ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-fmj2-7wx8-qj4v
Server-side request forgery (SSRF) in Apache XmlGraphics Commons
Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
{'CVE-2020-11988'}
2022-02-09T00:45:56Z
2022-02-09T00:45:56Z
HIGH
8.2
{'CWE-20', 'CWE-918'}
{'https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E', 'https://github.com/advisories/GHSA-fmj2-7wx8-qj4v', 'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11988', 'https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://issues.apache.org/jira/browse/XGC-122', 'https://lists.apache.org/thread.html/ra8f4d6ae402ec020ee3e8c28632c91be131c4d8b4c9c6756a179b12b@%3Cdev.jmeter.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JP4XA56DA3BFNRBBLBXM6ZAI5RUVFA33/', 'https://xmlgraphics.apache.org/security.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22HESSYU7T4D6GGENUVEX3X3H6FGBECH/', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-58c7-px5v-82hh
Potential sensitive information disclosed in error reports
django-registration is a user-registration application for Django. ### Impact The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django. Triggering this requires the following conditions: * A site is using django-registration < 3.1.2 * The site has detailed error reports (such as Django's [emailed error reports to site staff/developers](https://docs.djangoproject.com/en/3.1/howto/error-reporting/#email-reports)) enabled * A server-side error (HTTP 5xx) occurs during an attempt by a user to register an account Under these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user's proposed credentials (such as a password). ### Patches As of version 3.1.2, django-registration properly applies Django's `sensitive_post_parameters()` decorator to the base user-registration view, which will cause all data from the HTTP request body to be filtered from detailed error reports in the event of a server-side crash during user account registration. Note that as applied, this filters *all* HTTP request data from error reports. To selectively allow some fields but not others, see Django's own documentation (in references) and the notes below for how to apply `sensitive_post_parameters()` manually to a particular codebase's `RegistrationView` subclass(es). ### Workarounds Users who cannot upgrade quickly can apply the `django.views.decorators.debug.sensitive_post_parameters()` decorator to their own registration views. The decorator should be applied on the `dispatch()` method of the appropriate `RegistrationView` class, using Django's `method_decorator()` helper. For example: ```python from django.utils.decorators import method_decorator from django.views.decorators.debug import sensitive_post_parameters from django_registration.views import RegistrationView class MyRegistrationView(RegistrationView): """ A RegistrationView subclass manually protected against sensitive information disclosure in error reports. """ @method_decorator(sensitive_post_parameters()) def dispatch(self, *args, **kwargs): return super().dispatch(*args, **kwargs) ``` ### References * Django's documentation on [error reporting in production](https://docs.djangoproject.com/en/3.1/howto/error-reporting/) * [How Django's sensitive-data filters work](https://docs.djangoproject.com/en/3.1/howto/error-reporting/#filtering-error-reports)
{'CVE-2021-21416'}
2022-04-19T19:02:50Z
2021-04-06T17:28:59Z
LOW
3.7
{'CWE-209', 'CWE-201'}
{'https://github.com/advisories/GHSA-58c7-px5v-82hh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21416', 'https://github.com/ubernostrum/django-registration/security/advisories/GHSA-58c7-px5v-82hh'}
null
GHSA
GHSA-r4c4-5fpq-56wg
Heap OOB in boosted trees
### Impact An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `BoostedTreesSparseCalculateBestFeatureSplit`: ```python import tensorflow as tf tf.raw_ops.BoostedTreesSparseCalculateBestFeatureSplit( node_id_range=[0,10], stats_summary_indices=[[1, 2, 3, 0x1000000]], stats_summary_values=[1.0], stats_summary_shape=[1,1,1,1], l1=l2=[1.0], tree_complexity=[0.5], min_node_weight=[1.0], logits_dimension=3, split_type='inequality') ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/stats_ops.cc) needs to validate that each value in `stats_summary_indices` is in range. ### Patches We have patched the issue in GitHub commit [e84c975313e8e8e38bb2ea118196369c45c51378](https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37664'}
2021-08-25T14:42:20Z
2021-08-25T14:42:20Z
HIGH
7.3
{'CWE-125'}
{'https://github.com/advisories/GHSA-r4c4-5fpq-56wg', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4c4-5fpq-56wg', 'https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37664'}
null
GHSA
GHSA-4pc7-vqv5-5r3v
ECP SAML binding bypasses authentication flows
### Description A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.
{'CVE-2021-3827'}
2022-04-27T21:26:00Z
2022-04-27T21:25:59Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-4pc7-vqv5-5r3v', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v'}
null
GHSA
GHSA-hc6c-75p4-hmq4
Reference binding to null pointer in `MatrixDiag*` ops
### Impact The implementation of [`MatrixDiag*` operations](https://github.com/tensorflow/tensorflow/blob/4c4f420e68f1cfaf8f4b6e8e3eb857e9e4c3ff33/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L195-L197) does not validate that the tensor arguments are non-empty: ```cc num_rows = context->input(2).flat<int32>()(0); num_cols = context->input(3).flat<int32>()(0); padding_value = context->input(4).flat<T>()(0); ``` Thus, users can trigger null pointer dereferences if any of the above tensors are null: ```python import tensorflow as tf d = tf.convert_to_tensor([],dtype=tf.float32) p = tf.convert_to_tensor([],dtype=tf.float32) tf.raw_ops.MatrixDiagV2(diagonal=d, k=0, num_rows=0, num_cols=0, padding_value=p) ``` Changing from `tf.raw_ops.MatrixDiagV2` to `tf.raw_ops.MatrixDiagV3` still reproduces the issue. ### Patches We have patched the issue in GitHub commit [a7116dd3913c4a4afd2a3a938573aa7c785fdfc6](https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ye Zhang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29515'}
2021-05-21T14:20:54Z
2021-05-21T14:20:54Z
LOW
2.5
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29515', 'https://github.com/advisories/GHSA-hc6c-75p4-hmq4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hc6c-75p4-hmq4', 'https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6'}
null
GHSA
GHSA-wrw9-m778-g6mc
Memory Exposure in bl
Versions of `bl` before 0.9.5 and 1.0.1 are vulnerable to memory exposure. `bl.append(number)` in the affected `bl` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory ## Recommendation Update to version 0.9.5, 1.0.1 or later.
null
2021-08-04T20:29:11Z
2019-06-03T17:27:57Z
MODERATE
0
{'CWE-200'}
{'https://github.com/rvagg/bl/pull/22', 'https://www.npmjs.com/advisories/596', 'https://github.com/advisories/GHSA-wrw9-m778-g6mc'}
null
GHSA
GHSA-h39x-m55c-v55h
Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an external location
In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the StaticHandler uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\' (forward slashes) sequences that can resolve to a location that is outside of that directory when running on Windows Operating Systems.
{'CVE-2018-12542'}
2022-04-26T21:50:01Z
2018-10-17T16:20:45Z
CRITICAL
9.8
{'CWE-22'}
{'https://github.com/advisories/GHSA-h39x-m55c-v55h', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12542', 'https://github.com/vert-x3/vertx-web/issues/1025', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539171'}
null
GHSA
GHSA-894f-rw44-qrw5
Hijacked Environment Variables in mongose
The `mongose` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16077'}
2021-01-08T19:10:56Z
2018-10-10T17:28:21Z
MODERATE
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/516', 'https://github.com/advisories/GHSA-894f-rw44-qrw5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16077', 'https://nodesecurity.io/advisories/516'}
null
GHSA
GHSA-v82p-hv3v-p6qp
Incomplete validation in MKL requantization
### Impact Due to incomplete validation in MKL implementation of requantization, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays: ```python import tensorflow as tf tf.raw_ops.RequantizationRangePerChannel( input=[], input_min=[0,0,0,0,0], input_max=[1,1,1,1,1], clip_value_max=1) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/mkl/mkl_requantization_range_per_channel_op.cc) does not validate the dimensions of the `input` tensor. A similar issue occurs in `MklRequantizePerChannelOp`: ```python import tensorflow as tf from tensorflow.python.ops import gen_math_ops gen_math_ops.requantize_per_channel( input=[], input_min=[-100,-100,-100,-100,-100], input_max=[-100,-100,-100], requested_output_min=[-100,-100,-100,-100,-100], requested_output_max=[], out_type=tf.int) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/mkl/mkl_requantize_per_channel_op.cc) does not perform full validation for all the input arguments. ### Patches We have patched the issue in GitHub commit [9e62869465573cb2d9b5053f1fa02a81fce21d69](https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69) and in the Github commit [203214568f5bc237603dbab6e1fd389f1572f5c9](https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37665'}
2021-08-25T14:42:16Z
2021-08-25T14:42:16Z
HIGH
7.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-v82p-hv3v-p6qp', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v82p-hv3v-p6qp', 'https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37665', 'https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69'}
null
GHSA
GHSA-pf3p-x6qj-6j7q
mio invalidly assumes the memory layout of std::net::SocketAddr
An issue was discovered in the mio crate before 0.7.6 for Rust. It has false expectations about the std::net::SocketAddr memory representation.
{'CVE-2020-35922'}
2021-08-25T20:50:33Z
2021-08-25T20:50:33Z
MODERATE
5.5
{'CWE-188'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35922', 'https://github.com/tokio-rs/mio/issues/1386', 'https://rustsec.org/advisories/RUSTSEC-2020-0081.html', 'https://github.com/advisories/GHSA-pf3p-x6qj-6j7q'}
null
GHSA
GHSA-hm45-mgqm-gjm4
Remote Code Execution (RCE) Exploit on Cross Site Scripting (XSS) Vulnerability
### Impact A RCE exploit has been discovered in the Red Discord Bot - Dashboard Webserver: this exploit allows Discord users with specially crafted Server names and Usernames/Nicknames to inject code into the webserver front-end code. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. ### Patches This high severity exploit has been fixed on version `0.1.7a`. ### Workarounds There are no workarounds, bot owners must upgrade their relevant packages (Dashboard module and Dashboard webserver) in order to patch this issue ### References - 99d88b8 - a6b9785 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Cog-Creators/Red-Dashboard](https://github.com/Cog-Creators/Red-Dashboard/issues/new/choose) * Over on the official [Red Server](https://discord.gg/red) or at the Third Party Server [Toxic Layer](https://discord.gg/vQZTdB9)
{'CVE-2020-26249'}
2022-04-19T19:02:41Z
2020-12-08T23:55:54Z
HIGH
7.7
{'CWE-79'}
{'https://github.com/Cog-Creators/Red-Dashboard/security/advisories/GHSA-hm45-mgqm-gjm4', 'https://pypi.org/project/Red-Dashboard', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26249', 'https://github.com/Cog-Creators/Red-Dashboard/commit/99d88b840674674166ce005b784ae8e31e955ab1', 'https://github.com/Cog-Creators/Red-Dashboard/commit/a6b9785338003ec87fb75305e7d1cc2d40c7ab91', 'https://github.com/advisories/GHSA-hm45-mgqm-gjm4'}
null
GHSA
GHSA-29qj-rvv6-qrmv
Cross-site scripting in RESTEasy
A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
{'CVE-2020-10688'}
2021-06-15T16:05:22Z
2021-06-15T16:05:22Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/quarkusio/quarkus/issues/7248', 'https://bugzilla.redhat.com/show_bug.cgi?id=1814974', 'https://issues.redhat.com/browse/RESTEASY-2519', 'https://github.com/advisories/GHSA-29qj-rvv6-qrmv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10688'}
null
GHSA
GHSA-xgc9-9w4v-h33h
High severity vulnerability that affects org.apache.syncope:syncope-core
An administrator with report and template entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution.
{'CVE-2018-1321'}
2021-09-21T22:31:16Z
2018-11-06T23:17:27Z
HIGH
7.2
{'CWE-20'}
{'https://www.exploit-db.com/exploits/45400/', 'http://www.securityfocus.com/bid/103508', 'https://github.com/advisories/GHSA-xgc9-9w4v-h33h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1321', 'http://syncope.apache.org/security.html#CVE-2018-1321:_Remote_code_execution_by_administrators_with_report_and_template_entitlements'}
null
GHSA
GHSA-4v2c-g2xc-47fv
Downloads Resources over HTTP in massif
Affected versions of `massif` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `massif`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10682'}
2021-01-08T19:53:44Z
2019-02-18T23:54:38Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/290', 'https://github.com/advisories/GHSA-4v2c-g2xc-47fv', 'https://www.npmjs.com/advisories/290', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10682'}
null
GHSA
GHSA-3448-vrgh-85xr
NULL Pointer Dereference in OpenCV.
An issue was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.1.26). There is a NULL pointer dereference in the function cv::XMLParser::parse at modules/core/src/persistence.cpp.
{'CVE-2019-14493'}
2021-11-18T15:27:31Z
2021-10-12T22:21:43Z
HIGH
7.5
{'CWE-476'}
{'https://github.com/opencv/opencv/issues/15127', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14493', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c', 'https://github.com/advisories/GHSA-3448-vrgh-85xr'}
null
GHSA
GHSA-cr6m-62pq-hmqh
OS Command injection in npm-lockfile
npm-lockfile safely generates an npm lockfile and output it to the filename of your choice. npm-lockfile before 2.0.4 does not santize unsafe external input and invoke sensitive command execution API with the input, causing command injection vulnerability. A fix was released in version 2.0.5.
{'CVE-2022-0841'}
2022-04-04T21:37:39Z
2022-03-04T00:00:18Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8', 'https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1', 'https://github.com/advisories/GHSA-cr6m-62pq-hmqh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0841'}
null
GHSA
GHSA-f6vf-pq8c-69m4
Improper Check for Unusual or Exceptional Conditions in Connect2id Nimbus JOSE+JWT
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.
{'CVE-2019-17195'}
2022-04-22T17:26:38Z
2019-10-16T18:31:17Z
CRITICAL
9.8
{'CWE-754', 'CWE-755'}
{'https://lists.apache.org/thread.html/rcac26c2d4df22341fa6ebbfe93ba1eff77d2dcd3f6106a1dc1f9ac98@%3Cdev.avro.apache.org%3E', 'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17195', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-f6vf-pq8c-69m4', 'https://lists.apache.org/thread.html/r35f6301a3e6a56259224786dd9c2a935ba27ff6b494d15a3b66efe6a@%3Cdev.avro.apache.org%3E', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E', 'https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/SECURITY-CHANGELOG.txt', 'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/8768553cda5838f59ee3865cac546e824fa740e82d9dc2a7fc44e80d@%3Ccommon-dev.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/e10d43984f39327e443e875adcd4a5049193a7c010e81971908caf41@%3Ccommon-issues.hadoop.apache.org%3E', 'https://connect2id.com/blog/nimbus-jose-jwt-7-9'}
null
GHSA
GHSA-vm37-j55j-8655
OS Command Injection in Microweber
Microweber is a content management system with drag and drop. Prior to version 1.2.11, Microweber is vulnerable to OS Command Injection.
{'CVE-2022-0557'}
2022-03-28T15:23:38Z
2022-02-12T00:00:49Z
HIGH
7.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0557', 'http://packetstormsecurity.com/files/166077/Microweber-1.2.11-Shell-Upload.html', 'https://github.com/advisories/GHSA-vm37-j55j-8655', 'https://huntr.dev/bounties/660c89af-2de5-41bc-aada-9e4e78142db8', 'https://www.exploit-db.com/exploits/50768', 'https://github.com/microweber/microweber/commit/0a7e5f1d81de884861ca677ee1aaac31f188d632'}
null
GHSA
GHSA-wh4h-v3f2-r2pp
Moderate severity vulnerability that affects django
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.
{'CVE-2019-6975'}
2021-09-21T20:42:56Z
2019-02-12T15:36:37Z
HIGH
7.5
{'CWE-770'}
{'https://docs.djangoproject.com/en/dev/releases/security/', 'https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ', 'https://github.com/advisories/GHSA-wh4h-v3f2-r2pp', 'https://www.openwall.com/lists/oss-security/2019/02/11/1', 'https://www.debian.org/security/2019/dsa-4476', 'https://usn.ubuntu.com/3890-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/', 'https://www.djangoproject.com/weblog/2019/feb/11/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6975', 'http://www.securityfocus.com/bid/106964', 'https://seclists.org/bugtraq/2019/Jul/10'}
null
GHSA
GHSA-7wph-fc4w-wqp2
Moderate severity vulnerability that affects django
The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.
{'CVE-2010-4535'}
2021-09-03T21:46:39Z
2018-07-23T19:51:59Z
MODERATE
0
{'CWE-20'}
{'http://www.securityfocus.com/bid/45563', 'http://secunia.com/advisories/42715', 'http://www.openwall.com/lists/oss-security/2010/12/23/4', 'http://www.ubuntu.com/usn/USN-1040-1', 'http://www.vupen.com/english/advisories/2011/0098', 'https://github.com/advisories/GHSA-7wph-fc4w-wqp2', 'http://www.openwall.com/lists/oss-security/2011/01/03/5', 'http://www.djangoproject.com/weblog/2010/dec/22/security/', 'https://bugzilla.redhat.com/show_bug.cgi?id=665373', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html', 'http://secunia.com/advisories/42913', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html', 'http://www.vupen.com/english/advisories/2011/0048', 'http://secunia.com/advisories/42827', 'https://nvd.nist.gov/vuln/detail/CVE-2010-4535', 'http://code.djangoproject.com/changeset/15032'}
null
GHSA
GHSA-hxvf-35w8-f5mw
Cross-Site Request Forgery in Magnolia CMS
An issue in the Login page of Magnolia CMS v6.2.3 and below allows attackers to exploit both an Open Redirect vulnerability and Cross-Site Request Forgery (CSRF) in order to brute force and exfiltrate users' credentials.
{'CVE-2021-46366'}
2022-03-01T18:40:11Z
2022-02-12T00:00:37Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46366-CSRF%2BOpen%20Redirect-Magnolia%20CMS', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46366', 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory', 'https://github.com/advisories/GHSA-hxvf-35w8-f5mw'}
null
GHSA
GHSA-rrvx-pwf8-p59p
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
{'CVE-2016-1000343'}
2022-04-27T13:29:12Z
2018-10-17T16:24:22Z
HIGH
7.5
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000343', 'https://usn.ubuntu.com/3727-1/', 'https://github.com/advisories/GHSA-rrvx-pwf8-p59p', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927'}
null
GHSA
GHSA-72j4-94rx-cr6w
Incorrect Permission Assignment for Critical Resource and Permissive List of Allowed Inputs in Keycloak
A flaw was found in all versions of Keycloak before 10.0.0, where the NodeJS adapter did not support the verify-token-audience. This flaw results in some users having access to sensitive information outside of their permissions.
{'CVE-2020-1694'}
2022-02-09T00:57:02Z
2022-02-09T00:57:02Z
MODERATE
4.9
{'CWE-732', 'CWE-183'}
{'https://github.com/advisories/GHSA-72j4-94rx-cr6w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1694', 'https://bugzilla.redhat.com/show_bug.cgi?id=1790759'}
null
GHSA
GHSA-mvmf-cvfx-qg55
Regular Expression Denial of Service in bleach
All versions of the `bleach` package are vulnerable to a regular expression denial of service attack when certain types of input are passed into the sanitize function. ## Recommendation The `bleach` package is not currently maintained, and has not seen an update since 2014. To mitigate this issue, it is necessary to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=html%20sanitizer&page=1&ranking=optimal).
{'CVE-2014-8881'}
2021-09-23T21:06:11Z
2020-09-01T15:16:43Z
MODERATE
5.3
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-8881', 'https://github.com/advisories/GHSA-mvmf-cvfx-qg55', 'https://snyk.io/vuln/npm:bleach:20151024', 'https://www.npmjs.com/advisories/47'}
null
GHSA
GHSA-3cjv-4phw-gvvv
Malicious Package in getcookies
The `getcookies` module contained a backdoor that would allow for a remote attacker to execute arbitrary commands on the system running the malicious module. ## Recommendation This module should be uninstalled if found used within an application. In addition to removing the installed module, you will also want to evaluate your application to determine whether or not user data or systems were compromised.
null
2021-10-01T13:25:16Z
2020-09-01T20:39:33Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-3cjv-4phw-gvvv', 'https://www.npmjs.com/advisories/649'}
null
GHSA
GHSA-8f64-q7jc-ccgp
Cross-Site Scripting in metascraper
Versions of `metascraper` prior to 5.3.0 are vulnerable to stored cross-site scripting (XSS). ## Recommendation Upgrade to version 5.3.0 or later.
{'CVE-2018-3773'}
2021-01-08T19:10:26Z
2018-08-08T22:25:57Z
HIGH
0
{'CWE-79'}
{'https://hackerone.com/reports/309367', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3773', 'https://github.com/advisories/GHSA-8f64-q7jc-ccgp', 'https://www.npmjs.com/advisories/603'}
null
GHSA
GHSA-36h2-95gj-w488
Open redirect in Gitea
Gitea before 1.4.3 is affected by URL Redirection to Untrusted Site ('Open Redirect') via internal URLs.
{'CVE-2021-45328'}
2022-02-15T00:18:11Z
2022-02-09T00:00:28Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/go-gitea/gitea/issues/4332', 'https://blog.gitea.io/2018/06/release-of-1.4.3/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45328', 'https://github.com/advisories/GHSA-36h2-95gj-w488'}
null
GHSA
GHSA-c6rq-rjc2-86v2
Time-of-check Time-of-use (TOCTOU) Race Condition in chownr
A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.
{'CVE-2017-18869'}
2022-02-10T23:33:39Z
2022-02-10T23:33:39Z
LOW
2.5
{'CWE-367'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-18869', 'https://snyk.io/vuln/npm:chownr:20180731', 'https://github.com/isaacs/chownr/issues/14', 'https://github.com/advisories/GHSA-c6rq-rjc2-86v2', 'https://bugzilla.redhat.com/show_bug.cgi?id=1611614', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985'}
null
GHSA
GHSA-76qr-mmh8-cp8f
Moderate severity vulnerability that affects com.sparkjava:spark-core
In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
{'CVE-2018-9159'}
2021-09-02T19:24:33Z
2018-10-19T16:56:00Z
MODERATE
5.3
{'CWE-22'}
{'https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc', 'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd', 'https://access.redhat.com/errata/RHSA-2018:2405', 'https://nvd.nist.gov/vuln/detail/CVE-2018-9159', 'https://github.com/perwendel/spark/issues/981', 'https://github.com/advisories/GHSA-76qr-mmh8-cp8f', 'http://sparkjava.com/news#spark-272-released', 'https://access.redhat.com/errata/RHSA-2018:2020', 'https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668'}
null
GHSA
GHSA-qh2g-7h5p-mxf4
Credentials bypass in Apache Druid
When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user.
{'CVE-2020-1958'}
2022-02-09T22:05:39Z
2022-02-09T22:05:39Z
MODERATE
6.5
{'CWE-200', 'CWE-74'}
{'https://github.com/advisories/GHSA-qh2g-7h5p-mxf4', 'https://lists.apache.org/thread.html/r9d437371793b410f8a8e18f556d52d4bb68e18c537962f6a97f4945e%40%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rffabc9e83cc2831bbee5db32b3965b84b09346a26ebc1012db63d28c@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1526dbce98a138629a41daa06c13393146ddcaf8f9d273cc49d57681@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1958', 'https://github.com/apache/druid/pull/9600#issuecomment-607497875', 'https://lists.apache.org/thread.html/r026540c617d334007810cd8f0068f617b5c78444be00a31fc1b03390@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r47c90a378efdb3fd07ff7f74095b8eb63b3ca93b8ada5c2661c5e371@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf70876ecafb45b314eff9d040c5281c4adb0cb7771eb029448cfb79b@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r1c32c95543d44559b8d7fd89b0a85f728c80e8b715685bbf788a15a4@%3Ccommits.druid.apache.org%3E', 'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade5462961550c97715ab18de6ad07a3edf7e', 'https://lists.apache.org/thread.html/r75e74d39c41c1b95a658b6a9f75fc6fd02b1d1922566a0ee4ee2fdfc@%3Ccommits.druid.apache.org%3E'}
null
GHSA
GHSA-2777-2vq8-c4v4
SQL Injection in sequelize
Versions of `sequelize` prior to 5.3.0 (excluding v3 and v4) are vulnerable to SQL Injection. PostgreSQL option`standard_conforming_strings` is not set to `on` by default, which may allow attackers to inject SQL statements due to poor handling of backslashes in string literals. ## Recommendation Upgrade to version 5.3.0 or later.
{'CVE-2019-11069'}
2021-08-30T16:08:58Z
2019-04-11T16:33:17Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-2777-2vq8-c4v4', 'https://www.npmjs.com/advisories/821', 'https://github.com/sequelize/sequelize/pull/10746', 'https://github.com/sequelize/sequelize/pull/10746/files', 'https://github.com/sequelize/sequelize/releases/tag/v5.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11069', 'https://github.com/sequelize/sequelize/blob/98cb17c17f73e2aa1792aa5a1d31216ba984b456/lib/dialects/postgres/connection-manager.js#L158-L160', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-174167'}
null
GHSA
GHSA-qjw2-hr98-qgfh
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.6.7.5 and from 2.7.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
{'CVE-2020-24750'}
2022-04-26T20:58:39Z
2021-12-09T19:15:36Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24750', 'https://github.com/advisories/GHSA-qjw2-hr98-qgfh', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b', 'https://security.netapp.com/advisory/ntap-20201009-0003/', 'https://github.com/FasterXML/jackson-databind/issues/2798', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-7xcx-6wjh-7xp2
Command Injection in standard-version
# GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-111` The [GitHub Security Lab](https://securitylab.github.com) team has identified a potential security vulnerability in [standard-version](https://github.com/conventional-changelog/standard-version). ## Summary The `standardVersion` function has a command injection vulnerability. Clients of the `standard-version` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. ## Product Standard Version ## Tested Version Commit [2f04ac8](https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9/) ## Details ### Issue 1: Command injection in `standardVersion` The following proof-of-concept illustrates the vulnerability. First install Standard Version and create an empty git repo to run the PoC in: ``` npm install standard-version git init echo "foo" > foo.txt # the git repo has to be non-empty git add foo.txt git commit -am "initial commit" ``` Now create a file with the following contents: ``` var fs = require("fs"); // setting up a bit of environment fs.writeFileSync("package.json", '{"name": "foo", "version": "1.0.0"}'); const standardVersion = require('standard-version') standardVersion({ noVerify: true, infile: 'foo.txt', releaseCommitMessageFormat: "bla `touch exploit`" }) ``` and run it: ``` node test.js ``` Notice that a file named `exploit` has been created. This vulnerability is similar to command injection vulnerabilities that have been found in other Javascript libraries. Here are some examples: [CVE-2020-7646](https://github.com/advisories/GHSA-m8xj-5v73-3hh8), [CVE-2020-7614](https://github.com/advisories/GHSA-426h-24vj-qwxf), [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh), [CVE-2019-10778](https://github.com/advisories/GHSA-4gp3-p7ph-x2jr), [CVE-2019-10776](https://github.com/advisories/GHSA-84cm-v6jp-gjmr), [CVE-2018-16462](https://github.com/advisories/GHSA-9jm3-5835-537m), [CVE-2018-16461](https://github.com/advisories/GHSA-7g2w-6r25-2j7p), [CVE-2018-16460](https://github.com/advisories/GHSA-cfhg-9x44-78h2), [CVE-2018-13797](https://github.com/advisories/GHSA-pp57-mqmh-44h7), [CVE-2018-3786](https://github.com/advisories/GHSA-c9j3-wqph-5xx9), [CVE-2018-3772](https://github.com/advisories/GHSA-wjr4-2jgw-hmv8), [CVE-2018-3746](https://github.com/advisories/GHSA-3pxp-6963-46r9), [CVE-2017-16100](https://github.com/advisories/GHSA-jcw8-r9xm-32c6), [CVE-2017-16042](https://github.com/advisories/GHSA-qh2h-chj9-jffq). We have written a [CodeQL](https://codeql.com) query, which automatically detects this vulnerability. You can see the results of the query on the `standard-version` project [here](https://lgtm.com/query/237522640229151035/). #### Impact This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. #### Remediation We recommend not using an API that can interpret a string as a shell command. For example, use [`child_process.execFile`](https://nodejs.org/api/child_process.html#child_process_child_process_execfile_file_args_options_callback) instead of [`child_process.exec`](https://nodejs.org/api/child_process.html#child_process_child_process_exec_command_options_callback). ## Credit This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh). ## Contact You can contact the GHSL team at `securitylab@github.com`, please include `GHSL-2020-111` in any communication regarding this issue. ## Disclosure Policy This report is subject to our [coordinated disclosure policy](https://securitylab.github.com/disclosures#policy).
null
2021-09-22T21:03:04Z
2020-07-13T21:34:59Z
MODERATE
0
{'CWE-77'}
{'https://github.com/conventional-changelog/standard-version/security/advisories/GHSA-7xcx-6wjh-7xp2', 'https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9', 'https://github.com/advisories/GHSA-7xcx-6wjh-7xp2'}
null
GHSA
GHSA-xgjc-49cw-529m
Moderate severity vulnerability that affects org.b3log:symphony
An issue was discovered in b3log Symphony (aka Sym) before v3.4.7. XSS exists via the userIntro and userNickname fields to processor/SettingsProcessor.java.
{'CVE-2019-9142'}
2021-09-21T22:32:35Z
2019-03-06T17:35:49Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-xgjc-49cw-529m', 'https://github.com/b3log/symphony/issues/860', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9142'}
null
GHSA
GHSA-hxmp-pqch-c8mm
Denial of service attack via incorrect parameters in Matrix Synapse
### Impact A malicious or poorly-implemented homeserver can inject malformed events into a room by specifying a different room id in the path of a `/send_join`, `/send_leave`, `/invite` or `/exchange_third_party_invite` request. This can lead to a denial of service in which future events will not be correctly sent to other servers over federation. This affects any server which accepts federation requests from untrusted servers. ### Patches Issue is resolved by https://github.com/matrix-org/synapse/pull/8776. ### Workarounds Homeserver administrators could limit access to the federation API to trusted servers (for example via `federation_domain_whitelist`).
{'CVE-2020-26257'}
2021-01-07T22:37:52Z
2020-12-09T18:21:29Z
LOW
6.5
{'CWE-74', 'CWE-79', 'CWE-400'}
{'https://github.com/matrix-org/synapse/security/advisories/GHSA-hxmp-pqch-c8mm', 'https://github.com/matrix-org/synapse/pull/8776', 'https://github.com/advisories/GHSA-hxmp-pqch-c8mm', 'https://github.com/matrix-org/synapse/commit/3ce2f303f15f6ac3dc352298972dc6e04d9b7a8b', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DBTIU3ZNBFWZ56V4X7JIAD33V5H2GOMC/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26257', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QR4MMYZKX5N5GYGH4H5LBUUC5TLAFHI7/', 'https://github.com/matrix-org/synapse/blob/develop/CHANGES.md#synapse-1231-2020-12-09'}
null
GHSA
GHSA-pr5m-4w22-8483
XXS in NanoHTTPD
An issue was discovered in RouterNanoHTTPD.java in NanoHTTPD through 2.3.1. The GeneralHandler class implements a basic GET handler that prints debug information as an HTML page. Any web server that extends this class without implementing its own GET handler is vulnerable to reflected XSS, because the GeneralHandler GET handler prints user input passed through the query string without any sanitization.
{'CVE-2020-13697'}
2021-11-29T21:04:48Z
2021-02-25T16:32:34Z
MODERATE
0
{'CWE-79'}
{'https://www.vdoo.com/advisories/#CVE-2020-13697', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13697', 'https://github.com/advisories/GHSA-pr5m-4w22-8483'}
null
GHSA
GHSA-57q7-rxqq-7vgp
On Windows, `git-sizer` might run a `git` executable within the repository being analyzed
### Impact On Windows, if `git-sizer` is run against a non-bare repository, and that repository has an executable called `git.exe`, `git.bat`, etc., then that executable might be run by `git-sizer` rather than the system `git` executable. An attacker could try to use social engineering to get a victim to run `git-sizer` against a hostile repository and thereby get the victim to run arbitrary code. On Linux or other Unix-derived platforms, a similar problem could occur if the user's `PATH` has the current directory before the path to the standard `git` executable, but this is would be a very unusual configuration that has been known for decades to lead to all kinds of security problems. ### Patches Users should update to git-sizer v1.4.0 ### Workarounds If you are on Windows, then either * Don't run `git-sizer` against a repository that might contain hostile code, or, if you must… * Run `git-sizer` against a bare clone of the hostile repository, or, if that is not possible… * Make sure that the hostile repository doesn't have an executable in its top-level directory before running `git-sizer`. If you are on Linux or other Unix-based system, then (for myriad reasons!) don't add the current directory to your `PATH`. ### References * [Command PATH security in Go](https://blog.golang.org/path-security) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the `git-sizer` project](https://github.com/github/git-sizer). * Email us at [GitHub support](mailto:support@github.com).
null
2022-04-12T22:48:44Z
2022-02-15T01:57:18Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-57q7-rxqq-7vgp', 'https://github.com/github/git-sizer/commit/38400d6ddd79325e956b00ff584cfcc8dd96d536', 'https://github.com/github/git-sizer/security/advisories/GHSA-57q7-rxqq-7vgp'}
null
GHSA
GHSA-5f38-9jw2-6r6h
Cross-site Scripting in teddy
Teddy is a readable and easy to learn templating language. This affects the package teddy before 0.5.9. A type confusion vulnerability can be used to bypass input sanitization when the model content is an array (instead of a string).
{'CVE-2021-23447'}
2022-05-05T13:48:52Z
2021-10-12T16:22:04Z
MODERATE
5.4
{'CWE-79', 'CWE-843'}
{'https://github.com/rooseveltframework/teddy/pull/518', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23447', 'https://snyk.io/vuln/SNYK-JS-TEDDY-1579557', 'https://github.com/advisories/GHSA-5f38-9jw2-6r6h', 'https://github.com/rooseveltframework/teddy/releases/tag/0.5.9', 'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0'}
null
GHSA
GHSA-78vq-9j56-wrfr
Cross-site Scripting in gon
An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.
{'CVE-2020-25739'}
2021-04-30T17:29:15Z
2021-04-30T17:29:15Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25739', 'https://github.com/advisories/GHSA-78vq-9j56-wrfr', 'https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7', 'https://usn.ubuntu.com/4560-1/', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00018.html'}
null
GHSA
GHSA-xh56-3f5w-9h25
Hijacked Environment Variables in nodemailer-js
The `nodemailer-js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16071'}
2021-01-08T21:10:59Z
2018-08-29T23:40:01Z
MODERATE
0
{'CWE-506'}
{'https://nodesecurity.io/advisories/510', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16071', 'https://github.com/advisories/GHSA-xh56-3f5w-9h25', 'https://www.npmjs.com/advisories/510'}
null
GHSA
GHSA-cjj8-wfrx-jqcf
Cross-Site Scripting (XSS) in pivottable
Affected versions of `pivottable` are vulnerable to cross-site scripting, due to a new mechanism used to render JSON elements. ## Recommendation Update to version 2.0.0 or later.
{'CVE-2016-1000241'}
2021-09-23T21:36:35Z
2020-09-01T16:00:18Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/139', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000241', 'https://github.com/nicolaskruchten/pivottable/pull/401', 'https://github.com/advisories/GHSA-cjj8-wfrx-jqcf'}
null
GHSA
GHSA-r4gv-vj59-cccm
Control character injection in console output in github.com/ipfs/go-ipfs
### Impact Control characters are not escaped from console output. This can result in hiding input from the user which could result in the user taking an unknown, malicious action. ### Patches <!-- _Has the problem been patched? What versions should users upgrade to?_ --> - Patched via https://github.com/ipfs/go-ipfs/pull/7831 in v0.8.0 ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ipfs](http://github.com/ipfs/go-ipfs) * Email us at [security@ipfs.io](mailto:security@ipfs.io)
{'CVE-2020-26283'}
2022-04-19T19:02:51Z
2021-06-23T17:27:27Z
MODERATE
6.8
{'CWE-116', 'CWE-150'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26283', 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-r4gv-vj59-cccm', 'https://github.com/ipfs/go-ipfs/pull/7831', 'https://github.com/ipfs/go-ipfs/commit/fb0a9acd2d8288bd1028c3219a420de62a09683a', 'https://github.com/advisories/GHSA-r4gv-vj59-cccm'}
null
GHSA
GHSA-4q69-q4q7-x82c
High severity vulnerability that affects rendertron
Rendertron 1.0.0 includes an _ah/stop route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application.
{'CVE-2017-18353'}
2021-09-01T17:52:46Z
2019-01-04T17:41:46Z
HIGH
7.5
null
{'https://github.com/GoogleChrome/rendertron/pull/88', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18353', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://github.com/advisories/GHSA-4q69-q4q7-x82c'}
null
GHSA
GHSA-83rh-hx5x-q9p5
Out-of-bounds Read in OpenCV
In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer over-read exists in the function cv::HdrDecoder::checkSignature in modules/imgcodecs/src/grfmt_hdr.cpp.
{'CVE-2017-18009'}
2021-10-12T22:03:23Z
2021-10-12T22:03:23Z
HIGH
7.5
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-18009', 'http://www.securityfocus.com/bid/106945', 'https://github.com/opencv/opencv/issues/10479', 'https://github.com/opencv/opencv/pull/10480/commits/4ca89db22dea962690f31c1781bce5937ee91837', 'https://github.com/advisories/GHSA-83rh-hx5x-q9p5'}
null
GHSA
GHSA-33xh-xch9-p6hj
Incorrect Authorization in Apache Ozone
In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client.
{'CVE-2021-39233'}
2021-11-23T18:17:59Z
2021-11-23T18:17:59Z
CRITICAL
9.1
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39233', 'http://www.openwall.com/lists/oss-security/2021/11/19/4', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C394a9a73-44dd-b5db-84d8-607c3226eb00%40apache.org%3E', 'https://github.com/advisories/GHSA-33xh-xch9-p6hj'}
null
GHSA
GHSA-g6f4-j6c2-w3p3
High severity vulnerability that affects uglify-js
Withdrawn, accidental duplicate publish. The uglify-js package before 2.4.24 for Node.js does not properly account for non-boolean values when rewriting boolean expressions, which might allow attackers to bypass security mechanisms or possibly have unspecified other impact by leveraging improperly rewritten Javascript.
null
2021-12-03T14:25:51Z
2018-10-09T00:39:43Z
HIGH
0
null
{'https://github.com/advisories/GHSA-g6f4-j6c2-w3p3', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8857'}
null
GHSA
GHSA-75f6-78jr-4656
Null pointer dereference in `EditDistance`
### Impact An attacker can trigger a null pointer dereference in the implementation of `tf.raw_ops.EditDistance`: ```python import tensorflow as tf hypothesis_indices = tf.constant([247, 247, 247], shape=[1, 3], dtype=tf.int64) hypothesis_values = tf.constant([-9.9999], shape=[1], dtype=tf.float32) hypothesis_shape = tf.constant([0, 0, 0], shape=[3], dtype=tf.int64) truth_indices = tf.constant([], shape=[0, 3], dtype=tf.int64) truth_values = tf.constant([], shape=[0], dtype=tf.float32) truth_shape = tf.constant([0, 0, 0], shape=[3], dtype=tf.int64) tf.raw_ops.EditDistance( hypothesis_indices=hypothesis_indices, hypothesis_values=hypothesis_values, hypothesis_shape=hypothesis_shape, truth_indices=truth_indices, truth_values=truth_values, truth_shape=truth_shape, normalize=True) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/79865b542f9ffdc9caeb255631f7c56f1d4b6517/tensorflow/core/kernels/edit_distance_op.cc#L103-L159) has incomplete validation of the input parameters. In the above scenario, an attacker causes an allocation of an empty tensor for the output: ```cc OP_REQUIRES_OK(ctx, ctx->allocate_output("output", output_shape, &output)); auto output_t = output->flat<float>(); output_t.setZero(); ``` Because `output_shape` has 0 elements, the result of `output->flat<T>()` has an empty buffer, so calling `setZero` would result in a null dereference. ### Patches We have patched the issue in GitHub commit [f4c364a5d6880557f6f5b6eb5cee2c407f0186b3](https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29564'}
2021-05-21T14:25:08Z
2021-05-21T14:25:08Z
LOW
2.5
{'CWE-476'}
{'https://github.com/advisories/GHSA-75f6-78jr-4656', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29564', 'https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-75f6-78jr-4656'}
null
GHSA
GHSA-jv2c-mhcq-6wp4
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0829'}
2021-07-28T18:57:39Z
2021-07-28T18:57:39Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0829', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0829', 'https://github.com/advisories/GHSA-jv2c-mhcq-6wp4'}
null
GHSA
GHSA-c2w9-48qc-qpj4
High severity vulnerability that affects ansible
An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability.
{'CVE-2017-2809'}
2021-09-08T21:28:07Z
2018-07-13T15:16:54Z
HIGH
7.8
{'CWE-94'}
{'https://github.com/tomoh1r/ansible-vault/issues/4', 'https://github.com/tomoh1r/ansible-vault/blob/v1.0.5/CHANGES.txt', 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0305', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2809', 'http://www.securityfocus.com/bid/100824', 'https://github.com/advisories/GHSA-c2w9-48qc-qpj4', 'https://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04'}
null
GHSA
GHSA-f4hq-453j-p95f
Open redirect in Slashify
The package is an Express middleware that normalises routes by stripping any final slash, redirecting, for example, `bookings/latest/` to `bookings/latest`. However, it does not validate the path it redirects to in any way. In particular, if the path starts with two slashes (or two backslashes, or a slash and a backslash, etc.) it may redirect to a different domain. Consider the [example from the docs](https://www.npmjs.com/package/slashify#usage). Assume we have run it and started a server on `localhost:3000`, then visiting `localhost:3000///github.com/` redirects you to https://github.com. ## Recommendation This vulnerability is currently un-patched in the `slashify` package so there is no known safe version of this package. Discontinuing use of `slashify` is recommended.
{'CVE-2021-3189'}
2021-04-02T13:58:31Z
2021-02-05T20:43:34Z
HIGH
6.1
{'CWE-601'}
{'https://github.com/divshot/slashify', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3189', 'https://security.netapp.com/advisory/ntap-20210401-0004/', 'https://github.com/advisories/GHSA-f4hq-453j-p95f', 'https://www.npmjs.com/package/slashify', 'https://securitylab.github.com/advisories/GHSL-2020-199-open-redirect-slashify'}
null
GHSA
GHSA-fv9m-f7w4-889c
Exfiltrates Discord login tokens to pastebin in discordi.js
The `discordi.js` package is malware that attempts to discover and exfiltrate a user's [Discord](https://discordapp.com/) credentials, sending them to pastebin. All versions have been unpublished from the npm registry. ## Recommendation Do not install / use this module. It has been unpublished from the npm registry but may exist in some caches. Any users that logged into Discord using this library will need to change their credentials.
{'CVE-2017-16207'}
2021-01-08T18:51:20Z
2018-08-06T21:43:03Z
MODERATE
0
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16207', 'https://www.npmjs.com/advisories/545', 'https://github.com/advisories/GHSA-fv9m-f7w4-889c', 'https://nodesecurity.io/advisories/545'}
null
GHSA
GHSA-8h56-v53h-5hhj
Remote Code Execution - JavaEL Injection (low privileged accounts) in Nexus Repository Manager
Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.
{'CVE-2020-10204'}
2022-01-04T19:34:55Z
2020-04-14T15:27:14Z
HIGH
8.8
{'CWE-20'}
{'https://support.sonatype.com/hc/en-us/articles/360044882533', 'https://securitylab.github.com/advisories/GHSL-2020-012-nxrm-sonatype', 'https://securitylab.github.com/advisories/GHSL-2020-011-nxrm-sonatype', 'https://github.com/advisories/GHSA-8h56-v53h-5hhj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10204', 'https://support.sonatype.com/hc/en-us/articles/360044356194'}
null
GHSA
GHSA-qcc9-q247-3m2m
Malicious Package in js-regular
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:17:12Z
2020-09-03T19:46:49Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-qcc9-q247-3m2m', 'https://www.npmjs.com/advisories/1129'}
null
GHSA
GHSA-5r2p-j47h-mhpg
Moderate severity vulnerability that affects rack
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
{'CVE-2018-16471'}
2021-01-08T19:49:07Z
2018-11-15T15:59:08Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16471', 'https://groups.google.com/forum/#!topic/rubyonrails-security/GKsAFT924Ag', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html', 'https://github.com/advisories/GHSA-5r2p-j47h-mhpg', 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html', 'https://usn.ubuntu.com/4089-1/', 'https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html'}
null
GHSA
GHSA-j5hj-fhc9-g24m
Moderate severity vulnerability that affects rack-mini-profiler
The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks.
{'CVE-2016-4442'}
2021-09-14T18:19:21Z
2017-10-24T18:33:35Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4442', 'https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c', 'https://github.com/advisories/GHSA-j5hj-fhc9-g24m', 'http://www.openwall.com/lists/oss-security/2016/06/10/2'}
null
GHSA
GHSA-4xj5-vv9x-63jp
Data races in concread
An issue was discovered in the concread crate before 0.2.6 for Rust. Attackers can cause an ARCache<K,V> data race by sending types that do not implement Send/Sync.
{'CVE-2020-35928'}
2021-08-25T20:50:22Z
2021-08-25T20:50:22Z
MODERATE
4.7
{'CWE-362'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0092.html', 'https://github.com/kanidm/concread/issues/48', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35928', 'https://github.com/advisories/GHSA-4xj5-vv9x-63jp'}
null
GHSA
GHSA-83vp-6jqg-6cmr
Incorrect Authentication in shopware
### Impact Modify Customers, create Orders without App Permission ## Patches We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
{'CVE-2022-24748'}
2022-03-18T20:15:33Z
2022-03-10T18:02:14Z
MODERATE
6.8
{'CWE-287'}
{'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24748', 'https://github.com/advisories/GHSA-83vp-6jqg-6cmr', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.27683580.172848620.1646933022-368790926.1646933022', 'https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr'}
null
GHSA
GHSA-32wr-8wxm-852c
Deserialization of Untrusted Data in NukeViet
includes/core/is_user.php in NukeViet before 4.3.04 deserializes the untrusted nvloginhash cookie (i.e., the code relies on PHP's serialization format when JSON can be used to eliminate the risk).
{'CVE-2019-7725'}
2021-06-22T15:24:59Z
2021-06-22T15:24:59Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt', 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7725', 'https://github.com/advisories/GHSA-32wr-8wxm-852c', 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04', 'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt'}
null
GHSA
GHSA-qx4v-6gc5-f2vv
Regular Expression Denial of Service
A Regular Expression Denial of Service vulnerability was discovered in esm before 3.1.0. The issue is that esm's find-indexes is using the unescaped identifiers in a regex, which, in this case, causes an infinite loop.
null
2021-02-25T17:21:01Z
2019-06-20T14:32:56Z
MODERATE
0
{'CWE-400'}
{'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b', 'https://github.com/standard-things/esm/issues/694', 'https://github.com/advisories/GHSA-qx4v-6gc5-f2vv'}
null
GHSA
GHSA-58g2-9fqr-36q2
Prototype Pollution in Proto
This affects all versions of package Proto. It is possible to inject pollute the object property of an application using Proto by leveraging the merge function.
{'CVE-2021-23426'}
2021-09-10T17:08:40Z
2021-09-02T22:01:01Z
HIGH
7.5
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-PROTO-1316301', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23426', 'https://www.npmjs.com/package/Proto', 'https://github.com/advisories/GHSA-58g2-9fqr-36q2'}
null
GHSA
GHSA-5crj-c72x-m7gq
Null pointer exception when `Exit` node is not preceded by `Enter` op
### Impact The [process of building the control flow graph](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/common_runtime/immutable_executor_state.cc#L284-L346) for a TensorFlow model is vulnerable to a null pointer exception when nodes that should be paired are not: ```python import tensorflow as tf @tf.function def func(): return tf.raw_ops.Exit(data=[False,False]) func() ``` This occurs because the code assumes that the first node in the pairing (e.g., an `Enter` node) always exists when encountering the second node (e.g., an `Exit` node): ```cc ... } else if (IsExit(curr_node)) { // Exit to the parent frame. parent = parent_nodes[curr_id]; frame_name = cf_info->frame_names[parent->id()]; ... ``` When this is not the case, `parent` is `nullptr` so dereferencing it causes a crash. ### Patches We have patched the issue in GitHub commit [05cbebd3c6bb8f517a158b0155debb8df79017ff](https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41217'}
2021-11-10T18:55:11Z
2021-11-10T18:55:11Z
MODERATE
5.5
{'CWE-476'}
{'https://github.com/advisories/GHSA-5crj-c72x-m7gq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41217', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5crj-c72x-m7gq', 'https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff'}
null
GHSA
GHSA-wc6f-cjcp-cc33
Improper Certificate Validation in Apache IoTDB
An issue was found in Apache IoTDB .9.0 to 0.9.1 and 0.8.0 to 0.8.2. When starting IoTDB, the JMX port 31999 is exposed with no certification.Then, clients could execute code remotely.
{'CVE-2020-1952'}
2022-01-06T19:45:30Z
2022-01-06T19:45:30Z
HIGH
9.8
{'CWE-295'}
{'https://lists.apache.org/thread.html/r3d2ff899ead64d2952fdc1fbb1f520ca42011ed2b4c7f786e921f6b9%40%3Cdev.iotdb.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1952', 'https://github.com/advisories/GHSA-wc6f-cjcp-cc33'}
null
GHSA
GHSA-g8jj-899q-8x3j
Cross-site scripting in json-sanitizer
OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
{'CVE-2020-13973'}
2022-02-10T23:04:13Z
2022-02-10T23:04:13Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/OWASP/json-sanitizer/pull/20', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13973', 'https://github.com/advisories/GHSA-g8jj-899q-8x3j'}
null
GHSA
GHSA-cfqj-9g2g-w7q6
Cross-site Scripting in Apache JSPWiki
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later.
{'CVE-2021-40369'}
2021-12-02T17:49:14Z
2021-12-02T17:49:14Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-cfqj-9g2g-w7q6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40369', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369', 'https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh'}
null
GHSA
GHSA-pgf8-28gg-vpr6
Path traversal
### Impact A malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. ### Patches The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
{'CVE-2021-32662'}
2021-06-07T18:55:30Z
2021-06-04T19:09:20Z
MODERATE
6.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32662', 'https://github.com/advisories/GHSA-pgf8-28gg-vpr6', 'https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6', 'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208', 'https://github.com/backstage/backstage/releases/tag/release-2021-05-27'}
null
GHSA
GHSA-rgp5-m2pq-3fmg
Cross-site Scripting in microweber
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
{'CVE-2022-0690'}
2022-02-26T01:15:28Z
2022-02-20T00:00:31Z
HIGH
8.8
{'CWE-79'}
{'https://huntr.dev/bounties/4999a0f4-6efb-4681-b4ba-b36babc366f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0690', 'https://github.com/advisories/GHSA-rgp5-m2pq-3fmg', 'https://github.com/microweber/microweber/commit/f7f5d41ba1a08ceed37c00d5f70a3f48b272e9f2'}
null
GHSA
GHSA-j665-rvj7-2jv9
Code Injection in mosc
mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to `properties` argument is executed by the `eval` function, resulting in code execution.
{'CVE-2020-7672'}
2021-07-29T18:11:52Z
2021-05-17T21:00:17Z
HIGH
8.6
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-MOSC-571492', 'https://github.com/advisories/GHSA-j665-rvj7-2jv9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7672'}
null
GHSA
GHSA-cqv6-3phm-hcwx
Access to invalid memory during shape inference in `Cudnn*` ops
### Impact The [shape inference code](https://github.com/tensorflow/tensorflow/blob/9ff27787893f76d6971dcd1552eb5270d254f31b/tensorflow/core/ops/cudnn_rnn_ops.cc) for the `Cudnn*` operations in TensorFlow can be tricked into accessing invalid memory, via a heap buffer overflow: ```python import tensorflow as tf @tf.function def func(): return tf.raw_ops.CudnnRNNV3( input=[0.1, 0.1], input_h=[0.5], input_c=[0.1, 0.1, 0.1], params=[0.5, 0.5], sequence_lengths=[-1, 0, 1]) func() ``` This occurs because the ranks of the `input`, `input_h` and `input_c` parameters are not validated, but code assumes they have certain values: ```cc auto input_shape = c->input(0); auto input_h_shape = c->input(1); auto seq_length = c->Dim(input_shape, 0); auto batch_size = c->Dim(input_shape, 1); // assumes rank >= 2 auto num_units = c->Dim(input_h_shape, 2); // assumes rank >= 3 ``` ### Patches We have patched the issue in GitHub commit [af5fcebb37c8b5d71c237f4e59c6477015c78ce6](https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41221'}
2021-11-10T18:50:17Z
2021-11-10T18:50:17Z
HIGH
7.8
{'CWE-787', 'CWE-120'}
{'https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6', 'https://github.com/advisories/GHSA-cqv6-3phm-hcwx', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqv6-3phm-hcwx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41221'}
null
GHSA
GHSA-q42c-rrp3-r3xm
Malicious Package in commmander
All versions of `commmander` contain malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive. ## Recommendation Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
null
2021-09-30T22:02:15Z
2020-09-11T21:13:44Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/923', 'https://github.com/advisories/GHSA-q42c-rrp3-r3xm'}
null
GHSA
GHSA-hgwp-4vp4-qmm2
Local Privilege Escalation in cloudflared
In `cloudflared` versions < 2020.8.1 on Windows, if an administrator has started `cloudflared` and set it to read configuration files from a certain directory, an unprivileged user can exploit a misconfiguration in order to escalate privileges and execute system-level commands. The misconfiguration was due to the way that `cloudflared` reads its configuration file. One of the locations that `cloudflared` reads from (C:\etc\) is not a secure by default directory due to the fact that Windows does not enforce access controls on this directory without further controls applied. A malformed config.yaml file can be written by any user. Upon reading this config, `cloudflared` would output an error message to a log file defined in the malformed config. The user-controlled log file location could be set to a specific location that Windows will execute when any user logs in.
{'CVE-2020-24356'}
2022-04-19T19:02:35Z
2021-05-24T16:56:35Z
HIGH
7.8
{'CWE-427'}
{'https://github.com/advisories/GHSA-hgwp-4vp4-qmm2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24356', 'https://github.com/cloudflare/cloudflared/security/advisories/GHSA-hgwp-4vp4-qmm2'}
null
GHSA
GHSA-rj38-87f3-93p6
Downloads Resources over HTTP in limbus-buildgen
Affected versions of `limbus-buildgen` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `limbus-buildgen`. ## Recommendation Update to version 0.1.1 or later.
{'CVE-2016-10674'}
2021-01-07T22:31:55Z
2019-02-18T23:42:27Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/276', 'https://www.npmjs.com/advisories/276', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10674', 'https://github.com/advisories/GHSA-rj38-87f3-93p6'}
null
GHSA
GHSA-gq67-pp9w-43gp
Cryptographically weak CSRF tokens in Apache MyFaces
In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application. Mitigation: Existing web.xml configuration parameters can be used to direct MyFaces to use SecureRandom for CSRF token generation: org.apache.myfaces.RANDOM_KEY_IN_VIEW_STATE_SESSION_TOKEN=secureRandom org.apache.myfaces.RANDOM_KEY_IN_CSRF_SESSION_TOKEN=secureRandom org.apache.myfaces.RANDOM_KEY_IN_WEBSOCKET_SESSION_TOKEN=secureRandom
{'CVE-2021-26296'}
2021-06-16T17:31:39Z
2021-06-16T17:31:39Z
HIGH
0
{'CWE-352', 'CWE-330'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26296', 'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2', 'https://security.netapp.com/advisory/ntap-20210528-0007/', 'https://issues.apache.org/jira/browse/MYFACES-4373', 'http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html', 'https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-gq67-pp9w-43gp', 'http://seclists.org/fulldisclosure/2021/Feb/66'}
null
GHSA
GHSA-46hv-7769-j7rx
Unauthorized File Access in harp
Affected versions of `harp` are vulnerable to Unauthorized File Access. The package states that it ignores files and directories with names that start with an underscore, such as `_secret-folder`. If the underscore character is URL encoded the server delivers the file. ## Recommendation Upgrade to version `0.40.2` or later.
{'CVE-2019-5437'}
2021-06-03T17:09:41Z
2019-06-13T16:12:22Z
MODERATE
0
{'CWE-548'}
{'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210', 'https://hackerone.com/reports/453820', 'https://www.npmjs.com/advisories/807', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5437', 'https://github.com/advisories/GHSA-46hv-7769-j7rx'}
null
GHSA
GHSA-8c4j-34r4-xr8g
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.
{'CVE-2020-36180'}
2022-04-22T18:16:40Z
2021-12-09T19:16:18Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-8c4j-34r4-xr8g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36180', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
GHSA
GHSA-5vx5-9q73-wgp4
High severity vulnerability that affects safemode
rubygem-safemode, as used in Foreman, versions 1.3.1 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
{'CVE-2017-7540'}
2021-01-08T19:48:21Z
2017-10-24T18:33:35Z
HIGH
0
{'CWE-184'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-7540', 'https://github.com/svenfuchs/safemode/pull/23', 'https://github.com/advisories/GHSA-5vx5-9q73-wgp4'}
null
GHSA
GHSA-f4g9-h89h-jgv9
SAML XML Signature wrapping in PySAML2
### Impact All users of pysaml2 that use the default `CryptoBackendXmlSec1` backend and need to verify signed SAML documents are impacted. `pysaml2 <= 6.4.1` does not validate the SAML document against an XML schema. This allows invalid XML documents to trick the verification process, by presenting elements with a valid signature inside elements whose content has been malformed. The verification is offloaded to `xmlsec1` and `xmlsec1` will not validate every signature in the given document, but only the first it finds in the given scope. ### Patches Users should upgrade to pysaml2 `v6.5.0`. ### Workarounds No workaround provided at this point. ### References No references provided at this point. ### Credits - Victor Schönfelder Garcia (isits AG International School of IT Security) - Juraj Somorovsky (Paderborn University) - Vladislav Mladenov (Ruhr University Bochum) ### For more information If you have any questions or comments about this advisory: * Open an issue in [pysaml2](https://github.com/IdentityPython/pysaml2) * Email us at [the incident-response address](mailto:incident-response@idpy.org)
{'CVE-2021-21238'}
2022-04-19T19:02:44Z
2021-01-21T14:12:16Z
LOW
6.5
{'CWE-347'}
{'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-f4g9-h89h-jgv9', 'https://pypi.org/project/pysaml2', 'https://github.com/advisories/GHSA-f4g9-h89h-jgv9', 'https://github.com/IdentityPython/pysaml2/releases/tag/v6.5.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21238', 'https://github.com/IdentityPython/pysaml2/commit/1d8fd268f5bf887480a403a7a5ef8f048157cc14'}
null
GHSA
GHSA-6343-m2qr-66gf
Malicious Package in js-sja3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:14:57Z
2020-09-03T23:10:41Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-6343-m2qr-66gf', 'https://www.npmjs.com/advisories/1291'}
null
GHSA
GHSA-g44j-7vp3-68cv
Arbitrary File Write in Libcontainer
Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
{'CVE-2015-3629'}
2022-04-12T22:13:08Z
2022-02-15T01:57:18Z
HIGH
8.4
{'CWE-59'}
{'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'http://seclists.org/fulldisclosure/2015/May/28', 'https://github.com/advisories/GHSA-g44j-7vp3-68cv', 'https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html', 'http://www.securityfocus.com/bid/74558', 'http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3629', 'https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3629'}
null
GHSA
GHSA-xqfj-vm6h-2x34
Improper Handling of Length Parameter Inconsistency in Compress
When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.
{'CVE-2021-35517'}
2022-04-22T15:46:13Z
2021-08-02T16:55:39Z
HIGH
7.5
{'CWE-130', 'CWE-770'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-xqfj-vm6h-2x34', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/3', 'https://lists.apache.org/thread.html/r457b2ed564860996b20d938566fe8bd4bfb7c37be8e205448ccb5975@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46@%3Cuser.ant.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35517', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/ra393ffdc7c90a4a37ea023946f390285693795013a642d80fba20203@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'http://www.openwall.com/lists/oss-security/2021/07/13/5', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r31f75743ac173b0a606f8ea6ea53f351f386c44e7bcf78ae04007c29@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}
null
GHSA
GHSA-q9p4-qfc8-fvpp
SQL Injection in medoo
columnQuote in medoo before 1.7.5 allows remote attackers to perform a SQL Injection due to improper escaping.
{'CVE-2019-10762'}
2021-10-12T16:32:38Z
2021-10-12T16:32:38Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-q9p4-qfc8-fvpp', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10762', 'https://snyk.io/vuln/SNYK-PHP-CATFANMEDOO-474562', 'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533'}
null
GHSA
GHSA-w457-6q6x-cgp9
Prototype Pollution in handlebars
Versions of `handlebars` prior to 3.0.8 or 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' `__proto__` and `__defineGetter__` properties, which may allow an attacker to execute arbitrary code through crafted payloads. ## Recommendation Upgrade to version 3.0.8, 4.3.0 or later.
{'CVE-2019-19919'}
2021-07-26T21:51:07Z
2019-12-26T17:58:13Z
CRITICAL
9.8
{'CWE-74'}
{'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19919', 'https://www.npmjs.com/advisories/1164', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19919', 'https://github.com/wycats/handlebars.js/issues/1558', 'https://github.com/advisories/GHSA-w457-6q6x-cgp9'}
null
GHSA
GHSA-jv9c-w74q-6762
Insecure permissions on build temporary rootfs in Singularity
### Impact Insecure permissions on temporary directories used in explicit and implicit container build operations. When a Singularity command that results in a container build operation is executed, it is possible for a user with access to the system to read the contents of the image during the build. Additionally, if the image contains a world-writable file or directory, it is possible for a user to inject arbitrary content into the running build, which in certain circumstances may enable arbitrary code execution during the build and/or when the built container is run. ### Patches This issue is addressed in Singularity 3.6.3. All users are advised to upgrade to 3.6.3. ### Workarounds The issue is mitigated if `TMPDIR` is set to a location that is only accessible to the user, as any subdirectories directly under `TMPDIR` cannot then be accessed by others. However, this is difficult to enforce so it is not recommended to rely on this as a mitigation. ### For more information General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the: * [Singularity Slack Channel](https://bit.ly/2m0g3lX) * [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity) Any sensitive security concerns should be directed to: security@sylabs.io See our Security Policy here: https://sylabs.io/security-policy
{'CVE-2020-25040'}
2022-04-19T19:02:34Z
2021-05-24T16:56:23Z
HIGH
8.8
{'CWE-668', 'CWE-732'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25040', 'https://github.com/hpcng/singularity/security/advisories/GHSA-jv9c-w74q-6762', 'https://github.com/advisories/GHSA-jv9c-w74q-6762', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html', 'https://medium.com/sylabs'}
null
GHSA
GHSA-g37j-v5gh-g25c
Malicious Package in js-shi3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:14:08Z
2020-09-03T23:06:48Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1288', 'https://github.com/advisories/GHSA-g37j-v5gh-g25c'}
null
GHSA
GHSA-vj9x-w7ch-f46p
pimcore is vulnerable to SQL Injection
pimcore is vulnerable to Improper Neutralization of Special Elements used in an SQL Command
{'CVE-2022-0258'}
2022-01-21T23:50:08Z
2022-01-21T23:50:08Z
HIGH
8.3
{'CWE-89'}
{'https://github.com/pimcore/pimcore/commit/66281c12479dc01a06258d8533eaddfb1770d5bd', 'https://huntr.dev/bounties/0df891e4-6412-4d9a-a9b7-d9df50311802', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0258', 'https://github.com/advisories/GHSA-vj9x-w7ch-f46p'}
null
GHSA
GHSA-49c6-3wr4-8jr4
Malicious Package in malicious-npm-package
All versions of `malicious-npm-package` contain malicious code. The malware targets Windows systems. It runs a powershell command that downloads an executable file from a remote server and runs it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:07:49Z
2020-09-04T15:05:26Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-49c6-3wr4-8jr4', 'https://www.npmjs.com/advisories/1323'}
null
GHSA
GHSA-4w2q-9hp2-vxj5
Path Traversal in Caucho Resin
There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request.
{'CVE-2021-44138'}
2022-04-22T20:22:28Z
2022-04-05T00:00:28Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44138', 'https://github.com/maybe-why-not/reponame/issues/2', 'https://github.com/advisories/GHSA-4w2q-9hp2-vxj5'}
null
GHSA
GHSA-hxxf-q3w9-4xgw
Malicious Package in eslint-scope
Version 3.7.2 of `eslint-scope` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to 2 remote servers. ## Recommendation The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
null
2021-09-14T17:35:41Z
2018-07-12T19:52:02Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/eslint/eslint-scope/issues/39', 'https://eslint.org/blog/2018/07/postmortem-for-malicious-package-publishes', 'https://www.npmjs.com/advisories/673', 'https://github.com/advisories/GHSA-hxxf-q3w9-4xgw', 'https://snyk.io/vuln/SNYK-JS-ESLINTSCOPE-11120'}
null
GHSA
GHSA-xjp4-6w75-qrj7
Remote CLI Command Execution Vulnerability in CodeIgniter4
### Impact This vulnerability allows attackers to execute CLI routes via HTTP request. ### Patches Upgrade to v4.1.9 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues) * Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
{'CVE-2022-24711'}
2022-04-19T19:03:22Z
2022-03-01T21:44:13Z
CRITICAL
9.4
{'CWE-94', 'CWE-20'}
{'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-xjp4-6w75-qrj7', 'https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781', 'https://github.com/advisories/GHSA-xjp4-6w75-qrj7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24711'}
null
GHSA
GHSA-8g4m-cjm2-96wq
Sandbox escape in notevil and argencoders-notevil
This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878). This package has been deprecated.
{'CVE-2021-23771'}
2022-03-25T16:47:43Z
2022-03-18T00:01:11Z
MODERATE
6.5
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23771', 'https://github.com/advisories/GHSA-8g4m-cjm2-96wq', 'https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587', 'https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946'}
null
GHSA
GHSA-6jmr-jfh7-xg3h
False-positive validity for NFT1 genesis transactions
### Impact In the npm package named "slp-validate", versions prior to 1.2.2 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification. ### Patches npm package "slp-validate" has been patched and is published and tagged as version 1.2.2. ### Workarounds Upgrade to slp-validate 1.2.2. ### References * Package location: https://www.npmjs.com/package/slp-validate * SLP NFT1 spec: https://slp.dev/specs/slp-nft-1/#nft1-protocol-requirements * Git commit hash fixing this issue: https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c * Unit tests have been added to assist validator implementations in avoiding this bug: https://github.com/simpleledger/slp-unit-test-data/commit/8c942eacfae12686dcf1f3366321445a4fba73e7 ### For more information If you have any questions or comments about this advisory please open an issue in the [slp-validate](https://github.com/simpleledger/slp-validate.js/issues) repository.
{'CVE-2020-15131'}
2021-01-08T21:00:18Z
2020-07-30T14:58:53Z
CRITICAL
7.5
{'CWE-697'}
{'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c', 'https://github.com/advisories/GHSA-6jmr-jfh7-xg3h', 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-6jmr-jfh7-xg3h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15131'}
null
GHSA
GHSA-j59f-6m4q-62h6
Improper Key Verification in ipns
Versions 0.1.1 or 0.1.2 of `ipns` are vulnerable to improper key validation. This is due to the public key verification was not being performed properly, resulting in any key being valid. ## Recommendation Update to version 0.1.3 or later.
null
2021-08-04T21:17:51Z
2019-05-30T17:28:48Z
HIGH
7.5
{'CWE-287'}
{'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0', 'https://github.com/advisories/GHSA-j59f-6m4q-62h6', 'https://www.npmjs.com/advisories/693'}
null
GHSA
GHSA-w6gv-3r3v-gwgj
Moderate severity vulnerability that affects org.keycloak:keycloak-core
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
{'CVE-2017-2585'}
2021-09-21T17:59:57Z
2018-10-18T16:47:41Z
MODERATE
5.9
{'CWE-200'}
{'https://access.redhat.com/errata/RHSA-2017:0872', 'http://rhn.redhat.com/errata/RHSA-2017-0876.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2585', 'https://github.com/advisories/GHSA-w6gv-3r3v-gwgj', 'https://bugzilla.redhat.com/show_bug.cgi?id=1412376', 'https://access.redhat.com/errata/RHSA-2017:0873', 'http://www.securityfocus.com/bid/97393', 'http://www.securitytracker.com/id/1038180'}
null
GHSA
GHSA-x6fg-f45m-jf5q
Regular Expression Denial of Service in semver
Versions 4.3.1 and earlier of `semver` are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed. ## Recommendation Update to version 4.3.2 or later
{'CVE-2015-8855'}
2021-09-21T22:15:37Z
2017-10-24T18:33:36Z
HIGH
7.5
null
{'https://github.com/advisories/GHSA-x6fg-f45m-jf5q', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8855', 'https://www.npmjs.com/advisories/31', 'http://www.securityfocus.com/bid/86957', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS', 'https://nodesecurity.io/advisories/31'}
null
GHSA
GHSA-c3xq-cj8f-7829
Inadequate Encryption Strength in python-keystoneclient
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass
{'CVE-2013-2166'}
2022-03-23T19:45:18Z
2021-10-12T16:31:43Z
CRITICAL
9.8
{'CWE-326'}
{'https://security-tracker.debian.org/tracker/CVE-2013-2166', 'http://www.securityfocus.com/bid/60684', 'http://rhn.redhat.com/errata/RHSA-2013-0992.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2166', 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-2166', 'http://www.openwall.com/lists/oss-security/2013/06/19/5', 'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e', 'https://access.redhat.com/security/cve/cve-2013-2166', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2166', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html', 'https://github.com/advisories/GHSA-c3xq-cj8f-7829'}
null
GHSA
GHSA-p33q-w45h-2hcj
Malicious Package in 4equest
All versions of `4equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:44:09Z
2020-09-02T18:30:03Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-p33q-w45h-2hcj', 'https://www.npmjs.com/advisories/837'}
null
GHSA
GHSA-55r9-7mf8-m382
Cross-site Scripting in edge.js
Edge is a logical and batteries included template engine for Node.js. This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.
{'CVE-2021-23443'}
2022-05-05T13:50:00Z
2021-09-22T20:36:46Z
MODERATE
5.4
{'CWE-79', 'CWE-843'}
{'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23443', 'https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556', 'https://github.com/advisories/GHSA-55r9-7mf8-m382'}
null
GHSA
GHSA-pfr3-87q3-65rc
Cross-site Scripting in vmd
vmd through 1.34.0 allows 'div class="markdown-body"' XSS, as demonstrated by Electron remote code execution via require('child_process').execSync('calc.exe') on Windows and a similar attack on macOS.
{'CVE-2021-33041'}
2022-02-10T23:46:28Z
2022-02-10T23:46:28Z
MODERATE
6.1
{'CWE-79'}
{'https://www.npmjs.com/package/vmd', 'https://github.com/yoshuawuyts/vmd/issues/137', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33041', 'https://github.com/advisories/GHSA-pfr3-87q3-65rc'}
null
GHSA
GHSA-8w94-cf6g-c8mg
Man-in-the-Middle (MitM)
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
{'CVE-2014-5277'}
2022-04-12T22:53:42Z
2022-02-15T01:57:18Z
MODERATE
5.3
null
{'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5277', 'https://github.com/docker/docker/commit/8caacb18f8019dfda30d79c327397e5f5783c068', 'https://github.com/advisories/GHSA-8w94-cf6g-c8mg', 'https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00048.html', 'https://groups.google.com/forum/#!topic/docker-user/oYm0i3xShJU', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5277'}
null
GHSA
GHSA-rv6r-3f5q-9rgx
Twisted SSH client and server deny of service during SSH handshake.
### Impact The Twisted SSH client and server implementation naively accepted an infinite amount of data for the peer's SSH version identifier. A malicious peer can trivially craft a request that uses all available memory and crash the server, resulting in denial of service. The attack is as simple as `nc -rv localhost 22 < /dev/zero`. ### Patches The issue was fix in GitHub commit https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1 A fix is available in Twisted 22.2.0. ### Workarounds * Limit access to the SSH server only to trusted source IP addresses. * Connect over SSH only to trusted destination IP addresses. ### References Reported at https://twistedmatrix.com/trac/ticket/10284 Discussions at https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx ### For more information Found by vin01
{'CVE-2022-21716'}
2022-04-22T15:33:58Z
2022-03-03T19:02:08Z
HIGH
7.5
{'CWE-120'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://twistedmatrix.com/trac/ticket/10284', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21716', 'https://github.com/twisted/twisted/releases/tag/twisted-22.2.0', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00009.html', 'https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx', 'https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9', 'https://github.com/advisories/GHSA-rv6r-3f5q-9rgx', 'https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1'}
null
GHSA
GHSA-g8rg-7rpr-cwr2
Information Disclosure in TYPO3 extension sf_event_mgt
A missing access check in the backend module allows an authenticated backend user to export participant data for events which the user does not have access to, resulting in Information Disclosure. Another missing access check in the backend module allows an authenticated backend user to send emails to event participants for events which the user does not have access to, resulting in Broken Access Control. External reference: [https://typo3.org/security/advisory/typo3-ext-sa-2020-017](https://typo3.org/security/advisory/typo3-ext-sa-2020-017)
{'CVE-2020-25026'}
2022-04-19T19:02:33Z
2020-09-02T18:03:26Z
MODERATE
4.3
{'CWE-863'}
{'https://typo3.org/help/security-advisories', 'https://github.com/advisories/GHSA-g8rg-7rpr-cwr2', 'https://github.com/derhansen/sf_event_mgt/security/advisories/GHSA-g8rg-7rpr-cwr2', 'https://github.com/derhansen/sf_event_mgt/commit/17edcbf608b252cc1123e1279f0735f6aa28fef4', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-017', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25026', 'https://packagist.org/packages/derhansen/sf_event_mgt'}
null