ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-cccf-7xw3-p2vr
|
HTTP Request Smuggling in Undertow
|
A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.
|
{'CVE-2020-10719'}
|
2022-02-11T21:12:26Z
|
2021-04-30T17:28:33Z
|
MODERATE
| 6.5
|
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-10719', 'https://github.com/advisories/GHSA-cccf-7xw3-p2vr', 'https://security.netapp.com/advisory/ntap-20220210-0014/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10719'}
| null |
GHSA
|
GHSA-38j9-7pp9-2hjw
|
Invalid session token expiration
|
HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2.
|
{'CVE-2021-32923'}
|
2021-06-17T20:00:43Z
|
2021-06-08T18:52:05Z
|
HIGH
| 7.4
|
{'CWE-613'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32923', 'https://www.hashicorp.com/blog/category/vault/', 'https://github.com/advisories/GHSA-38j9-7pp9-2hjw', 'https://discuss.hashicorp.com/t/hcsec-2021-15-vault-renewed-nearly-expired-leases-with-incorrect-non-expiring-ttls/24603'}
| null |
GHSA
|
GHSA-p7v4-gm6j-cw9m
|
XSS in Mautic
|
### Impact
This is a cross-site scripting vulnerability relating to creating/editing a company which requires the user to be logged in as an administrator to be executed.
This vulnerability was reported by Dardan Prebreza at Bishop Fox.
### Patches
Upgrade to 3.2.4 or 2.16.5.
Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff
Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff
### Workarounds
None
### References
https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4
### For more information
If you have any questions or comments about this advisory:
* Post in https://forum.mautic.org/c/support
* Email us at security@mautic.org
|
{'CVE-2021-3142'}
|
2022-04-19T19:02:44Z
|
2021-01-29T20:51:20Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3142', 'https://github.com/advisories/GHSA-p7v4-gm6j-cw9m', 'https://github.com/mautic/mautic/commit/ba31db23e664f889da55a29ff27f797e2ab5cb1b', 'https://github.com/mautic/mautic/releases/tag/3.2.4', 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-3', 'https://github.com/mautic/mautic/security/advisories/GHSA-p7v4-gm6j-cw9m'}
| null |
GHSA
|
GHSA-h79p-32mx-fjj9
|
Apache Camel Netty enables Java deserialization by default
|
Apache Camel Netty enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0.
|
{'CVE-2020-11973'}
|
2021-06-15T17:45:54Z
|
2020-05-21T21:09:04Z
|
HIGH
| 9.8
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-h79p-32mx-fjj9', 'https://camel.apache.org/security/CVE-2020-11973.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11973', 'http://www.openwall.com/lists/oss-security/2020/05/14/9'}
| null |
GHSA
|
GHSA-wjr4-2jgw-hmv8
|
Command Injection in whereis
|
Versions of `whereis` before 0.4.1 are vulnerable to command injection if untrusted user input is passed into `whereis`.
## Recommendation
Update to version 0.4.1 or later.
|
{'CVE-2018-3772'}
|
2021-01-08T01:56:37Z
|
2018-07-31T18:28:53Z
|
HIGH
| 0
|
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3772', 'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b', 'https://hackerone.com/reports/319476', 'https://www.npmjs.com/advisories/604', 'https://github.com/advisories/GHSA-wjr4-2jgw-hmv8'}
| null |
GHSA
|
GHSA-pjj4-jjgc-h3r8
|
Authenticated remote code execution
|
### Impact
Authenticated remote code execution using plugin manager without ACL permissions.
### Patches
We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021
| null |
2021-03-12T23:09:24Z
|
2021-03-12T23:09:24Z
|
MODERATE
| 0
|
{'CWE-74'}
|
{'https://github.com/advisories/GHSA-pjj4-jjgc-h3r8', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021', 'https://github.com/shopware/platform/security/advisories/GHSA-pjj4-jjgc-h3r8'}
| null |
GHSA
|
GHSA-cqcf-4g4h-rghf
|
Cross-site scripting in Apache Archiva
|
In Apache Archiva before 2.2.4, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
|
{'CVE-2019-0213'}
|
2021-12-03T14:35:02Z
|
2019-05-14T04:00:31Z
|
MODERATE
| 6.5
|
{'CWE-79'}
|
{'http://archiva.apache.org/security.html#CVE-2019-0213', 'https://seclists.org/bugtraq/2019/Apr/47', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0213', 'http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html', 'https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-cqcf-4g4h-rghf', 'https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97@%3Cusers.maven.apache.org%3E', 'http://www.securityfocus.com/bid/108123', 'https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E', 'https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3@%3Cusers.archiva.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/30/7'}
| null |
GHSA
|
GHSA-93c4-vf86-3rj7
|
Reflected cross-site scripting in vaadin-menu-bar webjar resources in Vaadin 14
|
Missing output sanitization in test sources in `org.webjars.bowergithub.vaadin:vaadin-menu-bar` versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL.
|
{'CVE-2021-33611'}
|
2021-11-04T17:03:37Z
|
2021-11-03T17:33:32Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/vaadin/platform/security/advisories/GHSA-93c4-vf86-3rj7', 'https://vaadin.com/security/cve-2021-33611', 'https://github.com/vaadin/vaadin-menu-bar/pull/126', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33611', 'https://github.com/advisories/GHSA-93c4-vf86-3rj7'}
| null |
GHSA
|
GHSA-ppfm-rj6p-38q6
|
Improper Authorization in librenms
|
Improper Authorization in Packagist librenms/librenms prior to 22.2.0.
|
{'CVE-2022-0587'}
|
2022-02-24T12:14:15Z
|
2022-02-16T00:01:53Z
|
HIGH
| 7.1
|
{'CWE-285'}
|
{'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://github.com/advisories/GHSA-ppfm-rj6p-38q6', 'https://huntr.dev/bounties/0c7c9ecd-33ac-4865-b05b-447ced735469', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0587', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html'}
| null |
GHSA
|
GHSA-x5m8-2r8v-8f97
|
Prototype Pollution in libnested
|
The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)
|
{'CVE-2022-25352'}
|
2022-03-29T22:05:38Z
|
2022-03-18T00:01:11Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25352', 'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1', 'https://github.com/dominictarr/libnested/blob/master/index.js%23L22', 'https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117', 'https://github.com/advisories/GHSA-x5m8-2r8v-8f97'}
| null |
GHSA
|
GHSA-h58v-g3q6-q9fx
|
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in sulu/sulu
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
It is an issue when input HTML into the Tag name. The HTML is execute when the tag name is listed in the auto complete form.
Only admin users are affected and only admin users can create tags.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
The problem is patched with Version 1.6.42.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Create a custom request listener to avoid that this kind of tags are created.
### References
_Are there any links users can visit to find out more?_
Currently not.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [sulu/sulu repository](https://github.com/sulu/sulu/issues)
* Email us at [security@sulu.io](mailto:security@sulu.io)
|
{'CVE-2021-41169'}
|
2021-10-22T16:20:53Z
|
2021-10-22T16:20:53Z
|
MODERATE
| 6.2
|
{'CWE-79'}
|
{'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445', 'https://github.com/sulu/sulu/security/advisories/GHSA-h58v-g3q6-q9fx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41169', 'https://github.com/advisories/GHSA-h58v-g3q6-q9fx'}
| null |
GHSA
|
GHSA-6whf-q6p5-84wg
|
Improper Access Control in Webauthn Framework
|
Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence.
|
{'CVE-2021-38299'}
|
2021-10-06T13:23:36Z
|
2021-09-29T17:16:07Z
|
CRITICAL
| 9.8
|
{'CWE-863'}
|
{'https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2021-1-fehlende-ueberpruefung-von-user-presence-in-webauthn-framework/', 'https://github.com/web-auth/webauthn-framework/commit/572e239c5702667ca52487faf861abc768a46308', 'https://github.com/advisories/GHSA-6whf-q6p5-84wg', 'https://github.com/web-auth/webauthn-framework/releases', 'https://github.com/web-auth/webauthn-framework/releases/tag/v3.3.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38299'}
| null |
GHSA
|
GHSA-4h44-w6fm-548g
|
Potential Remote Code Execution in TYPO3 with mediace extension
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1)
> * CWE-325, CWE-20, CWE-200, CWE-502
### Problem
It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message authentication code (HMAC-SHA1) and can lead to various attack chains as described below.
* [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007), [CVE-2020-15099](https://nvd.nist.gov/vuln/detail/CVE-2020-15099): Potential Privilege Escalation
+ the database server used for a TYPO3 installation must be accessible for an attacker (either via internet or shared hosting network)
+ `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5, high)
* [TYPO3-CORE-SA-2016-013](https://typo3.org/security/advisory/typo3-core-sa-2016-013), [CVE-2016-5091](https://nvd.nist.gov/vuln/detail/CVE-2016-5091): Insecure Deserialization & Remote Code Execution
+ an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation
+ `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1, critical)
The overall severity of this vulnerability is critical (9.1) based on mentioned attack chains and the fact it does not require any privileges.
### Solution
In case the extension is not used and required at all, it is suggested to uninstall and remove it from the system completely. Otherwise, an updated version 7.6.5 is available from the TYPO3 extension manager, Packagist and the TYPO3 extension repository:
* https://extensions.typo3.org/extension/download/mediace/7.6.5/zip/
* https://packagist.org/packages/friendsoftypo3/mediace#7.6.5
As a precautionary measure it is advised to change `encryptionKey` and database credentials in `typo3conf/LocalConfiguration.php`.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
### References
* [TYPO3-EXT-SA-2020-014](https://typo3.org/security/advisory/typo3-ext-sa-2020-014)
|
{'CVE-2020-15086'}
|
2022-04-19T19:02:30Z
|
2020-07-29T16:15:12Z
|
HIGH
| 9.8
|
{'CWE-200', 'CWE-325', 'CWE-20', 'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15086', 'https://github.com/FriendsOfTYPO3/mediace/commit/fa29ffd3e8b275782a8600d2406e1b1e5e16ae75', 'https://github.com/FriendsOfTYPO3/mediace/pull/31', 'https://github.com/FriendsOfTYPO3/mediace/security/advisories/GHSA-4h44-w6fm-548g', 'https://github.com/advisories/GHSA-4h44-w6fm-548g'}
| null |
GHSA
|
GHSA-6g85-3hm8-83f9
|
CHECK-fail in `QuantizeAndDequantizeV4Grad`
|
### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.QuantizeAndDequantizeV4Grad`:
```python
import tensorflow as tf
gradient_tensor = tf.constant([0.0], shape=[1])
input_tensor = tf.constant([0.0], shape=[1])
input_min = tf.constant([[0.0]], shape=[1, 1])
input_max = tf.constant([[0.0]], shape=[1, 1])
tf.raw_ops.QuantizeAndDequantizeV4Grad(
gradients=gradient_tensor, input=input_tensor,
input_min=input_min, input_max=input_max, axis=0)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L162-L163) does not validate the rank of the `input_*` tensors. In turn, this results in the tensors being passes as they are to [`QuantizeAndDequantizePerChannelGradientImpl`](https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.h#L295-L306):
```cc
template <typename Device, typename T>
struct QuantizeAndDequantizePerChannelGradientImpl {
static void Compute(const Device& d,
typename TTypes<T, 3>::ConstTensor gradient,
typename TTypes<T, 3>::ConstTensor input,
const Tensor* input_min_tensor,
const Tensor* input_max_tensor,
typename TTypes<T, 3>::Tensor input_backprop,
typename TTypes<T>::Flat input_min_backprop,
typename TTypes<T>::Flat input_max_backprop) {
...
auto input_min = input_min_tensor->vec<T>();
auto input_max = input_max_tensor->vec<T>();
...
}
```
However, the `vec<T>` method, requires the rank to 1 and triggers a `CHECK` failure otherwise.
### Patches
We have patched the issue in GitHub commit [20431e9044cf2ad3c0323c34888b192f3289af6b](https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 as this is the only other affected version.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29544'}
|
2021-05-21T14:23:22Z
|
2021-05-21T14:23:22Z
|
LOW
| 2.5
|
{'CWE-754'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29544', 'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9', 'https://github.com/advisories/GHSA-6g85-3hm8-83f9'}
| null |
GHSA
|
GHSA-gp6j-vx54-5pmf
|
Incorrect validation of parties IDs leaks secret keys in Secret-sharing scheme
|
# Summary
In the threshold signature scheme, participants start by dividing secrets into shares using a secret sharing scheme. The Verifiable Secret Sharing scheme generates shares from the user’s IDs but does not properly validate them. Using a malicious ID will make other users reveal their secrets during the secret-sharing procedure. In addition, a second issue resulting from lack of validation could cause nodes to crash when sent maliciously formed user IDs.
# Details
The creation of Parties IDs does not properly validate for maliciously chosen IDs. Parties generate the secret shares in `binance-chain/tss-lib` codebase that `keep-network/keep-ecdsa` uses by evaluating the polynomial with the other parties’ IDs. It is critical that these party ids are non-zero because evaluating the polynomial at point 0 reveals the secret.
There is a check that these ids are not zero, but this is insufficient since it is not performed modulo the curve order. Therefore, one can set their ID equal to the order of the elliptic curve, which equals 0 during the polynomial evaluation modulo the curve order.
```
shares := make(Shares, num)
for i := 0; i < num; i++ {
if indexes[i].Cmp(big.NewInt(0)) == 0 {
return nil, nil, fmt.Errorf("party index should not be 0")
}
share := evaluatePolynomial(ec, threshold, poly, indexes[i])
shares[i] = &Share{Threshold: threshold, ID: indexes[i], Share: share}
}
```
(https://github.com/binance-chain/tss-lib/blob/73560daec7f83d7355107ea9b5e59d16de8765be/crypto/vss/feldman_vss.go#L64-L70)
Thus, a party with an ID equal to the order of the curve will receive the secret key as its share.
Another issue with the tss-lib implementation was the lack of verification for modularly equal user IDs that can cause nodes to crash during key generation or resharing.
# Timeline
### 6 December 2021, 20:28 CET
The team is informed by Trail of Bits about the issue in `binance-chain/tss-lib`. The vulnerability was already disclosed with Binance and they have implemented fixes in their recent commits. We are advised to update our dependency to the most recent `binance-chain/tss-lib` version.
### 7 December 2021, 9:10 CET
The team confirms with Trail of Bits we started the work on a fix.
### 7 December 2021, 20:03 CET
The team informs Trail of Bits that we found a potential problem in Binance's fix that may lead to the signing code failing with Go panic. We identified the problematic line and suggested its removal.
To address the vulnerability in the protocol, it is required to ensure that:
- all indexes are non-zero,
- all indexes are non-zero modulo the curve order,
- all indexes are unique modulo the curve order.
The first two are guarded in `CheckIndexes` function by:
```
vMod := new(big.Int).Mod(v, ec.Params().N)
if vMod.Cmp(zero) == 0 {
return nil, errors.New("party index should not be 0")
}
```
The last one is guarded by:
```
if sortutil.Dedupe(sortutil.BigIntSlice(dup)) < len(indexes) {
return nil, errors.New("duplicate in indexes")
}
```
However, `CheckIndexes` was additionally modified to update values of passed indexes by doing `indexes[i] = vMod`.
This line was not backward-compatible and caused signatures to fail with `panic: runtime error: invalid memory address or nil pointer dereference` in case the signing group was generated with at least one `PartyID.Key` higher than `ec.Params().N`. This would also be problematic for new code that constructs such `PartyID` - we tested that key generation completed successfully but signing failed with the mentioned panic.
### 8 December 2021, 12:49 CET
Trail of Bits confirmed the line we flagged is not critical to the security of the protocol.
### 8 December 2021, 15:29 CET
The team informed Trail of Bits we are planning to open a PR to `binance-chain/tss-lib` with a fix and we suggest extending the embargo for communicating this issue for one more week, until Friday, Dec 17h to give everyone more time update their code given the problem was found. We also ask Trail of Bits to get in touch with Binance to review our fix given that we are not going to provide a sufficient explanation in the commit and PR description to do not threaten the security of projects that have already upgraded their dependency.
### 8 December 2021, 18:17 CET
The team informs Trail of Bits about opening a PR https://github.com/binance-chain/tss-lib/pull/155 and explains all the details of the issue.
The problematic scenario is:
1. We start the keygen by creating `PartyID` for each member. The `PartyID` struct has `Id` and `Key` fields. We set `PartyID.Key` that is higher than the elliptic curve's `N`.
2. This goes to tss-lib which starts the round 1 code (`ecdsa/keygen/round_1.go`). It takes `PartyID.Key` of each member and assembles the `ids` slice. This slice is thrown into `CheckIndexes` which overwrites each element by doing the modulo `N`.
3. After returning from `CheckIndexes` the modified `ids` slice is used to set the `Ks` slice in the final `LocalPartySaveData` which is received by each group member as keygen final result.
4. Each member takes this `LocalPartySaveData` and saves it on disk.
5. Upon signing, we do the same as in point 1, so we construct `PartyID`s in the same way and start the protocol. At this point, `PartyID.Key` is higher than curve's `N`.
6. Before starting round 1 of signing, `LocalPartySaveData` obtained at keygen and our `PartyID`s built at point 5 are used in `BuildLocalSaveDataSubset` to build a new `LocalPartySaveData` instance.
7. `BuildLocalSaveDataSubset` is the place where things go wrong because `Key` field of each `PartyID` from point 5 doesn't correspond to encoded `Ks` elements of `LocalPartySaveData` obtained after keygen, the final `LocalPartySaveData` is corrupted, and cause panic upon validation before signing round 1.
### 8 December 2021, 21:50 CET
Trail of Bits confirms they are going to followup with Binance and they agree to extend the embargo by a week.
### 8 December 2021, 15:16 CET
Trail of Bits validates the problematic scenario we described and our fix. Trail of Bits reaches to Binance and recommends merging our fix and in addition to some other fixes that would secure the code to do not panic even if `LocalPartySaveData` has corrupted data.
### 10 December 2021, 8:16 CET
Binance merges our fix https://github.com/binance-chain/tss-lib/commit/cd95cee01ea2af6d4aa8316612803be944d5369a
### 13 December 2021, 8:35 CET
Binance applies more fixes so that even in case of `LocalPartySaveData` corrupted, the code is not going to panic.
### 15 December 2021
The team releases a new version of the client, v1.8.1, and announces the need for an upgrade.
https://github.com/keep-network/keep-ecdsa/releases/tag/v1.8.1
| null |
2022-01-06T18:30:26Z
|
2022-01-06T18:30:26Z
|
CRITICAL
| 0
| null |
{'https://github.com/advisories/GHSA-gp6j-vx54-5pmf', 'https://github.com/keep-network/keep-ecdsa/security/advisories/GHSA-gp6j-vx54-5pmf', 'https://github.com/keep-network/keep-ecdsa/releases/tag/v1.8.1'}
| null |
GHSA
|
GHSA-v54f-xcmp-43cr
|
Deserialization of Untrusted Data in Apache ShardingSphere
|
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
|
{'CVE-2020-1947'}
|
2022-02-10T20:39:47Z
|
2022-02-10T20:39:47Z
|
HIGH
| 9.8
|
{'CWE-502'}
|
{'https://github.com/advisories/GHSA-v54f-xcmp-43cr', 'https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1947'}
| null |
GHSA
|
GHSA-76f4-fw33-6j2v
|
Potential sensitive data exposure in applications using Vaadin 15
|
Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController`
- https://vaadin.com/security/cve-2020-36319
| null |
2022-04-19T19:02:54Z
|
2021-04-19T14:48:26Z
|
LOW
| 3.1
|
{'CWE-200'}
|
{'https://github.com/vaadin/platform/security/advisories/GHSA-76f4-fw33-6j2v', 'https://github.com/advisories/GHSA-76f4-fw33-6j2v', 'https://vaadin.com/security/cve-2020-36319'}
| null |
GHSA
|
GHSA-2p89-ppc2-mrq4
|
Cross site scripting in getgrav/grav
|
User input is not properly sanitized leading to cross site scrpting (xss) in grav.
|
{'CVE-2022-0743'}
|
2022-03-18T20:45:47Z
|
2022-03-02T00:00:22Z
|
MODERATE
| 4.6
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-2p89-ppc2-mrq4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0743', 'https://github.com/getgrav/grav/commit/3dd0cabeac9835fe64dcb4b68c658b39f1f6be2f', 'https://huntr.dev/bounties/32ea4ddb-5b41-4bf9-b5a1-ef455fe2d293'}
| null |
GHSA
|
GHSA-5mc5-5j6c-qmf9
|
High severity vulnerability that affects cfscrape
|
An issue was discovered in cloudflare-scrape 1.6.6 through 1.7.1. A malicious website owner could craft a page that executes arbitrary Python code against any cfscrape user who scrapes that website. This is fixed in 1.8.0.
|
{'CVE-2017-7235'}
|
2021-09-01T22:16:39Z
|
2018-07-13T16:01:01Z
|
HIGH
| 8.8
|
{'CWE-20'}
|
{'https://github.com/Anorov/cloudflare-scrape/releases/tag/1.8.0', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7235', 'https://github.com/Anorov/cloudflare-scrape/issues/97', 'http://www.securityfocus.com/bid/97191', 'https://github.com/advisories/GHSA-5mc5-5j6c-qmf9'}
| null |
GHSA
|
GHSA-9272-59x2-gwf2
|
Malicious Package in ripedm160
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:04:39Z
|
2020-09-03T17:04:13Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-9272-59x2-gwf2', 'https://www.npmjs.com/advisories/1404'}
| null |
GHSA
|
GHSA-rpx7-33j2-xx9x
|
Arbitrary file deletion in NeMo ASR webapp
|
### Description
NVIDIA NeMo contains a vulnerability in ASR WebApp, where Relative Path Traversal (CWE-23) may lead to deletion of any directory through the "../" structure when admin privileges are available.
CVSS Score = 2.0
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
### Impact
When the optional tool ASR Webapp (https://github.com/NVIDIA/NeMo/tree/main/tools/asr_webapp) is used prior to commit https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0, some interfaces do not verify user input. Malicious attackers can construct malicious requests to delete any directory through the "../" structure.
The vulnerability affects only cases where this particular web app is started by a user with superuser permissions. The web application is *not* a part of the regular pip release or the corresponding container, and impacts only users that clone the repository in its entirety and execute the web app (while also possessing superuser permissions).
## Patches
This vulnerability has been patched via https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0, which is effectively any clone of the repository post r1.5.1 branch. Since the web app is not distributed via pip release or container, users who clone the main branch post this commit will possess the patch.
### Workarounds
The changes in commit https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0 can be applied to any version of the web app without any adverse effect.
### Additional Information
Exploit Found on: 2021.12.16
Exploit Found by: @haby0
| null |
2022-04-20T21:03:58Z
|
2022-02-15T01:57:18Z
|
LOW
| 2
| null |
{'https://github.com/NVIDIA/NeMo/security/advisories/GHSA-rpx7-33j2-xx9x', 'https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0', 'https://github.com/advisories/GHSA-rpx7-33j2-xx9x'}
| null |
GHSA
|
GHSA-685w-vc84-wxcx
|
Moderate severity vulnerability that affects doorkeeper
|
Cross-site request forgery (CSRF) vulnerability in doorkeeper before 1.4.1 allows remote attackers to hijack the authentication of unspecified victims for requests that read a user OAuth authorization code via unknown vectors.
|
{'CVE-2014-8144'}
|
2021-09-01T22:45:16Z
|
2018-09-17T21:55:22Z
|
MODERATE
| 0
|
{'CWE-352'}
|
{'https://github.com/doorkeeper-gem/doorkeeper/blob/master/CHANGELOG.md', 'http://seclists.org/oss-sec/2014/q4/1076', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99342', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8144', 'https://github.com/advisories/GHSA-685w-vc84-wxcx'}
| null |
GHSA
|
GHSA-2g9q-chq2-w8qw
|
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
|
Apache Hive 2.1.x before 2.1.2, 2.2.x before 2.2.1, and 2.3.x before 2.3.1 expose an interface through which masking policies can be defined on tables or views, e.g., using Apache Ranger. When a view is created over a given table, the policy enforcement does not happen correctly on the table for masked columns.
|
{'CVE-2017-12625'}
|
2021-08-30T21:36:58Z
|
2019-03-14T15:40:16Z
|
MODERATE
| 4.3
|
{'CWE-200'}
|
{'http://mail-archives.apache.org/mod_mbox/hive-user/201710.mbox/%3C3791103E-80D5-4E75-AF23-6F8ED54DDEBE%40apache.org%3E', 'http://www.securityfocus.com/bid/101686', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12625', 'https://github.com/advisories/GHSA-2g9q-chq2-w8qw'}
| null |
GHSA
|
GHSA-pqg8-crx9-g8m4
|
Backend Same-Site Request Forgery in TYPO3 CMS
|
> ### Meta
> * CVSS v3.1: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
> * CWE-352
> * CWE-346
### Problem
It has been discovered that backend user interface and install tool are vulnerable to same-origin request forgery. A backend user can be tricked into interacting with a malicious resource an attacker previously managed to upload to the web server - scripts are then executed with the privileges of the victims' user session.
In a worst case scenario new admin users can be created which can directly be used by an attacker. The vulnerability is basically a cross-site request forgery (CSRF) triggered by a cross-site scripting vulnerability (XSS) - but happens on the same target host - thus, it’s actually a same-origin request forgery.
Malicious payload such as HTML containing JavaScript might be provided by either an authenticated backend user or by a non-authenticated user using a 3rd party extension - e.g. file upload in a contact form with knowing the target location.
The attacked victim requires an active and valid backend or install tool user sessions at the time of the attack to be successful.
### Solution
Update to TYPO3 versions 9.5.17 or 10.4.2 that mitigates the problem described.
### Additional Considerations
The deployment of additional mitigation techniques is suggested as described below.
#### Sudo Mode Extension
This TYPO3 extension intercepts modifications to security relevant database tables, e.g. those storing user accounts or storages of the file abstraction layer. Modifications need to confirmed by again by the acting user with providing their password again - this technique is known as "sudo mode". This way unintended actions happening in the background can be mitigated.
* https://github.com/FriendsOfTYPO3/sudo-mode
* https://extensions.typo3.org/extension/sudo_mode
#### Content Security Policy
[Content Security Policies](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy) tell (modern) browsers how resources served a particular site are handled - it also it possible to disallow script executions for specific locations. In a TYPO3 context it is suggested to disallow direct script execution at least for locations `/fileadmin/` and `/uploads/`.
```
# in fileadmin/.htaccess
<IfModule mod_headers.c>
Header add Content-Security-Policy "default-src 'self'; script-src 'none';"
</IfModule>
```
### Credits
Thanks to Matteo Bonaker who reported this issue and to TYPO3 security team member Oliver Hader who fixed the issue.
### References
* https://typo3.org/security/advisory/typo3-core-sa-2020-006
|
{'CVE-2020-11069'}
|
2022-04-19T19:02:26Z
|
2020-05-13T23:40:09Z
|
HIGH
| 8
|
{'CWE-352', 'CWE-346'}
|
{'https://github.com/advisories/GHSA-pqg8-crx9-g8m4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11069', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-pqg8-crx9-g8m4'}
| null |
GHSA
|
GHSA-886v-mm6p-4m66
|
High severity vulnerability that affects gun
|
## Urgent Upgrade
The static file server module included with GUN had a **serious vulnerability**:
- Using `curl --path-as-is` allowed reads on any parent directory or files.
This did not work via the browser or via curl without as-is option.
### Fixed
This has been fixed since version `0.2019.416` and higher.
### Who Was Effected?
Most NodeJS users who use the default setup, such as:
- `npm start`
- `node examples/http.js`
- `Heroku` 1-click-deploy
- `Docker`
- `Now`
If you have a custom NodeJS code then you are probably safe *unless* you have something like `require('http').createServer(Gun.serve(__dirname))` in it.
If you have not upgraded, it is **mandatory** or else it is highly likely your environment variables and AWS (or other) keys could be leaked.
### Credit
It was reported and fixed by [JK0N](https://github.com/amark/gun/pull/527), but I did not understand the `--path-as-is` condition.
Joonas Loppi from [function61](http://function61.com) rediscovered it and explained the urgency to me to fix it.
| null |
2022-04-19T19:02:22Z
|
2019-06-05T09:48:02Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/amark/gun/security/advisories/GHSA-886v-mm6p-4m66', 'https://github.com/advisories/GHSA-886v-mm6p-4m66'}
| null |
GHSA
|
GHSA-33f9-j839-rf8h
|
Prototype Pollution in immer
|
This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "__proto__" || p === "constructor") in applyPatches_ returns false if p is ['__proto__'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.
|
{'CVE-2021-23436'}
|
2021-09-13T20:27:53Z
|
2021-09-02T17:17:37Z
|
CRITICAL
| 9.8
|
{'CWE-843', 'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-IMMER-1540542', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23436', 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266', 'https://github.com/advisories/GHSA-33f9-j839-rf8h'}
| null |
GHSA
|
GHSA-pgh6-m65r-2rhq
|
DOS and Open Redirect with user input
|
### Impact
A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`.
A DOS vulnerability is possible if the URL contains invalid characters `curl --path-as-is "http://localhost:3000//^/.."`
The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`.
### Patches
The issue has been patched in `fastify-static@4.4.1`
### Workarounds
If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option.
### References
+ Bug founder: drstrnegth
+ [hackerone Report](https://hackerone.com/reports/1361804)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fastify-static](https://github.com/fastify/fastify-static)
* Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
|
{'CVE-2021-22964'}
|
2021-10-21T14:57:14Z
|
2021-10-12T16:04:17Z
|
HIGH
| 8.8
|
{'CWE-248', 'CWE-601'}
|
{'https://hackerone.com/reports/1361804', 'https://github.com/fastify/fastify-static/security/advisories/GHSA-pgh6-m65r-2rhq', 'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4', 'https://github.com/advisories/GHSA-pgh6-m65r-2rhq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22964'}
| null |
GHSA
|
GHSA-g7v2-2qxx-wjrw
|
Symlink Attack in Libcontainer and Docker Engine
|
Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
|
{'CVE-2015-3627'}
|
2022-02-15T01:18:02Z
|
2022-02-15T01:18:02Z
|
MODERATE
| 0
|
{'CWE-59'}
|
{'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'https://github.com/advisories/GHSA-g7v2-2qxx-wjrw', 'https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'https://seclists.org/fulldisclosure/2015/May/28', 'https://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3627', 'https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba', 'https://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html'}
| null |
GHSA
|
GHSA-cj2h-ww36-v932
|
Improper Certificate Validation in HashiCorp Nomad
|
HashiCorp Nomad and Nomad Enterprise up to 0.10.2 incorrectly validated role/region associated with TLS certificates used for mTLS RPC, and were susceptible to privilege escalation. Fixed in 0.10.3.
|
{'CVE-2020-7956'}
|
2021-05-18T18:20:26Z
|
2021-05-18T18:20:26Z
|
HIGH
| 9.8
|
{'CWE-295'}
|
{'https://github.com/advisories/GHSA-cj2h-ww36-v932', 'https://github.com/hashicorp/nomad/pull/7023', 'https://www.hashicorp.com/blog/category/nomad/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7956', 'https://github.com/hashicorp/nomad/issues/7003'}
| null |
GHSA
|
GHSA-4w8p-x6g8-fv64
|
Server-Side Request Forgery in calibreweb
|
calibreweb prior to version 0.6.16 contains a Server-Side Request Forgery (SSRF) vulnerability.
|
{'CVE-2022-0339'}
|
2022-04-04T21:38:26Z
|
2022-02-01T00:48:54Z
|
MODERATE
| 6.5
|
{'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0339', 'https://github.com/janeczku/calibre-web/commit/3b216bfa07ec7992eff03e55d61732af6df9bb92', 'https://github.com/janeczku/calibre-web/releases/tag/0.6.16', 'https://github.com/janeczku/calibre-web/commit/35f6f4c727c887f8f3607fe3233dbc1980d15020', 'https://huntr.dev/bounties/499688c4-6ac4-4047-a868-7922c3eab369', 'https://github.com/advisories/GHSA-4w8p-x6g8-fv64'}
| null |
GHSA
|
GHSA-qh7x-j4v8-qw5w
|
Clipboard-based XSS
|
### Impact
XSS against the user.
### Details
jsuites is vulnerable to DOM based XSS if the user can be tricked into copying _anything_ from a malicious and pasting it into the html editor. This is because a part of the clipboard content is directly written to `innerHTML` causing XSS.
### References
The Curious Case of Copy & Paste – on risks of pasting arbitrary content in browsers: https://research.securitum.com/the-curious-case-of-copy-paste/
|
{'CVE-2021-41086'}
|
2022-04-19T19:03:11Z
|
2021-09-22T20:39:26Z
|
HIGH
| 8.7
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-qh7x-j4v8-qw5w', 'https://github.com/jsuites/jsuites/commit/fe1d3cc5e339f2f4da8ed1f9f42271fdf9cbd8d2', 'https://github.com/jsuites/jsuites/security/advisories/GHSA-qh7x-j4v8-qw5w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41086', 'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3', 'https://www.npmjs.com/package/jsuites'}
| null |
GHSA
|
GHSA-v9w2-v7j9-rjpr
|
Remote code execution in Eclipse Theia
|
In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file.
|
{'CVE-2021-34435'}
|
2021-09-13T20:27:31Z
|
2021-09-02T22:02:36Z
|
HIGH
| 8.8
|
{'CWE-668', 'CWE-942'}
|
{'https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018', 'https://github.com/advisories/GHSA-v9w2-v7j9-rjpr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34435', 'https://github.com/eclipse-theia/theia/pull/8759', 'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5'}
| null |
GHSA
|
GHSA-333w-rxj3-f55r
|
Regular Expression Denial Of Service in uri-js
|
Affected versions of `uri-js` is susceptible to a regular expression denial of service vulnerability when user input is sent to the `.parse()` method.
## Recommendation
Update to v3.0.0 or later.
|
{'CVE-2017-16021'}
|
2021-01-08T20:04:46Z
|
2018-07-24T20:00:30Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-333w-rxj3-f55r', 'https://nodesecurity.io/advisories/100', 'https://github.com/garycourt/uri-js/issues/12', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16021', 'https://www.npmjs.com/advisories/100'}
| null |
GHSA
|
GHSA-mq47-6wwv-v79w
|
Path traversal in claircore
|
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
|
{'CVE-2021-3762'}
|
2022-03-21T15:33:08Z
|
2022-03-04T00:00:16Z
|
HIGH
| 7.8
|
{'CWE-22'}
|
{'https://github.com/quay/clair/pull/1380', 'https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821', 'https://vulmon.com/exploitdetails?qidtp=maillist_oss_security&qid=d19fce9ede06e13dfb5630ece7f14f83', 'https://github.com/quay/clair/pull/1379', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3762', 'https://github.com/quay/claircore/pull/478', 'https://github.com/advisories/GHSA-mq47-6wwv-v79w', 'https://github.com/quay/claircore/commit/dff671c665141f126c072de8a744855d4916c9c7', 'https://bugzilla.redhat.com/show_bug.cgi?id=2000795'}
| null |
GHSA
|
GHSA-j8g6-2wh7-6439
|
Apache Tika allows Java code execution for serialized objects embedded in MATLAB files
|
Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization.
|
{'CVE-2016-6809'}
|
2022-04-26T21:47:40Z
|
2018-10-17T15:44:36Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://dist.apache.org/repos/dist/release/tika/CHANGES-1.14.txt', 'https://github.com/advisories/GHSA-j8g6-2wh7-6439', 'https://lists.apache.org/thread.html/rfd3646bb724b66b1a9ddef69e692da2b7a727a8799551c78eedf0a0f@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6809', 'https://lists.apache.org/thread.html/d2375da29d89e679abf5d845db76d6f798fdc6f7d44f2c788e8a0fb9@%3Cuser.nutch.apache.org%3E', 'https://lists.apache.org/thread.html/e414754a6c57ce7194b731e211cd6b2cbb41f2c7000e3fb9c6b6ec78@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r2f6f6c130b12b7332f323f74d031072b1517065ce28a22346791ffb6@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/91eb639ef619b9a26b40020ca6732e7dbe457f7322ed5f1df49e411a@%3Cdev.nutch.apache.org%3E', 'http://www.securityfocus.com/bid/94247', 'http://seclists.org/bugtraq/2016/Nov/40'}
| null |
GHSA
|
GHSA-cfxm-4p54-5w7h
|
Directory traversal in pooledwebsocket
|
Affected versions of `pooledwebsocket` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
Update to version 0.0.19 or later.
|
{'CVE-2017-16107'}
|
2021-01-08T18:58:41Z
|
2018-07-24T00:20:57Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-cfxm-4p54-5w7h', 'https://www.npmjs.com/advisories/341', 'https://nodesecurity.io/advisories/341', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16107'}
| null |
GHSA
|
GHSA-7543-mr7h-6v86
|
Improper Authorization in googleapis
|
Versions of `googleapis` prior to 39.1.0 are vulnerable to Improper Authorization. Setting credentials to one client may apply to all clients which may cause requests to be sent with the incorrect credentials.
## Recommendation
Upgrade to version 39.1.0.
| null |
2021-09-27T16:15:53Z
|
2020-09-02T16:00:26Z
|
HIGH
| 0
|
{'CWE-285'}
|
{'https://github.com/advisories/GHSA-7543-mr7h-6v86', 'https://www.npmjs.com/advisories/791', 'https://github.com/googleapis/google-api-nodejs-client/issues/1594'}
| null |
GHSA
|
GHSA-3gp6-hhfw-4gqx
|
Padding oracle attacks
|
It was found that all OWASP ESAPI for Java up to version 2.0 RC2 are vulnerable to padding oracle attacks.
|
{'CVE-2010-3300'}
|
2021-08-13T15:22:24Z
|
2021-08-13T15:22:24Z
|
MODERATE
| 5.9
|
{'CWE-649'}
|
{'https://www.usenix.org/legacy/events/woot10/tech/full_papers/Rizzo.pdf', 'https://github.com/advisories/GHSA-3gp6-hhfw-4gqx', 'https://nvd.nist.gov/vuln/detail/CVE-2010-3300', 'https://seclists.org/oss-sec/2010/q3/357'}
| null |
GHSA
|
GHSA-hv7x-f3pv-gpwr
|
Wrong memory orderings violates mutual exclusion in spin
|
An issue was discovered in the spin crate before 0.5.2 for Rust, when RwLock is used. Because memory ordering is mishandled, two writers can acquire the lock at the same time, violating mutual exclusion.
|
{'CVE-2019-16137'}
|
2021-08-25T20:44:46Z
|
2021-08-25T20:44:46Z
|
HIGH
| 7.5
|
{'CWE-662'}
|
{'https://rustsec.org/advisories/RUSTSEC-2019-0013.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16137', 'https://github.com/advisories/GHSA-hv7x-f3pv-gpwr', 'https://github.com/mvdnes/spin-rs/issues/65'}
| null |
GHSA
|
GHSA-rpcm-whqc-jfw8
|
Use after free in libflate
|
An issue was discovered in the libflate crate before 0.1.25 for Rust. MultiDecoder::read has a use-after-free, leading to arbitrary code execution.
|
{'CVE-2019-15552'}
|
2021-08-25T20:44:53Z
|
2021-08-25T20:44:53Z
|
CRITICAL
| 9.8
|
{'CWE-416'}
|
{'https://rustsec.org/advisories/RUSTSEC-2019-0010.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15552', 'https://github.com/sile/libflate/issues/35', 'https://github.com/advisories/GHSA-rpcm-whqc-jfw8'}
| null |
GHSA
|
GHSA-q4xr-rc97-m4xx
|
OS Command Injection in celery
|
This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.
|
{'CVE-2021-23727'}
|
2022-01-18T22:52:38Z
|
2022-01-06T22:22:02Z
|
HIGH
| 7.5
|
{'CWE-77', 'CWE-78'}
|
{'https://github.com/advisories/GHSA-q4xr-rc97-m4xx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23727', 'https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953', 'https://github.com/celery/celery/blob/master/Changelog.rst%23522', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/'}
| null |
GHSA
|
GHSA-5hq2-xf89-9jxq
|
Open Redirect in Action Pack
|
Impact
------
This is similar to CVE-2021-22881. Specially crafted Host headers in
combination with certain "allowed host" formats can cause the Host
Authorization middleware in Action Pack to redirect users to a malicious
website.
Since rails/rails@9bc7ea5, strings in config.hosts that do not have a leading
dot are converted to regular expressions without proper escaping. This causes,
for example, config.hosts << "sub.example.com" to permit a request with a Host
header value of sub-example.com.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
The following monkey patch put in an initializer can be used as a workaround.
```ruby
class ActionDispatch::HostAuthorization::Permissions
def sanitize_string(host)
if host.start_with?(".")
/\A(.+\.)?#{Regexp.escape(host[1..-1])}\z/i
else
/\A#{Regexp.escape host}\z/i
end
end
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 6-1-open-redirect.patch - Patch for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at
present. Users of earlier unsupported releases are advised to upgrade as soon
as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases.
Credits
-------
Thanks Jonathan Hefner (https://hackerone.com/jonathanhefner) for reporting this bug!
|
{'CVE-2021-22903'}
|
2021-06-23T18:26:23Z
|
2021-05-05T19:48:29Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://hackerone.com/reports/1148025', 'https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22903', 'https://groups.google.com/g/rubyonrails-security/c/8TxqXEtgSF0', 'https://github.com/advisories/GHSA-5hq2-xf89-9jxq'}
| null |
GHSA
|
GHSA-9xr8-8hmc-389f
|
Cross-Site Scripting in vant
|
Versions of `vant` prior to 2.1.8 are vulnerable to Cross-Site Scripting. The text value of the `Picker` component column is not sanitized, which may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 2.1.8 or later.
| null |
2021-08-18T22:47:16Z
|
2019-11-22T13:45:33Z
|
HIGH
| 9.1
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1157', 'https://github.com/advisories/GHSA-9xr8-8hmc-389f', 'https://snyk.io/vuln/SNYK-JS-VANT-460461', 'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a', 'https://github.com/youzan/vant/issues/4270'}
| null |
GHSA
|
GHSA-r2vw-jgq9-jqx2
|
Improper Authorization in @sap-cloud-sdk/core
|
Affected versions of `@sap-cloud-sdk/core` do not properly validate JWTs. The `verifyJwt()` function does not properly validate the URL from where the public verification key for the JWT can be downloaded. Any URL was trusted which makes it possible to provide a URL belonging to a manipulated JWT.
## Recommendation
Upgrade to version 1.21.2 or later.
| null |
2021-10-04T21:13:11Z
|
2020-09-03T15:54:11Z
|
HIGH
| 0
|
{'CWE-285'}
|
{'https://github.com/advisories/GHSA-r2vw-jgq9-jqx2', 'https://www.npmjs.com/advisories/1540'}
| null |
GHSA
|
GHSA-cfc2-wjcm-c8fm
|
Incorrect Authorization with specially crafted requests
|
Envoy, which Pomerium is based on, contains two authorization related vulnerabilities:
- [CVE-2021-32777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32779): incorrectly transform a URL containing a `#fragment` element, causing a mismatch in path-prefix based authorization decisions.
- [CVE-2021-32779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32777): incorrectly handle duplicate headers, dropping all but the last. This may lead to incorrect routing or authorization policy decisions.
### Impact
With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium.
### Patches
Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched.
### Workarounds
- This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation.
### References
[envoy GSA CVE-2021-32777](https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9)
[envoy GSA CVE-2021-32779](https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h)
[envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues)
* Email us at [security@pomerium.com](mailto:security@pomerium.com)
|
{'CVE-2021-39206'}
|
2021-09-13T19:56:54Z
|
2021-09-10T17:54:25Z
|
HIGH
| 8.6
|
{'CWE-863'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39206', 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h', 'https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm', 'https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9', 'https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ', 'https://github.com/advisories/GHSA-cfc2-wjcm-c8fm'}
| null |
GHSA
|
GHSA-9x2h-hvg6-4r5p
|
Improper Authentication in Apache Zeppelin
|
In Apache Zeppelin prior to 0.8.0 the cron scheduler was enabled by default and could allow users to run paragraphs as other users without authentication.
|
{'CVE-2018-1317'}
|
2021-08-03T19:00:05Z
|
2019-04-24T16:06:52Z
|
HIGH
| 8.8
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1317', 'https://lists.apache.org/thread.html/ff6b995a5a3ba8db4d6b14b4d9dd487e7bf2e3bdd5b375b64a25fd06@%3Cusers.zeppelin.apache.org%3E', 'https://github.com/advisories/GHSA-9x2h-hvg6-4r5p', 'http://www.openwall.com/lists/oss-security/2019/04/23/1', 'https://zeppelin.apache.org/releases/zeppelin-release-0.8.0.html'}
| null |
GHSA
|
GHSA-cj8p-53v9-2c26
|
Cross-site Scripting in Bolt
|
Bolt before 3.6.10 has XSS via createFolder or createFile in Controller/Async/FilesystemManager.php.
|
{'CVE-2019-15485'}
|
2021-08-18T21:39:02Z
|
2019-11-08T15:28:11Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-cj8p-53v9-2c26', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15485', 'https://github.com/bolt/bolt/pull/7800', 'https://github.com/bolt/bolt/releases/tag/v3.6.10'}
| null |
GHSA
|
GHSA-5rqg-jm4f-cqx7
|
Infinite loop causing Denial of Service in colors
|
colors is a library for including colored text in node.js consoles. Between 07 and 09 January 2022, colors versions 1.4.1, 1.4.2, and 1.4.44-liberty-2 were published including malicious code that caused a Denial of Service due to an infinite loop. Software dependent on these versions experienced the printing of randomized characters to console and an infinite loop resulting in unbound system resource consumption.
Users of colors relying on these specific versions should downgrade to version 1.4.0.
| null |
2022-04-19T19:03:27Z
|
2022-01-10T17:29:53Z
|
HIGH
| 0
|
{'CWE-835'}
|
{'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75', 'https://github.com/advisories/GHSA-5rqg-jm4f-cqx7', 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd', 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed18c5cf26'}
| null |
GHSA
|
GHSA-frpw-jrwx-hcfv
|
Path Traversal in node-red-contrib-huemagic
|
node-red-contrib-huemagic 3.0.0 is affected by hue/assets/..%2F Directory Traversal.in the res.sendFile API, used in file hue-magic.js, to fetch an arbitrary file.
|
{'CVE-2021-25864'}
|
2021-04-13T15:30:00Z
|
2021-04-13T15:30:00Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-frpw-jrwx-hcfv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25864', 'https://github.com/Foddy/node-red-contrib-huemagic/issues/217'}
| null |
GHSA
|
GHSA-p7h9-vf92-5fj5
|
Moderate severity vulnerability that affects Products.CMFPlone and Products.PasswordResetTool
|
Cross-site scripting (XSS) vulnerability in Plone 4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
|
{'CVE-2011-1948'}
|
2021-06-10T22:02:04Z
|
2018-07-23T19:50:57Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'http://plone.org/products/plone/security/advisories/CVE-2011-1948', 'http://secunia.com/advisories/44775', 'http://osvdb.org/72727', 'https://nvd.nist.gov/vuln/detail/CVE-2011-1948', 'http://securityreason.com/securityalert/8269', 'http://www.securityfocus.com/bid/48005', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67693', 'http://www.securityfocus.com/archive/1/518155/100/0/threaded', 'http://secunia.com/advisories/44776', 'https://github.com/advisories/GHSA-p7h9-vf92-5fj5'}
| null |
GHSA
|
GHSA-89rj-5ggj-3p9p
|
Reachable Assertion in OpenCV.
|
In OpenCV 3.3.1 (corresponds with OpenCV-Python 3.3.1.11), an assertion failure happens in cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp because of an incorrect integer cast.
|
{'CVE-2018-5269'}
|
2021-11-18T15:29:39Z
|
2021-10-12T22:03:41Z
|
MODERATE
| 5.5
|
{'CWE-617'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-5269', 'https://github.com/opencv/opencv/issues/10540', 'http://www.securityfocus.com/bid/106945', 'https://github.com/advisories/GHSA-89rj-5ggj-3p9p', 'https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/10563', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}
| null |
GHSA
|
GHSA-jwjq-vp53-ph6m
|
Directory Traversal in pytservce
|
Affected versions of `pytservce` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16195'}
|
2021-01-14T15:42:15Z
|
2020-09-01T18:21:44Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pytservce', 'https://nodesecurity.io/advisories/435', 'https://www.npmjs.com/advisories/435', 'https://github.com/advisories/GHSA-jwjq-vp53-ph6m', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16195'}
| null |
GHSA
|
GHSA-mmqv-m45h-q2hp
|
Sandbox Breakout / Arbitrary Code Execution in localeval
|
All versions of `localeval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `constructor.constructor`. This may allow attackers to execute arbitrary code in the system. Evaluating the payload
```
constructor.constructor("return process.env")()
```
returns the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2022-03-14T23:59:01Z
|
2020-09-04T15:22:40Z
|
CRITICAL
| 0
| null |
{'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c', 'https://github.com/espadrine/localeval/issues/9', 'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335', 'https://github.com/advisories/GHSA-mmqv-m45h-q2hp'}
| null |
GHSA
|
GHSA-hj56-84jw-67h6
|
Potential Denial-of-Service in bindata
|
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers.
|
{'CVE-2021-32823'}
|
2021-06-24T13:11:19Z
|
2021-06-23T23:42:04Z
|
LOW
| 3.7
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32823', 'https://rubygems.org/gems/bindata', 'https://github.com/dmendel/bindata/blob/v2.4.10/ChangeLog.rdoc#version-2410-2021-05-18-', 'https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323', 'https://github.com/dmendel/bindata/blob/master/ChangeLog.rdoc#version-2410-2021-05-18-', 'https://github.com/advisories/GHSA-hj56-84jw-67h6', 'https://github.com/rubysec/ruby-advisory-db/issues/476', 'https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/#update-bindata-dependency'}
| null |
GHSA
|
GHSA-37q6-576q-vgr7
|
Missing Origin Validation in parcel-bundler
|
Versions of `parcel-bundler` before 1.10.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation
Update to version 1.10.0 or later.
|
{'CVE-2018-14731'}
|
2021-08-31T20:51:50Z
|
2018-10-30T20:36:53Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)', 'https://github.com/parcel-bundler/parcel/pull/1794', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14731', 'https://github.com/parcel-bundler/parcel/issues/1783', 'https://github.com/advisories/GHSA-37q6-576q-vgr7', 'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages', 'https://www.npmjs.com/advisories/721'}
| null |
GHSA
|
GHSA-p435-w4xm-jj8x
|
Hadoop token in temp file visible to all users in Apache Gobblin
|
In Apache Gobblin, the Hadoop token is written to a temp file that is visible to all local users on Unix-like systems. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue.
|
{'CVE-2021-36151'}
|
2022-02-11T16:12:07Z
|
2022-02-06T00:01:07Z
|
MODERATE
| 5.5
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-p435-w4xm-jj8x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36151', 'https://lists.apache.org/thread/3cdkyxdd6xk05lsvr3l66dsnvhwyo1t0'}
| null |
GHSA
|
GHSA-6445-fm66-fvq2
|
Integer overflows in Tensorflow
|
### Impact
The [implementation of `AddManySparseToTensorsMap`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc) is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service):
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.AddManySparseToTensorsMap(
sparse_indices=[(0,0),(0,1),(0,2),(4,3),(5,0),(5,1)],
sparse_values=[1,1,1,1,1,1],
sparse_shape=[2**32,2**32],
container='',
shared_name='',
name=None)
```
We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The latter is an instance of [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and is easily fixed by replacing a call to `TensorShape` constructor with a call to `BuildTensorShape` static helper factory.
### Patches
We have patched the issue in GitHub commits [b51b82fe65ebace4475e3c54eb089c18a4403f1c](https://github.com/tensorflow/tensorflow/commit/b51b82fe65ebace4475e3c54eb089c18a4403f1c) and [a68f68061e263a88321c104a6c911fe5598050a8](https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
|
{'CVE-2022-23568'}
|
2022-02-11T17:05:21Z
|
2022-02-09T23:39:11Z
|
MODERATE
| 6.5
|
{'CWE-190'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6445-fm66-fvq2', 'https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc', 'https://github.com/tensorflow/tensorflow/commit/b51b82fe65ebace4475e3c54eb089c18a4403f1c', 'https://github.com/advisories/GHSA-6445-fm66-fvq2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23568'}
| null |
GHSA
|
GHSA-g636-q5fc-4pr7
|
accounts: Hash account number using Salt
|
@alovak found that currently when we build hash of account number we do not "salt" it. Which makes it vulnerable to rainbow table attack.
**What did you expect to see?**
I expected salt (some random number from configuration) to be used in [hash.AccountNumber](https://github.com/moov-io/customers/blob/master/pkg/secrets/hash/account_number.go#L13)
I would generate salt per tenant at least (maybe per organization).
| null |
2021-05-24T17:00:27Z
|
2021-05-24T17:00:27Z
|
LOW
| 0
| null |
{'https://github.com/advisories/GHSA-g636-q5fc-4pr7', 'https://github.com/moov-io/customers/security/advisories/GHSA-g636-q5fc-4pr7'}
| null |
GHSA
|
GHSA-vxhx-gmhm-623c
|
Improper Access Control in moodle
|
Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
|
{'CVE-2020-25698'}
|
2021-03-29T20:42:46Z
|
2021-03-29T20:42:46Z
|
HIGH
| 7.5
|
{'CWE-284'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25698', 'https://github.com/advisories/GHSA-vxhx-gmhm-623c', 'https://moodle.org/mod/forum/discuss.php?d=413935', 'https://github.com/moodle/moodle/commit/c8ac07fb50fa92eee1d574823fbda09e1b309a63', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895419'}
| null |
GHSA
|
GHSA-w9m4-7w72-r766
|
Improper Access Control in Onionshare
|
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerability ID: OTF-004
- Vulnerability type: Improper Access Control
- Threat level: Moderate
## Description:
Chat participants can spoof their channel leave message, tricking others into assuming they left the chatroom.
## Technical description:



This series of screenshots show Alice, Bob and Eve joined a chatroom and are the only participants in the chatroom. Eve seemingly leaves the chatroom, which leads Bob and Alice to believe they are having a private chat. The last screenshot shows that Eve only emitted the leave message and is still able to read the chat and possibly write messages.
This can be reproduced by joining the chat with two different instances, where one instance has slightly modified the client-side JavaScript code similar to OTF-003 (page 22). The joined emit needs to be removed from the connect event handler. Therefore the modified client is not listed in the userlist and has no active session. The modified non-listed user also needs to change their username to Eve, which is not shown in the chatroom. The modified client then emits the disconnect event and their connection is no longer usable.
This results in the leave message for Eve and the removal from the user-list but not in removal of the original session of the Eve who announced to join the chat.
## Impact:
An adversary with access to the chat environment can spoof his leave event but still persist in the chat with access to all sent messages and the possibility to write in the chat using OTF-003 (page 22).
## Recommendation:
- Implement proper session handling
|
{'CVE-2022-21691'}
|
2022-01-25T20:52:18Z
|
2022-01-21T23:20:22Z
|
MODERATE
| 4.3
|
{'CWE-306'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21691', 'https://github.com/advisories/GHSA-w9m4-7w72-r766', 'https://github.com/onionshare/onionshare/security/advisories/GHSA-w9m4-7w72-r766', 'https://github.com/onionshare/onionshare/releases/tag/v2.5'}
| null |
GHSA
|
GHSA-75vw-3m5v-fprh
|
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
|
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
|
{'CVE-2022-0239'}
|
2022-01-24T22:08:32Z
|
2022-01-21T23:43:11Z
|
CRITICAL
| 9.8
|
{'CWE-611'}
|
{'https://huntr.dev/bounties/a717aec2-5646-4a5f-ade0-dadc25736ae3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0239', 'https://github.com/advisories/GHSA-75vw-3m5v-fprh', 'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd'}
| null |
GHSA
|
GHSA-f854-hpxv-cw9r
|
Drainage of FeeCollector's Block Transaction Fees in cronos
|
### Impact
In Cronos nodes running versions before v0.6.5, it is possible to take transaction fees from Cosmos SDK's FeeCollector for the current block by sending a custom crafted MsgEthereumTx.
User funds and balances are safe.
### Patches
This problem has been patched in Cronos v0.6.5 on the mempool level.
The next network upgrade with consensus-breaking changes will patch it on the consensus level.
### Workarounds
There are no tested workarounds. All validator node operators are recommended to upgrade to Cronos v0.6.5 at their earliest possible convenience.
### Credits
Thank you to @zb3 for reporting this issue on [Cronos Immunefi Bug Bounty Program](https://immunefi.com/bounty/cronos/), to @cyril-crypto for reproducing the issue and to @yihuang and @thomas-nguy for patching the issue on the CheckTx (mempool) and the DeliverTx (consensus) levels.
### For more information
If you have any questions or comments about this advisory:
* Open a discussion in [crypto-org-chain/cronos](https://github.com/crypto-org-chain/cronos/discussions/new)
* Email us at [chain@crypto.org](mailto:chain@crypto.org)
|
{'CVE-2021-43839'}
|
2022-04-19T19:03:18Z
|
2022-01-06T18:30:54Z
|
HIGH
| 7.5
|
{'CWE-670'}
|
{'https://github.com/advisories/GHSA-f854-hpxv-cw9r', 'https://github.com/crypto-org-chain/cronos/security/advisories/GHSA-f854-hpxv-cw9r', 'https://github.com/crypto-org-chain/cronos/pull/270', 'https://github.com/crypto-org-chain/cronos/commit/150ef237b37ac28c8136e1c0f494932860b9ebe8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43839'}
| null |
GHSA
|
GHSA-2cwj-8chv-9pp9
|
XML External Entity attack in log4net
|
Apache log4net before 2.0.10 does not disable XML external entities when parsing log4net configuration files. This could allow for XXE-based attacks in applications that accept arbitrary configuration files from users.
|
{'CVE-2018-1285'}
|
2022-04-25T23:06:14Z
|
2021-01-29T19:47:23Z
|
CRITICAL
| 9.8
|
{'CWE-611'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r9de86a185575e6c5f92e2a70a1d2e2e9514dc4341251577aac8e3866@%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/r7ab6b6e702f11a6f77b0db2af2d5e5532f56ae4b99b5fe73c5200b6a@%3Cdev.logging.apache.org%3E', 'https://github.com/advisories/GHSA-2cwj-8chv-9pp9', 'https://lists.apache.org/thread.html/r6543acafca3e2d24ff4b0c364a91540cb9378977ffa8d37a03ab4b0f@%3Cdev.logging.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rd2d72a017e238d1f345f9d14e075c81be16fc68a41c9e9ad9e29a732@%3Cdev.logging.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1285', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2018-1285', 'https://lists.apache.org/thread.html/reab1c277c95310bad1038255e0757857b2fbe291411b4fa84552028a%40%3Cdev.logging.apache.org%3E', 'https://snyk.io/vuln/SNYK-DOTNET-LOG4NET-568897', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2U233HVAQDSZ2PRG4XSGDASLY3J6ALH/', 'https://lists.apache.org/thread.html/r00b16ac5e0bbf7009a0d167ed58f3f94d0033b0f4b3e3d5025cc4872@%3Cdev.logging.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKL2LPINAI6BCMXOH4V4HVHGLUXIWOFO/', 'https://lists.apache.org/thread.html/rdbac24c945ca5c69cd5348b5ac023bc625768f653335de146e09ae2d@%3Cdev.logging.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT2DNNSW7C7FNK3MA3SLEUHGW5USYZKE/', 'https://lists.apache.org/thread.html/r33564de316d4e4ba0fea1d4d079e62cde1ffe64369c1157243d840d9@%3Cdev.logging.apache.org%3E', 'https://issues.apache.org/jira/browse/LOG4NET-575', 'https://www.nuget.org/packages/log4net/', 'https://lists.apache.org/thread.html/r525cbbd7db0aef4a114cf60de8439aa285decc34904d42a7f14f39c3@%3Cdev.logging.apache.org%3E'}
| null |
GHSA
|
GHSA-rp34-85x3-3764
|
Cross-site Scripting in librenms
|
Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0.
|
{'CVE-2022-0576'}
|
2022-02-24T13:07:05Z
|
2022-02-15T00:02:47Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd', 'https://github.com/advisories/GHSA-rp34-85x3-3764', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0576', 'https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html'}
| null |
GHSA
|
GHSA-9gxr-rhx6-4jgv
|
Sandbox Breakout / Prototype Pollution in notevil
|
Versions of `notevil` prior to 1.3.3 are vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing attacker to add or modify an object's prototype.
Evaluating the payload ```try{a[b];}catch(e){e.constructor.constructor('return __proto__.arguments.callee.__proto__.polluted=true')()}``` add the `polluted` property to Function.
## Recommendation
Upgrade to version 1.3.3 or later.
| null |
2021-10-01T20:11:51Z
|
2020-09-04T15:18:57Z
|
MODERATE
| 0
|
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1338', 'https://github.com/advisories/GHSA-9gxr-rhx6-4jgv'}
| null |
GHSA
|
GHSA-9r24-gp44-h3pm
|
High severity vulnerability that affects org.apache.tika:tika-core
|
From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.
|
{'CVE-2018-1335'}
|
2021-09-08T20:54:36Z
|
2018-10-17T15:43:43Z
|
HIGH
| 8.1
| null |
{'https://github.com/advisories/GHSA-9r24-gp44-h3pm', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1335', 'https://www.exploit-db.com/exploits/46540/', 'http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html', 'http://www.securityfocus.com/bid/104001', 'https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca@%3Cdev.tika.apache.org%3E'}
| null |
GHSA
|
GHSA-5hfj-r725-wpc4
|
Arbitrary code execution in october/system
|
### Impact
Assuming an attacker with access to the backend is able to execute PHP code by using the theme import feature. This will bypass the safe mode feature that prevents PHP execution in the CMS templates.
### Patches
Issue has been patched in Build 473 and v1.1.6
### Workarounds
Apply https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26 to your installation manually if you are unable to upgrade.
### References
Credits to:
• Sushi Yushi
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
|
{'CVE-2021-32650'}
|
2022-04-19T19:02:58Z
|
2022-01-14T21:08:26Z
|
HIGH
| 8.8
|
{'CWE-74'}
|
{'https://github.com/octobercms/october/security/advisories/GHSA-5hfj-r725-wpc4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32650', 'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26', 'https://github.com/advisories/GHSA-5hfj-r725-wpc4'}
| null |
GHSA
|
GHSA-gg96-f8wr-p89f
|
Script injection
|
### Impact
A malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page.
The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store.
### Patches
The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
|
{'CVE-2021-32661'}
|
2021-06-21T22:43:06Z
|
2021-06-04T19:09:26Z
|
MODERATE
| 6.8
|
{'CWE-434', 'CWE-77'}
|
{'https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f', 'https://github.com/advisories/GHSA-gg96-f8wr-p89f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32661', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}
| null |
GHSA
|
GHSA-r742-7j4h-hjr8
|
Malicious Package in arsenic-tabasco-cyborg-peanut-butter
|
All versions of `arsenic-tabasco-cyborg-peanut-butter` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T17:08:43Z
|
2020-09-03T23:27:36Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-r742-7j4h-hjr8', 'https://www.npmjs.com/advisories/1313'}
| null |
GHSA
|
GHSA-f8h3-rqrm-47v9
|
Prototype Pollution in smart-extend
|
All versions of `smart-extend` are vulnerable to Prototype Pollution. The `deep()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-09-27T16:16:39Z
|
2020-09-02T16:02:40Z
|
MODERATE
| 0
|
{'CWE-1321'}
|
{'https://hackerone.com/reports/438274', 'https://www.npmjs.com/advisories/801', 'https://github.com/advisories/GHSA-f8h3-rqrm-47v9'}
| null |
GHSA
|
GHSA-2m39-62fm-q8r3
|
Regular Expression Denial of Service in sshpk
|
Versions of `sshpk` before 1.13.2 or 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys.
## Recommendation
Update to version 1.13.2, 1.14.1 or later.
|
{'CVE-2018-3737'}
|
2021-01-08T20:07:45Z
|
2018-08-15T13:22:23Z
|
HIGH
| 0
|
{'CWE-770'}
|
{'https://github.com/advisories/GHSA-2m39-62fm-q8r3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3737', 'https://hackerone.com/reports/319593', 'https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17', 'https://www.npmjs.com/advisories/606', 'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957'}
| null |
GHSA
|
GHSA-2xgj-xhgf-ggjv
|
Heap buffer overflow in `BandedTriangularSolve`
|
### Impact
An attacker can trigger a heap buffer overflow in Eigen implementation of `tf.raw_ops.BandedTriangularSolve`:
```python
import tensorflow as tf
import numpy as np
matrix_array = np.array([])
matrix_tensor = tf.convert_to_tensor(np.reshape(matrix_array,(0,1)),dtype=tf.float32)
rhs_array = np.array([1,1])
rhs_tensor = tf.convert_to_tensor(np.reshape(rhs_array,(1,2)),dtype=tf.float32)
tf.raw_ops.BandedTriangularSolve(matrix=matrix_tensor,rhs=rhs_tensor)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L269-L278) calls `ValidateInputTensors` for input validation but fails to validate that the two tensors are not empty:
```cc
void ValidateInputTensors(OpKernelContext* ctx, const Tensor& in0, const Tensor& in1) {
OP_REQUIRES(
ctx, in0.dims() >= 2,
errors::InvalidArgument("In[0] ndims must be >= 2: ", in0.dims()));
OP_REQUIRES(
ctx, in1.dims() >= 2,
errors::InvalidArgument("In[1] ndims must be >= 2: ", in1.dims()));
}
```
Furthermore, since `OP_REQUIRES` macro only stops execution of current function after setting `ctx->status()` to a non-OK value, callers of helper functions that use `OP_REQUIRES` must check value of `ctx->status()` before continuing. This doesn't happen [in this op's implementation](https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L219), hence the validation that is present is also not effective.
### Patches
We have patched the issue in GitHub commit [ba6822bd7b7324ba201a28b2f278c29a98edbef2](https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2) followed by GitHub commit [0ab290774f91a23bebe30a358fde4e53ab4876a0](https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ye Zhang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29612'}
|
2021-05-21T14:28:37Z
|
2021-05-21T14:28:37Z
|
LOW
| 3.6
|
{'CWE-120'}
|
{'https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0', 'https://github.com/advisories/GHSA-2xgj-xhgf-ggjv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29612', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2xgj-xhgf-ggjv'}
| null |
GHSA
|
GHSA-cgpp-wm2h-6hqx
|
SQL Injection in waterline-sequel
|
Affected versions of `waterline-sequel` are vulnerable to SQL injection in cases where user input is passed into the `like`, `contains`, `startsWith`, or `endsWith` methods.
## Recommendation
Upgrade to at least version 0.5.1
|
{'CVE-2016-10551'}
|
2021-01-08T18:58:47Z
|
2019-02-18T23:54:28Z
|
HIGH
| 0
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10551', 'https://github.com/advisories/GHSA-cgpp-wm2h-6hqx', 'https://www.npmjs.com/advisories/115', 'https://nodesecurity.io/advisories/115', 'https://github.com/balderdashy/waterline-sequel/pull/66', 'https://github.com/balderdashy/waterline/issues/1219#issuecomment-157294530'}
| null |
GHSA
|
GHSA-pgr8-jg6h-8gw6
|
Cross-Site Scripting in webpack-bundle-analyzer
|
Versions of `webpack-bundle-analyzer` prior to 3.3.2 are vulnerable to Cross-Site Scripting. The package uses `JSON.stringify()` without properly escaping input which may lead to Cross-Site Scripting.
## Recommendation
Upgrade to version 3.3.2 or later.
| null |
2021-08-04T15:26:36Z
|
2019-05-23T09:26:20Z
|
MODERATE
| 6.3
|
{'CWE-79'}
|
{'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263', 'https://www.npmjs.com/advisories/826', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/pull/264', 'https://snyk.io/vuln/SNYK-JS-WEBPACKBUNDLEANALYZER-174190', 'https://github.com/advisories/GHSA-pgr8-jg6h-8gw6'}
| null |
GHSA
|
GHSA-c77f-4rgj-jfr4
|
Cross-site Scripting in Beego
|
Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the "Request Statistics" page.
|
{'CVE-2021-39391'}
|
2021-10-06T22:05:12Z
|
2021-09-15T20:23:28Z
|
HIGH
| 6.1
|
{'CWE-64', 'CWE-79'}
|
{'https://github.com/advisories/GHSA-c77f-4rgj-jfr4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39391', 'https://github.com/beego/beego/issues/4727'}
| null |
GHSA
|
GHSA-qpv2-jxc7-3638
|
Exposure of Sensitive Information in snipe/snipe-it
|
Snipe-IT prior to v5.3.10 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor.
|
{'CVE-2022-0569'}
|
2022-02-24T13:13:02Z
|
2022-02-15T00:02:47Z
|
MODERATE
| 4.3
|
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0569', 'https://huntr.dev/bounties/b41d5e63-bcd8-4864-8a2e-8ec74eec520b', 'https://github.com/snipe/snipe-it/commit/05c0819776b07425b2831cd31a8a0f4e7ac30c09', 'https://github.com/advisories/GHSA-qpv2-jxc7-3638'}
| null |
GHSA
|
GHSA-6rvj-pw9w-jcvc
|
Information disclosure vulnerability in OnionShare
|
An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.
|
{'CVE-2021-41867'}
|
2021-11-19T20:39:35Z
|
2021-11-19T20:39:35Z
|
MODERATE
| 0
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-6rvj-pw9w-jcvc', 'https://www.ihteam.net/advisory/onionshare/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41867', 'https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4'}
| null |
GHSA
|
GHSA-frcx-xc72-c4v4
|
Use of Sha-1 in tusdotnet
|
# Withdrawn
After reviewing this CVE, we have withdrawn this advisory due to it not having actual security impact.
# Original Advisory
The client in tusdotnet through 2.5.0 relies on SHA-1 to prevent spoofing of file content.
|
{'CVE-2021-44150'}
|
2021-11-30T21:55:51Z
|
2021-11-29T18:09:08Z
|
LOW
| 3.1
|
{'CWE-327'}
|
{'https://shattered.io/', 'https://github.com/advisories/GHSA-frcx-xc72-c4v4', 'https://github.com/github/advisory-database/issues/2324', 'https://github.com/tusdotnet/tusdotnet/issues/157', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44150'}
| null |
GHSA
|
GHSA-c87f-fq5g-63r2
|
Cross-site scripting in Unicorn framework
|
The Unicorn framework through 0.35.3 for Django allows XSS via component.name.
|
{'CVE-2021-42053'}
|
2021-10-12T17:51:11Z
|
2021-10-12T17:51:11Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'http://packetstormsecurity.com/files/164442/django-unicorn-0.35.3-Cross-Site-Scripting.html', 'https://github.com/advisories/GHSA-c87f-fq5g-63r2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42053', 'https://github.com/adamghill/django-unicorn/compare/0.35.3...0.36.0', 'https://github.com/adamghill/django-unicorn/pull/288', 'https://github.com/adamghill/django-unicorn/pull/288/commits/aa5b9835d946bd9893ef02e556859e3ea62cc5e2'}
| null |
GHSA
|
GHSA-r992-xph6-h7x2
|
Open redirect in microweber
|
microweber prior to 1.2.11 is vulnerable to open redirect.
|
{'CVE-2022-0560'}
|
2022-02-23T21:57:39Z
|
2022-02-12T00:00:48Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0560', 'https://huntr.dev/bounties/c9d586e7-0fa1-47ab-a2b3-b890e8dc9b25', 'https://github.com/microweber/microweber/commit/72d4b12cc487f56a859a8570ada4efb77b4b8c63', 'https://github.com/advisories/GHSA-r992-xph6-h7x2'}
| null |
GHSA
|
GHSA-qmfx-75ff-8mw6
|
Listing of upload directory contents possible
|
There's an security issue in prosody-filer versions **< 1.0.1** which leads to unwanted directory listings of download directories.
An attacker is able to list previous uploads of a certain user by shortening the URL and accessing a URL subdirectors other than `/upload/` (or the corresponding user defined root dir)
Version 1.0.1 and later fix this problem and allow only direct file access if the full path is known. Directory listings are blocked entirely.
| null |
2021-05-27T18:41:00Z
|
2021-05-27T18:41:00Z
|
HIGH
| 0
| null |
{'https://github.com/ThomasLeister/prosody-filer/security/advisories/GHSA-qmfx-75ff-8mw6', 'https://github.com/advisories/GHSA-qmfx-75ff-8mw6'}
| null |
GHSA
|
GHSA-3wqh-h42r-x8fq
|
Denial of Service in @hapi/subtext
|
Versions of `@hapi/subtext` prior to 6.1.3 or 7.0.3 are vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to version 6.1.3 or 7.0.3
| null |
2020-09-03T15:46:22Z
|
2020-09-03T15:46:22Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-3wqh-h42r-x8fq', 'https://www.npmjs.com/advisories/1476'}
| null |
GHSA
|
GHSA-grg4-wf29-r9vv
|
Bzip2Decoder doesn't allow setting size restrictions for decompressed data
|
### Impact
The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).
All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack
### Workarounds
No workarounds other than not using the `Bzip2Decoder`
### References
Relevant code areas:
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305
|
{'CVE-2021-37136'}
|
2022-04-22T15:41:16Z
|
2021-09-09T17:11:21Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80', 'https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv', 'https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37136', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20220210-0012/', 'https://github.com/advisories/GHSA-grg4-wf29-r9vv', 'https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020', 'https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305'}
| null |
GHSA
|
GHSA-x52f-h74p-9jh8
|
Hijacked Environment Variables in node-sqlite
|
The `node-sqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16048'}
|
2021-06-10T19:38:20Z
|
2018-07-23T21:00:07Z
|
HIGH
| 7.5
|
{'CWE-200', 'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16048', 'https://github.com/advisories/GHSA-x52f-h74p-9jh8', 'https://www.npmjs.com/advisories/493', 'https://nodesecurity.io/advisories/493'}
| null |
GHSA
|
GHSA-9475-xg6m-j7pw
|
Subject Confirmation Method not validated in Saml2 Authentication Services for ASP.NET
|
### Impact
Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Saml2 protocol for issuing tokens that is tied to a subject through other means, e.g. holder-of-key where possession of a private key must be proved.
The Sustainsys.Saml2 library incorrectly treats all incoming tokens as bearer tokens, even though they have another subject confirmation method specified. This could be used by an attacker that could get access to Saml2 tokens with another subject confirmation method than bearer. The attacker could then use such a tocken to create a log in session.
### Patches
Version 1.0.2 and 2.7.0 are patched.
### Workarounds
Ensure that any IdentityProvider trusted by the Sustainsys.Saml2 SP only issues bearer tokens if the audience matches the Sustainsys.Saml2 SP.
### For more information
If you have any questions or comments about this advisory:
* Comment on #103
* Email us at security@sustainsys.com if you think that there are further security issues.
|
{'CVE-2020-5268'}
|
2021-01-08T20:21:36Z
|
2020-04-22T20:59:37Z
|
MODERATE
| 6.5
|
{'CWE-303'}
|
{'https://github.com/Sustainsys/Saml2/issues/712', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-9475-xg6m-j7pw', 'https://github.com/advisories/GHSA-9475-xg6m-j7pw', 'https://www.nuget.org/packages/Sustainsys.Saml2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5268', 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}
| null |
GHSA
|
GHSA-8849-5h85-98qw
|
Out-of-bounds Write in OpenCV
|
In opencv calls that use libpng, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges required. User interaction is not required for exploitation. Product: AndroidVersions: Android-10Android ID: A-110986616
|
{'CVE-2019-9423'}
|
2021-10-12T22:22:17Z
|
2021-10-12T22:22:17Z
|
HIGH
| 7.8
|
{'CWE-787'}
|
{'https://source.android.com/security/bulletin/android-10', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9423', 'http://www.openwall.com/lists/oss-security/2019/11/07/1', 'http://www.openwall.com/lists/oss-security/2020/12/05/1', 'https://github.com/advisories/GHSA-8849-5h85-98qw', 'http://www.openwall.com/lists/oss-security/2019/10/25/17', 'http://www.openwall.com/lists/oss-security/2019/10/27/1'}
| null |
GHSA
|
GHSA-x4qm-mcjq-v2gf
|
Overflow in prost-types
|
An issue was discovered in the prost-types crate before 0.8.0 for Rust. An overflow can occur during conversion from Timestamp to SystemTime.
|
{'CVE-2021-38192'}
|
2021-08-25T20:55:53Z
|
2021-08-25T20:55:53Z
|
HIGH
| 7.5
|
{'CWE-120', 'CWE-190'}
|
{'https://github.com/advisories/GHSA-x4qm-mcjq-v2gf', 'https://rustsec.org/advisories/RUSTSEC-2021-0073.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38192', 'https://github.com/tokio-rs/prost/issues/438'}
| null |
GHSA
|
GHSA-j866-8vxx-27hx
|
Hijacked Environment Variables in nodemailer.js
|
The `nodemailer.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16072'}
|
2021-01-08T18:36:11Z
|
2018-08-29T23:43:53Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16072', 'https://github.com/advisories/GHSA-j866-8vxx-27hx', 'https://www.npmjs.com/advisories/511', 'https://nodesecurity.io/advisories/511'}
| null |
GHSA
|
GHSA-7cvf-p83w-48q6
|
Malicious Package in beffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:22:59Z
|
2020-09-03T21:37:29Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1229', 'https://github.com/advisories/GHSA-7cvf-p83w-48q6'}
| null |
GHSA
|
GHSA-r96c-57pf-9jjm
|
Prototype Pollution in node.extend
|
Versions of `node.extend` before 1.1.7 or 2.0.1 are vulnerable to prototype pollution.
## Recommendation
Update to version 1.1.7, 2.0.1 or later.
|
{'CVE-2018-16491'}
|
2021-01-08T01:58:05Z
|
2019-02-07T18:17:34Z
|
MODERATE
| 0
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-r96c-57pf-9jjm', 'https://www.npmjs.com/advisories/781', 'https://hackerone.com/reports/430831', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16491'}
| null |
GHSA
|
GHSA-v92m-hhhw-vv9v
|
Code injection in codiad
|
Codiad Web IDE through 2.8.4 allows PHP Code injection.
|
{'CVE-2019-19208'}
|
2022-01-31T22:01:57Z
|
2021-09-01T18:27:12Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://herolab.usd.de/security-advisories/usd-2019-0049/', 'https://herolab.usd.de/en/security-advisories/', 'http://packetstormsecurity.com/files/162753/Codiad-2.8.4-Remote-Code-Execution.html', 'https://www.exploit-db.com/exploits/49902', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19208', 'https://github.com/Codiad/Codiad/commits/master', 'https://github.com/advisories/GHSA-v92m-hhhw-vv9v', 'https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-19208-Exploit'}
| null |
GHSA
|
GHSA-hrmr-f5m6-m9pq
|
Moderate severity vulnerability that affects org.apache.commons:commons-compress
|
When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17's ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package.
|
{'CVE-2018-11771'}
|
2022-02-08T22:08:25Z
|
2018-10-19T16:41:27Z
|
MODERATE
| 5.5
|
{'CWE-835'}
|
{'https://lists.apache.org/thread.html/3565494c263dfeb4dcb2a71cb24d09a1ca285cd6ac74edc025a3af8a@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/0adb631517766e793e18a59723e2df08ced41eb9a57478f14781c9f7@%3Cdev.tinkerpop.apache.org%3E', 'https://github.com/advisories/GHSA-hrmr-f5m6-m9pq', 'https://lists.apache.org/thread.html/6c79965066c30d4e330e04d911d3761db41b82c89ae38d9a6b37a6f1@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/e3eae9e6fc021c4c22dda59a335d21c12eecab480b48115a2f098ef6@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/eeecc1669242b28a3777ae13c68b376b0148d589d3d8170340d61120@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/b8ef29df0f1d55aa741170748352ae8e425c7b1d286b2f257711a2dd@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/35f60d6d0407c13c39411038ba1aca71d92595ed7041beff4d07f2ee@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/b907e70bc422905d7962fd18f863f746bf7b4e7ed9da25c148580c61@%3Cnotifications.commons.apache.org%3E', 'https://lists.apache.org/thread.html/f9cdd32af7d73e943452167d15801db39e8130409ebb9efb243b3f41@%3Ccommits.tinkerpop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/c7954dc1e8fafd7ca1449f078953b419ebf8936e087f235f3bd024be@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/f28052d04cb8dbaae39bfd3dc8438e58c2a8be306a3f381f4728d7c1@%3Ccommits.commons.apache.org%3E', 'https://lists.apache.org/thread.html/714c6ac1b1b50f8557e7342903ef45f1538a7bc60a0b47d6e48c273d@%3Ccommits.tinkerpop.apache.org%3E', 'http://www.securitytracker.com/id/1041503', 'https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11771', 'http://www.securityfocus.com/bid/105139'}
| null |
GHSA
|
GHSA-864j-6qpp-cmrr
|
SQL Injection in Geocoder
|
sql.rb in Geocoder before 1.6.1 allows Boolean-based SQL injection when within_bounding_box is used in conjunction with untrusted sw_lat, sw_lng, ne_lat, or ne_lng data.
|
{'CVE-2020-7981'}
|
2021-08-30T13:36:05Z
|
2020-06-10T20:03:02Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7981', 'https://github.com/alexreisner/geocoder/compare/v1.6.0...v1.6.1', 'https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613', 'https://github.com/advisories/GHSA-864j-6qpp-cmrr', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7981', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/geocoder/CVE-2020-7981.yml'}
| null |
GHSA
|
GHSA-wwh7-4jw9-33x6
|
High severity vulnerability that affects yajl-ruby
|
In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service.
|
{'CVE-2017-16516'}
|
2021-09-21T21:54:28Z
|
2017-11-28T22:44:42Z
|
HIGH
| 7.5
|
{'CWE-134'}
|
{'https://lists.debian.org/debian-lts-announce/2017/11/msg00010.html', 'https://rubygems.org/gems/yajl-ruby', 'https://github.com/advisories/GHSA-wwh7-4jw9-33x6', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16516', 'https://github.com/brianmario/yajl-ruby/issues/176'}
| null |
GHSA
|
GHSA-2g8g-63j4-9w3r
|
RCE vulnerability affecting v1beta3 templates in @backstage/plugin-scaffolder-backend
|
The templating library used by the scaffolder backend assumes that templates are trusted which is an undesired property of the scaffolder-backend. This has now been mitigated by sandboxing the template code execution.
### Impact
A malicious actor with write access to a registered scaffolder template could manipulate the template in a way that allows for remote code execution on the scaffolder-backend instance. This was only exploitable in the template yaml definition itself and not by user input data.
### Patches
This is vulnerability is patched in version `0.15.14` of `@backstage/plugin-scaffolder-backend`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
| null |
2021-12-01T18:29:12Z
|
2021-12-01T18:29:12Z
|
HIGH
| 0
| null |
{'https://github.com/backstage/backstage/security/advisories/GHSA-2g8g-63j4-9w3r', 'https://github.com/advisories/GHSA-2g8g-63j4-9w3r'}
| null |
GHSA
|
GHSA-p5p2-rhc3-wmf3
|
Malicious Package in siganle
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T15:40:01Z
|
2020-09-03T17:03:31Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1409', 'https://github.com/advisories/GHSA-p5p2-rhc3-wmf3'}
| null |
GHSA
|
GHSA-2647-c639-qv2j
|
Server-Side Request Forgery in calibreweb
|
calibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is due to an incomplete fix for [CVE-2022-0339](https://github.com/advisories/GHSA-4w8p-x6g8-fv64). The blacklist does not check for `0.0.0.0`, which would result in a payload of `0.0.0.0` resolving to `localhost`.
|
{'CVE-2022-0766'}
|
2022-03-18T21:20:46Z
|
2022-03-08T00:00:31Z
|
CRITICAL
| 9.8
|
{'CWE-918'}
|
{'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0766', 'https://github.com/advisories/GHSA-2647-c639-qv2j', 'https://huntr.dev/bounties/7f2a5bb4-e6c7-4b6a-b8eb-face9e3add7b'}
| null |
GHSA
|
GHSA-fg6m-q92x-vv38
|
Directory Traversal in dcserver
|
Affected versions of `dcserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16158'}
|
2021-01-14T15:48:03Z
|
2020-09-01T17:26:00Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16158', 'https://nodesecurity.io/advisories/393', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http', 'https://www.npmjs.com/advisories/393', 'https://github.com/advisories/GHSA-fg6m-q92x-vv38'}
| null |
GHSA
|
GHSA-8p2p-p8mg-x3cw
|
Insight API transaction broadcast endpoint can result in Full Path Disclosure
|
Bitpay/insight-api Insight-api version 5.0.0 and earlier contains a CWE-20: input validation vulnerability in transaction broadcast endpoint that can result in Full Path Disclosure. This attack appear to be exploitable via Web request.
|
{'CVE-2018-1000023'}
|
2022-04-25T22:32:09Z
|
2018-03-05T19:33:54Z
|
MODERATE
| 5.3
|
{'CWE-20'}
|
{'https://github.com/bitpay/insight-api/issues/542', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000023', 'https://github.com/advisories/GHSA-8p2p-p8mg-x3cw'}
| null |
GHSA
|
GHSA-f6f2-pwrj-64h3
|
Moderate severity vulnerability that affects tryton
|
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values.
|
{'CVE-2019-10868'}
|
2021-06-10T23:48:33Z
|
2019-04-10T14:31:37Z
|
MODERATE
| 6.5
|
{'CWE-862'}
|
{'https://www.debian.org/security/2019/dsa-4426', 'https://seclists.org/bugtraq/2019/Apr/14', 'https://github.com/advisories/GHSA-f6f2-pwrj-64h3', 'https://hg.tryton.org/trytond/rev/f58bbfe0aefb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10868', 'https://discuss.tryton.org/t/security-release-for-issue8189/1262'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.