ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-9vpm-rcf4-9wqw | Division by 0 in `MaxPoolGradWithArgmax` | ### Impact
The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` is vulnerable to a division by 0:
```python
import tensorflow as tf
input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32)
grad = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32)
argmax = tf.constant([], shape=[0], dtype=tf.int64)
ksize = [1, 1, 1, 1]
strides = [1, 1, 1, 1]
tf.raw_ops.MaxPoolGradWithArgmax(
input=input, grad=grad, argmax=argmax, ksize=ksize, strides=strides,
padding='SAME', include_batch_in_index=False)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/279bab6efa22752a2827621b7edb56a730233bd8/tensorflow/core/kernels/maxpooling_op.cc#L1033-L1034) fails to validate that the batch dimension of the tensor is non-zero, before dividing by this quantity.
### Patches
We have patched the issue in GitHub commit [376c352a37ce5a68b721406dc7e77ac4b6cf483d](https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29573'} | 2021-05-21T14:26:07Z | 2021-05-21T14:26:07Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-9vpm-rcf4-9wqw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29573', 'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vpm-rcf4-9wqw'} | null |
GHSA | GHSA-vp77-fqqp-79j8 | Prototype Pollution in decal | This affects all versions of package decal. The vulnerability is in the set function. | {'CVE-2020-28449'} | 2021-04-13T15:20:27Z | 2021-04-13T15:20:27Z | HIGH | 8.6 | {'CWE-400', 'CWE-1321'} | {'https://github.com/advisories/GHSA-vp77-fqqp-79j8', 'https://snyk.io/vuln/SNYK-JS-DECAL-1051007', 'https://www.npmjs.com/package/decal', 'https://github.com/gigafied/decal.js/blob/master/src/utils/set.js%23L45-L73', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28449'} | null |
GHSA | GHSA-8jxj-9r5f-w3m2 | Low severity vulnerability that affects puppet | lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file. | {'CVE-2012-3866'} | 2021-09-07T19:48:46Z | 2017-10-24T18:33:37Z | LOW | 0 | null | {'http://www.debian.org/security/2012/dsa-2511', 'https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f', 'https://github.com/advisories/GHSA-8jxj-9r5f-w3m2', 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html', 'http://www.ubuntu.com/usn/USN-1506-1', 'http://secunia.com/advisories/50014', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3866', 'http://puppetlabs.com/security/cve/cve-2012-3866/', 'https://bugzilla.redhat.com/show_bug.cgi?id=839135'} | null |
GHSA | GHSA-hv53-vf5m-8q94 | Validation bypass vulnerability | Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev)
### Credits
Niklas Sköldmark (Medborgarskolan) | null | 2022-02-11T23:28:20Z | 2022-02-11T23:28:20Z | LOW | 0 | null | {'https://github.com/personnummer/go/security/advisories/GHSA-hv53-vf5m-8q94', 'https://github.com/advisories/GHSA-hv53-vf5m-8q94'} | null |
GHSA | GHSA-874w-m2v2-mj64 | Double Free in Adplug | AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h. | {'CVE-2019-15151'} | 2021-03-29T20:48:45Z | 2021-03-29T20:48:45Z | CRITICAL | 9.8 | {'CWE-415'} | {'https://github.com/adplug/adplug/issues/91', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15151', 'https://github.com/advisories/GHSA-874w-m2v2-mj64', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/', 'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/'} | null |
GHSA | GHSA-mgv2-57vj-99xc | Low severity vulnerability that affects eye.js | ## Test breaking
### Impact
In v1.2.0, tests are broken: all tests are always succeeding. If tests are looking for security vulnerabilities, these were compromised.
### Patches
Users should upgrade to `v1.2.1`
### Workarounds
Users who don't use eye.js for looking for vulnerabilities are safe. Upgrading will just fix some bugs.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [EyeJS](https://github.com/arguiot/EyeJS)
* Email us at [arguiot@gmail.com](mailto:arguiot@gmail.com)
| null | 2021-12-03T14:39:45Z | 2019-10-07T16:54:24Z | LOW | 0 | null | {'https://github.com/arguiot/EyeJS/security/advisories/GHSA-mgv2-57vj-99xc', 'https://github.com/advisories/GHSA-mgv2-57vj-99xc'} | null |
GHSA | GHSA-5mj6-3cmq-fh34 | showdoc is vulnerable to Generation of Error Message Containing Sensitive Information | showdoc is vulnerable to Generation of Error Message Containing Sensitive Information | {'CVE-2022-0079'} | 2022-01-06T22:22:46Z | 2022-01-06T22:22:46Z | MODERATE | 5.3 | {'CWE-209'} | {'https://huntr.dev/bounties/b37f0e26-355a-4d50-8495-a567c10828ee', 'https://github.com/star7th/showdoc/commit/e43df0a190f68aefa272507d3bd54475f566c1db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0079', 'https://github.com/advisories/GHSA-5mj6-3cmq-fh34'} | null |
GHSA | GHSA-2wpq-vvw6-67wr | Hijacked Environment Variables in nodecaffe | The `nodecaffe` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16070'} | 2021-09-16T20:57:18Z | 2018-08-29T23:38:35Z | CRITICAL | 0 | {'CWE-506', 'CWE-433'} | {'https://www.npmjs.com/advisories/509', 'https://nodesecurity.io/advisories/509', 'https://github.com/advisories/GHSA-2wpq-vvw6-67wr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16070'} | null |
GHSA | GHSA-p7w2-mc6m-mfx2 | Malicious Package in scroool | Version 0.1.7 of `scroool` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | null | 2020-09-11T21:22:25Z | 2020-09-11T21:22:25Z | CRITICAL | 0 | null | {'https://www.npmjs.com/advisories/944', 'https://github.com/advisories/GHSA-p7w2-mc6m-mfx2'} | null |
GHSA | GHSA-v84g-cf5j-xjqx | Path Traversal in Apache James Server | Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to user names being prefixed by the value of the username being used). | {'CVE-2022-22931'} | 2022-02-10T22:46:45Z | 2022-02-08T00:00:34Z | MODERATE | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-22931', 'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7', 'https://lists.apache.org/thread/bp8yql4wws56jlh0vxoowj7foothsmpr', 'https://github.com/apache/james-project/pull/877', 'https://www.openwall.com/lists/oss-security/2022/02/07/1', 'https://github.com/advisories/GHSA-v84g-cf5j-xjqx'} | null |
GHSA | GHSA-rmh2-65xw-9m6q | Infinite Loop in jsonparser | The Library API in buger jsonparser through 2019-12-04 allows attackers to cause a denial of service (infinite loop) via a Delete call. | {'CVE-2020-10675'} | 2021-05-18T18:26:25Z | 2021-05-18T18:26:25Z | MODERATE | 7.5 | {'CWE-835'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4C7PV6KEUUM76V4B2J5IFN2U6LEOWB67/', 'https://github.com/advisories/GHSA-rmh2-65xw-9m6q', 'https://github.com/buger/jsonparser/issues/188', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10675'} | null |
GHSA | GHSA-g5rr-p69h-7v3g | Insufficient type validation in pocketmine/pocketmine-mp | When an inventory interaction is performed (e.g. moving an item around an inventory), the client sends a serialized version of the itemstack to the server, which the server then deserializes and compares against its own copy. If the copies don't match, the transaction is invalid. This involves deserializing item NBT from the client, which allows for bogus data to be provided. Usually, this is harmless, but in this particular case, it could result in crashes on certain types of bad data (e.g. incorrect ListTag type provided for the `CanDestroy` tag). This is fixed in 4.2.9 by commit 5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2. It's non-trivial to workaround this, but can be done by handling `InventoryTransactionPacket` and `PlayerAuthInputPacket` to scrub inbound transaction data of bogus NBT that would cause these crashes.
| null | 2022-04-26T20:57:10Z | 2022-04-22T20:57:12Z | HIGH | 7.5 | {'CWE-20', 'CWE-1287'} | {'https://github.com/pmmp/PocketMine-MP/blob/4.2.9/changelogs/4.2.md#429', 'https://github.com/advisories/GHSA-g5rr-p69h-7v3g', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-g5rr-p69h-7v3g', 'https://github.com/pmmp/PocketMine-MP/commit/5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2', 'https://github.com/pmmp/PocketMine-MP/releases/tag/4.2.9'} | null |
GHSA | GHSA-m8h6-m9p5-p2f8 | Moderate severity vulnerability that affects activerecord | Withdrawn, accidental duplicate publish.
Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155. | null | 2021-12-02T23:15:04Z | 2018-08-13T20:49:01Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-m8h6-m9p5-p2f8', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6317'} | null |
GHSA | GHSA-cr5j-953j-xw5p | Arbitrary execution of code in Nokogiri | A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4. | {'CVE-2019-5477'} | 2021-01-08T20:59:55Z | 2019-08-19T19:27:23Z | HIGH | 0 | {'CWE-78'} | {'https://hackerone.com/reports/650835', 'https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc', 'https://github.com/sparklemotion/nokogiri/issues/1915', 'https://github.com/advisories/GHSA-cr5j-953j-xw5p', 'https://security.gentoo.org/glsa/202006-05', 'https://usn.ubuntu.com/4175-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5477', 'https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html'} | null |
GHSA | GHSA-f2c5-997w-7f5c | Cross-site Scripting in peertube | peertube is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). It was found that one could upload a SVG image and then send the url of that to other users and when they open the link we can get their complete session keys as the session keys stored in local storage and with Javascript easily can be stolen by attackers. | {'CVE-2021-3780'} | 2021-09-24T13:07:20Z | 2021-09-20T20:42:41Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6', 'https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65', 'https://github.com/advisories/GHSA-f2c5-997w-7f5c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3780'} | null |
GHSA | GHSA-qjf4-7642-c57p | Downloads Resources over HTTP in unicode | Affected versions of `unicode` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Update to version 9.0.0 or later. | {'CVE-2016-10578'} | 2021-01-08T21:18:43Z | 2019-02-18T23:51:52Z | HIGH | 0 | {'CWE-311'} | {'https://www.npmjs.com/advisories/161', 'https://nodesecurity.io/advisories/161', 'https://github.com/advisories/GHSA-qjf4-7642-c57p', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10578'} | null |
GHSA | GHSA-h6xx-pmxh-3wgp | Improper Authentication in etcd | etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway. | {'CVE-2018-16886'} | 2022-04-12T22:41:39Z | 2022-02-15T01:57:18Z | HIGH | 8.1 | {'CWE-287', 'CWE-285'} | {'https://access.redhat.com/errata/RHSA-2019:0237', 'https://github.com/etcd-io/etcd/commit/0191509637546621d6f2e18e074e955ab8ef374d', 'https://github.com/etcd-io/etcd/pull/10366', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/', 'https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/', 'http://www.securityfocus.com/bid/106540', 'https://github.com/advisories/GHSA-h6xx-pmxh-3wgp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16886', 'https://access.redhat.com/errata/RHSA-2019:1352', 'https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.3.md#security-authentication', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886', 'https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.2.md#security-authentication'} | null |
GHSA | GHSA-488m-6gh8-9j36 | Moderate severity vulnerability that affects bracket-template | bracket-template suffers from reflected XSS possible when variable passed via GET parameter is used in template | {'CVE-2018-3735'} | 2021-01-08T19:56:12Z | 2018-07-27T17:05:06Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-488m-6gh8-9j36', 'https://hackerone.com/reports/317125', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3735'} | null |
GHSA | GHSA-h9q8-5gv2-v6mg | Potential Session Hijacking | ### Impact
Potential session hijacking of store customers.
### Patches
We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021 | null | 2021-03-12T23:09:08Z | 2021-03-12T23:09:08Z | LOW | 0 | {'CWE-613'} | {'https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg', 'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e', 'https://github.com/advisories/GHSA-h9q8-5gv2-v6mg', 'https://packagist.org/packages/shopware/platform'} | null |
GHSA | GHSA-mx3x-ghqm-r43h | Prototype pollution vulnerability in 'predefine' | Prototype pollution vulnerability in 'predefine' versions 0.0.0 through 0.1.2 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2020-28280'} | 2021-10-12T16:27:18Z | 2021-10-12T16:27:18Z | CRITICAL | 9.8 | null | {'https://github.com/bigpipe/predefine/blob/238137e3d1b8288ff5d7529c3cbcdd371888c26b/index.js#L284', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28280', 'https://github.com/advisories/GHSA-mx3x-ghqm-r43h', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280'} | null |
GHSA | GHSA-95rw-fx8r-36v6 | Cross-site Scripting in Django | The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS. | {'CVE-2022-22818'} | 2022-02-24T13:07:20Z | 2022-02-04T00:00:33Z | MODERATE | 6.1 | {'CWE-79'} | {'https://security.netapp.com/advisory/ntap-20220221-0003/', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22818', 'https://www.djangoproject.com/weblog/2022/feb/01/security-releases/', 'https://groups.google.com/forum/#!forum/django-announce', 'https://github.com/advisories/GHSA-95rw-fx8r-36v6'} | null |
GHSA | GHSA-gx73-2498-r55c | Unsound casting in flatbuffers | An issue was discovered in the flatbuffers crate before 0.6.1 for Rust. Arbitrary bytes can be reinterpreted as a bool, defeating soundness. | {'CVE-2019-25004'} | 2021-08-25T20:46:49Z | 2021-08-25T20:46:49Z | CRITICAL | 9.8 | {'CWE-704'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-25004', 'https://github.com/google/flatbuffers/issues/5530', 'https://rustsec.org/advisories/RUSTSEC-2019-0028.html', 'https://github.com/advisories/GHSA-gx73-2498-r55c'} | null |
GHSA | GHSA-2x7v-w2mv-f3rx | Improper Authentication in Atlassian Connect Spring Boot | Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app. | {'CVE-2021-26077'} | 2021-06-16T17:23:12Z | 2021-06-16T17:23:12Z | HIGH | 8.8 | {'CWE-287'} | {'https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072', 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1063555147', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26077', 'https://github.com/advisories/GHSA-2x7v-w2mv-f3rx'} | null |
GHSA | GHSA-v569-g72v-q434 | Low severity vulnerability that affects org.apache.hadoop:hadoop-main | In Apache Hadoop 3.0.0-alpha1 to 3.0.0, 2.9.0, 2.8.0 to 2.8.3, and 2.5.0 to 2.7.5, HDFS exposes extended attribute key/value pairs during listXAttrs, verifying only path-level search access to the directory rather than path-level read permission to the referent. | {'CVE-2018-1296'} | 2021-09-20T15:10:34Z | 2019-02-12T17:26:12Z | HIGH | 7.5 | {'CWE-200'} | {'http://www.securityfocus.com/bid/106764', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1296', 'https://github.com/advisories/GHSA-v569-g72v-q434', 'https://lists.apache.org/thread.html/a5b15bc76fbdad2ee40761aacf954a13aeef67e305f86d483f267e8e@%3Cuser.hadoop.apache.org%3E'} | null |
GHSA | GHSA-m22m-h4rf-pwq3 | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Prior to version 1.3.3, a TAR file entry `../evil.txt` may be extracted in the parent directory of `destFolder`. This leads to arbitrary file write that may lead to code execution. The vulnerability was patched in version 1.3.3. | {'CVE-2021-32840'} | 2022-02-08T19:45:31Z | 2022-02-01T16:22:50Z | HIGH | 7.3 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32840', 'https://github.com/advisories/GHSA-m22m-h4rf-pwq3', 'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'} | null |
GHSA | GHSA-p82g-2xpp-m5r3 | Cross-Site Scripting in dojo | Versions of `dojo` prior to 1.2.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize HTML code in user-controlled input, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 1.2.0 or later. | {'CVE-2015-5654'} | 2021-09-28T16:55:58Z | 2020-09-11T21:18:05Z | MODERATE | 5.4 | {'CWE-79'} | {'http://www-01.ibm.com/support/docview.wss?uid=swg21975256', 'https://www.npmjs.com/advisories/973', 'http://jvn.jp/en/jp/JVN13456571/index.html', 'http://www.securitytracker.com/id/1034848', 'https://snyk.io/vuln/SNYK-JS-DOJO-174933', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5654', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000153', 'https://github.com/advisories/GHSA-p82g-2xpp-m5r3', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5654', 'http://www.securityfocus.com/bid/77026'} | null |
GHSA | GHSA-4gp3-p7ph-x2jr | OS Command Injection in devcert-sanscache | devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization. | {'CVE-2019-10778'} | 2021-08-23T15:12:52Z | 2020-04-14T23:09:00Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/advisories/GHSA-4gp3-p7ph-x2jr', 'https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926', 'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10778'} | null |
GHSA | GHSA-hvpr-9cr6-q5v7 | High severity vulnerability that affects org.apache.camel:camel-snakeyaml | Apache Camel's camel-snakeyaml component is vulnerable to Java object de-serialization vulnerability. De-serializing untrusted data can lead to security flaws. | {'CVE-2017-3159'} | 2021-09-14T17:30:28Z | 2018-10-16T17:21:42Z | HIGH | 9.8 | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2017:0868', 'http://camel.apache.org/security-advisories.data/CVE-2017-3159.txt.asc?version=1&modificationDate=1486565167000&api=v2', 'http://www.openwall.com/lists/oss-security/2017/05/22/2', 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3159', 'http://www.securityfocus.com/bid/96321', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://github.com/advisories/GHSA-hvpr-9cr6-q5v7', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'} | null |
GHSA | GHSA-33wf-4crm-2322 | Improper Access Control in librenms | Improper Access Control in Packagist librenms/librenms prior to 22.2.0. | {'CVE-2022-0580'} | 2022-02-24T12:12:44Z | 2022-02-16T00:01:58Z | HIGH | 7.1 | {'CWE-284'} | {'https://github.com/advisories/GHSA-33wf-4crm-2322', 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0580', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://huntr.dev/bounties/2494106c-7703-4558-bb1f-1eae59d264e3'} | null |
GHSA | GHSA-7hjp-97g3-rq93 | Moderate severity vulnerability that affects net.mingsoft:ms-mcms | An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter. | {'CVE-2018-18831'} | 2021-09-03T19:20:00Z | 2018-11-01T14:47:04Z | HIGH | 7.5 | {'CWE-22'} | {'https://gitee.com/mingSoft/MCMS/issues/IO0K0', 'https://github.com/advisories/GHSA-7hjp-97g3-rq93', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18831'} | null |
GHSA | GHSA-3h5r-928v-mxhh | Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11 | Missing check in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message.
- https://vaadin.com/security/cve-2018-25007 | null | 2021-10-08T21:24:02Z | 2021-04-19T14:49:13Z | LOW | 2.6 | {'CWE-754'} | {'https://github.com/vaadin/platform/security/advisories/GHSA-3h5r-928v-mxhh', 'https://vaadin.com/security/cve-2018-25007', 'https://github.com/advisories/GHSA-3h5r-928v-mxhh'} | null |
GHSA | GHSA-3mpr-hq3p-49h9 | Prototype Pollution in mixin-deep | Versions of `mixin-deep` before 1.3.1 are vulnerable to prototype pollution via merging functions.
## Recommendation
Update to version 1.3.1 or later. | {'CVE-2018-3719'} | 2021-01-08T20:00:26Z | 2018-07-26T15:10:54Z | LOW | 0 | {'CWE-471'} | {'https://hackerone.com/reports/311236', 'https://www.npmjs.com/advisories/578', 'https://github.com/advisories/GHSA-3mpr-hq3p-49h9', 'https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3719'} | null |
GHSA | GHSA-wph3-44rj-92pr | Multiple vulnerabilities leading to RCE | ### Impact
We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration.
### Patches
The issues were addressed in our last release, 2.1.59.
### Workarounds
If you can't update to 2.1.59, make sure your connector is not exposed without authentication.
### Reference
Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time.
### For more information
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to vulnerability.research@sonarsource.com;
- The maintainers, by opening an issue on this repository. | {'CVE-2021-32682'} | 2022-04-19T19:02:59Z | 2021-06-16T17:04:29Z | CRITICAL | 9.8 | {'CWE-918', 'CWE-22', 'CWE-78'} | {'https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr', 'https://github.com/advisories/GHSA-wph3-44rj-92pr', 'http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html', 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr', 'https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32682'} | null |
GHSA | GHSA-636j-7x7r-gvw2 | Old sessions not blocked by login enable function in Snipe-IT | Snipe-IT is a FOSS project for asset management in IT Operations. In Snipe-IT versions 5.4.1 and 6.0.0-RC-5 and prior, active sessions are not revoked when a user account is disabled, allowing that user to still access information that they should no longer be able to. Workarounds include using the KillAllSessions console command, clearing the contents of the storage/framework/sessions directory, or changing the cookie name, but all of those options logout ALL users, which could be kind of annoying. This issue is fixed in versions 6.0.0-RC-6 and 5.4.2. | {'CVE-2022-1155'} | 2022-04-13T13:28:22Z | 2022-03-31T00:00:22Z | HIGH | 7.4 | {'CWE-613'} | {'https://huntr.dev/bounties/ebc26354-2414-4f72-88aa-f044aec2b2e1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1155', 'https://github.com/advisories/GHSA-636j-7x7r-gvw2', 'https://github.com/snipe/snipe-it/releases/tag/v6.0.0-RC-6', 'https://github.com/snipe/snipe-it/pull/10876', 'https://github.com/snipe/snipe-it/commit/bdabbbd4e98e88ee01e728ceb4fd512661fbd38d', 'https://github.com/snipe/snipe-it/releases/tag/v5.4.2'} | null |
GHSA | GHSA-ww4j-c2rq-47q8 | Command injection in ts-process-promises | This affects all versions of package ts-process-promises. The injection point is located in line 45 in main entry of package in lib/process-promises.js. | {'CVE-2020-7784'} | 2021-01-20T19:19:17Z | 2021-01-13T18:22:28Z | CRITICAL | 0 | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7784', 'https://github.com/advisories/GHSA-ww4j-c2rq-47q8', 'https://snyk.io/vuln/SNYK-JS-TSPROCESSPROMISES-1048334'} | null |
GHSA | GHSA-ww4x-rwq6-qpgf | Cross-site Request Forgery in OmniAuth | The request phase of the OmniAuth Ruby gem is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.
There is currently no fixed version of this package, however there is a recommended remediation described [here](https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284). | {'CVE-2015-9284'} | 2020-11-11T00:31:47Z | 2019-05-29T19:11:31Z | HIGH | 0 | {'CWE-352'} | {'https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284', 'https://www.openwall.com/lists/oss-security/2015/05/26/11', 'https://github.com/omniauth/omniauth/pull/809', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9284', 'https://github.com/advisories/GHSA-ww4x-rwq6-qpgf', 'https://github.com/omniauth/omniauth-rails/pull/1'} | null |
GHSA | GHSA-xx68-jfcg-xmmf | High severity vulnerability that affects commons-fileupload:commons-fileupload | MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions. | {'CVE-2014-0050'} | 2021-07-19T16:42:07Z | 2018-12-21T17:51:42Z | HIGH | 0 | {'CWE-20'} | {'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755', 'http://tomcat.apache.org/security-7.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676410', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676092', 'http://www-01.ibm.com/support/docview.wss?uid=swg21681214', 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:084', 'http://www-01.ibm.com/support/docview.wss?uid=swg21677724', 'http://secunia.com/advisories/59187', 'http://www.ubuntu.com/usn/USN-2130-1', 'http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html', 'http://rhn.redhat.com/errata/RHSA-2014-0253.html', 'http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm', 'http://www.securityfocus.com/archive/1/534161/100/0/threaded', 'http://secunia.com/advisories/57915', 'http://secunia.com/advisories/60753', 'http://www.vmware.com/security/advisories/VMSA-2014-0007.html', 'http://www.vmware.com/security/advisories/VMSA-2014-0008.html', 'http://secunia.com/advisories/59399', 'http://svn.apache.org/r1565143', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676403', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0050', 'http://secunia.com/advisories/58976', 'http://secunia.com/advisories/59039', 'http://secunia.com/advisories/59041', 'http://jvn.jp/en/jp/JVN14876762/index.html', 'https://github.com/advisories/GHSA-xx68-jfcg-xmmf', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676405', 'http://secunia.com/advisories/60475', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917', 'http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html', 'http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html', 'http://secunia.com/advisories/59500', 'http://www.securityfocus.com/bid/65400', 'http://www-01.ibm.com/support/docview.wss?uid=swg21677691', 'http://www.debian.org/security/2014/dsa-2856', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676401', 'http://secunia.com/advisories/59725', 'http://secunia.com/advisories/59185', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'http://rhn.redhat.com/errata/RHSA-2014-0252.html', 'http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907@apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676091', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html', 'http://marc.info/?l=bugtraq&m=143136844732487&w=2', 'http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017', 'http://www.vmware.com/security/advisories/VMSA-2014-0012.html', 'http://secunia.com/advisories/59232', 'http://secunia.com/advisories/59492', 'http://secunia.com/advisories/58075', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675432', 'http://www.securityfocus.com/archive/1/532549/100/0/threaded', 'http://secunia.com/advisories/59183', 'http://secunia.com/advisories/59184', 'http://seclists.org/fulldisclosure/2014/Dec/23', 'http://tomcat.apache.org/security-8.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21669554', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676656', 'http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html', 'http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html', 'http://rhn.redhat.com/errata/RHSA-2014-0400.html', 'http://advisories.mageia.org/MGASA-2014-0110.html', 'http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1062337', 'http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676853'} | null |
GHSA | GHSA-4x25-f45x-grv5 | Missing encryption in Apache Directory Studio | While investigating DIRSTUDIO-1219 it was noticed that configured StartTLS encryption was not applied when any SASL authentication mechanism (DIGEST-MD5, GSSAPI) was used. While investigating DIRSTUDIO-1220 it was noticed that any configured SASL confidentiality layer was not applied. This issue affects Apache Directory Studio version 2.0.0.v20210213-M16 and prior versions. | {'CVE-2021-33900'} | 2021-08-10T16:54:25Z | 2021-08-09T20:40:53Z | HIGH | 7.5 | {'CWE-311'} | {'https://github.com/advisories/GHSA-4x25-f45x-grv5', 'https://lists.apache.org/thread.html/rb1dbcc43a5b406e45d335343a1704f4233de613140a01929d102fdc9%40%3Cusers.directory.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33900'} | null |
GHSA | GHSA-5pv8-ppvj-4h68 | Prevent user enumeration using Guard or the new Authenticator-based Security | Description
-----------
The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authenticating a non-existing user.
Resolution
----------
We now ensure that 403s are returned whether the user exists or not if the password is invalid or if the user does not exist.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011) for branch 3.4.
Credits
-------
I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue. | {'CVE-2021-21424'} | 2022-04-19T19:02:57Z | 2021-05-13T20:23:02Z | MODERATE | 5.3 | {'CWE-200'} | {'https://github.com/symfony/symfony/security/advisories/GHSA-5pv8-ppvj-4h68', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH7TMM5CHQYBFFGXWRPJDPB3SKCZXI2M/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UC7BND775DVZDQT3RMGD2HVB2PKLJDJW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KENRNLB3FYXYGDWRBH2PDBOZZKOD7VY4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VRUS2H2SSOQWNLBD35SKIWIDQEMV2PD3/', 'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21424', 'https://github.com/advisories/GHSA-5pv8-ppvj-4h68'} | null |
GHSA | GHSA-7vq3-wcjw-3fxh | Directory Traversal in lab6.brit95 | Affected versions of `lab6.brit95` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16140'} | 2021-01-08T19:14:09Z | 2018-07-23T20:48:53Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/475', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6.brit95', 'https://github.com/advisories/GHSA-7vq3-wcjw-3fxh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16140', 'https://nodesecurity.io/advisories/475'} | null |
GHSA | GHSA-4v37-24gm-h554 | Cross-Site Request Forgery (CSRF) Protection Bypass Vulnerability in CodeIgniter4 | ### Impact
This vulnerability might allow remote attackers to bypass the CodeIgniter4 CSRF protection mechanism.
### Patches
Upgrade to v4.1.9 or later.
### Workarounds
These are workarounds for this vulnerability, but **you will still need to code as these after upgrading to v4.1.9**.
Otherwise, the CSRF protection may be bypassed.
#### When Auto-Routing is Enabled
1. Check the request method in the controller method before processing.
E.g.:
```php
if (strtolower($this->request->getMethod()) !== 'post') {
return $this->response->setStatusCode(405)->setBody('Method Not Allowed');
}
```
#### When Auto-Routing is Disabled
Do one of the following:
1. Do not use `$routes->add()`, and [use HTTP verbs in routes](https://codeigniter4.github.io/userguide/incoming/routing.html#using-http-verbs-in-routes).
2. Check the request method in the controller method before processing.
E.g.:
```php
if (strtolower($this->request->getMethod()) !== 'post') {
return $this->response->setStatusCode(405)->setBody('Method Not Allowed');
}
```
### References
- [CodeIgniter4 CSRF protection](https://codeigniter4.github.io/userguide/libraries/security.html#cross-site-request-forgery-csrf)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
| {'CVE-2022-24712'} | 2022-03-01T22:50:08Z | 2022-03-01T21:47:28Z | MODERATE | 6.3 | {'CWE-352'} | {'https://github.com/codeigniter4/CodeIgniter4/blob/7dc2ece32401ebde67122f7d2460efcaee7c352e/user_guide_src/source/changelogs/v4.1.9.rst', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-4v37-24gm-h554', 'https://github.com/advisories/GHSA-4v37-24gm-h554', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24712'} | null |
GHSA | GHSA-83rx-c8cr-6j8q | Insecure Default Configuration in tesseract.js | Versions of `tesseract.js` prior to 1.0.19 default to using a third-party proxy. Requests may be proxied through `crossorigin.me` which clearly states is not suitable for production use. This may lead to instability and privacy violations.
## Recommendation
Upgrade to version 1.0.19 or later. | null | 2021-08-04T21:33:59Z | 2019-06-05T20:48:55Z | MODERATE | 5.9 | {'CWE-829'} | {'https://github.com/naptha/tesseract.js/pull/267', 'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28', 'https://snyk.io/vuln/SNYK-JS-TESSERACTJS-174085', 'https://www.npmjs.com/advisories/792', 'https://github.com/advisories/GHSA-83rx-c8cr-6j8q'} | null |
GHSA | GHSA-27j5-4p9v-pp67 | `std::abort` raised from `TensorListReserve` | ### Impact
Providing a negative element to `num_elements` list argument of `tf.raw_ops.TensorListReserve` causes the runtime to abort the process due to reallocating a `std::vector` to have a negative number of elements:
```python
import tensorflow as tf
tf.raw_ops.TensorListReserve(
element_shape = tf.constant([1]),
num_elements=tf.constant([-1]),
element_dtype = tf.int32)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/list_kernels.cc#L312) calls `std::vector.resize()` with the new size controlled by input given by the user, without checking that this input is valid.
### Patches
We have patched the issue in GitHub commit [8a6e874437670045e6c7dc6154c7412b4a2135e2](https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37644'} | 2021-08-25T14:43:40Z | 2021-08-25T14:43:40Z | MODERATE | 5.5 | {'CWE-617'} | {'https://github.com/advisories/GHSA-27j5-4p9v-pp67', 'https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27j5-4p9v-pp67', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37644'} | null |
GHSA | GHSA-37cf-r3w2-gjfw | django-nopassword stores secrets in cleartext | django-nopassword before 5.0.0 stores cleartext secrets in the database. | {'CVE-2019-10682'} | 2021-07-28T21:27:01Z | 2020-06-05T16:09:19Z | HIGH | 7.5 | {'CWE-312', 'CWE-522'} | {'https://github.com/relekang/django-nopassword/compare/v4.0.1...v5.0.0', 'https://github.com/relekang/django-nopassword/blob/8e8cfc765ee00adfed120c2c79bf71ef856e9022/nopassword/models.py#L14', 'https://github.com/advisories/GHSA-37cf-r3w2-gjfw', 'https://github.com/relekang/django-nopassword/commit/d8b4615f5fbfe3997d96cf4cb3e342406396193c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10682'} | null |
GHSA | GHSA-rjqq-98f6-6j3r | Improper Input Validation in sanitize-html | Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option. | {'CVE-2021-26539'} | 2022-04-27T19:14:13Z | 2021-05-06T16:10:05Z | MODERATE | 5.3 | {'CWE-20'} | {'https://github.com/apostrophecms/sanitize-html/pull/458', 'https://advisory.checkmarx.net/advisory/CX-2021-4308', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26539', 'https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#231-2021-01-22', 'https://github.com/advisories/GHSA-rjqq-98f6-6j3r'} | null |
GHSA | GHSA-g2c4-4m64-vxm3 | Malicious Package in buffer-yor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T21:25:12Z | 2020-09-03T22:15:25Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1254', 'https://github.com/advisories/GHSA-g2c4-4m64-vxm3'} | null |
GHSA | GHSA-pfj7-w373-gqch | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3900'} | 2021-10-29T13:49:08Z | 2021-10-28T23:14:21Z | MODERATE | 6.5 | {'CWE-352'} | {'https://github.com/advisories/GHSA-pfj7-w373-gqch', 'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635', 'https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3900'} | null |
GHSA | GHSA-p2q9-9cq6-h3jw | Out of bounds read in Ozone | An issue was discovered in the ozone crate through 2020-07-04 for Rust. Memory safety is violated because of out-of-bounds access. | {'CVE-2020-35877'} | 2021-08-25T20:47:46Z | 2021-08-25T20:47:46Z | CRITICAL | 9.8 | {'CWE-119'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35877', 'https://github.com/advisories/GHSA-p2q9-9cq6-h3jw'} | null |
GHSA | GHSA-8wx2-9q48-vm9r | RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application | In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input. | {'CVE-2020-5398'} | 2021-10-21T21:15:16Z | 2020-01-21T20:59:09Z | HIGH | 7.5 | {'CWE-79', 'CWE-494'} | {'https://lists.apache.org/thread.html/r4639e821ef9ca6ca10887988f410a60261400a7766560e7a97a22efc@%3Ccommits.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r7361bfe84bde9d233f9800c3a96673e7bd81207549ced0236f07a29d@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r1accbd4f31ad2f40e1661d70a4510a584eb3efd1e32e8660ccf46676@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r1bc5d673c01cfbb8e4a91914e9748ead3e5f56b61bca54d314c0419b@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210917-0006/', 'https://lists.apache.org/thread.html/r9fb1ee08cf337d16c3364feb0f35a072438c1a956afd7b77859aa090@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rdcaadaa9a68b31b7d093d76eacfaacf6c7a819f976b595c75ad2d4dc@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E', 'https://github.com/advisories/GHSA-8wx2-9q48-vm9r', 'https://lists.apache.org/thread.html/ra996b56e1f5ab2fed235a8b91fa0cc3cf34c2e9fee290b7fa4380a0d@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r7d5e518088e2e778928b02bcd3be3b948b59acefe2f0ebb57ec2ebb0@%3Ccommits.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r2dfd5b331b46d3f90c4dd63a060e9f04300468293874bd7e41af7163@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r712a6fce928e24e7b6ec30994a7e115a70f1f6e4cf2c2fbf0347ce46@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r028977b9b9d44a89823639aa3296fb0f0cfdd76b4450df89d3c4fbbf@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r8cc37a60a5056351377ee5f1258f2a4fdd39822a257838ba6bcc1e88@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rab0de39839b4c208dcd73f01e12899dc453361935a816a784548e048@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf8dc72b974ee74f17bce661ea7d124e733a1f4c4f236354ac0cf48e8@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r6dac0e365d1b2df9a7ffca12b4195181ec14ff0abdf59e1fdb088ce5@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r3765353ff434fd00d8fa5a44734b3625a06eeb2a3fb468da7dfae134@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r0f3530f7cb510036e497532ffc4e0bd0b882940448cf4e233994b08b@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rb4d1fc078f086ec2e98b2693e8b358e58a6a4ef903ceed93a1ee2b18@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/reaa8a6674baf2724b1b88a621b0d72d9f7a6f5577c88759842c16eb6@%3Ccommits.karaf.apache.org%3E', 'https://pivotal.io/security/cve-2020-5398', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5398', 'https://lists.apache.org/thread.html/r8736185eb921022225a83e56d7285a217fd83f5524bd64a6ca3bf5cc@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r0f2d0ae1bad2edb3d4a863d77f3097b5e88cfbdae7b809f4f42d6aad@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6@%3Cdev.rocketmq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r4b1886e82cc98ef38f582fef7d4ea722e3fcf46637cd4674926ba682@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc05acaacad089613e9642f939b3a44f7199b5537493945c3e045287f@%3Cdev.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r74f81f93a9b69140fe41e236afa7cbe8dfa75692e7ab31a468fddaa0@%3Ccommits.karaf.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-c27r-x354-4m68 | HMAC-SHA1 signatures can bypass validation via key confusion | ### Impact
An attacker can inject an HMAC-SHA1 signature that is valid using only knowledge of the RSA public key. This allows bypassing signature validation.
### Patches
Version 2.0.0 has the fix.
### Workarounds
The recommendation is to upgrade. In case that is not possible remove the 'http://www.w3.org/2000/09/xmldsig#hmac-sha1' entry from SignedXml.SignatureAlgorithms. | null | 2022-04-19T19:02:39Z | 2020-10-27T20:39:46Z | HIGH | 0 | {'CWE-287'} | {'https://github.com/yaronn/xml-crypto/security/advisories/GHSA-c27r-x354-4m68', 'https://github.com/advisories/GHSA-c27r-x354-4m68', 'https://www.npmjs.com/package/xml-crypto', 'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100'} | null |
GHSA | GHSA-8fqx-7pv4-3jwm | Moderate severity vulnerability that affects rails | Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain. | {'CVE-2008-7248'} | 2021-09-07T17:26:14Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-20'} | {'http://www.openwall.com/lists/oss-security/2009/11/28/1', 'http://www.vupen.com/english/advisories/2009/2544', 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en', 'http://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html', 'https://github.com/advisories/GHSA-8fqx-7pv4-3jwm', 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html', 'http://secunia.com/advisories/36600', 'http://www.openwall.com/lists/oss-security/2009/12/02/2', 'http://secunia.com/advisories/38915', 'http://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/', 'https://nvd.nist.gov/vuln/detail/CVE-2008-7248', 'http://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1'} | null |
GHSA | GHSA-wrx7-qgmj-mf2q | Server-Side Request Forgery in Apache Kylin | All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2. | {'CVE-2021-27738'} | 2022-01-08T00:43:04Z | 2022-01-08T00:43:04Z | MODERATE | 0 | {'CWE-918'} | {'http://www.openwall.com/lists/oss-security/2022/01/06/6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27738', 'https://github.com/advisories/GHSA-wrx7-qgmj-mf2q', 'https://github.com/apache/kylin/pull/1646', 'https://lists.apache.org/thread/vkohh0to2vzwymyb2x13fszs3cs3vd70'} | null |
GHSA | GHSA-9fcp-vcq9-9h2h | Moderate severity vulnerability that affects org.craftercms:crafter-studio | A Server-Side Template Injection issue was discovered in Crafter CMS 3.0.18. Attackers with developer privileges may execute OS commands by Creating/Editing a template file (.ftl filetype) that triggers a call to freemarker.template.utility.Execute in the FreeMarker library during rendering of a web page. | {'CVE-2018-19907'} | 2021-09-07T21:26:46Z | 2018-12-19T19:24:18Z | HIGH | 8.8 | {'CWE-78'} | {'https://github.com/advisories/GHSA-9fcp-vcq9-9h2h', 'https://github.com/craftercms/craftercms/issues/2677', 'https://medium.com/@buxuqua/rce-vulnerability-in-crafter-cms-server-side-template-injection-19d8708ce242', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19907'} | null |
GHSA | GHSA-qmxf-fxq7-w59f | Malicious Package in angular-material-sidenav-rnd | Version 0.1.1 of `angular-material-sidenav-rnd` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | null | 2021-09-24T14:46:01Z | 2020-09-01T19:43:53Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/sovanna/angular-material-sidenav', 'https://snyk.io/vuln/SNYK-JS-ANGULARMATERIALSIDENAVRND-451015', 'https://github.com/advisories/GHSA-qmxf-fxq7-w59f', 'https://github.com/musabgosset/angular-material-sidenav', 'https://www.npmjs.com/advisories/615'} | null |
GHSA | GHSA-x92h-wmg2-6hp7 | Invalid HTTP method overrides allow possible XSS or other attacks in Symfony | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation. | {'CVE-2019-10913'} | 2021-08-19T15:18:28Z | 2019-12-02T18:10:24Z | CRITICAL | 9.8 | {'CWE-89', 'CWE-79'} | {'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml', 'https://github.com/advisories/GHSA-x92h-wmg2-6hp7', 'https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides', 'https://symfony.com/cve-2019-10913', 'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10913'} | null |
GHSA | GHSA-2f5v-8r3f-8pww | Improper access control allows admin privilege escalation in Argo CD | ### Impact
#### Impacts for versions starting with v1.0.0
All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.
To perform the following exploits, an authorized Argo CD user must have push access to an Application's source git or Helm repository or `sync` _and_ `override` access to an Application. Once a user has that access, different exploitation levels are possible depending on their other RBAC privileges:
1. If that user has `update` access to the Application, they can modify any resource on the Application's destination cluster. If the destination cluster is or can be made to be the same as the cluster hosting Argo CD, the user can escalate their Argo CD permissions to admin-level.
2. If the user has `delete` access to the Application, they can delete any resource on the Application's destination cluster. (This exploit is possible starting with v0.8.0.)
3. If the user has `get` access to the Application, they can view any resource on the Application's destination cluster (except for the contents of Secrets) and list [actions](https://argo-cd.readthedocs.io/en/stable/operator-manual/resource_actions/) available for that resource.
4. If the user has `get` access to the Application, they can view the logs of any Pods on the Application's destination cluster.
5. If the user has `action/{some action or *}` access on the Application, they can run an action for any resource (which supports the allowed action(s)) on the Application's destination cluster. (Some actions are available in Argo CD by default, and others may be configured by an Argo CD admin.)
See the [Argo CD RBAC documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#rbac-resources-and-actions) for an explanation of the privileges available in Argo CD.
##### Events exploit
A related exploit is possible for a user with `get` access to an Application **even if they do not have access to the Application's source git or Helm repository or `sync` and `override` access to the Application**. The user can access any Event in the Application's destination cluster if they know the involved object's name, UID, and namespace.
#### Impacts for versions starting with v0.8.0
The same bug exists starting with v0.8.0, but only the following exploits were possible before v1.0.0:
* The `delete` exploit (#⁠2 above).
* The logs exploit (#⁠4 above).
* The Events exploit described above.
#### Impacts for versions starting with v0.5.0
The same bug exists starting with v0.5.0 (when RBAC was implemented), but only the Events exploit described above was possible before v0.8.0.
### Patches
A patch for this vulnerability has been released in the following Argo CD versions:
* v2.3.2
* v2.2.8
* v2.1.14
**Versions 2.0.x and earlier users:** See the [changelog](https://github.com/argoproj/argo-cd/blob/master/CHANGELOG.md) for links to upgrade instructions for your version. It is imperative to upgrade quickly, but some limited mitigations are described in the next section.
**argo-helm chart users:** Argo CD users deploying v2.3.x with [argo-helm](https://github.com/argoproj/argo-helm) can upgrade the chart to version 4.2.2. Argo CD 2.2 and 2.1 users can set the `global.image.tag` value to the latest in your current release series (`v2.2.8`, or `v2.1.14`). Since charts for the 2.2 and 2.1 series are no longer maintained, you will need to either leave the value override in place or upgrade to the 4.x chart series (and therefore to Argo CD 2.3).
### Workarounds
The only certain way to avoid the vulnerability is to upgrade.
#### Mitigations
* To avoid privilege escalation:
* Limit who has push access to Application source repositories or `sync` + `override` access to Applications.
* Limit which repositories are available in [projects](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/) where users have `update` access to Applications.
* To avoid unauthorized resource inspection/tampering:
* Limit who has `delete`, `get`, or `action` access to Applications.
These mitigations can help limit potential damage, but they are _not_ a substitute for upgrading. It is necessary to upgrade immediately.
### References
* [Argo CD RBAC configuration documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#)
### For more information
Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
| {'CVE-2022-24768'} | 2022-04-04T20:40:45Z | 2022-03-24T00:18:54Z | CRITICAL | 9.9 | {'CWE-200', 'CWE-269'} | {'https://github.com/argoproj/argo-cd/releases/tag/v2.1.14', 'https://github.com/argoproj/argo-cd/releases/tag/v2.2.8', 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww', 'https://github.com/argoproj/argo-cd/releases/tag/v2.3.2', 'https://github.com/argoproj/argo-cd/commit/af03b291d4b7e9d3ce9a6580ae9c8141af0e05cf', 'https://github.com/advisories/GHSA-2f5v-8r3f-8pww', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24768'} | null |
GHSA | GHSA-jrmq-rv9w-63rv | Umbraco ApplicationURL Overwrite | Within the Umbraco CMS, a configuration element named "UmbracoApplicationUrl" (or just "ApplicationUrl") is used whenever application code needs to build a URL pointing back to the site. For example, when a user resets their password and the application builds a password reset URL or when the administrator invites users to the site. For Umbraco versions less than 9.2.0, if the Application URL is not specifically configured, the attacker can manipulate this value and store it persistently affecting all users for components where the "UmbracoApplicationUrl" is used. For example, the attacker is able to change the URL users receive when resetting their password so that it points to the attackers server, when the user follows this link the reset token can be intercepted by the attacker resulting in account takeover. | {'CVE-2022-22690'} | 2022-01-27T18:25:58Z | 2022-01-21T23:34:24Z | HIGH | 8.6 | {'CWE-444'} | {'https://github.com/advisories/GHSA-jrmq-rv9w-63rv', 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22690'} | null |
GHSA | GHSA-27rq-4943-qcwp | Insertion of Sensitive Information into Log File in Hashicorp go-getter | The Hashicorp go-getter library before 1.5.11 could write SSH credentials into its logfile, exposing sensitive credentials to local users able to read the logfile. | {'CVE-2022-29810'} | 2022-05-03T20:19:27Z | 2022-04-28T00:00:35Z | MODERATE | 0 | {'CWE-532'} | {'https://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc', 'https://github.com/hashicorp/go-getter/releases/tag/v1.5.11', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29810', 'https://github.com/advisories/GHSA-27rq-4943-qcwp', 'https://github.com/hashicorp/go-getter/pull/348'} | null |
GHSA | GHSA-2467-h365-j7hm | Improper Input Validation in Apache Solr | Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0. The Replication handler (https://lucene.apache.org/solr/guide/8_6/index-replication.html#http-api-commands-for-the-replicationhandler) allows commands backup, restore and deleteBackup. Each of these take a location parameter, which was not validated, i.e you could read/write to any location the solr user can access. | {'CVE-2020-13941'} | 2022-02-10T00:31:31Z | 2022-02-10T00:31:31Z | MODERATE | 8.8 | {'CWE-20'} | {'https://github.com/advisories/GHSA-2467-h365-j7hm', 'https://lists.apache.org/thread.html/rbcd9dff009ed19ffcc2b09784595fc1098fc802a5472f81795f893be@%3Ccommits.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13941', 'https://lists.apache.org/thread.html/rf54e7912b7d2b72c63ec54a7afa4adcbf16268dcc63253767dd67d60%40%3Cgeneral.lucene.apache.org%3E'} | null |
GHSA | GHSA-h3cq-j957-vhxg | Cross-site Scripting in fullpage.js | using fullpage.js you can create a anchor tag . But when put href in anchor then it does not sanitize the url which allow for a break in the context of anchor element and can add our new element. | {'CVE-2022-1330'} | 2022-04-22T20:26:50Z | 2022-04-13T00:00:16Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/08d2a6d0-772f-4b05-834e-86343f263c35', 'https://github.com/advisories/GHSA-h3cq-j957-vhxg', 'https://github.com/alvarotrigo/fullpage.js/commit/e7a5db42711700c8a584e61b5e532a64039fe92b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1330', 'https://github.com/alvarotrigo/fullPage.js/pull/4360'} | null |
GHSA | GHSA-724c-6vrf-99rq | Sensitive Data Exposure in loopback | Versions of `loopback` prior to 3.26.0 (3.x) and 2.42.0 (2.x) are vulnerable to Sensitive Data Exposure. Invalid API requests to the login endpoint may return information about the first user in the database. This can be used alongside other attacks for credential theft.
## Recommendation
If you're using `loopback` 3.x upgrade to version 3.26.0 or later.
If you're using `loopback` 2.x upgrade to version 2.42.0 or later. | null | 2021-09-27T22:31:27Z | 2020-09-02T21:49:48Z | LOW | 0 | {'CWE-200'} | {'https://github.com/strongloop/loopback/issues/4195', 'https://www.npmjs.com/advisories/915', 'https://github.com/advisories/GHSA-724c-6vrf-99rq', 'https://loopback.io/doc/en/sec/Security-advisory-06-17-2019.html'} | null |
GHSA | GHSA-x6ch-c6rv-f7wh | Malicious Package in asymc | All versions of `asymc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T13:46:50Z | 2020-09-02T18:34:22Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/841', 'https://github.com/advisories/GHSA-x6ch-c6rv-f7wh'} | null |
GHSA | GHSA-4pf7-579w-f4gm | Downloads Resources over HTTP in dwebp-bin | Affected versions of `dwebp-bin` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dwebp-bin`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10633'} | 2021-09-16T20:55:10Z | 2019-02-18T23:57:04Z | HIGH | 0 | {'CWE-311', 'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10633', 'https://www.npmjs.com/advisories/232', 'https://nodesecurity.io/advisories/232', 'https://github.com/advisories/GHSA-4pf7-579w-f4gm'} | null |
GHSA | GHSA-f268-65qc-98vg | Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. | {'CVE-2020-13943'} | 2022-02-09T23:04:16Z | 2022-02-09T23:03:53Z | MODERATE | 4.3 | {'CWE-200'} | {'https://www.debian.org/security/2021/dsa-4835', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00019.html', 'https://lists.apache.org/thread.html/r4a390027eb27e4550142fac6c8317cc684b157ae314d31514747f307%40%3Cannounce.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20201016-0007/', 'https://github.com/advisories/GHSA-f268-65qc-98vg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13943', 'https://www.oracle.com/security-alerts/cpuApr2021.html'} | null |
GHSA | GHSA-c57f-4vp2-jqhm | Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19 | Insecure temporary directory usage in frontend build functionality of `com.vaadin:flow-server` versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds.
- https://vaadin.com/security/cve-2021-31411 | null | 2021-10-05T16:29:36Z | 2021-05-06T15:27:04Z | MODERATE | 6.3 | {'CWE-379'} | {'https://github.com/vaadin/flow/security/advisories/GHSA-c57f-4vp2-jqhm', 'https://github.com/advisories/GHSA-c57f-4vp2-jqhm'} | null |
GHSA | GHSA-mh7g-99w9-xpjm | Remote code execution occurs in Apache Solr | Remote code execution occurs in Apache Solr before versions 5.5.5, 6.6.2 and 7.1.0 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr | {'CVE-2017-12629'} | 2022-04-27T15:06:44Z | 2018-10-17T19:56:17Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://access.redhat.com/errata/RHSA-2017:3452', 'https://s.apache.org/FJDl', 'https://access.redhat.com/errata/RHSA-2018:0004', 'https://lists.debian.org/debian-lts-announce/2018/01/msg00028.html', 'https://github.com/advisories/GHSA-mh7g-99w9-xpjm', 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0005', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201710.mbox/%3CCAOOKt51UO_6Vy%3Dj8W%3Dx1pMbLW9VJfZyFWz7pAnXJC_OAdSZubA%40mail.gmail.com%3E', 'https://access.redhat.com/errata/RHSA-2018:0003', 'https://www.debian.org/security/2018/dsa-4124', 'https://access.redhat.com/errata/RHSA-2017:3244', 'https://access.redhat.com/errata/RHSA-2017:3123', 'https://access.redhat.com/errata/RHSA-2017:3451', 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E', 'https://www.exploit-db.com/exploits/43009/', 'https://lists.apache.org/thread.html/r26c996b068ef6c5e89aa59acb769025cfd343a08e63fbe9e7f3f720f@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0002', 'https://access.redhat.com/errata/RHSA-2017:3124', 'http://www.securityfocus.com/bid/101261', 'https://twitter.com/ApacheSolr/status/918731485611401216', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12629', 'https://twitter.com/searchtools_avi/status/918904813613543424', 'https://twitter.com/joshbressers/status/919258716297420802', 'http://openwall.com/lists/oss-security/2017/10/13/1', 'https://usn.ubuntu.com/4259-1/'} | null |
GHSA | GHSA-wpvm-wqr4-p7cw | Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4 | It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin). | {'CVE-2021-26272'} | 2022-02-08T21:39:05Z | 2021-10-13T15:34:09Z | MODERATE | 6.5 | {'CWE-829'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-26272', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-wpvm-wqr4-p7cw', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416', 'https://ckeditor.com/blog/CKEditor-4.16-with-improved-image-pasting-High-Contrast-support-and-a-new-color-API/#security-comes-first', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-xpwp-rq3x-x6v7 | Critical severity vulnerability that affects recurly-api-client | The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources. | {'CVE-2017-0907'} | 2021-01-08T00:00:08Z | 2018-10-16T17:35:04Z | CRITICAL | 0 | {'CWE-918'} | {'https://github.com/advisories/GHSA-xpwp-rq3x-x6v7', 'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1', 'https://hackerone.com/reports/288635', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0907', 'https://dev.recurly.com/page/net-updates'} | null |
GHSA | GHSA-93q8-gq69-wqmw | Inefficient Regular Expression Complexity in chalk/ansi-regex | ansi-regex is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3807'} | 2022-05-02T21:01:45Z | 2021-09-20T20:20:09Z | HIGH | 7.5 | {'CWE-1333'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-93q8-gq69-wqmw', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311', 'https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994', 'https://github.com/chalk/ansi-regex/releases/tag/v6.0.1', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3807', 'https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908', 'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9'} | null |
GHSA | GHSA-v3cg-h3f6-2242 | Injection in MockServer | MockServer is open source software which enables easy mocking of any system you integrate with via HTTP or HTTPS. An attacker that can trick a victim into visiting a malicious site while running MockServer locally, will be able to run arbitrary code on the MockServer machine. With an overly broad default CORS configuration MockServer allows any site to send cross-site requests. Additionally, MockServer allows you to create dynamic expectations using Javascript or Velocity templates. Both engines may allow an attacker to execute arbitrary code on-behalf of MockServer. By combining these two issues (Overly broad CORS configuration + Script injection), an attacker could serve a malicious page so that if a developer running MockServer visits it, they will get compromised. For more details including a PoC see the referenced GHSL-2021-059. | {'CVE-2021-32827'} | 2022-02-08T21:01:18Z | 2021-08-30T16:24:38Z | MODERATE | 6.1 | {'CWE-74'} | {'https://securitylab.github.com/advisories/GHSL-2021-059-mockserver/', 'https://github.com/advisories/GHSA-v3cg-h3f6-2242', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32827', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-rrfq-g5fq-fc9c | Moderate severity vulnerability that affects org.apache.hive:hive-exec | In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use. | {'CVE-2018-11777'} | 2021-09-17T20:40:09Z | 2018-11-21T22:25:04Z | HIGH | 8.1 | null | {'https://github.com/advisories/GHSA-rrfq-g5fq-fc9c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11777', 'https://lists.apache.org/thread.html/963c8e2516405c9b532b4add16c03b2c5db621e0c83e80f45049cbbb@%3Cdev.hive.apache.org%3E', 'http://www.securityfocus.com/bid/105886'} | null |
GHSA | GHSA-p45v-v4pw-77jr | Division by 0 in `QuantizedBatchNormWithGlobalNormalization` | ### Impact
An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`:
```python
import tensorflow as tf
t = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.quint8)
t_min = tf.constant(-10.0, dtype=tf.float32)
t_max = tf.constant(-10.0, dtype=tf.float32)
m = tf.constant([], shape=[0], dtype=tf.quint8)
m_min = tf.constant(-10.0, dtype=tf.float32)
m_max = tf.constant(-10.0, dtype=tf.float32)
v = tf.constant([], shape=[0], dtype=tf.quint8)
v_min = tf.constant(-10.0, dtype=tf.float32)
v_max = tf.constant(-10.0, dtype=tf.float32)
beta = tf.constant([], shape=[0], dtype=tf.quint8)
beta_min = tf.constant(-10.0, dtype=tf.float32)
beta_max = tf.constant(-10.0, dtype=tf.float32)
gamma = tf.constant([], shape=[0], dtype=tf.quint8)
gamma_min = tf.constant(-10.0, dtype=tf.float32)
gamma_max = tf.constant(-10.0, dtype=tf.float32)
tf.raw_ops.QuantizedBatchNormWithGlobalNormalization(
t=t, t_min=t_min, t_max=t_max, m=m, m_min=m_min, m_max=m_max,
v=v, v_min=v_min, v_max=v_max, beta=beta, beta_min=beta_min,
beta_max=beta_max, gamma=gamma, gamma_min=gamma_min,
gamma_max=gamma_max, out_type=tf.qint32,
variance_epsilon=0.1, scale_after_normalization=True)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc) does not validate all constraints specified in the [op's contract](https://www.tensorflow.org/api_docs/python/tf/raw_ops/QuantizedBatchNormWithGlobalNormalization).
### Patches
We have patched the issue in GitHub commit [d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b](https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team | {'CVE-2021-29548'} | 2021-05-21T14:23:34Z | 2021-05-21T14:23:34Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-p45v-v4pw-77jr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29548', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p45v-v4pw-77jr', 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'} | null |
GHSA | GHSA-r6rj-9ch6-g264 | Prototype pollution in Merge-deep | The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library. | {'CVE-2021-26707'} | 2021-07-19T15:55:55Z | 2021-06-07T22:09:26Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://security.netapp.com/advisory/ntap-20210716-0008/', 'https://securitylab.github.com/advisories/GHSL-2020-160-merge-deep/', 'https://www.npmjs.com/package/merge-deep', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26707', 'https://github.com/advisories/GHSA-r6rj-9ch6-g264', 'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5'} | null |
GHSA | GHSA-6qj8-c27w-rp33 | Cross-site scripting in Apache Syncome EndUser | It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string. | {'CVE-2019-17557'} | 2022-01-06T19:38:07Z | 2022-01-06T19:38:07Z | LOW | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-17557', 'http://syncope.apache.org/security', 'https://github.com/advisories/GHSA-6qj8-c27w-rp33'} | null |
GHSA | GHSA-6wqp-v4v6-c87c | Deserialization of Untrusted Data | An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload. | {'CVE-2018-12023'} | 2021-08-30T14:16:00Z | 2020-06-15T18:44:51Z | HIGH | 7.5 | {'CWE-502'} | {'https://www.debian.org/security/2019/dsa-4452', 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12023', 'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:1107', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:3149', 'http://www.securityfocus.com/bid/105659', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://github.com/advisories/GHSA-6wqp-v4v6-c87c', 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/', 'https://github.com/FasterXML/jackson-databind/issues/2058', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1106'} | null |
GHSA | GHSA-c94w-c95p-phf8 | Integer overflow in Tensorflow | ### Impact
The [implementation of `OpLevelCostEstimator::CalculateTensorSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558) is vulnerable to an integer overflow if an attacker can create an operation which would involve a tensor with large enough number of elements:
```cc
int64_t OpLevelCostEstimator::CalculateTensorSize(
const OpInfo::TensorProperties& tensor, bool* found_unknown_shapes) {
int64_t count = CalculateTensorElementCount(tensor, found_unknown_shapes);
int size = DataTypeSize(BaseType(tensor.dtype()));
VLOG(2) << "Count: " << count << " DataTypeSize: " << size;
return count * size;
}
```
Here, `count` and `size` can be large enough to cause `count * size` to overflow.
### Patches
We have patched the issue in GitHub commit [fcd18ce3101f245b083b30655c27b239dc72221e](https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23575'} | 2022-02-11T20:46:29Z | 2022-02-10T00:32:59Z | MODERATE | 6.5 | {'CWE-190'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23575', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558', 'https://github.com/advisories/GHSA-c94w-c95p-phf8', 'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e'} | null |
GHSA | GHSA-34fr-fhqr-7235 | Information Disclosure in User Authentication | > ### Meta
> * CVSS: `AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C` (4.9)
### Problem
It has been discovered that user credentials have been logged as plaintext when explicitly using log level debug, which is not the _default_ configuration.
### Solution
Update to TYPO3 versions 7.6.52 ELTS, 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described.
### Credits
Thanks to Ingo Schmitt who reported this issue, and to TYPO3 core & security team member Benni Mack who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-012](https://typo3.org/security/advisory/typo3-core-sa-2021-012) | {'CVE-2021-32767'} | 2022-04-19T19:03:03Z | 2021-07-26T21:16:28Z | MODERATE | 5.3 | {'CWE-532'} | {'https://typo3.org/security/advisory/typo3-core-sa-2021-013', 'https://typo3.org/security/advisory/typo3-core-sa-2021-012', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-34fr-fhqr-7235', 'https://github.com/advisories/GHSA-34fr-fhqr-7235', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32767', 'https://github.com/TYPO3/typo3/security/advisories/GHSA-34fr-fhqr-7235'} | null |
GHSA | GHSA-cmgw-8vpc-rc59 | Segfault on strings tensors with mistmatched dimensions, due to Go code | ### Impact
Under certain conditions, Go code can trigger a segfault in string deallocation.
For string tensors, `C.TF_TString_Dealloc` is called during garbage collection within a finalizer function. However, tensor structure isn't checked until encoding to avoid a performance penalty. The current method for dealloc assumes that encoding succeeded, but segfaults when a string tensor is garbage collected whose encoding failed (e.g., due to mismatched dimensions).
To fix this, the call to set the finalizer function is deferred until `NewTensor` returns and, if encoding failed for a string tensor, deallocs are determined based on bytes written.
### Patches
We have patched the issue in GitHub commit [8721ba96e5760c229217b594f6d2ba332beedf22](https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22) (merging [#50508](https://github.com/tensorflow/tensorflow/pull/50508)).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, which is the other affected version.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [fixing PR](https://github.com/tensorflow/tensorflow/pull/50508). | {'CVE-2021-37692'} | 2021-08-25T14:38:57Z | 2021-08-25T14:38:57Z | MODERATE | 5.5 | {'CWE-20'} | {'https://github.com/advisories/GHSA-cmgw-8vpc-rc59', 'https://github.com/tensorflow/tensorflow/pull/50508', 'https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cmgw-8vpc-rc59', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37692'} | null |
GHSA | GHSA-c4qp-h3m6-785f | Downloads Resources over HTTP in ibm_db | Affected versions of `ibm_db` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Update to version 1.0.2 or later. | {'CVE-2016-10577'} | 2021-01-08T19:01:23Z | 2019-02-18T23:51:59Z | HIGH | 0 | {'CWE-311'} | {'https://nodesecurity.io/advisories/163', 'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94', 'https://www.npmjs.com/advisories/163', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10577', 'https://github.com/advisories/GHSA-c4qp-h3m6-785f'} | null |
GHSA | GHSA-5wqj-f379-6jh4 | Command injection in kill-process-on-port | All versions of package kill-process-on-port are vulnerable to Command Injection via a.getProcessPortId. | {'CVE-2020-28426'} | 2021-03-19T21:19:47Z | 2021-03-19T21:19:47Z | HIGH | 7.3 | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28426', 'https://snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458', 'https://github.com/advisories/GHSA-5wqj-f379-6jh4'} | null |
GHSA | GHSA-wmpm-fq7r-jq56 | Imporoper path validation in elFinder.NetCore | This affects all versions of package elFinder.NetCore. The ExtractAsync function within the FileSystem is vulnerable to arbitrary extraction due to insufficient validation. | {'CVE-2021-23427'} | 2021-09-10T17:10:39Z | 2021-09-02T22:05:17Z | HIGH | 8.6 | {'CWE-20'} | {'https://github.com/advisories/GHSA-wmpm-fq7r-jq56', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1567778', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L226', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23427', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L226'} | null |
GHSA | GHSA-9h63-7qf6-mv6r | Improper Authorization in github.com/containers/libpod | A flaw was found in podman before 1.7.0. File permissions for non-root users running in a privileged container are not correctly checked. This flaw can be abused by a low-privileged user inside the container to access any other file in the container, even if owned by the root user inside the container. It does not allow to directly escape the container, though being a privileged container means that a lot of security features are disabled when running the container. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | {'CVE-2021-20188'} | 2021-05-18T18:33:12Z | 2021-05-18T18:33:12Z | HIGH | 7 | {'CWE-863'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1915734', 'https://github.com/containers/podman/commit/c8bd4746151e6ae37d49c4688f2f64e03db429fc', 'https://github.com/containers/podman/commit/dcf3c742b1ac4d641d66810113f3d17441a412f4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20188', 'https://github.com/advisories/GHSA-9h63-7qf6-mv6r', 'https://github.com/containers/podman/commit/2c7b579fe7328dc6db48bdaf60d0ddd9136b1e24'} | null |
GHSA | GHSA-8q64-wrfr-q48c | Data races in model | `Shared` data structure in `model` crate implements `Send` and `Sync` traits regardless of the inner type.
This allows safe Rust code to trigger a data race, which is undefined behavior in Rust.
Users are advised to treat `Shared` as an unsafe type.
It should not be used outside of the testing context,
and care must be taken so that the testing code does not have a data race
besides a race condition that is expected to be caught by the test.
Check [the Rustonomicon](https://doc.rust-lang.org/nomicon/races.html) for the difference between
a data race and a general race condition.
| null | 2021-08-25T20:59:24Z | 2021-08-25T20:59:24Z | MODERATE | 0 | {'CWE-362'} | {'https://github.com/spacejam/model/issues/3', 'https://rustsec.org/advisories/RUSTSEC-2020-0140.html', 'https://github.com/advisories/GHSA-8q64-wrfr-q48c'} | null |
GHSA | GHSA-qx3f-p745-w4hr | Integer overflow in Tensorflow | ### Impact
The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations.
### Patches
We have patched the issue in GitHub commit [f0147751fd5d2ff23251149ebad9af9f03010732](https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732) (merging [#51733](https://github.com/tensorflow/tensorflow/pull/51733)).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/52676). | {'CVE-2022-23562'} | 2022-02-11T15:07:30Z | 2022-02-09T23:54:07Z | HIGH | 7.6 | {'CWE-190'} | {'https://github.com/advisories/GHSA-qx3f-p745-w4hr', 'https://github.com/tensorflow/tensorflow/pull/51733', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23562', 'https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr', 'https://github.com/tensorflow/tensorflow/issues/52676'} | null |
GHSA | GHSA-vxp9-wv2f-wqmw | High severity vulnerability that affects superset | Versions of Superset prior to 0.23 used an unsafe load method from the pickle library to deserialize data leading to possible remote code execution. Note Superset 0.23 was released prior to any Superset release under the Apache Software Foundation. | {'CVE-2018-8021'} | 2022-03-23T22:10:14Z | 2018-11-09T17:40:56Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/apache/superset/pull/4243', 'https://github.com/advisories/GHSA-vxp9-wv2f-wqmw', 'https://github.com/apache/superset/commit/2c72a7ae4fc0a8bac1f037a79efa90e1c5549710', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8021', 'https://www.exploit-db.com/exploits/45933/'} | null |
GHSA | GHSA-m85c-9mf8-m2m6 | Critical severity vulnerability that affects confire | An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability. | {'CVE-2017-16763'} | 2021-09-15T18:38:46Z | 2018-07-18T18:28:26Z | CRITICAL | 9.8 | null | {'https://github.com/bbengfort/confire/issues/24', 'https://github.com/advisories/GHSA-m85c-9mf8-m2m6', 'https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16763-configure-loaded-through-confire/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16763', 'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea'} | null |
GHSA | GHSA-cpf4-wx82-gxp6 | Segfault due to negative splits in `SplitV` | ### Impact
The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/split_v_op.cc#L49-L205) of `SplitV` can trigger a segfault is an attacker supplies negative arguments:
```python
import tensorflow as tf
tf.raw_ops.SplitV(
value=tf.constant([]),
size_splits=[-1, -2]
,axis=0,
num_split=2)
```
This occurs whenever `size_splits` contains more than one value and at least one value is negative.
### Patches
We have patched the issue in GitHub commit [25d622ffc432acc736b14ca3904177579e733cc6](https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41222'} | 2021-11-10T18:48:15Z | 2021-11-10T18:48:15Z | MODERATE | 5.5 | {'CWE-682'} | {'https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41222', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cpf4-wx82-gxp6', 'https://github.com/advisories/GHSA-cpf4-wx82-gxp6'} | null |
GHSA | GHSA-8f93-rv4p-x4jw | SQL Injection in sql | All versions of `sql` are vulnerable to sql injection as it does not properly escape parameters when building SQL queries.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available. | null | 2021-08-04T21:14:40Z | 2019-06-12T16:36:52Z | MODERATE | 0 | {'CWE-89'} | {'https://www.npmjs.com/advisories/662', 'https://github.com/advisories/GHSA-8f93-rv4p-x4jw', 'https://hackerone.com/reports/319465', 'https://nodesecurity.io/advisories/662'} | null |
GHSA | GHSA-v6wr-fch2-vm5w | Moderate severity vulnerability that affects com.orientechnologies:orientdb-studio | server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class. | {'CVE-2015-2913'} | 2021-09-20T15:49:27Z | 2018-10-18T17:41:27Z | MODERATE | 5.9 | {'CWE-200'} | {'https://github.com/advisories/GHSA-v6wr-fch2-vm5w', 'https://www.kb.cert.org/vuls/id/845332', 'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2913'} | null |
GHSA | GHSA-8gv3-3j7f-wg94 | Potential Remote Code Execution vulnerability | Packages nette/application versions prior to 2.2.10, 2.3.14, 2.4.16, 3.0.6 and nette/nette versions prior to 2.0.19 and 2.1.13 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE.
Reported by Cyku Hong from DEVCORE (https://devco.re)
### Impact
Code injection, possible remote code execution.
### Patches
Fixed in nette/application 2.2.10, 2.3.14, 2.4.16, 3.0.6 and nette/nette 2.0.19 and 2.1.13 | {'CVE-2020-15227'} | 2021-11-19T15:12:41Z | 2020-10-02T16:22:19Z | HIGH | 8.7 | {'CWE-94', 'CWE-74'} | {'https://github.com/advisories/GHSA-8gv3-3j7f-wg94', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00003.html', 'https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94', 'https://packagist.org/packages/nette/application', 'https://packagist.org/packages/nette/nette', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15227'} | null |
GHSA | GHSA-m7j4-fhg6-xf5v | Prototype pollution in datatables.net | All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806. | {'CVE-2020-28458'} | 2021-07-28T20:34:50Z | 2020-12-17T21:00:50Z | HIGH | 7.3 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-m7j4-fhg6-xf5v', 'https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28458', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402', 'https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03'} | null |
GHSA | GHSA-26v6-w6fw-rh94 | Apache Camel can allow remote attackers to execute arbitrary commands | Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request. | {'CVE-2015-5348'} | 2022-04-26T19:23:29Z | 2018-10-16T23:12:20Z | HIGH | 8.1 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2015-5348', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://github.com/advisories/GHSA-26v6-w6fw-rh94', 'http://www.securityfocus.com/bid/80696', 'https://issues.apache.org/jira/browse/CAMEL-9309', 'http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc', 'http://www.securityfocus.com/archive/1/537147/100/0/threaded', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'} | null |
GHSA | GHSA-785g-gx74-gr39 | Malicious Package in js-wha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-10-01T14:35:21Z | 2020-09-03T23:12:48Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-785g-gx74-gr39', 'https://www.npmjs.com/advisories/1294'} | null |
GHSA | GHSA-65mj-7c86-79jf | Authentication Bypass in ADOdb/ADOdb | ### Impact
An attacker can inject values into a PostgreSQL connection string by providing a parameter surrounded by single quotes.
Depending on how the library is used in the client software, this may allow an attacker to bypass the login process, gain access to the server's IP address, etc.
### Patches
The vulnerability is fixed in ADOdb versions 5.20.21 (952de6c4273d9b1e91c2b838044f8c2111150c29) and 5.21.4 or later (b4d5ce70034c5aac3a1d51d317d93c037a0938d2).
The simplest patch is to delete line 29 in `drivers/adodb-postgres64.inc.php`:
```php
diff --git a/drivers/adodb-postgres64.inc.php b/drivers/adodb-postgres64.inc.php
index d04b7f67..729d7141 100644
--- a/drivers/adodb-postgres64.inc.php
+++ b/drivers/adodb-postgres64.inc.php
@@ -26,7 +26,6 @@ function adodb_addslashes($s)
{
$len = strlen($s);
if ($len == 0) return "''";
- if (strncmp($s,"'",1) === 0 && substr($s,$len-1) == "'") return $s; // already quoted
return "'".addslashes($s)."'";
}
```
### Workarounds
Ensure the parameters passed to *ADOConnection::connect()* or related functions (_nConnect()_, _pConnect()_) are not surrounded by single quotes.
### Credits
Thanks to **Emmet Leahy** (@meme-lord) of Sorcery Ltd for reporting this vulnerability, and to the [huntr](https://huntr.dev/) team for their support.
### References
- Original issue report https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c/
- ADOdb reference issue #793
### For more information
If you have any questions or comments about this advisory:
* Add a note in issue #793
* Contact the maintainers on [Gitter](https://gitter.im/adodb/adodb)
| {'CVE-2021-3850'} | 2022-03-30T21:12:11Z | 2022-01-27T15:23:19Z | CRITICAL | 9.1 | {'CWE-287', 'CWE-305'} | {'https://github.com/ADOdb/ADOdb/commit/952de6c4273d9b1e91c2b838044f8c2111150c29', 'https://www.debian.org/security/2022/dsa-5101', 'https://github.com/ADOdb/ADOdb/issues/793', 'https://github.com/ADOdb/ADOdb/security/advisories/GHSA-65mj-7c86-79jf', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00006.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3850', 'https://github.com/advisories/GHSA-65mj-7c86-79jf', 'https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c', 'https://github.com/ADOdb/ADOdb/commit/b4d5ce70034c5aac3a1d51d317d93c037a0938d2'} | null |
GHSA | GHSA-6c9x-mj3g-h47x | Spoofing attack in swagger-ui-dist | The swagger-ui-dist package before 4.1.3 for Node.js could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. | {'CVE-2021-46708'} | 2022-04-15T17:04:35Z | 2022-03-12T00:00:36Z | MODERATE | 6.1 | {'CWE-1021'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-46708', 'https://www.npmjs.com/package/swagger-ui-dist/v/4.1.3', 'https://security.netapp.com/advisory/ntap-20220407-0004/', 'https://github.com/advisories/GHSA-6c9x-mj3g-h47x', 'https://security.snyk.io/vuln/SNYK-JS-SWAGGERUIDIST-2314884'} | null |
GHSA | GHSA-qrg9-f472-qwfm | Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19 | Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided.
- https://vaadin.com/security/cve-2021-31412 | {'CVE-2021-31412'} | 2021-07-01T21:47:23Z | 2021-06-28T16:55:58Z | MODERATE | 5.3 | {'CWE-1295', 'CWE-668'} | {'https://github.com/vaadin/platform/security/advisories/GHSA-qrg9-f472-qwfm', 'https://github.com/vaadin/flow/pull/11107', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31412', 'https://vaadin.com/security/cve-2021-31412', 'https://github.com/advisories/GHSA-qrg9-f472-qwfm'} | null |
GHSA | GHSA-4f68-49qq-h392 | Improper certificate validation in em-map | em-imap 0.5 and earlier use the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified. | {'CVE-2020-13163'} | 2021-05-24T18:12:20Z | 2021-05-24T18:12:20Z | MODERATE | 7.4 | {'CWE-295'} | {'https://securitylab.github.com/advisories/GHSL-2020-095-conradirwin-em-imap', 'https://github.com/advisories/GHSA-4f68-49qq-h392', 'https://github.com/ConradIrwin/em-imap/issues/25', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13163'} | null |
GHSA | GHSA-7rp2-fm2h-wchj | Cross-site Scripting in Django | An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link. | {'CVE-2019-12308'} | 2021-08-04T21:04:11Z | 2019-06-10T18:43:25Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-7rp2-fm2h-wchj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12308', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://www.djangoproject.com/weblog/2019/jun/03/security-releases/', 'https://groups.google.com/forum/#!topic/django-announce/GEbHU7YoVz8', 'https://docs.djangoproject.com/en/dev/releases/2.1.9/', 'http://www.openwall.com/lists/oss-security/2019/06/03/2', 'https://docs.djangoproject.com/en/dev/releases/1.11.21/', 'https://docs.djangoproject.com/en/dev/releases/2.2.2/'} | null |
GHSA | GHSA-jqjj-r4qp-x2gh | Use of Uninitialized Resource in messagepack-rs. | An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string_primitive may read from uninitialized memory locations. | {'CVE-2021-45693'} | 2022-01-07T16:25:54Z | 2022-01-06T22:12:42Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://github.com/advisories/GHSA-jqjj-r4qp-x2gh', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/messagepack-rs/RUSTSEC-2021-0092.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0092.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45693'} | null |
GHSA | GHSA-rrrm-qjm4-v8hf | Inefficient Regular Expression Complexity in marked | ### Impact
_What kind of vulnerability is it?_
Denial of service.
The regular expression `block.def` may cause catastrophic backtracking against some strings.
PoC is the following.
```javascript
import * as marked from "marked";
marked.parse(`[x]:${' '.repeat(1500)}x ${' '.repeat(1500)} x`);
```
_Who is impacted?_
Anyone who runs untrusted markdown through marked and does not use a worker with a time limit.
### Patches
_Has the problem been patched?_
Yes
_What versions should users upgrade to?_
4.0.10
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Do not run untrusted markdown through marked or run marked on a [worker](https://marked.js.org/using_advanced#workers) thread and set a reasonable time limit to prevent draining resources.
### References
_Are there any links users can visit to find out more?_
- https://marked.js.org/using_advanced#workers
- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [marked](https://github.com/markedjs/marked)
| {'CVE-2022-21680'} | 2022-04-19T19:03:20Z | 2022-01-14T21:04:41Z | HIGH | 7.5 | {'CWE-1333'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21680', 'https://github.com/advisories/GHSA-rrrm-qjm4-v8hf', 'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0', 'https://github.com/markedjs/marked/releases/tag/v4.0.10', 'https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.