? weights(idx) : T(1);
out(batch_idx - 1, bin) += value;
}
}
}
```
Before the `for` loop, `batch_idx` is set to 0. The attacker sets `splits(0)` to be 7, hence the `while` loop does not execute and `batch_idx` remains 0. This then results in writing to `out(-1, bin)`, which is before the heap allocated buffer for the output tensor.
### Patches
We have patched the issue in GitHub commit [eebb96c2830d48597d055d247c0e9aebaea94cd5](https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29514'} | 2021-05-21T14:20:51Z | 2021-05-21T14:20:51Z | LOW | 2.5 | {'CWE-787'} | {'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29514', 'https://github.com/advisories/GHSA-8h46-5m9h-7553', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8h46-5m9h-7553'} | null |
GHSA | GHSA-w6rp-4vj7-v2m8 | Missing Authorization in DayByDay CRM | In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the attacker to gain access to the highest privileged user in the application. | {'CVE-2022-22111'} | 2022-01-10T21:46:06Z | 2022-01-08T00:31:49Z | HIGH | 8.8 | {'CWE-862'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-22111', 'https://github.com/advisories/GHSA-w6rp-4vj7-v2m8', 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111'} | null |
GHSA | GHSA-jc84-3g44-wf2q | Denial of Service in ecstatic | ecstatic have a denial of service vulnerability. Successful exploitation could lead to crash of an application. | {'CVE-2019-10775'} | 2020-12-15T16:52:17Z | 2020-12-15T16:52:17Z | MODERATE | 0 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10775', 'https://github.com/advisories/GHSA-jc84-3g44-wf2q', 'https://snyk.io/vuln/SNYK-JS-ECSTATIC-540354'} | null |
GHSA | GHSA-2cf2-2383-h4jv | Improperly Controlled Modification of Dynamically-Determined Object Attributes in querymen | querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks. | {'CVE-2020-7600'} | 2021-07-28T18:46:08Z | 2021-05-07T16:16:43Z | MODERATE | 5.3 | {'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7600', 'https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867', 'https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef', 'https://github.com/advisories/GHSA-2cf2-2383-h4jv'} | null |
GHSA | GHSA-xfhp-gmh8-r8v2 | Regular Expression Denial of Service (ReDoS) | The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity. | {'CVE-2021-23354'} | 2021-03-25T00:18:25Z | 2021-03-19T21:22:10Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/advisories/GHSA-xfhp-gmh8-r8v2', 'https://github.com/adaltas/node-printf/issues/31', 'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23354', 'https://github.com/adaltas/node-printf/pull/32', 'https://snyk.io/vuln/SNYK-JS-PRINTF-1072096'} | null |
GHSA | GHSA-rqxg-xvcq-3v2f | Out-of-bounds Write in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillColorRow8 function in utils.cpp when reading an image file by using cv::imread. | {'CVE-2017-12605'} | 2021-11-18T15:33:23Z | 2021-10-12T22:02:04Z | HIGH | 8.8 | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-12605', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/advisories/GHSA-rqxg-xvcq-3v2f', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'} | null |
GHSA | GHSA-8j6j-4h2c-c65p | Arbitrary Code Execution in require-node | Versions of `require-node` prior to 1.3.4 for 1.x and 2.0.4 for 2.x are vulnerable to Arbitrary Code Execution. The package fails to sanitize requests to the `require-node` endpoint, allowing attackers to execute arbitrary code in the server through the injection of OS commands in the request body.
## Recommendation
- If you are using 1.x, upgrade to version 1.3.4 or later.
- If you are using 2.x, upgrade to version 2.0.4 or later. | null | 2021-09-28T17:07:49Z | 2020-09-03T17:02:52Z | CRITICAL | 0 | {'CWE-78'} | {'https://github.com/advisories/GHSA-8j6j-4h2c-c65p', 'https://www.npmjs.com/advisories/1015'} | null |
GHSA | GHSA-w6jr-wj64-mc9x | Deserialization of Untrusted Data in Codeigniter4 | ### Impact
Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4.
Remote attackers may inject auto-loadable arbitrary objects with this vulnerability,
and possibly execute existing PHP code on the server.
We are aware of a working exploit, which can lead to SQL injection.
### Patches
Upgrade to v4.1.6 or later.
### Workarounds
Do not use:
- `old()` and form_helper
- `RedirectResponse::withInput()` and `redirect()->withInput()`
### References
- [PHP Object Injection | OWASP](https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
| {'CVE-2022-21647'} | 2022-01-06T22:52:41Z | 2022-01-06T22:52:41Z | HIGH | 7.7 | {'CWE-502'} | {'https://github.com/codeigniter4/CodeIgniter4/commit/ce95ed5765256e2f09f3513e7d42790e0d6948f5', 'https://github.com/advisories/GHSA-w6jr-wj64-mc9x', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21647', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-w6jr-wj64-mc9x'} | null |
GHSA | GHSA-q4xf-3pmq-3hw8 | Improper Restriction of XML External Entity Reference in Apache NiFi | In Apache NiFi 1.0.0 to 1.11.4, the notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE). | {'CVE-2020-13940'} | 2022-01-06T20:41:00Z | 2022-01-06T20:41:00Z | MODERATE | 5.5 | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13940', 'https://github.com/advisories/GHSA-q4xf-3pmq-3hw8', 'https://nifi.apache.org/security#CVE-2020-13940', 'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798'} | null |
GHSA | GHSA-7vrq-vg6p-32fw | Downloads Resources over HTTP in libxl | Affected versions of `libxl` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libxl`.
## Recommendation
The module author recommends installing the bindings using a pinned and verified version of SDK instead of the automated download. More information is available in the modules [README](https://www.npmjs.com/package/libxl). | {'CVE-2016-10585'} | 2021-09-16T20:44:28Z | 2019-02-18T23:34:48Z | HIGH | 0 | {'CWE-311', 'CWE-269'} | {'https://www.npmjs.com/advisories/178', 'https://nodesecurity.io/advisories/178', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10585', 'https://github.com/advisories/GHSA-7vrq-vg6p-32fw'} | null |
GHSA | GHSA-x9r5-jxvq-4387 | Self XSS on user input in jquery.terminal | ### Impact
This is low impact and limited XSS, because code for XSS payload is always visible, but attacker can use other techniques to hide the code the victim sees.
Also if the application use execHash option and execute code from URL the attacker can use this URL to execute his code. The scope is limited because the javascript code inside html attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible.
### Patches
Fixed version 2.31.1
### Workarounds
The user can use formatting that wrap whole user input and it's no op.
```javascript
$.terminal.new_formatter([/([\s\S]+)/g, '[[;;]$1]']);
```
The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way).
### References
The issue was reported here [jcubic/jquery.terminal#727](https://github.com/jcubic/jquery.terminal/issues/727)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [jcubic/jquery.terminal](https://github.com/jcubic/jquery.terminal)
* Email us at [jcubic@onet.pl](mailto:jcubic@onet.pl)
| {'CVE-2021-43862'} | 2022-04-19T19:03:19Z | 2022-01-06T22:48:56Z | LOW | 3.7 | {'CWE-80'} | {'https://github.com/jcubic/jquery.terminal/security/advisories/GHSA-x9r5-jxvq-4387', 'https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a9157f0bc6648f81a84b5', 'https://github.com/jcubic/jquery.terminal/issues/727', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43862', 'https://github.com/jcubic/jquery.terminal/releases/tag/2.31.1', 'https://github.com/advisories/GHSA-x9r5-jxvq-4387'} | null |
GHSA | GHSA-v2jq-9475-r5g8 | Cross-Site Scripting in bootstrap-tagsinput | All versions of `bootstrap-tagsinput` are vulnerable to cross-site scripting when user input is passed into the `itemTitle` parameter unmodified, as the package fails to properly sanitize or encode user input for that parameter.
## Recommendation
This package is not actively maintained, and has not seen an update since 2015.
Because of this, the simplest mitigation is to avoid using the `itemTitle` parameter. With over 200 open issues and over 100 open pull requests as of 2/2018, it seems unlikely that the author has any intention of maintaining the module. If avoiding the use of `itemTitle` indefinitely is acceptable, this is a workable solution. If not, the best available mitigation is to use a fork of the module that is actively maintained and provides similar functionality. There are [many such forks to choose from available on github.](https://github.com/bootstrap-tagsinput/bootstrap-tagsinput/network/members). | {'CVE-2016-1000227'} | 2021-09-23T21:31:31Z | 2020-09-01T15:29:51Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-v2jq-9475-r5g8', 'https://github.com/bootstrap-tagsinput/bootstrap-tagsinput/issues/501', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000227', 'https://www.npmjs.com/advisories/124'} | null |
GHSA | GHSA-rv49-54qp-fw42 | Path Traversal in servey | Versions of `servey` prior to 3.x are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.
## Recommendation
Upgrade to the latest version | null | 2021-08-04T20:56:42Z | 2019-06-06T15:30:20Z | MODERATE | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/802', 'https://github.com/advisories/GHSA-rv49-54qp-fw42', 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://hackerone.com/reports/355501'} | null |
GHSA | GHSA-wf98-vxv9-jqfv | XSS Injection Vulnerability | ### Impact
Under some circumstances, the Feeds widget on the dashboard could have an XSS vulnerability if a malformed feed was supplied.
### Patches
This has been patched in Craft 3.7.29.
### References
* https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18
### For more information
If you have any questions or comments about this advisory, email us at [support@craftcms.com](mailto:support@craftcms.com)
----------
Credits: https://github.com/noobpk
| null | 2022-04-12T21:55:59Z | 2022-04-05T18:31:51Z | LOW | 0 | null | {'https://github.com/advisories/GHSA-wf98-vxv9-jqfv', 'https://github.com/craftcms/cms/security/advisories/GHSA-wf98-vxv9-jqfv'} | null |
GHSA | GHSA-8qxj-f9rh-9fg2 | Improper Verification of Cryptographic Signature in Pure-Python ECDSA | A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions. | {'CVE-2019-14859'} | 2022-03-21T22:37:12Z | 2020-04-01T16:35:26Z | CRITICAL | 9.1 | {'CWE-347'} | {'https://github.com/warner/python-ecdsa/issues/114', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14859', 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3', 'https://github.com/advisories/GHSA-8qxj-f9rh-9fg2', 'https://github.com/warner/python-ecdsa/pull/115', 'https://pypi.org/project/ecdsa/0.13.3/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859'} | null |
GHSA | GHSA-6vmq-jh76-hq43 | Uninitialized memory access in outer_cgi | An issue was discovered in the outer_cgi crate before 0.2.1 for Rust. A user-provided Read instance receives an uninitialized memory buffer from KeyValueReader. | {'CVE-2021-30454'} | 2021-08-25T20:55:25Z | 2021-08-25T20:55:25Z | CRITICAL | 0 | {'CWE-119'} | {'https://github.com/SolraBizna/outer_cgi/commit/dd59b3066e616a08e756f72de8dc3ab11b7036c4', 'https://github.com/advisories/GHSA-6vmq-jh76-hq43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30454', 'https://github.com/SolraBizna/outer_cgi/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2021-0051.html'} | null |
GHSA | GHSA-wgx2-6432-j3fw | Unsoundness in bigint | An issue was discovered in the bigint crate through 2020-05-07 for Rust. It allows a soundness violation. | {'CVE-2020-35880'} | 2021-08-25T20:48:04Z | 2021-08-25T20:48:04Z | CRITICAL | 9.8 | {'CWE-704'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0025.html', 'https://github.com/advisories/GHSA-wgx2-6432-j3fw', 'https://github.com/paritytech/bigint/commit/7e71521a61b009afc94c91135353102658550d42', 'https://github.com/rustsec/advisory-db/pull/290', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35880'} | null |
GHSA | GHSA-4627-w373-375v | Malicious Package in grunt-radical | Version 0.0.14 of `grunt-radical` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | null | 2020-09-11T21:22:24Z | 2020-09-11T21:22:24Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-4627-w373-375v', 'https://www.npmjs.com/advisories/935'} | null |
GHSA | GHSA-9824-rp6m-xx9w | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-0989'} | 2021-03-29T20:59:04Z | 2021-03-29T20:59:04Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-9824-rp6m-xx9w', 'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0989', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0989'} | null |
GHSA | GHSA-h822-r4r5-v8jg | Polymorphic Typing issue in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. | {'CVE-2019-14540'} | 2021-08-17T22:28:26Z | 2019-09-23T18:33:25Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://security.netapp.com/advisory/ntap-20191004-0002/', 'https://github.com/advisories/GHSA-h822-r4r5-v8jg', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/a4f2c9fb36642a48912cdec6836ec00e497427717c5d377f8d7ccce6@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016@%3Cissues.hbase.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb@%3Ccommits.hbase.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0@%3Cissues.hbase.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2410', 'https://www.debian.org/security/2019/dsa-4542', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14540', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540@%3Ccommits.nifi.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2449', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/FasterXML/jackson-databind/blob/master/release-notes/VERSION-2.x', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'} | null |
GHSA | GHSA-xq52-rv6w-397c | Directive injection when using dynamic overrides with user input | ### Impact
If user-supplied input was passed into `append/override_content_security_policy_directives`, a semicolon could be injected leading to directive injection.
This could be used to e.g. override a `script-src` directive. Duplicate directives are ignored and the first one wins. The directives in `secure_headers` are sorted alphabetically so they pretty much all come before `script-src`. A previously undefined directive would receive a value even if `SecureHeaders::OPT_OUT` was supplied.
The fixed versions will silently convert the semicolons to spaces and emit a deprecation warning when this happens. This will result in innocuous browser console messages if being exploited/accidentally used. In future releases, we will raise application errors resulting in 500s.
> Duplicate script-src directives detected. All but the first instance will be ignored.
See https://www.w3.org/TR/CSP3/#parse-serialized-policy
> Note: In this case, the user agent SHOULD notify developers that a duplicate directive was ignored. A console warning might be appropriate, for example.
### Patches
Depending on what major version you are using, the fixed versions are 6.2.0, 5.1.0, 3.8.0.
### Workarounds
If you are passing user input into the above methods, you could filter out the input:
```ruby
override_content_security_policy_directives(:frame_src, [user_input.gsub(";", " ")])
```
### References
Reported in https://github.com/twitter/secure_headers/issues/418
https://www.w3.org/TR/CSP3/#parse-serialized-policy
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [this repo](https://github.com/twitter/secure_headers/issues/new)
* DM @ndm on twitter | {'CVE-2020-5217'} | 2021-01-08T21:09:32Z | 2020-01-23T02:28:11Z | MODERATE | 4.4 | {'CWE-95'} | {'https://github.com/twitter/secure_headers/pull/421', 'https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3', 'https://github.com/twitter/secure_headers/issues/418', 'https://github.com/advisories/GHSA-xq52-rv6w-397c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5217', 'https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c'} | null |
GHSA | GHSA-4g29-fccr-p59w | Reflected Cross-site Scripting in Shopware storefront | ### Impact
Not-stored XSS in storefront.
Request parameter were directly assigned to the template, so that malicious code could be send via an URL.
### Patches
We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022 | {'CVE-2022-24873'} | 2022-04-29T20:31:19Z | 2022-04-28T20:59:24Z | MODERATE | 5.4 | {'CWE-79'} | {'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-4g29-fccr-p59w', 'https://github.com/advisories/GHSA-4g29-fccr-p59w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24873', 'https://www.shopware.com/en/changelog-sw5/#5-7-9'} | null |
GHSA | GHSA-24fg-p96v-hxh8 | Moderate severity vulnerability that affects rails | Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696. | {'CVE-2011-0447'} | 2021-08-30T15:41:48Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-352'} | {'http://www.debian.org/security/2011/dsa-2247', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html', 'http://secunia.com/advisories/43666', 'http://www.vupen.com/english/advisories/2011/0877', 'http://www.securitytracker.com/id?1025060', 'http://www.vupen.com/english/advisories/2011/0587', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html', 'http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails', 'http://www.securityfocus.com/bid/46291', 'http://secunia.com/advisories/43274', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0447', 'https://github.com/advisories/GHSA-24fg-p96v-hxh8', 'http://groups.google.com/group/rubyonrails-security/msg/c22ea1668c0d181c?dmode=source&output=gplain'} | null |
GHSA | GHSA-r2gr-fhmr-66c5 | "Arbitrary code execution in socket.io-file" | "The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." | {'CVE-2020-24807'} | 2021-05-10T18:38:11Z | 2021-05-10T18:38:11Z | HIGH | 7.8 | {'CWE-20'} | {'https://github.com/advisories/GHSA-6495-8jvh-f28x', 'https://github.com/rico345100/socket.io-file', 'https://www.npmjs.com/advisories/1564', 'https://github.com/advisories/GHSA-r2gr-fhmr-66c5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24807', 'https://www.npmjs.com/package/socket.io-file'} | null |
GHSA | GHSA-25fx-mxc2-76g7 | Unauthorized access to Credit card form exposing payer name and not requiring 3DS | ### Impact
URL to the payment page done after checkout was created with autoincremented payment id (`/pay-with-paypal/{id}`) and therefore it was easy to access for anyone, not even the order's customer. The problem was, the Credit card form has prefilled "credit card holder" field with the Customer's first and last name.
Additionally, the mentioned form did not require a 3D Secure authentication, as well as did not checked the result of the 3D Secure authentication.
### Patches
The problem has been patched in Sylius/PayPalPlugin **1.2.4** and **1.3.1**
### Workarounds
One can override a `sylius_paypal_plugin_pay_with_paypal_form` route and change its URL parameters to (for example) `{orderToken}/{paymentId}`, then override the `Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction` service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method.
Additionally, one could override the `@SyliusPayPalPlugin/payWithPaypal.html.twig` template, to add `contingencies: ['SCA_ALWAYS']` line in `hostedFields.submit(...)` function call (line 421). It would then have to be handled in the function callback.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in Sylius/PayPalPlugin issues
- Email us at security at sylius dot com
| {'CVE-2021-41120'} | 2021-10-06T17:49:11Z | 2021-10-06T17:49:11Z | HIGH | 7.5 | {'CWE-200'} | {'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41120', 'https://github.com/Sylius/PayPalPlugin/security/advisories/GHSA-25fx-mxc2-76g7', 'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7', 'https://github.com/advisories/GHSA-25fx-mxc2-76g7'} | null |
GHSA | GHSA-2vp8-jv5v-6qh6 | Allocation of resources without limits or throttling in keycloak-model-infinispan | A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack. | {'CVE-2021-3637'} | 2021-07-14T19:41:47Z | 2021-07-13T17:43:23Z | HIGH | 7.5 | {'CWE-770'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1979638', 'https://github.com/advisories/GHSA-2vp8-jv5v-6qh6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3637'} | null |
GHSA | GHSA-v3rr-cph9-2g2q | Moderate severity vulnerability that affects rack-ssl | Cross-site scripting (XSS) vulnerability in lib/rack/ssl.rb in the rack-ssl gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script or HTML via a URI, which might not be properly handled by third-party adapters such as JRuby-Rack. | {'CVE-2014-2538'} | 2021-09-20T15:02:21Z | 2017-10-24T18:33:36Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-v3rr-cph9-2g2q', 'https://nvd.nist.gov/vuln/detail/CVE-2014-2538', 'http://secunia.com/advisories/57466', 'https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b', 'http://www.openwall.com/lists/oss-security/2014/03/19/20', 'http://www.securityfocus.com/bid/66314', 'http://lists.opensuse.org/opensuse-updates/2014-04/msg00032.html'} | null |
GHSA | GHSA-m874-69ww-w7jq | Directory Traversal in whispercast | Affected versions of `whispercast` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16174'} | 2021-01-08T18:29:43Z | 2018-07-23T20:45:01Z | HIGH | 0 | {'CWE-22'} | {'https://nodesecurity.io/advisories/466', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16174', 'https://www.npmjs.com/advisories/466', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/whispercast', 'https://github.com/advisories/GHSA-m874-69ww-w7jq'} | null |
GHSA | GHSA-2v5c-755p-p4gv | Missing TLS certificate verification in faye-websocket | The `Faye::WebSocket::Client` class uses the [`EM::Connection#start_tls`][1]
method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL
is used for the connection. This method does not implement certificate
verification by default, meaning that it does not check that the server presents
a valid and trusted TLS certificate for the expected hostname. That means that
any `wss:` connection made using this library is vulnerable to a
man-in-the-middle attack, since it does not confirm the identity of the server
it is connected to.
This has been a requested feature in EventMachine for many years now; see for
example [#275][3], [#378][4], and [#814][5]. In June 2020, [em-http-request][6]
published an [advisory][7] related to this problem and fixed it by [implementing
TLS verification][8] in their own codebase; although EventMachine does not
implement certificate verification itself, it provides an extension point for
the caller to implement it, called [`ssl_verify_peer`][9]. Based on this
implementation, we have incorporated similar functionality into [faye-websocket
for Ruby][10], such that we use the `OpenSSL` module to perform two checks:
- The chain of certificates presented by the server is valid and ultimately
trusted by your root certificate set -- either your system default root
certificates, or a set provided at runtime
- The final certificate presented by the server is valid for the hostname used
in the request URI; if the connection is made via a proxy we use the hostname
from the request, not the proxy's hostname
After implementing verification in v1.1.6, em-http-request has elected to leave
the `:verify_peer` option switched off by default. We have decided to _enable_
this option by default in faye-websocket, but are publishing a minor release
with added functionality for configuring it. We are mindful of the fact that
this may break existing programs, but we consider it much more important that
all clients have TLS verification turned on by default. A client that is not
carrying out verification is either:
- talking to the expected server, and will not break under this change
- being attacked, and would benefit from being alerted to this fact
- deliberately talking to a server that would be rejected by verification
The latter case includes situations like talking to a non-public server using a
self-signed certificate. We consider this use case to be "working by accident",
rather than functionality that was actively supported, and it should be properly
and explicitly supported instead. To that end, we have added two new options to
the `Faye::WebSocket::Client` constructor: `tls.root_cert_file`, and
`tls.verify_peer`.
The `:root_cert_file` option lets you provide a different set of root
certificates in situations where you don't want to use your system's default
root certificates to verify the remote host. It should be a path or an array of
paths identifying the certificates to use instead of the defaults.
```rb
client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: {
root_cert_file: 'path/to/certificate.pem'
})
```
The `:verify_peer` option lets you turn verification off entirely. This should
be a last resort and we recommend using the `:root_cert_file` option if
possible.
```rb
client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: {
verify_peer: false
})
```
To get the new behaviour, please upgrade to v0.11.0 of the [Rubygems
package][10]. There are, unfortunately, no workarounds for this issue, as you
cannot enable `:verify_peer` in EventMachine unless the calling library contains
an implementation of `ssl_verify_peer` that actually checks the server's
certificates.
For further background information on this issue, please see [faye#524][12] and
[faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel
Morsing][15] for providing invaluable assistance and feedback on this issue.
[1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls
[2]: https://rubygems.org/gems/eventmachine
[3]: https://github.com/eventmachine/eventmachine/issues/275
[4]: https://github.com/eventmachine/eventmachine/pull/378
[5]: https://github.com/eventmachine/eventmachine/issues/814
[6]: https://rubygems.org/gems/em-http-request
[7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request
[8]: https://github.com/igrigorik/em-http-request/pull/340
[9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer
[10]: https://rubygems.org/gems/faye-websocket
[12]: https://github.com/faye/faye/issues/524
[13]: https://github.com/faye/faye-websocket-ruby/pull/129
[14]: https://github.com/SpComb
[15]: https://github.com/DanielMorsing | {'CVE-2020-15133'} | 2021-11-19T15:42:56Z | 2020-07-31T17:40:04Z | HIGH | 8 | {'CWE-295'} | {'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15133', 'https://github.com/faye/faye-websocket-ruby/security/advisories/GHSA-2v5c-755p-p4gv', 'https://github.com/faye/faye/issues/524', 'https://github.com/advisories/GHSA-2v5c-755p-p4gv', 'https://github.com/eventmachine/eventmachine/pull/378', 'https://github.com/faye/faye-websocket-ruby/pull/129', 'https://github.com/igrigorik/em-http-request/pull/340', 'https://github.com/eventmachine/eventmachine/issues/814', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls', 'https://github.com/eventmachine/eventmachine/issues/275'} | null |
GHSA | GHSA-qw93-45r3-p66p | Prototype Pollution in merge-options | All versions of `merge-options` are vulnerable to Prototype Pollution
## Recommendation
Update to version 1.0.1 or greater. | {'CVE-2018-3752'} | 2021-09-16T21:10:32Z | 2018-10-09T00:19:57Z | CRITICAL | 9.8 | {'CWE-20'} | {'https://github.com/advisories/GHSA-qw93-45r3-p66p', 'https://hackerone.com/reports/311336', 'https://www.npmjs.com/advisories/717', 'https://github.com/schnittstabil/merge-options/commit/d4a93bc2890455e0931ac0779667023e6cb101d4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3752'} | null |
GHSA | GHSA-q58g-455p-8vw9 | In RubyGem excon, interrupted Persistent Connections May Leak Response Data | ### Impact
There was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.
### Patches
The problem has been patched in 0.71.0, users should upgrade to this or a newer version (if one exists).
### Workarounds
Users can workaround the problem by disabling persistent connections, though this may cause performance implications.
### References
See the [patch](https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29) for further details.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [excon/issues](https://github.com/excon/excon/issues)
* Email us at [geemus+github@gmail.com](mailto:geemus+github@gmail.com) | {'CVE-2019-16779'} | 2021-10-29T14:10:28Z | 2019-12-16T19:30:17Z | MODERATE | 5.8 | {'CWE-362', 'CWE-664'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-16779', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00015.html', 'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html', 'https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9', 'https://github.com/advisories/GHSA-q58g-455p-8vw9'} | null |
GHSA | GHSA-gxpj-cx7g-858c | Regular Expression Denial of Service in debug | Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter.
As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue.
## Recommendation
Version 2.x.x: Update to version 2.6.9 or later.
Version 3.x.x: Update to version 3.1.0 or later. | {'CVE-2017-16137'} | 2021-01-08T18:45:04Z | 2018-08-09T20:18:07Z | LOW | 0 | {'CWE-400'} | {'https://github.com/visionmedia/debug/pull/504', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16137', 'https://www.npmjs.com/advisories/534', 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E', 'https://nodesecurity.io/advisories/534', 'https://github.com/visionmedia/debug/issues/501', 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E', 'https://github.com/advisories/GHSA-gxpj-cx7g-858c'} | null |
GHSA | GHSA-fr52-4hqw-p27f | Nokogiri does not forbid namespace nodes in XPointer ranges | xpointer.c in libxml2 before 2.9.5 (as used in nokogiri before 1.7.1 amongst other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document. | {'CVE-2016-4658'} | 2022-04-26T18:24:05Z | 2018-08-21T19:03:26Z | CRITICAL | 9.8 | {'CWE-119'} | {'https://support.apple.com/HT207141', 'https://support.apple.com/HT207170', 'http://www.securityfocus.com/bid/93054', 'https://support.apple.com/HT207143', 'https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b', 'https://support.apple.com/HT207142', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html', 'http://www.securitytracker.com/id/1036858', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html', 'https://github.com/advisories/GHSA-fr52-4hqw-p27f', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4658', 'http://www.securitytracker.com/id/1038623', 'https://security.gentoo.org/glsa/201701-37'} | null |
GHSA | GHSA-j47f-4232-hvv8 | Heap out of bounds read in `RaggedCross` | ### Impact
An attacker can force accesses outside the bounds of heap allocated arrays by passing in invalid tensor values to `tf.raw_ops.RaggedCross`:
```python
import tensorflow as tf
ragged_values = []
ragged_row_splits = []
sparse_indices = []
sparse_values = []
sparse_shape = []
dense_inputs_elem = tf.constant([], shape=[92, 0], dtype=tf.int64)
dense_inputs = [dense_inputs_elem]
input_order = "R"
hashed_output = False
num_buckets = 0
hash_key = 0
tf.raw_ops.RaggedCross(ragged_values=ragged_values,
ragged_row_splits=ragged_row_splits,
sparse_indices=sparse_indices,
sparse_values=sparse_values,
sparse_shape=sparse_shape,
dense_inputs=dense_inputs,
input_order=input_order,
hashed_output=hashed_output,
num_buckets=num_buckets,
hash_key=hash_key,
out_values_type=tf.int64,
out_row_splits_type=tf.int64)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/efea03b38fb8d3b81762237dc85e579cc5fc6e87/tensorflow/core/kernels/ragged_cross_op.cc#L456-L487) lacks validation for the user supplied arguments:
```cc
int next_ragged = 0;
int next_sparse = 0;
int next_dense = 0;
for (char c : input_order_) {
if (c == 'R') {
TF_RETURN_IF_ERROR(BuildRaggedFeatureReader(
ragged_values_list[next_ragged], ragged_splits_list[next_ragged],
features));
next_ragged++;
} else if (c == 'S') {
TF_RETURN_IF_ERROR(BuildSparseFeatureReader(
sparse_indices_list[next_sparse], sparse_values_list[next_sparse],
batch_size, features));
next_sparse++;
} else if (c == 'D') {
TF_RETURN_IF_ERROR(
BuildDenseFeatureReader(dense_list[next_dense++], features));
}
...
}
```
Each of the above branches call a helper function after accessing array elements via a `*_list[next_*]` pattern, followed by incrementing the `next_*` index. However, as there is no validation that the `next_*` values are in the valid range for the corresponding `*_list` arrays, this results in heap OOB reads.
### Patches
We have patched the issue in GitHub commit [44b7f486c0143f68b56c34e2d01e146ee445134a](https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29532'} | 2021-05-21T14:22:17Z | 2021-05-21T14:22:17Z | LOW | 2.5 | {'CWE-125'} | {'https://github.com/advisories/GHSA-j47f-4232-hvv8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j47f-4232-hvv8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29532', 'https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a'} | null |
GHSA | GHSA-5v44-7647-xfw9 | Blind SQL injection in PrestaShop productcomments module | ### Impact
An attacker can use a Blind SQL injection to retrieve data or stop the MySQL service.
### Patches
The problem is fixed in 4.2.1 | {'CVE-2020-26248'} | 2022-04-19T19:02:41Z | 2021-01-20T21:33:53Z | LOW | 8.2 | {'CWE-89'} | {'https://packagist.org/packages/prestashop/productcomments', 'https://github.com/PrestaShop/productcomments/commit/7c2033dd811744e021da8897c80d6c301cd45ffa', 'https://github.com/PrestaShop/productcomments/releases/tag/v4.2.1', 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-5v44-7647-xfw9', 'https://github.com/advisories/GHSA-5v44-7647-xfw9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26248', 'http://packetstormsecurity.com/files/160539/PrestaShop-ProductComments-4.2.0-SQL-Injection.html'} | null |
GHSA | GHSA-x7fx-mcc9-27j7 | Inappropriate implementation in V8 in CefSharp | High CVE-2020-16013: Inappropriate implementation in V8.
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild.
There is currently little to no public information on the issue other than it has been flagged as `High` severity. | {'CVE-2020-16013'} | 2021-01-14T17:39:17Z | 2020-11-27T20:12:55Z | HIGH | 0 | {'CWE-119', 'CWE-787'} | {'https://github.com/advisories/GHSA-x7fx-mcc9-27j7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16013', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-x7fx-mcc9-27j7', 'https://crbug.com/1147206', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'} | null |
GHSA | GHSA-pvh2-pj76-4m96 | Specification non-compliance in JUMPI | ### Impact
In `evm` crate `< 0.31.0`, `JUMPI` opcode's condition is checked after the destination validity check. However, according to Geth and OpenEthereum, the condition check should happen before the destination validity check.
### Patches
This is a **high** severity security advisory if you use `evm` crate for Ethereum mainnet. In this case, you should update your library dependency immediately to on or after `0.31.0`.
This is a **low** severity security advisory if you use `evm` crate in Frontier or in a standalone blockchain, because there's no security exploit possible with this advisory. It is **not** recommended to update to on or after `0.31.0` until all the normal chain upgrade preparations have been done. If you use Frontier or other `pallet-evm` based Substrate blockchain, please ensure to update your `spec_version` before updating this. For other blockchains, please make sure to follow a hard-fork process before you update this.
### Workarounds
If you are dependent on an older version of `evm` and cannot update due to API interface changes, please contact Wei by email (wei@that.world), who will be happy to help you to publish patch releases for older `evm` versions.
### References
Fix PR: https://github.com/rust-blockchain/evm/pull/67
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the `evm` repo.
### Special thanks
Special thanks to @rakita for reporting this issue.
| {'CVE-2021-41153'} | 2021-10-25T20:07:58Z | 2021-10-19T15:28:35Z | HIGH | 8.7 | {'CWE-670'} | {'https://github.com/rust-blockchain/evm/pull/67', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41153', 'https://github.com/rust-blockchain/evm/security/advisories/GHSA-pvh2-pj76-4m96', 'https://github.com/advisories/GHSA-pvh2-pj76-4m96'} | null |
GHSA | GHSA-73q9-7pwj-gm46 | icecoder is vulnerable to Cross-site Scripting | icecoder is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-3862'} | 2022-01-21T23:46:12Z | 2022-01-21T23:46:12Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3862', 'https://github.com/advisories/GHSA-73q9-7pwj-gm46', 'https://huntr.dev/bounties/5c9c228e-2a39-4643-bb82-2b02a2b0a601'} | null |
GHSA | GHSA-vrxj-4qhw-5vwq | Malicious Package in scryptys | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-04T14:29:03Z | 2020-09-03T17:03:41Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-vrxj-4qhw-5vwq', 'https://www.npmjs.com/advisories/1407'} | null |
GHSA | GHSA-mm9x-g8pc-w292 | Denial of Service in Netty | The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder. | {'CVE-2020-11612'} | 2022-04-25T23:06:20Z | 2020-06-15T19:36:16Z | HIGH | 7.5 | {'CWE-119', 'CWE-400', 'CWE-770'} | {'https://lists.apache.org/thread.html/r88e2b91560c065ed67e62adf8f401c417e4d70256d11ea447215a70c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9addb580456807cd11d6f0c6b6373b7d7161d06d2278866c30c7febb@%3Ccommits.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf803b65b4a57589d79cf2e83d8ece0539018d32864f932f63c972844@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11612', 'https://lists.apache.org/thread.html/r14446ed58208cb6d97b6faa6ebf145f1cf2c70c0886c0c133f4d3b6f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://github.com/netty/netty/pull/9924', 'https://github.com/netty/netty/issues/6168', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r31424427cc6d7db46beac481bdeed9a823fc20bb1b9deede38557f71@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r69b23a94d4ae45394cabae012dd1f4a963996869c44c478eb1c61082@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7836bbdbe95c99d4d725199f0c169927d4e87ba57e4beeeb699c097a@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rd302ddb501fa02c5119120e5fc21df9a1c00e221c490edbe2d7ad365@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfd173eac20d5e5f581c8984b685c836dafea8eb2f7ff85f617704cf1@%3Cdev.zookeeper.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/', 'https://github.com/advisories/GHSA-mm9x-g8pc-w292', 'https://lists.apache.org/thread.html/r2958e4d49ee046e1e561e44fdc114a0d2285927501880f15852a9b53@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5b1ad61552591b747cd31b3a908d5ff2e8f2a8a6847583dd6b7b1ee7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r3195127e46c87a680b5d1d3733470f83b886bfd3b890c50df718bed1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r255ed239e65d0596812362adc474bee96caf7ba042c7ad2f3c62cec7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5a0b1f0b1c3bcd66f5177fbd6f6de2d0f8cae24a13ab2669f274251a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rff8859c0d06b1688344b39097f9685c43b461cf2bc41f60f001704e9@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ref3943adbc3a8813aee0e3a9dd919bacbb27f626be030a3c6d6c7f83@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8a654f11e1172b0effbfd6f8d5b6ca651ae4ac724a976923c268a42f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/re1ea144e91f03175d661b2d3e97c7d74b912e019613fa90419cf63f4@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9c30b7fca4baedebcb46d6e0f90071b30cc4a0e074164d50122ec5ec@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ref2c8a0cbb3b8271e5b9a06457ba78ad2028128627186531730f50ef@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r866288c2ada00ce148b7307cdf869f15f24302b3eb2128af33830997@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4a7e4e23bd84ac24abf30ab5d5edf989c02b555e1eca6a2f28636692@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5030cd8ea5df1e64cf6a7b633eff145992fbca03e8bfc687cd2427ab@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra98e3a8541a09271f96478d5e22c7e3bd1afdf48641c8be25d62d9f9@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/compare/netty-4.1.45.Final...netty-4.1.46.Final', 'https://lists.apache.org/thread.html/r4f4a14d6a608db447b725ec2e96c26ac9664d83cd879aa21e2cfeb24@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://security.netapp.com/advisory/ntap-20201223-0001/', 'https://lists.apache.org/thread.html/rf9f8bcc4ca8d2788f77455ff594468404732a4497baebe319043f4d5@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r281882fdf9ea89aac02fd2f92786693a956aac2ce9840cce87c7df6b@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3ea4918d20d0c1fa26cac74cc7cda001d8990bc43473d062867ef70d@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-3v43-877x-qgmq | Moderate severity vulnerability that affects league/commonmark | ## CVE-2019-10010
### Impact
In `league/commonmark` 0.18.2 and below, malicious users can insert double-encoded HTML entities into their Markdown like this:
```md
[XSS](javascript&colon;alert%28'XSS'%29)
```
This library would (correctly) unescape the `&` entity to `&` during the parsing step. However, **the renderer step would fail to properly re-escape the resulting `:` string**, thus producing the following malicious HTML output:
```html
<p><a href="javascript:alert('XSS')">XSS</a></p>
```
Browsers would interpret `:` as a `:` character and allow the JS to be executed when the link is clicked.
This vulnerability was present in the upstream library this project was forked from and therefore exists in all prior versions of `league/commonmark`.
### Solution
The new [0.18.3](https://github.com/thephpleague/commonmark/releases/tag/0.18.3) release mirrors [the fix made upstream](https://github.com/commonmark/commonmark.js/commit/c89b35c5fc99bdf1d2181f7f0c9fcb8a1abc27c8) - we no longer attempt to preserve entities when rendering HTML attributes like `href`, `src`, `title`, etc.
The `$preserveEntities` parameter of `Xml::escape()` is therefore no longer used internally, so it has been deprecated and marked for removal in the next major release (0.19.0).
### Credits
- Mohit Fawaz for identifying the issue
- Sebastiaan Knijnenburg and Ross Tuck for responsibly disclosing/relaying the issue
- John MacFarlane for investigating it and implementing the upstream fix we mirrored here
### References
- https://nvd.nist.gov/vuln/detail/CVE-2019-10010
- https://github.com/thephpleague/commonmark/releases/tag/0.18.3
- https://github.com/thephpleague/commonmark/issues/353
- https://github.com/FriendsOfPHP/security-advisories/blob/master/league/commonmark/CVE-2019-10010.yaml | {'CVE-2019-10010'} | 2021-08-31T21:29:59Z | 2019-09-17T22:47:47Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/thephpleague/commonmark/releases/tag/0.18.3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10010', 'https://github.com/thephpleague/commonmark/issues/353', 'https://github.com/advisories/GHSA-3v43-877x-qgmq', 'https://github.com/thephpleague/commonmark/security/advisories/GHSA-3v43-877x-qgmq'} | null |
GHSA | GHSA-77vh-xpmg-72qh | Clarify `mediaType` handling | ### Impact
In the OCI Image Specification version 1.0.1 and prior, manifest and index documents are not self-describing and documents with a single digest could be interpreted as either a manifest or an index.
### Patches
The Image Specification will be updated to recommend that both manifest and index documents contain a `mediaType` field to identify the type of document.
Release [v1.0.2](https://github.com/opencontainers/image-spec/releases/tag/v1.0.2) includes these updates.
### Workarounds
Software attempting to deserialize an ambiguous document may reject the document if it contains both “manifests” and “layers” fields or “manifests” and “config” fields.
### References
https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/opencontainers/image-spec
* Email us at [security@opencontainers.org](mailto:security@opencontainers.org)
* https://github.com/opencontainers/image-spec/commits/v1.0.2
| null | 2021-11-24T19:43:36Z | 2021-11-18T16:02:41Z | LOW | 3 | {'CWE-843'} | {'https://github.com/opencontainers/image-spec/releases/tag/v1.0.2', 'https://github.com/advisories/GHSA-77vh-xpmg-72qh', 'https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c', 'https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh', 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m'} | null |
GHSA | GHSA-4wp3-8q92-mh8w | Cross Site Request Forgery in Gitea | Cross Site Request Forgery (CSRF) vulnerability exists in Gitea before 1.5.2 via API routes.This can be dangerous especially with state altering POST requests. | {'CVE-2021-45326'} | 2022-02-15T00:18:10Z | 2022-02-09T00:00:29Z | HIGH | 0 | {'CWE-352'} | {'https://github.com/advisories/GHSA-4wp3-8q92-mh8w', 'https://github.com/go-gitea/gitea/pull/4840', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45326', 'https://github.com/go-gitea/gitea/issues/4838', 'https://blog.gitea.io/2018/10/gitea-1.5.2-is-released/'} | null |
GHSA | GHSA-84cm-x2q5-8225 | Critical severity vulnerability that affects dojox | In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid. | {'CVE-2018-15494'} | 2021-09-03T22:57:53Z | 2018-10-15T22:03:48Z | CRITICAL | 9.8 | {'CWE-116'} | {'https://github.com/advisories/GHSA-84cm-x2q5-8225', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15494', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00002.html', 'https://dojotoolkit.org/blog/dojo-1-14-released', 'https://github.com/dojo/dojox/pull/283'} | null |
GHSA | GHSA-qxx8-292g-2w66 | Improper Authentication | ### Impact
A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an an attacker to have internal knowledge of the bot.
### Patches
The problem has been patched in all affected versions. Please see the list of patched versions for the most appropriate one for your individual case.
### Workarounds
Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator which throws an exception if the Claims are Skill Claims.
For detailed instructions, see the link in the References section.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botbuilder-dotnet)
* Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com) | null | 2021-03-08T15:50:01Z | 2021-03-08T15:50:01Z | HIGH | 0 | {'CWE-287'} | {'https://github.com/advisories/GHSA-qxx8-292g-2w66', 'https://aka.ms/SkillClaimsValidationDotnet', 'https://www.nuget.org/packages/Microsoft.Bot.Connector/', 'https://github.com/microsoft/botbuilder-dotnet/security/advisories/GHSA-qxx8-292g-2w66'} | null |
GHSA | GHSA-2r9c-46v3-43fc | Downloads Resources over HTTP in haxe3 | Affected versions of `haxe3` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe3`.
## Recommendation
No patch is currently available for this vulnerability. This vulnerability has been left unpatched for several years, despite active maintenance on the package. Because of this, it appears that the package author has accepted the risk, and is unlikely to patch this package in the future.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10688'} | 2021-01-08T20:59:02Z | 2018-08-17T20:28:13Z | HIGH | 0 | {'CWE-311'} | {'https://www.npmjs.com/advisories/294', 'https://nodesecurity.io/advisories/294', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10688', 'https://github.com/advisories/GHSA-2r9c-46v3-43fc'} | null |
GHSA | GHSA-vf26-7gjf-f92r | OS Command Injection in rpi | rpi through 0.0.3 allows execution of arbritary commands. The variable pinNumbver in function GPIO within src/lib/gpio.js is used as part of the arguement of exec function without any sanitization. | {'CVE-2019-10796'} | 2021-04-13T15:23:29Z | 2021-04-13T15:23:29Z | MODERATE | 9.8 | {'CWE-78'} | {'https://github.com/xseignard/rpi/blob/master/src/lib/gpio.js#L47', 'https://snyk.io/vuln/SNYK-JS-RPI-548942', 'https://github.com/advisories/GHSA-vf26-7gjf-f92r', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10796'} | null |
GHSA | GHSA-9q5w-79cv-947m | Unsafe defaults in `remark-html` | ### Impact
The documentation of `remark-html` has mentioned that it was safe by default. In practise the default was never safe and had to be opted into. This means arbitrary HTML can be passed through leading to potential XSS attacks.
### Patches
The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation.
### Workarounds
On older affected versions, pass `sanitize: true`, like so:
```diff
- .use(remarkHtml)
+ .use(remarkHtml, {sanitize: true})
```
### References
n/a
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`remark-html`](https://github.com/remarkjs/remark-html)
* Email us at [security@unifiedjs.com](mailto:security@unifiedjs.com)
| {'CVE-2021-39199'} | 2022-04-19T19:03:07Z | 2021-09-07T23:10:56Z | CRITICAL | 10 | {'CWE-79'} | {'https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m', 'https://github.com/remarkjs/remark-html/releases/tag/14.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39199', 'https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1', 'https://www.npmjs.com/package/remark-html', 'https://github.com/advisories/GHSA-9q5w-79cv-947m'} | null |
GHSA | GHSA-wjw6-2cqr-j4qr | Client metadata path-traversal | ### Impact
In both clients (`tuf/client` and `tuf/ngclient`), there is a path traversal vulnerability that in the worst case can overwrite files ending in `.json` anywhere on the client system on a call to `get_one_valid_targetinfo()`. It occurs because the rolename is used to form the filename, and may contain path traversal characters (ie `../../name.json`).
The impact is mitigated by a few facts:
* It only affects implementations that allow arbitrary rolename selection for delegated targets metadata
* The attack requires the ability to A) insert new metadata for the path-traversing role and B) get the role delegated by an existing targets metadata
* The written file content is heavily restricted since it needs to be a valid, signed targets file. The file extension is always .json.
### Patches
A fix is available in version 0.19 or newer.
### Workarounds
None that do not require code changes. Clients can restrict the allowed character set for rolenames, or they can store metadata in files named in a way that is not vulnerable: neither of these approaches is possible without modifying python-tuf.
### References
- [The issue where this was discovered](https://github.com/theupdateframework/python-tuf/issues/1527)
- [Proof of Concept demonstrating the flaw](https://github.com/jku/path-traversal-poc)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [python-tuf](https://github.com/theupdateframework/python-tuf/issues)
* Contact the maintainers by email or Slack
| {'CVE-2021-41131'} | 2022-04-19T19:03:09Z | 2021-10-19T20:14:36Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102', 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr', 'https://github.com/theupdateframework/python-tuf/issues/1527', 'https://github.com/advisories/GHSA-wjw6-2cqr-j4qr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41131'} | null |
GHSA | GHSA-8p5p-ff7x-hw7q | Cross-Site Scripting in public | Versions of `public` prior to 0.1.4 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
Upgrade to version 0.1.4 or later. | {'CVE-2018-3747'} | 2021-09-07T20:23:17Z | 2018-10-10T17:27:58Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-8p5p-ff7x-hw7q', 'https://hackerone.com/reports/329950', 'https://hackerone.com/reports/316346', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3747', 'https://www.npmjs.com/advisories/1000'} | null |
GHSA | GHSA-8j34-9876-pvfq | Hugo can execute a binary from the current directory on Windows | ## Impact
Hugo depends on Go's `os/exec` for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system `%PATH%` on Windows. However, if a malicious file with the same name (`exe` or `bat`) is found in the current working directory at the time of running `hugo`, the malicious command will be invoked instead of the system one.
Windows users who run `hugo` inside untrusted Hugo sites are affected.
## Patches
Users should upgrade to Hugo v0.79.1. | {'CVE-2020-26284'} | 2022-04-19T19:02:43Z | 2021-06-23T17:28:26Z | HIGH | 7.7 | {'CWE-78'} | {'https://github.com/gohugoio/hugo/security/advisories/GHSA-8j34-9876-pvfq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26284', 'https://github.com/advisories/GHSA-8j34-9876-pvfq', 'https://github.com/golang/go/issues/38736'} | null |
GHSA | GHSA-ffw3-6mp6-jmvj | Improper Access Control in Airflow | Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue affects Apache Airflow 2.0.0. | {'CVE-2021-26559'} | 2021-04-07T21:05:57Z | 2021-04-07T21:05:57Z | MODERATE | 6.5 | {'CWE-284', 'CWE-269'} | {'https://github.com/apache/airflow/blob/486b76438c0679682cf98cb88ed39c4b161cbcc8/CHANGELOG.txt', 'http://www.openwall.com/lists/oss-security/2021/02/17/1', 'https://lists.apache.org/thread.html/r3b3787700279ec361308cbefb7c2cce2acb26891a12ce864e4a13c8d%40%3Cusers.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-ffw3-6mp6-jmvj', 'https://lists.apache.org/thread.html/rd142565996d7ee847b9c14b8a9921dcf80bc6bc160e3d9dca6dfc2f8@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26559'} | null |
GHSA | GHSA-vhxc-fhm5-qcp9 | Prototype Pollution in bodymen | The package bodymen from 0.0.0 are vulnerable to Prototype Pollution via the handler function which could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. **Note:** This vulnerability derives from an incomplete fix to [CVE-2019-10792](https://security.snyk.io/vuln/SNYK-JS-BODYMEN-548897) | {'CVE-2022-25296'} | 2022-03-21T19:38:25Z | 2022-03-18T00:01:11Z | MODERATE | 6.3 | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25296', 'https://github.com/advisories/GHSA-vhxc-fhm5-qcp9'} | null |
GHSA | GHSA-jm56-5h66-w453 | Repository index file allows for duplicates of the same chart entry in helm | ### Impact
During a security audit of Helm's code base, security researchers at Trail of Bits identified a bug in which the a Helm repository can contain duplicates of the same chart, with the last one always used. If a repository is compromised, this lowers the level of access that an attacker needs to inject a bad chart into a repository.
To perform this attack, an attacker must have write access to the index file (which can occur during a MITM attack on a non-SSL connection).
### Patches
This issue has been patched in Helm 3.3.2 and 2.16.11
### Workarounds
- do not install charts from repositories you do not trust
- fetch charts using a secure channel of communication (such as TLS)
- use `helm pull` to fetch the chart, then review the chart’s content (either manually, or with `helm verify` if it has been signed) to ensure it has not been tampered with
- manually review the index file in the Helm repository cache before installing software. | {'CVE-2020-15185'} | 2021-05-24T16:57:06Z | 2021-05-24T16:57:06Z | LOW | 2.2 | {'CWE-74', 'CWE-20', 'CWE-694'} | {'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15185', 'https://github.com/helm/helm/commit/055dd41cbe53ce131ab0357524a7f6729e6e40dc', 'https://github.com/advisories/GHSA-jm56-5h66-w453', 'https://github.com/helm/helm/security/advisories/GHSA-jm56-5h66-w453'} | null |
GHSA | GHSA-r6j9-8759-g62w | Improper Restriction of XML External Entity Reference in jackson-mapper-asl | A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar to CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes. | {'CVE-2019-10172'} | 2021-09-28T17:06:06Z | 2020-02-04T22:39:19Z | HIGH | 7.5 | {'CWE-611'} | {'https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html', 'https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d@%3Cissues.hive.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html', 'https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac@%3Ccommon-issues.hadoop.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10172', 'https://github.com/advisories/GHSA-r6j9-8759-g62w', 'https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb@%3Cissues.hive.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10172', 'https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe@%3Cuser.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1@%3Ccommits.cassandra.apache.org%3E'} | null |
GHSA | GHSA-mvch-rh6h-2m47 | Malicious Package in equest | All versions of `equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:09:55Z | 2020-09-11T21:10:29Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-mvch-rh6h-2m47', 'https://www.npmjs.com/advisories/867'} | null |
GHSA | GHSA-gc79-gh4f-9g6w | Server Side Template Injection in MCMS | MCMS v5.2.5 was discovered to contain a Server Side Template Injection (SSTI) vulnerability via the Template Management module. | {'CVE-2021-46063'} | 2022-03-01T21:32:00Z | 2022-02-19T00:01:24Z | CRITICAL | 9.1 | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-46063', 'https://github.com/advisories/GHSA-gc79-gh4f-9g6w', 'https://github.com/ming-soft/MCMS/issues/59'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.