ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-cccf-7xw3-p2vr
HTTP Request Smuggling in Undertow
A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.
{'CVE-2020-10719'}
2022-02-11T21:12:26Z
2021-04-30T17:28:33Z
MODERATE
6.5
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-10719', 'https://github.com/advisories/GHSA-cccf-7xw3-p2vr', 'https://security.netapp.com/advisory/ntap-20220210-0014/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10719'}
null
GHSA
GHSA-38j9-7pp9-2hjw
Invalid session token expiration
HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2.
{'CVE-2021-32923'}
2021-06-17T20:00:43Z
2021-06-08T18:52:05Z
HIGH
7.4
{'CWE-613'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32923', 'https://www.hashicorp.com/blog/category/vault/', 'https://github.com/advisories/GHSA-38j9-7pp9-2hjw', 'https://discuss.hashicorp.com/t/hcsec-2021-15-vault-renewed-nearly-expired-leases-with-incorrect-non-expiring-ttls/24603'}
null
GHSA
GHSA-p7v4-gm6j-cw9m
XSS in Mautic
### Impact This is a cross-site scripting vulnerability relating to creating/editing a company which requires the user to be logged in as an administrator to be executed. This vulnerability was reported by Dardan Prebreza at Bishop Fox. ### Patches Upgrade to 3.2.4 or 2.16.5. Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff ### Workarounds None ### References https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4 ### For more information If you have any questions or comments about this advisory: * Post in https://forum.mautic.org/c/support * Email us at security@mautic.org
{'CVE-2021-3142'}
2022-04-19T19:02:44Z
2021-01-29T20:51:20Z
HIGH
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3142', 'https://github.com/advisories/GHSA-p7v4-gm6j-cw9m', 'https://github.com/mautic/mautic/commit/ba31db23e664f889da55a29ff27f797e2ab5cb1b', 'https://github.com/mautic/mautic/releases/tag/3.2.4', 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-3', 'https://github.com/mautic/mautic/security/advisories/GHSA-p7v4-gm6j-cw9m'}
null
GHSA
GHSA-h79p-32mx-fjj9
Apache Camel Netty enables Java deserialization by default
Apache Camel Netty enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0.
{'CVE-2020-11973'}
2021-06-15T17:45:54Z
2020-05-21T21:09:04Z
HIGH
9.8
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-h79p-32mx-fjj9', 'https://camel.apache.org/security/CVE-2020-11973.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11973', 'http://www.openwall.com/lists/oss-security/2020/05/14/9'}
null
GHSA
GHSA-wjr4-2jgw-hmv8
Command Injection in whereis
Versions of `whereis` before 0.4.1 are vulnerable to command injection if untrusted user input is passed into `whereis`. ## Recommendation Update to version 0.4.1 or later.
{'CVE-2018-3772'}
2021-01-08T01:56:37Z
2018-07-31T18:28:53Z
HIGH
0
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3772', 'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b', 'https://hackerone.com/reports/319476', 'https://www.npmjs.com/advisories/604', 'https://github.com/advisories/GHSA-wjr4-2jgw-hmv8'}
null
GHSA
GHSA-pjj4-jjgc-h3r8
Authenticated remote code execution
### Impact Authenticated remote code execution using plugin manager without ACL permissions. ### Patches We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021
null
2021-03-12T23:09:24Z
2021-03-12T23:09:24Z
MODERATE
0
{'CWE-74'}
{'https://github.com/advisories/GHSA-pjj4-jjgc-h3r8', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021', 'https://github.com/shopware/platform/security/advisories/GHSA-pjj4-jjgc-h3r8'}
null
GHSA
GHSA-cqcf-4g4h-rghf
Cross-site scripting in Apache Archiva
In Apache Archiva before 2.2.4, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
{'CVE-2019-0213'}
2021-12-03T14:35:02Z
2019-05-14T04:00:31Z
MODERATE
6.5
{'CWE-79'}
{'http://archiva.apache.org/security.html#CVE-2019-0213', 'https://seclists.org/bugtraq/2019/Apr/47', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0213', 'http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html', 'https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-cqcf-4g4h-rghf', 'https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97@%3Cusers.maven.apache.org%3E', 'http://www.securityfocus.com/bid/108123', 'https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E', 'https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3@%3Cusers.archiva.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/30/7'}
null
GHSA
GHSA-93c4-vf86-3rj7
Reflected cross-site scripting in vaadin-menu-bar webjar resources in Vaadin 14
Missing output sanitization in test sources in `org.webjars.bowergithub.vaadin:vaadin-menu-bar` versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL.
{'CVE-2021-33611'}
2021-11-04T17:03:37Z
2021-11-03T17:33:32Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/vaadin/platform/security/advisories/GHSA-93c4-vf86-3rj7', 'https://vaadin.com/security/cve-2021-33611', 'https://github.com/vaadin/vaadin-menu-bar/pull/126', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33611', 'https://github.com/advisories/GHSA-93c4-vf86-3rj7'}
null
GHSA
GHSA-ppfm-rj6p-38q6
Improper Authorization in librenms
Improper Authorization in Packagist librenms/librenms prior to 22.2.0.
{'CVE-2022-0587'}
2022-02-24T12:14:15Z
2022-02-16T00:01:53Z
HIGH
7.1
{'CWE-285'}
{'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://github.com/advisories/GHSA-ppfm-rj6p-38q6', 'https://huntr.dev/bounties/0c7c9ecd-33ac-4865-b05b-447ced735469', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0587', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html'}
null
GHSA
GHSA-x5m8-2r8v-8f97
Prototype Pollution in libnested
The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)
{'CVE-2022-25352'}
2022-03-29T22:05:38Z
2022-03-18T00:01:11Z
CRITICAL
9.8
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25352', 'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1', 'https://github.com/dominictarr/libnested/blob/master/index.js%23L22', 'https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117', 'https://github.com/advisories/GHSA-x5m8-2r8v-8f97'}
null
GHSA
GHSA-h58v-g3q6-q9fx
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in sulu/sulu
### Impact _What kind of vulnerability is it? Who is impacted?_ It is an issue when input HTML into the Tag name. The HTML is execute when the tag name is listed in the auto complete form. Only admin users are affected and only admin users can create tags. ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem is patched with Version 1.6.42. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Create a custom request listener to avoid that this kind of tags are created. ### References _Are there any links users can visit to find out more?_ Currently not. ### For more information If you have any questions or comments about this advisory: * Open an issue in [sulu/sulu repository](https://github.com/sulu/sulu/issues) * Email us at [security@sulu.io](mailto:security@sulu.io)
{'CVE-2021-41169'}
2021-10-22T16:20:53Z
2021-10-22T16:20:53Z
MODERATE
6.2
{'CWE-79'}
{'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445', 'https://github.com/sulu/sulu/security/advisories/GHSA-h58v-g3q6-q9fx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41169', 'https://github.com/advisories/GHSA-h58v-g3q6-q9fx'}
null
GHSA
GHSA-6whf-q6p5-84wg
Improper Access Control in Webauthn Framework
Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence.
{'CVE-2021-38299'}
2021-10-06T13:23:36Z
2021-09-29T17:16:07Z
CRITICAL
9.8
{'CWE-863'}
{'https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2021-1-fehlende-ueberpruefung-von-user-presence-in-webauthn-framework/', 'https://github.com/web-auth/webauthn-framework/commit/572e239c5702667ca52487faf861abc768a46308', 'https://github.com/advisories/GHSA-6whf-q6p5-84wg', 'https://github.com/web-auth/webauthn-framework/releases', 'https://github.com/web-auth/webauthn-framework/releases/tag/v3.3.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38299'}
null
GHSA
GHSA-4h44-w6fm-548g
Potential Remote Code Execution in TYPO3 with mediace extension
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1) > * CWE-325, CWE-20, CWE-200, CWE-502 ### Problem It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message authentication code (HMAC-SHA1) and can lead to various attack chains as described below. * [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007), [CVE-2020-15099](https://nvd.nist.gov/vuln/detail/CVE-2020-15099): Potential Privilege Escalation + the database server used for a TYPO3 installation must be accessible for an attacker (either via internet or shared hosting network) + `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5, high) * [TYPO3-CORE-SA-2016-013](https://typo3.org/security/advisory/typo3-core-sa-2016-013), [CVE-2016-5091](https://nvd.nist.gov/vuln/detail/CVE-2016-5091): Insecure Deserialization & Remote Code Execution + an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation + `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1, critical) The overall severity of this vulnerability is critical (9.1) based on mentioned attack chains and the fact it does not require any privileges. ### Solution In case the extension is not used and required at all, it is suggested to uninstall and remove it from the system completely. Otherwise, an updated version 7.6.5 is available from the TYPO3 extension manager, Packagist and the TYPO3 extension repository: * https://extensions.typo3.org/extension/download/mediace/7.6.5/zip/ * https://packagist.org/packages/friendsoftypo3/mediace#7.6.5 As a precautionary measure it is advised to change `encryptionKey` and database credentials in `typo3conf/LocalConfiguration.php`. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue. ### References * [TYPO3-EXT-SA-2020-014](https://typo3.org/security/advisory/typo3-ext-sa-2020-014)
{'CVE-2020-15086'}
2022-04-19T19:02:30Z
2020-07-29T16:15:12Z
HIGH
9.8
{'CWE-200', 'CWE-325', 'CWE-20', 'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15086', 'https://github.com/FriendsOfTYPO3/mediace/commit/fa29ffd3e8b275782a8600d2406e1b1e5e16ae75', 'https://github.com/FriendsOfTYPO3/mediace/pull/31', 'https://github.com/FriendsOfTYPO3/mediace/security/advisories/GHSA-4h44-w6fm-548g', 'https://github.com/advisories/GHSA-4h44-w6fm-548g'}
null
GHSA
GHSA-6g85-3hm8-83f9
CHECK-fail in `QuantizeAndDequantizeV4Grad`
### Impact An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.QuantizeAndDequantizeV4Grad`: ```python import tensorflow as tf gradient_tensor = tf.constant([0.0], shape=[1]) input_tensor = tf.constant([0.0], shape=[1]) input_min = tf.constant([[0.0]], shape=[1, 1]) input_max = tf.constant([[0.0]], shape=[1, 1]) tf.raw_ops.QuantizeAndDequantizeV4Grad( gradients=gradient_tensor, input=input_tensor, input_min=input_min, input_max=input_max, axis=0) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L162-L163) does not validate the rank of the `input_*` tensors. In turn, this results in the tensors being passes as they are to [`QuantizeAndDequantizePerChannelGradientImpl`](https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.h#L295-L306): ```cc template <typename Device, typename T> struct QuantizeAndDequantizePerChannelGradientImpl { static void Compute(const Device& d, typename TTypes<T, 3>::ConstTensor gradient, typename TTypes<T, 3>::ConstTensor input, const Tensor* input_min_tensor, const Tensor* input_max_tensor, typename TTypes<T, 3>::Tensor input_backprop, typename TTypes<T>::Flat input_min_backprop, typename TTypes<T>::Flat input_max_backprop) { ... auto input_min = input_min_tensor->vec<T>(); auto input_max = input_max_tensor->vec<T>(); ... } ``` However, the `vec<T>` method, requires the rank to 1 and triggers a `CHECK` failure otherwise. ### Patches We have patched the issue in GitHub commit [20431e9044cf2ad3c0323c34888b192f3289af6b](https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 as this is the only other affected version. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29544'}
2021-05-21T14:23:22Z
2021-05-21T14:23:22Z
LOW
2.5
{'CWE-754'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29544', 'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9', 'https://github.com/advisories/GHSA-6g85-3hm8-83f9'}
null
GHSA
GHSA-gp6j-vx54-5pmf
Incorrect validation of parties IDs leaks secret keys in Secret-sharing scheme
# Summary In the threshold signature scheme, participants start by dividing secrets into shares using a secret sharing scheme. The Verifiable Secret Sharing scheme generates shares from the user’s IDs but does not properly validate them. Using a malicious ID will make other users reveal their secrets during the secret-sharing procedure. In addition, a second issue resulting from lack of validation could cause nodes to crash when sent maliciously formed user IDs. # Details The creation of Parties IDs does not properly validate for maliciously chosen IDs. Parties generate the secret shares in `binance-chain/tss-lib` codebase that `keep-network/keep-ecdsa` uses by evaluating the polynomial with the other parties’ IDs. It is critical that these party ids are non-zero because evaluating the polynomial at point 0 reveals the secret. There is a check that these ids are not zero, but this is insufficient since it is not performed modulo the curve order. Therefore, one can set their ID equal to the order of the elliptic curve, which equals 0 during the polynomial evaluation modulo the curve order. ``` shares := make(Shares, num) for i := 0; i < num; i++ { if indexes[i].Cmp(big.NewInt(0)) == 0 { return nil, nil, fmt.Errorf("party index should not be 0") } share := evaluatePolynomial(ec, threshold, poly, indexes[i]) shares[i] = &Share{Threshold: threshold, ID: indexes[i], Share: share} } ``` (https://github.com/binance-chain/tss-lib/blob/73560daec7f83d7355107ea9b5e59d16de8765be/crypto/vss/feldman_vss.go#L64-L70) Thus, a party with an ID equal to the order of the curve will receive the secret key as its share. Another issue with the tss-lib implementation was the lack of verification for modularly equal user IDs that can cause nodes to crash during key generation or resharing. # Timeline ### 6 December 2021, 20:28 CET The team is informed by Trail of Bits about the issue in `binance-chain/tss-lib`. The vulnerability was already disclosed with Binance and they have implemented fixes in their recent commits. We are advised to update our dependency to the most recent `binance-chain/tss-lib` version. ### 7 December 2021, 9:10 CET The team confirms with Trail of Bits we started the work on a fix. ### 7 December 2021, 20:03 CET The team informs Trail of Bits that we found a potential problem in Binance's fix that may lead to the signing code failing with Go panic. We identified the problematic line and suggested its removal. To address the vulnerability in the protocol, it is required to ensure that: - all indexes are non-zero, - all indexes are non-zero modulo the curve order, - all indexes are unique modulo the curve order. The first two are guarded in `CheckIndexes` function by: ``` vMod := new(big.Int).Mod(v, ec.Params().N) if vMod.Cmp(zero) == 0 { return nil, errors.New("party index should not be 0") } ``` The last one is guarded by: ``` if sortutil.Dedupe(sortutil.BigIntSlice(dup)) < len(indexes) { return nil, errors.New("duplicate in indexes") } ``` However, `CheckIndexes` was additionally modified to update values of passed indexes by doing `indexes[i] = vMod`. This line was not backward-compatible and caused signatures to fail with `panic: runtime error: invalid memory address or nil pointer dereference` in case the signing group was generated with at least one `PartyID.Key` higher than `ec.Params().N`. This would also be problematic for new code that constructs such `PartyID` - we tested that key generation completed successfully but signing failed with the mentioned panic. ### 8 December 2021, 12:49 CET Trail of Bits confirmed the line we flagged is not critical to the security of the protocol. ### 8 December 2021, 15:29 CET The team informed Trail of Bits we are planning to open a PR to `binance-chain/tss-lib` with a fix and we suggest extending the embargo for communicating this issue for one more week, until Friday, Dec 17h to give everyone more time update their code given the problem was found. We also ask Trail of Bits to get in touch with Binance to review our fix given that we are not going to provide a sufficient explanation in the commit and PR description to do not threaten the security of projects that have already upgraded their dependency. ### 8 December 2021, 18:17 CET The team informs Trail of Bits about opening a PR https://github.com/binance-chain/tss-lib/pull/155 and explains all the details of the issue. The problematic scenario is: 1. We start the keygen by creating `PartyID` for each member. The `PartyID` struct has `Id` and `Key` fields. We set `PartyID.Key` that is higher than the elliptic curve's `N`. 2. This goes to tss-lib which starts the round 1 code (`ecdsa/keygen/round_1.go`). It takes `PartyID.Key` of each member and assembles the `ids` slice. This slice is thrown into `CheckIndexes` which overwrites each element by doing the modulo `N`. 3. After returning from `CheckIndexes` the modified `ids` slice is used to set the `Ks` slice in the final `LocalPartySaveData` which is received by each group member as keygen final result. 4. Each member takes this `LocalPartySaveData` and saves it on disk. 5. Upon signing, we do the same as in point 1, so we construct `PartyID`s in the same way and start the protocol. At this point, `PartyID.Key` is higher than curve's `N`. 6. Before starting round 1 of signing, `LocalPartySaveData` obtained at keygen and our `PartyID`s built at point 5 are used in `BuildLocalSaveDataSubset` to build a new `LocalPartySaveData` instance. 7. `BuildLocalSaveDataSubset` is the place where things go wrong because `Key` field of each `PartyID` from point 5 doesn't correspond to encoded `Ks` elements of `LocalPartySaveData` obtained after keygen, the final `LocalPartySaveData` is corrupted, and cause panic upon validation before signing round 1. ### 8 December 2021, 21:50 CET Trail of Bits confirms they are going to followup with Binance and they agree to extend the embargo by a week. ### 8 December 2021, 15:16 CET Trail of Bits validates the problematic scenario we described and our fix. Trail of Bits reaches to Binance and recommends merging our fix and in addition to some other fixes that would secure the code to do not panic even if `LocalPartySaveData` has corrupted data. ### 10 December 2021, 8:16 CET Binance merges our fix https://github.com/binance-chain/tss-lib/commit/cd95cee01ea2af6d4aa8316612803be944d5369a ### 13 December 2021, 8:35 CET Binance applies more fixes so that even in case of `LocalPartySaveData` corrupted, the code is not going to panic. ### 15 December 2021 The team releases a new version of the client, v1.8.1, and announces the need for an upgrade. https://github.com/keep-network/keep-ecdsa/releases/tag/v1.8.1
null
2022-01-06T18:30:26Z
2022-01-06T18:30:26Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-gp6j-vx54-5pmf', 'https://github.com/keep-network/keep-ecdsa/security/advisories/GHSA-gp6j-vx54-5pmf', 'https://github.com/keep-network/keep-ecdsa/releases/tag/v1.8.1'}
null
GHSA
GHSA-v54f-xcmp-43cr
Deserialization of Untrusted Data in Apache ShardingSphere
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere&#39;s web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
{'CVE-2020-1947'}
2022-02-10T20:39:47Z
2022-02-10T20:39:47Z
HIGH
9.8
{'CWE-502'}
{'https://github.com/advisories/GHSA-v54f-xcmp-43cr', 'https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1947'}
null
GHSA
GHSA-76f4-fw33-6j2v
Potential sensitive data exposure in applications using Vaadin 15
Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController` - https://vaadin.com/security/cve-2020-36319
null
2022-04-19T19:02:54Z
2021-04-19T14:48:26Z
LOW
3.1
{'CWE-200'}
{'https://github.com/vaadin/platform/security/advisories/GHSA-76f4-fw33-6j2v', 'https://github.com/advisories/GHSA-76f4-fw33-6j2v', 'https://vaadin.com/security/cve-2020-36319'}
null
GHSA
GHSA-2p89-ppc2-mrq4
Cross site scripting in getgrav/grav
User input is not properly sanitized leading to cross site scrpting (xss) in grav.
{'CVE-2022-0743'}
2022-03-18T20:45:47Z
2022-03-02T00:00:22Z
MODERATE
4.6
{'CWE-79'}
{'https://github.com/advisories/GHSA-2p89-ppc2-mrq4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0743', 'https://github.com/getgrav/grav/commit/3dd0cabeac9835fe64dcb4b68c658b39f1f6be2f', 'https://huntr.dev/bounties/32ea4ddb-5b41-4bf9-b5a1-ef455fe2d293'}
null
GHSA
GHSA-5mc5-5j6c-qmf9
High severity vulnerability that affects cfscrape
An issue was discovered in cloudflare-scrape 1.6.6 through 1.7.1. A malicious website owner could craft a page that executes arbitrary Python code against any cfscrape user who scrapes that website. This is fixed in 1.8.0.
{'CVE-2017-7235'}
2021-09-01T22:16:39Z
2018-07-13T16:01:01Z
HIGH
8.8
{'CWE-20'}
{'https://github.com/Anorov/cloudflare-scrape/releases/tag/1.8.0', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7235', 'https://github.com/Anorov/cloudflare-scrape/issues/97', 'http://www.securityfocus.com/bid/97191', 'https://github.com/advisories/GHSA-5mc5-5j6c-qmf9'}
null
GHSA
GHSA-9272-59x2-gwf2
Malicious Package in ripedm160
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:04:39Z
2020-09-03T17:04:13Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-9272-59x2-gwf2', 'https://www.npmjs.com/advisories/1404'}
null
GHSA
GHSA-rpx7-33j2-xx9x
Arbitrary file deletion in NeMo ASR webapp
### Description NVIDIA NeMo contains a vulnerability in ASR WebApp, where Relative Path Traversal (CWE-23) may lead to deletion of any directory through the "../" structure when admin privileges are available. CVSS Score = 2.0 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N ### Impact When the optional tool ASR Webapp (https://github.com/NVIDIA/NeMo/tree/main/tools/asr_webapp) is used prior to commit https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0, some interfaces do not verify user input. Malicious attackers can construct malicious requests to delete any directory through the "../" structure. The vulnerability affects only cases where this particular web app is started by a user with superuser permissions. The web application is *not* a part of the regular pip release or the corresponding container, and impacts only users that clone the repository in its entirety and execute the web app (while also possessing superuser permissions). ## Patches This vulnerability has been patched via https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0, which is effectively any clone of the repository post r1.5.1 branch. Since the web app is not distributed via pip release or container, users who clone the main branch post this commit will possess the patch. ### Workarounds The changes in commit https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0 can be applied to any version of the web app without any adverse effect. ### Additional Information Exploit Found on: 2021.12.16 Exploit Found by: @haby0
null
2022-04-20T21:03:58Z
2022-02-15T01:57:18Z
LOW
2
null
{'https://github.com/NVIDIA/NeMo/security/advisories/GHSA-rpx7-33j2-xx9x', 'https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0', 'https://github.com/advisories/GHSA-rpx7-33j2-xx9x'}
null
GHSA
GHSA-685w-vc84-wxcx
Moderate severity vulnerability that affects doorkeeper
Cross-site request forgery (CSRF) vulnerability in doorkeeper before 1.4.1 allows remote attackers to hijack the authentication of unspecified victims for requests that read a user OAuth authorization code via unknown vectors.
{'CVE-2014-8144'}
2021-09-01T22:45:16Z
2018-09-17T21:55:22Z
MODERATE
0
{'CWE-352'}
{'https://github.com/doorkeeper-gem/doorkeeper/blob/master/CHANGELOG.md', 'http://seclists.org/oss-sec/2014/q4/1076', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99342', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8144', 'https://github.com/advisories/GHSA-685w-vc84-wxcx'}
null
GHSA
GHSA-2g9q-chq2-w8qw
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
Apache Hive 2.1.x before 2.1.2, 2.2.x before 2.2.1, and 2.3.x before 2.3.1 expose an interface through which masking policies can be defined on tables or views, e.g., using Apache Ranger. When a view is created over a given table, the policy enforcement does not happen correctly on the table for masked columns.
{'CVE-2017-12625'}
2021-08-30T21:36:58Z
2019-03-14T15:40:16Z
MODERATE
4.3
{'CWE-200'}
{'http://mail-archives.apache.org/mod_mbox/hive-user/201710.mbox/%3C3791103E-80D5-4E75-AF23-6F8ED54DDEBE%40apache.org%3E', 'http://www.securityfocus.com/bid/101686', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12625', 'https://github.com/advisories/GHSA-2g9q-chq2-w8qw'}
null
GHSA
GHSA-pqg8-crx9-g8m4
Backend Same-Site Request Forgery in TYPO3 CMS
> ### Meta > * CVSS v3.1: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C > * CWE-352 > * CWE-346 ### Problem It has been discovered that backend user interface and install tool are vulnerable to same-origin request forgery. A backend user can be tricked into interacting with a malicious resource an attacker previously managed to upload to the web server - scripts are then executed with the privileges of the victims' user session. In a worst case scenario new admin users can be created which can directly be used by an attacker. The vulnerability is basically a cross-site request forgery (CSRF) triggered by a cross-site scripting vulnerability (XSS) - but happens on the same target host - thus, it’s actually a same-origin request forgery. Malicious payload such as HTML containing JavaScript might be provided by either an authenticated backend user or by a non-authenticated user using a 3rd party extension - e.g. file upload in a contact form with knowing the target location. The attacked victim requires an active and valid backend or install tool user sessions at the time of the attack to be successful. ### Solution Update to TYPO3 versions 9.5.17 or 10.4.2 that mitigates the problem described. ### Additional Considerations The deployment of additional mitigation techniques is suggested as described below. #### Sudo Mode Extension This TYPO3 extension intercepts modifications to security relevant database tables, e.g. those storing user accounts or storages of the file abstraction layer. Modifications need to confirmed by again by the acting user with providing their password again - this technique is known as "sudo mode". This way unintended actions happening in the background can be mitigated. * https://github.com/FriendsOfTYPO3/sudo-mode * https://extensions.typo3.org/extension/sudo_mode #### Content Security Policy [Content Security Policies](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy) tell (modern) browsers how resources served a particular site are handled - it also it possible to disallow script executions for specific locations. In a TYPO3 context it is suggested to disallow direct script execution at least for locations `/fileadmin/` and `/uploads/`. ``` # in fileadmin/.htaccess <IfModule mod_headers.c> Header add Content-Security-Policy "default-src 'self'; script-src 'none';" </IfModule> ``` ### Credits Thanks to Matteo Bonaker who reported this issue and to TYPO3 security team member Oliver Hader who fixed the issue. ### References * https://typo3.org/security/advisory/typo3-core-sa-2020-006
{'CVE-2020-11069'}
2022-04-19T19:02:26Z
2020-05-13T23:40:09Z
HIGH
8
{'CWE-352', 'CWE-346'}
{'https://github.com/advisories/GHSA-pqg8-crx9-g8m4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11069', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-pqg8-crx9-g8m4'}
null
GHSA
GHSA-886v-mm6p-4m66
High severity vulnerability that affects gun
## Urgent Upgrade The static file server module included with GUN had a **serious vulnerability**: - Using `curl --path-as-is` allowed reads on any parent directory or files. This did not work via the browser or via curl without as-is option. ### Fixed This has been fixed since version `0.2019.416` and higher. ### Who Was Effected? Most NodeJS users who use the default setup, such as: - `npm start` - `node examples/http.js` - `Heroku` 1-click-deploy - `Docker` - `Now` If you have a custom NodeJS code then you are probably safe *unless* you have something like `require('http').createServer(Gun.serve(__dirname))` in it. If you have not upgraded, it is **mandatory** or else it is highly likely your environment variables and AWS (or other) keys could be leaked. ### Credit It was reported and fixed by [JK0N](https://github.com/amark/gun/pull/527), but I did not understand the `--path-as-is` condition. Joonas Loppi from [function61](http://function61.com) rediscovered it and explained the urgency to me to fix it.
null
2022-04-19T19:02:22Z
2019-06-05T09:48:02Z
HIGH
0
{'CWE-22'}
{'https://github.com/amark/gun/security/advisories/GHSA-886v-mm6p-4m66', 'https://github.com/advisories/GHSA-886v-mm6p-4m66'}
null
GHSA
GHSA-33f9-j839-rf8h
Prototype Pollution in immer
This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "__proto__" || p === "constructor") in applyPatches_ returns false if p is ['__proto__'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.
{'CVE-2021-23436'}
2021-09-13T20:27:53Z
2021-09-02T17:17:37Z
CRITICAL
9.8
{'CWE-843', 'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-IMMER-1540542', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23436', 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266', 'https://github.com/advisories/GHSA-33f9-j839-rf8h'}
null
GHSA
GHSA-pgh6-m65r-2rhq
DOS and Open Redirect with user input
### Impact A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`. A DOS vulnerability is possible if the URL contains invalid characters `curl --path-as-is "http://localhost:3000//^/.."` The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`. ### Patches The issue has been patched in `fastify-static@4.4.1` ### Workarounds If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option. ### References + Bug founder: drstrnegth + [hackerone Report](https://hackerone.com/reports/1361804) ### For more information If you have any questions or comments about this advisory: * Open an issue in [fastify-static](https://github.com/fastify/fastify-static) * Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
{'CVE-2021-22964'}
2021-10-21T14:57:14Z
2021-10-12T16:04:17Z
HIGH
8.8
{'CWE-248', 'CWE-601'}
{'https://hackerone.com/reports/1361804', 'https://github.com/fastify/fastify-static/security/advisories/GHSA-pgh6-m65r-2rhq', 'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4', 'https://github.com/advisories/GHSA-pgh6-m65r-2rhq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22964'}
null
GHSA
GHSA-g7v2-2qxx-wjrw
Symlink Attack in Libcontainer and Docker Engine
Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
{'CVE-2015-3627'}
2022-02-15T01:18:02Z
2022-02-15T01:18:02Z
MODERATE
0
{'CWE-59'}
{'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'https://github.com/advisories/GHSA-g7v2-2qxx-wjrw', 'https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'https://seclists.org/fulldisclosure/2015/May/28', 'https://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3627', 'https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba', 'https://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html'}
null
GHSA
GHSA-cj2h-ww36-v932
Improper Certificate Validation in HashiCorp Nomad
HashiCorp Nomad and Nomad Enterprise up to 0.10.2 incorrectly validated role/region associated with TLS certificates used for mTLS RPC, and were susceptible to privilege escalation. Fixed in 0.10.3.
{'CVE-2020-7956'}
2021-05-18T18:20:26Z
2021-05-18T18:20:26Z
HIGH
9.8
{'CWE-295'}
{'https://github.com/advisories/GHSA-cj2h-ww36-v932', 'https://github.com/hashicorp/nomad/pull/7023', 'https://www.hashicorp.com/blog/category/nomad/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7956', 'https://github.com/hashicorp/nomad/issues/7003'}
null
GHSA
GHSA-4w8p-x6g8-fv64
Server-Side Request Forgery in calibreweb
calibreweb prior to version 0.6.16 contains a Server-Side Request Forgery (SSRF) vulnerability.
{'CVE-2022-0339'}
2022-04-04T21:38:26Z
2022-02-01T00:48:54Z
MODERATE
6.5
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0339', 'https://github.com/janeczku/calibre-web/commit/3b216bfa07ec7992eff03e55d61732af6df9bb92', 'https://github.com/janeczku/calibre-web/releases/tag/0.6.16', 'https://github.com/janeczku/calibre-web/commit/35f6f4c727c887f8f3607fe3233dbc1980d15020', 'https://huntr.dev/bounties/499688c4-6ac4-4047-a868-7922c3eab369', 'https://github.com/advisories/GHSA-4w8p-x6g8-fv64'}
null
GHSA
GHSA-qh7x-j4v8-qw5w
Clipboard-based XSS
### Impact XSS against the user. ### Details jsuites is vulnerable to DOM based XSS if the user can be tricked into copying _anything_ from a malicious and pasting it into the html editor. This is because a part of the clipboard content is directly written to `innerHTML` causing XSS. ### References The Curious Case of Copy & Paste – on risks of pasting arbitrary content in browsers: https://research.securitum.com/the-curious-case-of-copy-paste/
{'CVE-2021-41086'}
2022-04-19T19:03:11Z
2021-09-22T20:39:26Z
HIGH
8.7
{'CWE-79'}
{'https://github.com/advisories/GHSA-qh7x-j4v8-qw5w', 'https://github.com/jsuites/jsuites/commit/fe1d3cc5e339f2f4da8ed1f9f42271fdf9cbd8d2', 'https://github.com/jsuites/jsuites/security/advisories/GHSA-qh7x-j4v8-qw5w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41086', 'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3', 'https://www.npmjs.com/package/jsuites'}
null
GHSA
GHSA-v9w2-v7j9-rjpr
Remote code execution in Eclipse Theia
In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file.
{'CVE-2021-34435'}
2021-09-13T20:27:31Z
2021-09-02T22:02:36Z
HIGH
8.8
{'CWE-668', 'CWE-942'}
{'https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018', 'https://github.com/advisories/GHSA-v9w2-v7j9-rjpr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34435', 'https://github.com/eclipse-theia/theia/pull/8759', 'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5'}
null
GHSA
GHSA-333w-rxj3-f55r
Regular Expression Denial Of Service in uri-js
Affected versions of `uri-js` is susceptible to a regular expression denial of service vulnerability when user input is sent to the `.parse()` method. ## Recommendation Update to v3.0.0 or later.
{'CVE-2017-16021'}
2021-01-08T20:04:46Z
2018-07-24T20:00:30Z
HIGH
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-333w-rxj3-f55r', 'https://nodesecurity.io/advisories/100', 'https://github.com/garycourt/uri-js/issues/12', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16021', 'https://www.npmjs.com/advisories/100'}
null
GHSA
GHSA-mq47-6wwv-v79w
Path traversal in claircore
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
{'CVE-2021-3762'}
2022-03-21T15:33:08Z
2022-03-04T00:00:16Z
HIGH
7.8
{'CWE-22'}
{'https://github.com/quay/clair/pull/1380', 'https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821', 'https://vulmon.com/exploitdetails?qidtp=maillist_oss_security&qid=d19fce9ede06e13dfb5630ece7f14f83', 'https://github.com/quay/clair/pull/1379', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3762', 'https://github.com/quay/claircore/pull/478', 'https://github.com/advisories/GHSA-mq47-6wwv-v79w', 'https://github.com/quay/claircore/commit/dff671c665141f126c072de8a744855d4916c9c7', 'https://bugzilla.redhat.com/show_bug.cgi?id=2000795'}
null
GHSA
GHSA-j8g6-2wh7-6439
Apache Tika allows Java code execution for serialized objects embedded in MATLAB files
Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization.
{'CVE-2016-6809'}
2022-04-26T21:47:40Z
2018-10-17T15:44:36Z
CRITICAL
9.8
{'CWE-502'}
{'https://dist.apache.org/repos/dist/release/tika/CHANGES-1.14.txt', 'https://github.com/advisories/GHSA-j8g6-2wh7-6439', 'https://lists.apache.org/thread.html/rfd3646bb724b66b1a9ddef69e692da2b7a727a8799551c78eedf0a0f@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6809', 'https://lists.apache.org/thread.html/d2375da29d89e679abf5d845db76d6f798fdc6f7d44f2c788e8a0fb9@%3Cuser.nutch.apache.org%3E', 'https://lists.apache.org/thread.html/e414754a6c57ce7194b731e211cd6b2cbb41f2c7000e3fb9c6b6ec78@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r2f6f6c130b12b7332f323f74d031072b1517065ce28a22346791ffb6@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/91eb639ef619b9a26b40020ca6732e7dbe457f7322ed5f1df49e411a@%3Cdev.nutch.apache.org%3E', 'http://www.securityfocus.com/bid/94247', 'http://seclists.org/bugtraq/2016/Nov/40'}
null
GHSA
GHSA-cfxm-4p54-5w7h
Directory traversal in pooledwebsocket
Affected versions of `pooledwebsocket` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation Update to version 0.0.19 or later.
{'CVE-2017-16107'}
2021-01-08T18:58:41Z
2018-07-24T00:20:57Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-cfxm-4p54-5w7h', 'https://www.npmjs.com/advisories/341', 'https://nodesecurity.io/advisories/341', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16107'}
null
GHSA
GHSA-7543-mr7h-6v86
Improper Authorization in googleapis
Versions of `googleapis` prior to 39.1.0 are vulnerable to Improper Authorization. Setting credentials to one client may apply to all clients which may cause requests to be sent with the incorrect credentials. ## Recommendation Upgrade to version 39.1.0.
null
2021-09-27T16:15:53Z
2020-09-02T16:00:26Z
HIGH
0
{'CWE-285'}
{'https://github.com/advisories/GHSA-7543-mr7h-6v86', 'https://www.npmjs.com/advisories/791', 'https://github.com/googleapis/google-api-nodejs-client/issues/1594'}
null
GHSA
GHSA-3gp6-hhfw-4gqx
Padding oracle attacks
It was found that all OWASP ESAPI for Java up to version 2.0 RC2 are vulnerable to padding oracle attacks.
{'CVE-2010-3300'}
2021-08-13T15:22:24Z
2021-08-13T15:22:24Z
MODERATE
5.9
{'CWE-649'}
{'https://www.usenix.org/legacy/events/woot10/tech/full_papers/Rizzo.pdf', 'https://github.com/advisories/GHSA-3gp6-hhfw-4gqx', 'https://nvd.nist.gov/vuln/detail/CVE-2010-3300', 'https://seclists.org/oss-sec/2010/q3/357'}
null
GHSA
GHSA-hv7x-f3pv-gpwr
Wrong memory orderings violates mutual exclusion in spin
An issue was discovered in the spin crate before 0.5.2 for Rust, when RwLock is used. Because memory ordering is mishandled, two writers can acquire the lock at the same time, violating mutual exclusion.
{'CVE-2019-16137'}
2021-08-25T20:44:46Z
2021-08-25T20:44:46Z
HIGH
7.5
{'CWE-662'}
{'https://rustsec.org/advisories/RUSTSEC-2019-0013.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16137', 'https://github.com/advisories/GHSA-hv7x-f3pv-gpwr', 'https://github.com/mvdnes/spin-rs/issues/65'}
null
GHSA
GHSA-rpcm-whqc-jfw8
Use after free in libflate
An issue was discovered in the libflate crate before 0.1.25 for Rust. MultiDecoder::read has a use-after-free, leading to arbitrary code execution.
{'CVE-2019-15552'}
2021-08-25T20:44:53Z
2021-08-25T20:44:53Z
CRITICAL
9.8
{'CWE-416'}
{'https://rustsec.org/advisories/RUSTSEC-2019-0010.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15552', 'https://github.com/sile/libflate/issues/35', 'https://github.com/advisories/GHSA-rpcm-whqc-jfw8'}
null
GHSA
GHSA-q4xr-rc97-m4xx
OS Command Injection in celery
This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.
{'CVE-2021-23727'}
2022-01-18T22:52:38Z
2022-01-06T22:22:02Z
HIGH
7.5
{'CWE-77', 'CWE-78'}
{'https://github.com/advisories/GHSA-q4xr-rc97-m4xx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23727', 'https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953', 'https://github.com/celery/celery/blob/master/Changelog.rst%23522', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/'}
null
GHSA
GHSA-5hq2-xf89-9jxq
Open Redirect in Action Pack
Impact ------ This is similar to CVE-2021-22881. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Since rails/rails@9bc7ea5, strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, config.hosts << "sub.example.com" to permit a request with a Host header value of sub-example.com. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- The following monkey patch put in an initializer can be used as a workaround. ```ruby class ActionDispatch::HostAuthorization::Permissions def sanitize_string(host) if host.start_with?(".") /\A(.+\.)?#{Regexp.escape(host[1..-1])}\z/i else /\A#{Regexp.escape host}\z/i end end end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 6-1-open-redirect.patch - Patch for 6.1 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thanks Jonathan Hefner (https://hackerone.com/jonathanhefner) for reporting this bug!
{'CVE-2021-22903'}
2021-06-23T18:26:23Z
2021-05-05T19:48:29Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://hackerone.com/reports/1148025', 'https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22903', 'https://groups.google.com/g/rubyonrails-security/c/8TxqXEtgSF0', 'https://github.com/advisories/GHSA-5hq2-xf89-9jxq'}
null
GHSA
GHSA-9xr8-8hmc-389f
Cross-Site Scripting in vant
Versions of `vant` prior to 2.1.8 are vulnerable to Cross-Site Scripting. The text value of the `Picker` component column is not sanitized, which may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 2.1.8 or later.
null
2021-08-18T22:47:16Z
2019-11-22T13:45:33Z
HIGH
9.1
{'CWE-79'}
{'https://www.npmjs.com/advisories/1157', 'https://github.com/advisories/GHSA-9xr8-8hmc-389f', 'https://snyk.io/vuln/SNYK-JS-VANT-460461', 'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a', 'https://github.com/youzan/vant/issues/4270'}
null
GHSA
GHSA-r2vw-jgq9-jqx2
Improper Authorization in @sap-cloud-sdk/core
Affected versions of `@sap-cloud-sdk/core` do not properly validate JWTs. The `verifyJwt()` function does not properly validate the URL from where the public verification key for the JWT can be downloaded. Any URL was trusted which makes it possible to provide a URL belonging to a manipulated JWT. ## Recommendation Upgrade to version 1.21.2 or later.
null
2021-10-04T21:13:11Z
2020-09-03T15:54:11Z
HIGH
0
{'CWE-285'}
{'https://github.com/advisories/GHSA-r2vw-jgq9-jqx2', 'https://www.npmjs.com/advisories/1540'}
null
GHSA
GHSA-cfc2-wjcm-c8fm
Incorrect Authorization with specially crafted requests
Envoy, which Pomerium is based on, contains two authorization related vulnerabilities: - [CVE-2021-32777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32779): incorrectly transform a URL containing a `#fragment` element, causing a mismatch in path-prefix based authorization decisions. - [CVE-2021-32779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32777): incorrectly handle duplicate headers, dropping all but the last. This may lead to incorrect routing or authorization policy decisions. ### Impact With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. ### Patches Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. ### Workarounds - This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation. ### References [envoy GSA CVE-2021-32777](https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9) [envoy GSA CVE-2021-32779](https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h) [envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ) ### For more information If you have any questions or comments about this advisory: * Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues) * Email us at [security@pomerium.com](mailto:security@pomerium.com)
{'CVE-2021-39206'}
2021-09-13T19:56:54Z
2021-09-10T17:54:25Z
HIGH
8.6
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39206', 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h', 'https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm', 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9', 'https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ', 'https://github.com/advisories/GHSA-cfc2-wjcm-c8fm'}
null
GHSA
GHSA-9x2h-hvg6-4r5p
Improper Authentication in Apache Zeppelin
In Apache Zeppelin prior to 0.8.0 the cron scheduler was enabled by default and could allow users to run paragraphs as other users without authentication.
{'CVE-2018-1317'}
2021-08-03T19:00:05Z
2019-04-24T16:06:52Z
HIGH
8.8
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1317', 'https://lists.apache.org/thread.html/ff6b995a5a3ba8db4d6b14b4d9dd487e7bf2e3bdd5b375b64a25fd06@%3Cusers.zeppelin.apache.org%3E', 'https://github.com/advisories/GHSA-9x2h-hvg6-4r5p', 'http://www.openwall.com/lists/oss-security/2019/04/23/1', 'https://zeppelin.apache.org/releases/zeppelin-release-0.8.0.html'}
null
GHSA
GHSA-cj8p-53v9-2c26
Cross-site Scripting in Bolt
Bolt before 3.6.10 has XSS via createFolder or createFile in Controller/Async/FilesystemManager.php.
{'CVE-2019-15485'}
2021-08-18T21:39:02Z
2019-11-08T15:28:11Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-cj8p-53v9-2c26', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15485', 'https://github.com/bolt/bolt/pull/7800', 'https://github.com/bolt/bolt/releases/tag/v3.6.10'}
null
GHSA
GHSA-5rqg-jm4f-cqx7
Infinite loop causing Denial of Service in colors
colors is a library for including colored text in node.js consoles. Between 07 and 09 January 2022, colors versions 1.4.1, 1.4.2, and 1.4.44-liberty-2 were published including malicious code that caused a Denial of Service due to an infinite loop. Software dependent on these versions experienced the printing of randomized characters to console and an infinite loop resulting in unbound system resource consumption. Users of colors relying on these specific versions should downgrade to version 1.4.0.
null
2022-04-19T19:03:27Z
2022-01-10T17:29:53Z
HIGH
0
{'CWE-835'}
{'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75', 'https://github.com/advisories/GHSA-5rqg-jm4f-cqx7', 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd', 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed18c5cf26'}
null
GHSA
GHSA-frpw-jrwx-hcfv
Path Traversal in node-red-contrib-huemagic
node-red-contrib-huemagic 3.0.0 is affected by hue/assets/..%2F Directory Traversal.in the res.sendFile API, used in file hue-magic.js, to fetch an arbitrary file.
{'CVE-2021-25864'}
2021-04-13T15:30:00Z
2021-04-13T15:30:00Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-frpw-jrwx-hcfv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25864', 'https://github.com/Foddy/node-red-contrib-huemagic/issues/217'}
null
GHSA
GHSA-p7h9-vf92-5fj5
Moderate severity vulnerability that affects Products.CMFPlone and Products.PasswordResetTool
Cross-site scripting (XSS) vulnerability in Plone 4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
{'CVE-2011-1948'}
2021-06-10T22:02:04Z
2018-07-23T19:50:57Z
MODERATE
0
{'CWE-79'}
{'http://plone.org/products/plone/security/advisories/CVE-2011-1948', 'http://secunia.com/advisories/44775', 'http://osvdb.org/72727', 'https://nvd.nist.gov/vuln/detail/CVE-2011-1948', 'http://securityreason.com/securityalert/8269', 'http://www.securityfocus.com/bid/48005', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67693', 'http://www.securityfocus.com/archive/1/518155/100/0/threaded', 'http://secunia.com/advisories/44776', 'https://github.com/advisories/GHSA-p7h9-vf92-5fj5'}
null
GHSA
GHSA-89rj-5ggj-3p9p
Reachable Assertion in OpenCV.
In OpenCV 3.3.1 (corresponds with OpenCV-Python 3.3.1.11), an assertion failure happens in cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp because of an incorrect integer cast.
{'CVE-2018-5269'}
2021-11-18T15:29:39Z
2021-10-12T22:03:41Z
MODERATE
5.5
{'CWE-617'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-5269', 'https://github.com/opencv/opencv/issues/10540', 'http://www.securityfocus.com/bid/106945', 'https://github.com/advisories/GHSA-89rj-5ggj-3p9p', 'https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/10563', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}
null
GHSA
GHSA-jwjq-vp53-ph6m
Directory Traversal in pytservce
Affected versions of `pytservce` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16195'}
2021-01-14T15:42:15Z
2020-09-01T18:21:44Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pytservce', 'https://nodesecurity.io/advisories/435', 'https://www.npmjs.com/advisories/435', 'https://github.com/advisories/GHSA-jwjq-vp53-ph6m', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16195'}
null
GHSA
GHSA-mmqv-m45h-q2hp
Sandbox Breakout / Arbitrary Code Execution in localeval
All versions of `localeval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `constructor.constructor`. This may allow attackers to execute arbitrary code in the system. Evaluating the payload ``` constructor.constructor("return process.env")() ``` returns the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2022-03-14T23:59:01Z
2020-09-04T15:22:40Z
CRITICAL
0
null
{'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c', 'https://github.com/espadrine/localeval/issues/9', 'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335', 'https://github.com/advisories/GHSA-mmqv-m45h-q2hp'}
null
GHSA
GHSA-hj56-84jw-67h6
Potential Denial-of-Service in bindata
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers.
{'CVE-2021-32823'}
2021-06-24T13:11:19Z
2021-06-23T23:42:04Z
LOW
3.7
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32823', 'https://rubygems.org/gems/bindata', 'https://github.com/dmendel/bindata/blob/v2.4.10/ChangeLog.rdoc#version-2410-2021-05-18-', 'https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323', 'https://github.com/dmendel/bindata/blob/master/ChangeLog.rdoc#version-2410-2021-05-18-', 'https://github.com/advisories/GHSA-hj56-84jw-67h6', 'https://github.com/rubysec/ruby-advisory-db/issues/476', 'https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/#update-bindata-dependency'}
null
GHSA
GHSA-37q6-576q-vgr7
Missing Origin Validation in parcel-bundler
Versions of `parcel-bundler` before 1.10.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation Update to version 1.10.0 or later.
{'CVE-2018-14731'}
2021-08-31T20:51:50Z
2018-10-30T20:36:53Z
HIGH
7.5
{'CWE-200'}
{'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)', 'https://github.com/parcel-bundler/parcel/pull/1794', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14731', 'https://github.com/parcel-bundler/parcel/issues/1783', 'https://github.com/advisories/GHSA-37q6-576q-vgr7', 'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages', 'https://www.npmjs.com/advisories/721'}
null
GHSA
GHSA-p435-w4xm-jj8x
Hadoop token in temp file visible to all users in Apache Gobblin
In Apache Gobblin, the Hadoop token is written to a temp file that is visible to all local users on Unix-like systems. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue.
{'CVE-2021-36151'}
2022-02-11T16:12:07Z
2022-02-06T00:01:07Z
MODERATE
5.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-p435-w4xm-jj8x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36151', 'https://lists.apache.org/thread/3cdkyxdd6xk05lsvr3l66dsnvhwyo1t0'}
null
GHSA
GHSA-6445-fm66-fvq2
Integer overflows in Tensorflow
### Impact The [implementation of `AddManySparseToTensorsMap`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc) is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service): ```python import tensorflow as tf import numpy as np tf.raw_ops.AddManySparseToTensorsMap( sparse_indices=[(0,0),(0,1),(0,2),(4,3),(5,0),(5,1)], sparse_values=[1,1,1,1,1,1], sparse_shape=[2**32,2**32], container='', shared_name='', name=None) ``` We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The latter is an instance of [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and is easily fixed by replacing a call to `TensorShape` constructor with a call to `BuildTensorShape` static helper factory. ### Patches We have patched the issue in GitHub commits [b51b82fe65ebace4475e3c54eb089c18a4403f1c](https://github.com/tensorflow/tensorflow/commit/b51b82fe65ebace4475e3c54eb089c18a4403f1c) and [a68f68061e263a88321c104a6c911fe5598050a8](https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
{'CVE-2022-23568'}
2022-02-11T17:05:21Z
2022-02-09T23:39:11Z
MODERATE
6.5
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6445-fm66-fvq2', 'https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc', 'https://github.com/tensorflow/tensorflow/commit/b51b82fe65ebace4475e3c54eb089c18a4403f1c', 'https://github.com/advisories/GHSA-6445-fm66-fvq2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23568'}
null
GHSA
GHSA-g636-q5fc-4pr7
accounts: Hash account number using Salt
@alovak found that currently when we build hash of account number we do not "salt" it. Which makes it vulnerable to rainbow table attack. **What did you expect to see?** I expected salt (some random number from configuration) to be used in [hash.AccountNumber](https://github.com/moov-io/customers/blob/master/pkg/secrets/hash/account_number.go#L13) I would generate salt per tenant at least (maybe per organization).
null
2021-05-24T17:00:27Z
2021-05-24T17:00:27Z
LOW
0
null
{'https://github.com/advisories/GHSA-g636-q5fc-4pr7', 'https://github.com/moov-io/customers/security/advisories/GHSA-g636-q5fc-4pr7'}
null
GHSA
GHSA-vxhx-gmhm-623c
Improper Access Control in moodle
Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
{'CVE-2020-25698'}
2021-03-29T20:42:46Z
2021-03-29T20:42:46Z
HIGH
7.5
{'CWE-284'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25698', 'https://github.com/advisories/GHSA-vxhx-gmhm-623c', 'https://moodle.org/mod/forum/discuss.php?d=413935', 'https://github.com/moodle/moodle/commit/c8ac07fb50fa92eee1d574823fbda09e1b309a63', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895419'}
null
GHSA
GHSA-w9m4-7w72-r766
Improper Access Control in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerability ID: OTF-004 - Vulnerability type: Improper Access Control - Threat level: Moderate ## Description: Chat participants can spoof their channel leave message, tricking others into assuming they left the chatroom. ## Technical description: ![otf-004-a](https://user-images.githubusercontent.com/156128/140665619-e51cfac0-a60a-4c2f-9c8e-be26066e6f3f.png) ![otf-004-b](https://user-images.githubusercontent.com/156128/140665620-5d7c2770-c83f-4925-8912-f2849071a3b0.png) ![otf-004-c](https://user-images.githubusercontent.com/156128/140665622-78a71ace-c483-4b16-b205-481aafe7ff87.png) This series of screenshots show Alice, Bob and Eve joined a chatroom and are the only participants in the chatroom. Eve seemingly leaves the chatroom, which leads Bob and Alice to believe they are having a private chat. The last screenshot shows that Eve only emitted the leave message and is still able to read the chat and possibly write messages. This can be reproduced by joining the chat with two different instances, where one instance has slightly modified the client-side JavaScript code similar to OTF-003 (page 22). The joined emit needs to be removed from the connect event handler. Therefore the modified client is not listed in the userlist and has no active session. The modified non-listed user also needs to change their username to Eve, which is not shown in the chatroom. The modified client then emits the disconnect event and their connection is no longer usable. This results in the leave message for Eve and the removal from the user-list but not in removal of the original session of the Eve who announced to join the chat. ## Impact: An adversary with access to the chat environment can spoof his leave event but still persist in the chat with access to all sent messages and the possibility to write in the chat using OTF-003 (page 22). ## Recommendation: - Implement proper session handling
{'CVE-2022-21691'}
2022-01-25T20:52:18Z
2022-01-21T23:20:22Z
MODERATE
4.3
{'CWE-306'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21691', 'https://github.com/advisories/GHSA-w9m4-7w72-r766', 'https://github.com/onionshare/onionshare/security/advisories/GHSA-w9m4-7w72-r766', 'https://github.com/onionshare/onionshare/releases/tag/v2.5'}
null
GHSA
GHSA-75vw-3m5v-fprh
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
{'CVE-2022-0239'}
2022-01-24T22:08:32Z
2022-01-21T23:43:11Z
CRITICAL
9.8
{'CWE-611'}
{'https://huntr.dev/bounties/a717aec2-5646-4a5f-ade0-dadc25736ae3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0239', 'https://github.com/advisories/GHSA-75vw-3m5v-fprh', 'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd'}
null
GHSA
GHSA-f854-hpxv-cw9r
Drainage of FeeCollector's Block Transaction Fees in cronos
### Impact In Cronos nodes running versions before v0.6.5, it is possible to take transaction fees from Cosmos SDK's FeeCollector for the current block by sending a custom crafted MsgEthereumTx. User funds and balances are safe. ### Patches This problem has been patched in Cronos v0.6.5 on the mempool level. The next network upgrade with consensus-breaking changes will patch it on the consensus level. ### Workarounds There are no tested workarounds. All validator node operators are recommended to upgrade to Cronos v0.6.5 at their earliest possible convenience. ### Credits Thank you to @zb3 for reporting this issue on [Cronos Immunefi Bug Bounty Program](https://immunefi.com/bounty/cronos/), to @cyril-crypto for reproducing the issue and to @yihuang and @thomas-nguy for patching the issue on the CheckTx (mempool) and the DeliverTx (consensus) levels. ### For more information If you have any questions or comments about this advisory: * Open a discussion in [crypto-org-chain/cronos](https://github.com/crypto-org-chain/cronos/discussions/new) * Email us at [chain@crypto.org](mailto:chain@crypto.org)
{'CVE-2021-43839'}
2022-04-19T19:03:18Z
2022-01-06T18:30:54Z
HIGH
7.5
{'CWE-670'}
{'https://github.com/advisories/GHSA-f854-hpxv-cw9r', 'https://github.com/crypto-org-chain/cronos/security/advisories/GHSA-f854-hpxv-cw9r', 'https://github.com/crypto-org-chain/cronos/pull/270', 'https://github.com/crypto-org-chain/cronos/commit/150ef237b37ac28c8136e1c0f494932860b9ebe8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43839'}
null
GHSA
GHSA-2cwj-8chv-9pp9
XML External Entity attack in log4net
Apache log4net before 2.0.10 does not disable XML external entities when parsing log4net configuration files. This could allow for XXE-based attacks in applications that accept arbitrary configuration files from users.
{'CVE-2018-1285'}
2022-04-25T23:06:14Z
2021-01-29T19:47:23Z
CRITICAL
9.8
{'CWE-611'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r9de86a185575e6c5f92e2a70a1d2e2e9514dc4341251577aac8e3866@%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/r7ab6b6e702f11a6f77b0db2af2d5e5532f56ae4b99b5fe73c5200b6a@%3Cdev.logging.apache.org%3E', 'https://github.com/advisories/GHSA-2cwj-8chv-9pp9', 'https://lists.apache.org/thread.html/r6543acafca3e2d24ff4b0c364a91540cb9378977ffa8d37a03ab4b0f@%3Cdev.logging.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rd2d72a017e238d1f345f9d14e075c81be16fc68a41c9e9ad9e29a732@%3Cdev.logging.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1285', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2018-1285', 'https://lists.apache.org/thread.html/reab1c277c95310bad1038255e0757857b2fbe291411b4fa84552028a%40%3Cdev.logging.apache.org%3E', 'https://snyk.io/vuln/SNYK-DOTNET-LOG4NET-568897', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2U233HVAQDSZ2PRG4XSGDASLY3J6ALH/', 'https://lists.apache.org/thread.html/r00b16ac5e0bbf7009a0d167ed58f3f94d0033b0f4b3e3d5025cc4872@%3Cdev.logging.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKL2LPINAI6BCMXOH4V4HVHGLUXIWOFO/', 'https://lists.apache.org/thread.html/rdbac24c945ca5c69cd5348b5ac023bc625768f653335de146e09ae2d@%3Cdev.logging.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT2DNNSW7C7FNK3MA3SLEUHGW5USYZKE/', 'https://lists.apache.org/thread.html/r33564de316d4e4ba0fea1d4d079e62cde1ffe64369c1157243d840d9@%3Cdev.logging.apache.org%3E', 'https://issues.apache.org/jira/browse/LOG4NET-575', 'https://www.nuget.org/packages/log4net/', 'https://lists.apache.org/thread.html/r525cbbd7db0aef4a114cf60de8439aa285decc34904d42a7f14f39c3@%3Cdev.logging.apache.org%3E'}
null
GHSA
GHSA-rp34-85x3-3764
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0.
{'CVE-2022-0576'}
2022-02-24T13:07:05Z
2022-02-15T00:02:47Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd', 'https://github.com/advisories/GHSA-rp34-85x3-3764', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0576', 'https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html'}
null
GHSA
GHSA-9gxr-rhx6-4jgv
Sandbox Breakout / Prototype Pollution in notevil
Versions of `notevil` prior to 1.3.3 are vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing attacker to add or modify an object's prototype. Evaluating the payload ```try{a[b];}catch(e){e.constructor.constructor('return __proto__.arguments.callee.__proto__.polluted=true')()}``` add the `polluted` property to Function. ## Recommendation Upgrade to version 1.3.3 or later.
null
2021-10-01T20:11:51Z
2020-09-04T15:18:57Z
MODERATE
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1338', 'https://github.com/advisories/GHSA-9gxr-rhx6-4jgv'}
null
GHSA
GHSA-9r24-gp44-h3pm
High severity vulnerability that affects org.apache.tika:tika-core
From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.
{'CVE-2018-1335'}
2021-09-08T20:54:36Z
2018-10-17T15:43:43Z
HIGH
8.1
null
{'https://github.com/advisories/GHSA-9r24-gp44-h3pm', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1335', 'https://www.exploit-db.com/exploits/46540/', 'http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html', 'http://www.securityfocus.com/bid/104001', 'https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca@%3Cdev.tika.apache.org%3E'}
null
GHSA
GHSA-5hfj-r725-wpc4
Arbitrary code execution in october/system
### Impact Assuming an attacker with access to the backend is able to execute PHP code by using the theme import feature. This will bypass the safe mode feature that prevents PHP execution in the CMS templates. ### Patches Issue has been patched in Build 473 and v1.1.6 ### Workarounds Apply https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26 to your installation manually if you are unable to upgrade. ### References Credits to: • Sushi Yushi ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
{'CVE-2021-32650'}
2022-04-19T19:02:58Z
2022-01-14T21:08:26Z
HIGH
8.8
{'CWE-74'}
{'https://github.com/octobercms/october/security/advisories/GHSA-5hfj-r725-wpc4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32650', 'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26', 'https://github.com/advisories/GHSA-5hfj-r725-wpc4'}
null
GHSA
GHSA-gg96-f8wr-p89f
Script injection
### Impact A malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. ### Patches The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
{'CVE-2021-32661'}
2021-06-21T22:43:06Z
2021-06-04T19:09:26Z
MODERATE
6.8
{'CWE-434', 'CWE-77'}
{'https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f', 'https://github.com/advisories/GHSA-gg96-f8wr-p89f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32661', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}
null
GHSA
GHSA-r742-7j4h-hjr8
Malicious Package in arsenic-tabasco-cyborg-peanut-butter
All versions of `arsenic-tabasco-cyborg-peanut-butter` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T17:08:43Z
2020-09-03T23:27:36Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-r742-7j4h-hjr8', 'https://www.npmjs.com/advisories/1313'}
null
GHSA
GHSA-f8h3-rqrm-47v9
Prototype Pollution in smart-extend
All versions of `smart-extend` are vulnerable to Prototype Pollution. The `deep()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-27T16:16:39Z
2020-09-02T16:02:40Z
MODERATE
0
{'CWE-1321'}
{'https://hackerone.com/reports/438274', 'https://www.npmjs.com/advisories/801', 'https://github.com/advisories/GHSA-f8h3-rqrm-47v9'}
null
GHSA
GHSA-2m39-62fm-q8r3
Regular Expression Denial of Service in sshpk
Versions of `sshpk` before 1.13.2 or 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys. ## Recommendation Update to version 1.13.2, 1.14.1 or later.
{'CVE-2018-3737'}
2021-01-08T20:07:45Z
2018-08-15T13:22:23Z
HIGH
0
{'CWE-770'}
{'https://github.com/advisories/GHSA-2m39-62fm-q8r3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3737', 'https://hackerone.com/reports/319593', 'https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17', 'https://www.npmjs.com/advisories/606', 'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957'}
null
GHSA
GHSA-2xgj-xhgf-ggjv
Heap buffer overflow in `BandedTriangularSolve`
### Impact An attacker can trigger a heap buffer overflow in Eigen implementation of `tf.raw_ops.BandedTriangularSolve`: ```python import tensorflow as tf import numpy as np matrix_array = np.array([]) matrix_tensor = tf.convert_to_tensor(np.reshape(matrix_array,(0,1)),dtype=tf.float32) rhs_array = np.array([1,1]) rhs_tensor = tf.convert_to_tensor(np.reshape(rhs_array,(1,2)),dtype=tf.float32) tf.raw_ops.BandedTriangularSolve(matrix=matrix_tensor,rhs=rhs_tensor) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L269-L278) calls `ValidateInputTensors` for input validation but fails to validate that the two tensors are not empty: ```cc void ValidateInputTensors(OpKernelContext* ctx, const Tensor& in0, const Tensor& in1) { OP_REQUIRES( ctx, in0.dims() >= 2, errors::InvalidArgument("In[0] ndims must be >= 2: ", in0.dims())); OP_REQUIRES( ctx, in1.dims() >= 2, errors::InvalidArgument("In[1] ndims must be >= 2: ", in1.dims())); } ``` Furthermore, since `OP_REQUIRES` macro only stops execution of current function after setting `ctx->status()` to a non-OK value, callers of helper functions that use `OP_REQUIRES` must check value of `ctx->status()` before continuing. This doesn't happen [in this op's implementation](https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L219), hence the validation that is present is also not effective. ### Patches We have patched the issue in GitHub commit [ba6822bd7b7324ba201a28b2f278c29a98edbef2](https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2) followed by GitHub commit [0ab290774f91a23bebe30a358fde4e53ab4876a0](https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ye Zhang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29612'}
2021-05-21T14:28:37Z
2021-05-21T14:28:37Z
LOW
3.6
{'CWE-120'}
{'https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0', 'https://github.com/advisories/GHSA-2xgj-xhgf-ggjv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29612', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2xgj-xhgf-ggjv'}
null
GHSA
GHSA-cgpp-wm2h-6hqx
SQL Injection in waterline-sequel
Affected versions of `waterline-sequel` are vulnerable to SQL injection in cases where user input is passed into the `like`, `contains`, `startsWith`, or `endsWith` methods. ## Recommendation Upgrade to at least version 0.5.1
{'CVE-2016-10551'}
2021-01-08T18:58:47Z
2019-02-18T23:54:28Z
HIGH
0
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10551', 'https://github.com/advisories/GHSA-cgpp-wm2h-6hqx', 'https://www.npmjs.com/advisories/115', 'https://nodesecurity.io/advisories/115', 'https://github.com/balderdashy/waterline-sequel/pull/66', 'https://github.com/balderdashy/waterline/issues/1219#issuecomment-157294530'}
null
GHSA
GHSA-pgr8-jg6h-8gw6
Cross-Site Scripting in webpack-bundle-analyzer
Versions of `webpack-bundle-analyzer` prior to 3.3.2 are vulnerable to Cross-Site Scripting. The package uses `JSON.stringify()` without properly escaping input which may lead to Cross-Site Scripting. ## Recommendation Upgrade to version 3.3.2 or later.
null
2021-08-04T15:26:36Z
2019-05-23T09:26:20Z
MODERATE
6.3
{'CWE-79'}
{'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263', 'https://www.npmjs.com/advisories/826', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/pull/264', 'https://snyk.io/vuln/SNYK-JS-WEBPACKBUNDLEANALYZER-174190', 'https://github.com/advisories/GHSA-pgr8-jg6h-8gw6'}
null
GHSA
GHSA-c77f-4rgj-jfr4
Cross-site Scripting in Beego
Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the "Request Statistics" page.
{'CVE-2021-39391'}
2021-10-06T22:05:12Z
2021-09-15T20:23:28Z
HIGH
6.1
{'CWE-64', 'CWE-79'}
{'https://github.com/advisories/GHSA-c77f-4rgj-jfr4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39391', 'https://github.com/beego/beego/issues/4727'}
null
GHSA
GHSA-qpv2-jxc7-3638
Exposure of Sensitive Information in snipe/snipe-it
Snipe-IT prior to v5.3.10 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor.
{'CVE-2022-0569'}
2022-02-24T13:13:02Z
2022-02-15T00:02:47Z
MODERATE
4.3
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0569', 'https://huntr.dev/bounties/b41d5e63-bcd8-4864-8a2e-8ec74eec520b', 'https://github.com/snipe/snipe-it/commit/05c0819776b07425b2831cd31a8a0f4e7ac30c09', 'https://github.com/advisories/GHSA-qpv2-jxc7-3638'}
null
GHSA
GHSA-6rvj-pw9w-jcvc
Information disclosure vulnerability in OnionShare
An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.
{'CVE-2021-41867'}
2021-11-19T20:39:35Z
2021-11-19T20:39:35Z
MODERATE
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-6rvj-pw9w-jcvc', 'https://www.ihteam.net/advisory/onionshare/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41867', 'https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4'}
null
GHSA
GHSA-frcx-xc72-c4v4
Use of Sha-1 in tusdotnet
# Withdrawn After reviewing this CVE, we have withdrawn this advisory due to it not having actual security impact. # Original Advisory The client in tusdotnet through 2.5.0 relies on SHA-1 to prevent spoofing of file content.
{'CVE-2021-44150'}
2021-11-30T21:55:51Z
2021-11-29T18:09:08Z
LOW
3.1
{'CWE-327'}
{'https://shattered.io/', 'https://github.com/advisories/GHSA-frcx-xc72-c4v4', 'https://github.com/github/advisory-database/issues/2324', 'https://github.com/tusdotnet/tusdotnet/issues/157', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44150'}
null
GHSA
GHSA-c87f-fq5g-63r2
Cross-site scripting in Unicorn framework
The Unicorn framework through 0.35.3 for Django allows XSS via component.name.
{'CVE-2021-42053'}
2021-10-12T17:51:11Z
2021-10-12T17:51:11Z
MODERATE
0
{'CWE-79'}
{'http://packetstormsecurity.com/files/164442/django-unicorn-0.35.3-Cross-Site-Scripting.html', 'https://github.com/advisories/GHSA-c87f-fq5g-63r2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42053', 'https://github.com/adamghill/django-unicorn/compare/0.35.3...0.36.0', 'https://github.com/adamghill/django-unicorn/pull/288', 'https://github.com/adamghill/django-unicorn/pull/288/commits/aa5b9835d946bd9893ef02e556859e3ea62cc5e2'}
null
GHSA
GHSA-r992-xph6-h7x2
Open redirect in microweber
microweber prior to 1.2.11 is vulnerable to open redirect.
{'CVE-2022-0560'}
2022-02-23T21:57:39Z
2022-02-12T00:00:48Z
MODERATE
6.1
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0560', 'https://huntr.dev/bounties/c9d586e7-0fa1-47ab-a2b3-b890e8dc9b25', 'https://github.com/microweber/microweber/commit/72d4b12cc487f56a859a8570ada4efb77b4b8c63', 'https://github.com/advisories/GHSA-r992-xph6-h7x2'}
null
GHSA
GHSA-qmfx-75ff-8mw6
Listing of upload directory contents possible
There's an security issue in prosody-filer versions **< 1.0.1** which leads to unwanted directory listings of download directories. An attacker is able to list previous uploads of a certain user by shortening the URL and accessing a URL subdirectors other than `/upload/` (or the corresponding user defined root dir) Version 1.0.1 and later fix this problem and allow only direct file access if the full path is known. Directory listings are blocked entirely.
null
2021-05-27T18:41:00Z
2021-05-27T18:41:00Z
HIGH
0
null
{'https://github.com/ThomasLeister/prosody-filer/security/advisories/GHSA-qmfx-75ff-8mw6', 'https://github.com/advisories/GHSA-qmfx-75ff-8mw6'}
null
GHSA
GHSA-3wqh-h42r-x8fq
Denial of Service in @hapi/subtext
Versions of `@hapi/subtext` prior to 6.1.3 or 7.0.3 are vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to version 6.1.3 or 7.0.3
null
2020-09-03T15:46:22Z
2020-09-03T15:46:22Z
HIGH
0
null
{'https://github.com/advisories/GHSA-3wqh-h42r-x8fq', 'https://www.npmjs.com/advisories/1476'}
null
GHSA
GHSA-grg4-wf29-r9vv
Bzip2Decoder doesn't allow setting size restrictions for decompressed data
### Impact The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack ### Workarounds No workarounds other than not using the `Bzip2Decoder` ### References Relevant code areas: https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305
{'CVE-2021-37136'}
2022-04-22T15:41:16Z
2021-09-09T17:11:21Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80', 'https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv', 'https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37136', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20220210-0012/', 'https://github.com/advisories/GHSA-grg4-wf29-r9vv', 'https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020', 'https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305'}
null
GHSA
GHSA-x52f-h74p-9jh8
Hijacked Environment Variables in node-sqlite
The `node-sqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16048'}
2021-06-10T19:38:20Z
2018-07-23T21:00:07Z
HIGH
7.5
{'CWE-200', 'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16048', 'https://github.com/advisories/GHSA-x52f-h74p-9jh8', 'https://www.npmjs.com/advisories/493', 'https://nodesecurity.io/advisories/493'}
null
GHSA
GHSA-9475-xg6m-j7pw
Subject Confirmation Method not validated in Saml2 Authentication Services for ASP.NET
### Impact Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Saml2 protocol for issuing tokens that is tied to a subject through other means, e.g. holder-of-key where possession of a private key must be proved. The Sustainsys.Saml2 library incorrectly treats all incoming tokens as bearer tokens, even though they have another subject confirmation method specified. This could be used by an attacker that could get access to Saml2 tokens with another subject confirmation method than bearer. The attacker could then use such a tocken to create a log in session. ### Patches Version 1.0.2 and 2.7.0 are patched. ### Workarounds Ensure that any IdentityProvider trusted by the Sustainsys.Saml2 SP only issues bearer tokens if the audience matches the Sustainsys.Saml2 SP. ### For more information If you have any questions or comments about this advisory: * Comment on #103 * Email us at security@sustainsys.com if you think that there are further security issues.
{'CVE-2020-5268'}
2021-01-08T20:21:36Z
2020-04-22T20:59:37Z
MODERATE
6.5
{'CWE-303'}
{'https://github.com/Sustainsys/Saml2/issues/712', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-9475-xg6m-j7pw', 'https://github.com/advisories/GHSA-9475-xg6m-j7pw', 'https://www.nuget.org/packages/Sustainsys.Saml2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5268', 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}
null
GHSA
GHSA-8849-5h85-98qw
Out-of-bounds Write in OpenCV
In opencv calls that use libpng, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges required. User interaction is not required for exploitation. Product: AndroidVersions: Android-10Android ID: A-110986616
{'CVE-2019-9423'}
2021-10-12T22:22:17Z
2021-10-12T22:22:17Z
HIGH
7.8
{'CWE-787'}
{'https://source.android.com/security/bulletin/android-10', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9423', 'http://www.openwall.com/lists/oss-security/2019/11/07/1', 'http://www.openwall.com/lists/oss-security/2020/12/05/1', 'https://github.com/advisories/GHSA-8849-5h85-98qw', 'http://www.openwall.com/lists/oss-security/2019/10/25/17', 'http://www.openwall.com/lists/oss-security/2019/10/27/1'}
null
GHSA
GHSA-x4qm-mcjq-v2gf
Overflow in prost-types
An issue was discovered in the prost-types crate before 0.8.0 for Rust. An overflow can occur during conversion from Timestamp to SystemTime.
{'CVE-2021-38192'}
2021-08-25T20:55:53Z
2021-08-25T20:55:53Z
HIGH
7.5
{'CWE-120', 'CWE-190'}
{'https://github.com/advisories/GHSA-x4qm-mcjq-v2gf', 'https://rustsec.org/advisories/RUSTSEC-2021-0073.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38192', 'https://github.com/tokio-rs/prost/issues/438'}
null
GHSA
GHSA-j866-8vxx-27hx
Hijacked Environment Variables in nodemailer.js
The `nodemailer.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16072'}
2021-01-08T18:36:11Z
2018-08-29T23:43:53Z
MODERATE
0
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16072', 'https://github.com/advisories/GHSA-j866-8vxx-27hx', 'https://www.npmjs.com/advisories/511', 'https://nodesecurity.io/advisories/511'}
null
GHSA
GHSA-7cvf-p83w-48q6
Malicious Package in beffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:22:59Z
2020-09-03T21:37:29Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1229', 'https://github.com/advisories/GHSA-7cvf-p83w-48q6'}
null
GHSA
GHSA-r96c-57pf-9jjm
Prototype Pollution in node.extend
Versions of `node.extend` before 1.1.7 or 2.0.1 are vulnerable to prototype pollution. ## Recommendation Update to version 1.1.7, 2.0.1 or later.
{'CVE-2018-16491'}
2021-01-08T01:58:05Z
2019-02-07T18:17:34Z
MODERATE
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-r96c-57pf-9jjm', 'https://www.npmjs.com/advisories/781', 'https://hackerone.com/reports/430831', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16491'}
null
GHSA
GHSA-v92m-hhhw-vv9v
Code injection in codiad
Codiad Web IDE through 2.8.4 allows PHP Code injection.
{'CVE-2019-19208'}
2022-01-31T22:01:57Z
2021-09-01T18:27:12Z
CRITICAL
9.8
{'CWE-94'}
{'https://herolab.usd.de/security-advisories/usd-2019-0049/', 'https://herolab.usd.de/en/security-advisories/', 'http://packetstormsecurity.com/files/162753/Codiad-2.8.4-Remote-Code-Execution.html', 'https://www.exploit-db.com/exploits/49902', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19208', 'https://github.com/Codiad/Codiad/commits/master', 'https://github.com/advisories/GHSA-v92m-hhhw-vv9v', 'https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-19208-Exploit'}
null
GHSA
GHSA-hrmr-f5m6-m9pq
Moderate severity vulnerability that affects org.apache.commons:commons-compress
When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17's ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package.
{'CVE-2018-11771'}
2022-02-08T22:08:25Z
2018-10-19T16:41:27Z
MODERATE
5.5
{'CWE-835'}
{'https://lists.apache.org/thread.html/3565494c263dfeb4dcb2a71cb24d09a1ca285cd6ac74edc025a3af8a@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/0adb631517766e793e18a59723e2df08ced41eb9a57478f14781c9f7@%3Cdev.tinkerpop.apache.org%3E', 'https://github.com/advisories/GHSA-hrmr-f5m6-m9pq', 'https://lists.apache.org/thread.html/6c79965066c30d4e330e04d911d3761db41b82c89ae38d9a6b37a6f1@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/e3eae9e6fc021c4c22dda59a335d21c12eecab480b48115a2f098ef6@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/eeecc1669242b28a3777ae13c68b376b0148d589d3d8170340d61120@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/b8ef29df0f1d55aa741170748352ae8e425c7b1d286b2f257711a2dd@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/35f60d6d0407c13c39411038ba1aca71d92595ed7041beff4d07f2ee@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/b907e70bc422905d7962fd18f863f746bf7b4e7ed9da25c148580c61@%3Cnotifications.commons.apache.org%3E', 'https://lists.apache.org/thread.html/f9cdd32af7d73e943452167d15801db39e8130409ebb9efb243b3f41@%3Ccommits.tinkerpop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/c7954dc1e8fafd7ca1449f078953b419ebf8936e087f235f3bd024be@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/f28052d04cb8dbaae39bfd3dc8438e58c2a8be306a3f381f4728d7c1@%3Ccommits.commons.apache.org%3E', 'https://lists.apache.org/thread.html/714c6ac1b1b50f8557e7342903ef45f1538a7bc60a0b47d6e48c273d@%3Ccommits.tinkerpop.apache.org%3E', 'http://www.securitytracker.com/id/1041503', 'https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11771', 'http://www.securityfocus.com/bid/105139'}
null
GHSA
GHSA-864j-6qpp-cmrr
SQL Injection in Geocoder
sql.rb in Geocoder before 1.6.1 allows Boolean-based SQL injection when within_bounding_box is used in conjunction with untrusted sw_lat, sw_lng, ne_lat, or ne_lng data.
{'CVE-2020-7981'}
2021-08-30T13:36:05Z
2020-06-10T20:03:02Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7981', 'https://github.com/alexreisner/geocoder/compare/v1.6.0...v1.6.1', 'https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613', 'https://github.com/advisories/GHSA-864j-6qpp-cmrr', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7981', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/geocoder/CVE-2020-7981.yml'}
null
GHSA
GHSA-wwh7-4jw9-33x6
High severity vulnerability that affects yajl-ruby
In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service.
{'CVE-2017-16516'}
2021-09-21T21:54:28Z
2017-11-28T22:44:42Z
HIGH
7.5
{'CWE-134'}
{'https://lists.debian.org/debian-lts-announce/2017/11/msg00010.html', 'https://rubygems.org/gems/yajl-ruby', 'https://github.com/advisories/GHSA-wwh7-4jw9-33x6', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16516', 'https://github.com/brianmario/yajl-ruby/issues/176'}
null
GHSA
GHSA-2g8g-63j4-9w3r
RCE vulnerability affecting v1beta3 templates in @backstage/plugin-scaffolder-backend
The templating library used by the scaffolder backend assumes that templates are trusted which is an undesired property of the scaffolder-backend. This has now been mitigated by sandboxing the template code execution. ### Impact A malicious actor with write access to a registered scaffolder template could manipulate the template in a way that allows for remote code execution on the scaffolder-backend instance. This was only exploitable in the template yaml definition itself and not by user input data. ### Patches This is vulnerability is patched in version `0.15.14` of `@backstage/plugin-scaffolder-backend`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
null
2021-12-01T18:29:12Z
2021-12-01T18:29:12Z
HIGH
0
null
{'https://github.com/backstage/backstage/security/advisories/GHSA-2g8g-63j4-9w3r', 'https://github.com/advisories/GHSA-2g8g-63j4-9w3r'}
null
GHSA
GHSA-p5p2-rhc3-wmf3
Malicious Package in siganle
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T15:40:01Z
2020-09-03T17:03:31Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1409', 'https://github.com/advisories/GHSA-p5p2-rhc3-wmf3'}
null
GHSA
GHSA-2647-c639-qv2j
Server-Side Request Forgery in calibreweb
calibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is due to an incomplete fix for [CVE-2022-0339](https://github.com/advisories/GHSA-4w8p-x6g8-fv64). The blacklist does not check for `0.0.0.0`, which would result in a payload of `0.0.0.0` resolving to `localhost`.
{'CVE-2022-0766'}
2022-03-18T21:20:46Z
2022-03-08T00:00:31Z
CRITICAL
9.8
{'CWE-918'}
{'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0766', 'https://github.com/advisories/GHSA-2647-c639-qv2j', 'https://huntr.dev/bounties/7f2a5bb4-e6c7-4b6a-b8eb-face9e3add7b'}
null
GHSA
GHSA-fg6m-q92x-vv38
Directory Traversal in dcserver
Affected versions of `dcserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16158'}
2021-01-14T15:48:03Z
2020-09-01T17:26:00Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16158', 'https://nodesecurity.io/advisories/393', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http', 'https://www.npmjs.com/advisories/393', 'https://github.com/advisories/GHSA-fg6m-q92x-vv38'}
null
GHSA
GHSA-8p2p-p8mg-x3cw
Insight API transaction broadcast endpoint can result in Full Path Disclosure
Bitpay/insight-api Insight-api version 5.0.0 and earlier contains a CWE-20: input validation vulnerability in transaction broadcast endpoint that can result in Full Path Disclosure. This attack appear to be exploitable via Web request.
{'CVE-2018-1000023'}
2022-04-25T22:32:09Z
2018-03-05T19:33:54Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/bitpay/insight-api/issues/542', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000023', 'https://github.com/advisories/GHSA-8p2p-p8mg-x3cw'}
null
GHSA
GHSA-f6f2-pwrj-64h3
Moderate severity vulnerability that affects tryton
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values.
{'CVE-2019-10868'}
2021-06-10T23:48:33Z
2019-04-10T14:31:37Z
MODERATE
6.5
{'CWE-862'}
{'https://www.debian.org/security/2019/dsa-4426', 'https://seclists.org/bugtraq/2019/Apr/14', 'https://github.com/advisories/GHSA-f6f2-pwrj-64h3', 'https://hg.tryton.org/trytond/rev/f58bbfe0aefb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10868', 'https://discuss.tryton.org/t/security-release-for-issue8189/1262'}
null