ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-69p3-xp37-f692 | Improper Certificate Validation in kubeclient | A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM). | {'CVE-2022-0759'} | 2022-04-08T21:45:07Z | 2022-03-26T00:00:29Z | HIGH | 8.1 | {'CWE-295'} | {'https://github.com/advisories/GHSA-69p3-xp37-f692', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0759', 'https://github.com/ManageIQ/kubeclient/issues/555', 'https://github.com/ManageIQ/kubeclient/issues/554', 'https://github.com/ManageIQ/kubeclient/pull/556'} | null |
GHSA | GHSA-h3mf-4fwp-59c7 | VecStorage Deserialize Allows Violation of Length Invariant | The `Deserialize` implementation for `VecStorage` did not maintain the invariant that the number of elements must equal `nrows * ncols`. Deserialization of specially crafted inputs could allow memory access beyond allocation of the vector.
This flaw was introduced in v0.11.0 ([`086e6e`](https://github.com/dimforge/nalgebra/commit/086e6e719f53fecba6dadad2e953a487976387f5)) due to the addition of an automatically derived implementation of `Deserialize` for `MatrixVec`. `MatrixVec` was later renamed to `VecStorage` in v0.16.13 ([`0f66403`](https://github.com/dimforge/nalgebra/commit/0f66403cbbe9eeac15cedd8a906c0d6a3d8841f2)) and continued to use the automatically derived implementation of `Deserialize`.
This flaw was corrected in commit [`5bff536`](https://github.com/dimforge/nalgebra/commit/5bff5368bf38ddfa31416e4ae9897b163031a513) by returning an error during deserialization if the number of elements does not exactly match the expected size.
| null | 2021-08-18T23:03:07Z | 2021-08-05T19:58:06Z | MODERATE | 0 | null | {'https://rustsec.org/advisories/RUSTSEC-2021-0070.html', 'https://github.com/dimforge/nalgebra/issues/883', 'https://github.com/advisories/GHSA-h3mf-4fwp-59c7', 'https://github.com/dimforge/nalgebra/pull/889', 'https://github.com/dimforge/nalgebra/blob/dev/CHANGELOG.md#0270', 'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5'} | null |
GHSA | GHSA-x6hx-7gh3-3q98 | Prototype Pollution in mootools | This affects all versions of package mootools. This is due to the ability to pass untrusted input to Object.merge() | {'CVE-2021-23432'} | 2021-09-02T17:09:30Z | 2021-09-02T17:09:30Z | MODERATE | 5.4 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-x6hx-7gh3-3q98', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23432', 'https://snyk.io/vuln/SNYK-JS-MOOTOOLS-1325536'} | null |
GHSA | GHSA-pjfr-qf3p-3q25 | When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server | When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. | {'CVE-2017-12615'} | 2022-04-27T13:37:16Z | 2018-10-17T16:30:31Z | HIGH | 8.1 | {'CWE-434'} | {'https://access.redhat.com/errata/RHSA-2018:0466', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-pjfr-qf3p-3q25', 'https://www.exploit-db.com/exploits/42953/', 'https://access.redhat.com/errata/RHSA-2017:3114', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3113', 'https://access.redhat.com/errata/RHSA-2017:3081', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'http://www.securitytracker.com/id/1039392', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12615', 'https://www.synology.com/support/security/Synology_SA_17_54_Tomcat', 'https://access.redhat.com/errata/RHSA-2018:0465', 'http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20171018-0001/', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3080', 'https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@%3Cannounce.tomcat.apache.org%3E', 'https://github.com/breaktoprotect/CVE-2017-12615', 'http://www.securityfocus.com/bid/100901'} | null |
GHSA | GHSA-grfj-wjv9-4f9v | Open redirect in Jupyter Server | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Open redirect vulnerability - a maliciously crafted link to a jupyter server could redirect the browser to a different website.
All jupyter servers are technically affected, however, these maliciously crafted links can only be reasonably made for known jupyter server hosts. A link to your jupyter server may *appear* safe, but ultimately redirect to a spoofed server on the public internet.
This originated in jupyter/notebook: https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh
### Patches
_Has the problem been patched? What versions should users upgrade to?_
jupyter_server 1.0.6
### References
[OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html)
### For more information
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org).
Credit: zhuonan li of Alibaba Application Security Team | {'CVE-2020-26232'} | 2021-01-07T22:40:25Z | 2020-11-24T21:20:52Z | MODERATE | 4.1 | {'CWE-601'} | {'https://github.com/jupyter/jupyter_server/security/advisories/GHSA-grfj-wjv9-4f9v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26232', 'https://github.com/jupyter-server/jupyter_server/blob/master/CHANGELOG.md#106---2020-11-18', 'https://github.com/jupyter-server/jupyter_server/commit/3d83e49090289c431da253e2bdb8dc479cbcb157', 'https://github.com/advisories/GHSA-grfj-wjv9-4f9v'} | null |
GHSA | GHSA-w74j-v8xh-3w5h | Reference binding to nullptr in unicode encoding | ### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.UnicodeEncode`:
```python
import tensorflow as tf
from tensorflow.python.ops import gen_string_ops
gen_string_ops.unicode_encode(
input_values=[],
input_splits=[],
output_encoding='UTF-8',
errors='ignore',
replacement_char='a')
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/unicode_ops.cc#L533-L539) reads the first dimension of the `input_splits` tensor before validating that this tensor is not empty:
```cc
const Tensor& input_splits = context->input(1);
const auto input_splits_flat = input_splits.flat<SPLITS_TYPE>();
TensorShape output_shape({input_splits.dim_size(0) - 1});
```
### Patches
We have patched the issue in GitHub commit [2e0ee46f1a47675152d3d865797a18358881d7a6](https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37667'} | 2021-08-25T14:42:09Z | 2021-08-25T14:42:09Z | HIGH | 7.8 | {'CWE-824'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w74j-v8xh-3w5h', 'https://github.com/advisories/GHSA-w74j-v8xh-3w5h', 'https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37667'} | null |
GHSA | GHSA-52r9-g5g6-2hjp | Path Traversal in node-srv | Versions of `node-srv` before 2.1.1 are vulnerable to path traversal allowing a remote attacker to read files from the server that uses `node-srv`.
## Recommendation
Update to version 2.1.1 or later. | {'CVE-2018-3714'} | 2021-01-08T19:51:51Z | 2018-07-26T14:50:41Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/588', 'https://hackerone.com/reports/309124', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3714', 'https://github.com/advisories/GHSA-52r9-g5g6-2hjp'} | null |
GHSA | GHSA-v42f-j8fx-99f3 | Queue<T> should have a Send bound on its Send/Sync traits | Affected versions of this crate unconditionally implements `Send`/`Sync` for `Queue<T>`.
This allows (1) creating data races to a `T: !Sync` and (2) sending `T: !Send` to other threads, resulting in memory corruption or other undefined behavior.
| null | 2021-08-25T21:00:13Z | 2021-08-25T21:00:13Z | MODERATE | 0 | {'CWE-362'} | {'https://github.com/advisories/GHSA-v42f-j8fx-99f3', 'https://github.com/rossdylan/rust-scottqueue/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0133.html'} | null |
GHSA | GHSA-r2x6-vrxx-jgv4 | Data races in multiqueue | An issue was discovered in the multiqueue crate through 2020-12-25 for Rust. There are unconditional implementations of Send for InnerSend<RW, T>, InnerRecv<RW, T>, FutInnerSend<RW, T>, and FutInnerRecv<RW, T>. | {'CVE-2020-36463'} | 2021-08-25T20:58:07Z | 2021-08-25T20:58:07Z | HIGH | 8.1 | {'CWE-362', 'CWE-77'} | {'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/multiqueue/RUSTSEC-2020-0143.md', 'https://github.com/schets/multiqueue/issues/31', 'https://github.com/advisories/GHSA-r2x6-vrxx-jgv4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36463', 'https://rustsec.org/advisories/RUSTSEC-2020-0143.html'} | null |
GHSA | GHSA-x9hc-rw35-f44h | Sandbox Breakout / Arbitrary Code Execution in static-eval | Versions of `static-eval`prior to 2.0.2 pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package.
## Proof of concept
```
var evaluate = require('static-eval');
var parse = require('esprima').parse;
var src = process.argv[2];
var payload = '(function({x}){return x.constructor})({x:"".sub})("console.log(process.env)")()'
var ast = parse(payload).body[0].expression;
console.log(evaluate(ast, {x:1}));
```
## Recommendation
Upgrade to version 2.0.2 or later. | null | 2021-09-27T13:40:53Z | 2020-09-02T15:46:03Z | HIGH | 7.3 | {'CWE-94'} | {'https://github.com/advisories/GHSA-x9hc-rw35-f44h', 'https://www.npmjs.com/advisories/758'} | null |
GHSA | GHSA-q2c6-c6pm-g3gh | Arbitrary Code Execution in handlebars | Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It is due to an incomplete fix for a [previous issue](https://www.npmjs.com/advisories/1316). This vulnerability can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting).
## Recommendation
Upgrade to version 3.0.8, 4.5.3 or later. | null | 2020-09-04T15:07:38Z | 2020-09-04T15:07:38Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-q2c6-c6pm-g3gh', 'https://www.npmjs.com/advisories/1324'} | null |
GHSA | GHSA-cfcv-q4qq-2ph4 | CKEditor 4 vulnerabilities in versions <4.16.1 | Details see:
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc ( CVE-2021-37695 )
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c ( CVE-2021-32808 )
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7889-rm5j-hpgg ( CVE-2021-32809 )
Patch:
https://github.com/pimcore/pimcore/pull/10032 | null | 2021-10-08T21:19:54Z | 2021-08-23T19:42:05Z | MODERATE | 0 | null | {'https://github.com/pimcore/pimcore/commit/0d2ce3b1db4ac40646cee5104115767505760b6a', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-cfcv-q4qq-2ph4', 'https://github.com/advisories/GHSA-cfcv-q4qq-2ph4'} | null |
GHSA | GHSA-5vjc-qx43-r747 | Stored Cross-site Scripting in folder-auth plugin | Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
Folder-based Authorization Strategy Plugin 1.4 escapes the names of roles shown on the configuration form.
See https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646 | null | 2022-03-22T12:51:59Z | 2022-03-18T23:57:52Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-5vjc-qx43-r747', 'https://github.com/jenkinsci/folder-auth-plugin/security/advisories/GHSA-5vjc-qx43-r747', 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646'} | null |
GHSA | GHSA-xc7v-wxcw-j472 | Memory Exposure in tunnel-agent | Versions of `tunnel-agent` before 0.6.0 are vulnerable to memory exposure.
This is exploitable if user supplied input is provided to the auth value and is a number.
Proof-of-concept:
```js
require('request')({
method: 'GET',
uri: 'http://www.example.com',
tunnel: true,
proxy:{
protocol: 'http:',
host:'127.0.0.1',
port:8080,
auth:USERSUPPLIEDINPUT // number
}
});
```
## Recommendation
Update to version 0.6.0 or later. | null | 2021-08-04T20:28:52Z | 2019-06-03T17:08:26Z | MODERATE | 0 | {'CWE-200'} | {'https://www.npmjs.com/advisories/598', 'https://github.com/advisories/GHSA-xc7v-wxcw-j472', 'https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4', 'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0'} | null |
GHSA | GHSA-wxj3-qwv4-cvfm | Privilege Escalation in Docker | Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors. | {'CVE-2014-3499'} | 2022-02-15T00:40:44Z | 2022-02-15T00:40:44Z | HIGH | 8.4 | {'CWE-269'} | {'https://github.com/docker/docker/commit/707ef9618b3b26a0534a0af732a22f159eccfaa5', 'https://bugzilla.redhat.com/show_bug.cgi?id=1111687', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3499', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3499', 'https://rhn.redhat.com/errata/RHSA-2014-0820.html', 'https://github.com/advisories/GHSA-wxj3-qwv4-cvfm'} | null |
GHSA | GHSA-rfhr-62xp-2fp2 | Open Redirect in trailing-slash | The package trailing-slash before 2.0.1 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::createTrailing(), as the web server uses relative URLs instead of absolute URLs. | {'CVE-2021-23387'} | 2021-06-08T23:19:21Z | 2021-06-08T23:19:21Z | MODERATE | 5.4 | {'CWE-601'} | {'https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707', 'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23387', 'https://github.com/advisories/GHSA-rfhr-62xp-2fp2', 'https://github.com/fardog/trailing-slash/blob/f640ece055fe85275c983de5eb94661b95e35670/index.js%23L36'} | null |
GHSA | GHSA-f7jg-mcvw-9gwv | Directory Traversal in reecerver | Affected versions of `reecerver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16188'} | 2021-01-08T18:54:05Z | 2018-07-23T20:40:40Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16188', 'https://github.com/advisories/GHSA-f7jg-mcvw-9gwv', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/reecerver', 'https://www.npmjs.com/advisories/443', 'https://nodesecurity.io/advisories/443'} | null |
GHSA | GHSA-x5jp-9fmm-m9pf | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3683'} | 2021-11-17T21:11:17Z | 2021-11-15T23:13:52Z | MODERATE | 5.4 | {'CWE-352'} | {'https://github.com/advisories/GHSA-x5jp-9fmm-m9pf', 'https://huntr.dev/bounties/063a339a-5d78-40d6-a96a-6716960e8134', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3683', 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} | null |
GHSA | GHSA-9959-6p3m-wxpc | Denial of service in Netty | The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message. | {'CVE-2014-3488'} | 2021-09-22T18:44:48Z | 2020-06-30T21:01:31Z | MODERATE | 0 | {'CWE-119'} | {'https://github.com/advisories/GHSA-9959-6p3m-wxpc', 'https://github.com/netty/netty/issues/2562', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994', 'https://snyk.io/vuln/SNYK-JAVA-ORGJBOSSNETTY-31630', 'http://netty.io/news/2014/06/11/3-9-2-Final.html', 'http://secunia.com/advisories/59196', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3488'} | null |
GHSA | GHSA-mm7h-323r-9p4g | Downloads Resources over HTTP in imageoptim | imageoptim is a Node.js wrapper for some images compression algorithms.
imageoptim downloads zipped resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested tarball with an attacker controlled tarball if the attacker is on the network or positioned in between the user and the remote server.
## Recommendation
No fix is currently available for this vulnerability.
It is our recommendation to not install or use this module at this time. | {'CVE-2016-10596'} | 2021-01-08T18:27:12Z | 2019-02-18T23:50:33Z | HIGH | 0 | {'CWE-311'} | {'https://www.npmjs.com/advisories/194', 'https://nodesecurity.io/advisories/194', 'https://github.com/advisories/GHSA-mm7h-323r-9p4g', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10596'} | null |
GHSA | GHSA-4qwq-q4pr-rr7r | Vulnerability in packageCmd function leads to arbitrary code execution via filePath parameters | aaptjs is a node wraper for aapt. An issue was discovered in the packageCmd function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | {'CVE-2020-36378'} | 2022-05-05T13:47:57Z | 2021-11-02T15:42:38Z | CRITICAL | 9.8 | {'CWE-77', 'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-36378', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://github.com/advisories/GHSA-4qwq-q4pr-rr7r'} | null |
GHSA | GHSA-4wjq-69rc-8wcp | Path Traversal in Apache Camel | Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected. | {'CVE-2019-0194'} | 2021-08-03T21:29:50Z | 2019-05-02T15:21:34Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/advisories/GHSA-4wjq-69rc-8wcp', 'http://www.openwall.com/lists/oss-security/2019/04/30/2', 'https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E', 'https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0194'} | null |
GHSA | GHSA-8c5j-9r9f-c6w8 | Information disclosure in Django | An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key. | {'CVE-2021-45116'} | 2022-02-14T22:16:34Z | 2022-01-12T19:21:10Z | HIGH | 7.5 | {'CWE-668'} | {'https://www.djangoproject.com/weblog/2022/jan/04/security-releases/', 'https://security.netapp.com/advisory/ntap-20220121-0005/', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://github.com/advisories/GHSA-8c5j-9r9f-c6w8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45116', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://groups.google.com/forum/#!forum/django-announce'} | null |
GHSA | GHSA-qcc4-3rxf-gf4m | Unauthorized property update in CheckboxGroup component in Vaadin 12-14 and 15-20 | Improper check in `CheckboxGroup` in `com.vaadin:vaadin-checkbox-flow` versions 1.2.0 prior to 2.0.0 (Vaadin 12.0.0 prior to 14.0.0), 2.0.0 prior to 3.0.0 (Vaadin 14.0.0 prior to 14.5.0), 3.0.0 through 4.0.1 (Vaadin 15.0.0 through 17.0.11), 14.5.0 through 14.6.7 (Vaadin 14.5.0 through 14.6.7), and 18.0.0 through 20.0.5 (Vaadin 18.0.0 through 20.0.5) allows attackers to modify the value of a disabled `Checkbox` inside enabled `CheckboxGroup` component via unspecified vectors.
- https://vaadin.com/security/cve-2021-33605 | {'CVE-2021-33605'} | 2021-09-03T20:35:32Z | 2021-08-30T16:16:38Z | MODERATE | 4.3 | {'CWE-754'} | {'https://github.com/vaadin/flow-components/pull/1903', 'https://github.com/vaadin/flow-components/security/advisories/GHSA-qcc4-3rxf-gf4m', 'https://github.com/advisories/GHSA-qcc4-3rxf-gf4m', 'https://vaadin.com/security/cve-2021-33605', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33605'} | null |
GHSA | GHSA-jg8v-48h5-wgxg | Prototype Pollution | This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g __proto__, toString, etc) results in a returned object with a modified prototype instance. | {'CVE-2021-23413'} | 2021-08-31T20:58:02Z | 2021-08-10T16:02:18Z | MODERATE | 5.3 | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23413', 'https://github.com/advisories/GHSA-jg8v-48h5-wgxg', 'https://github.com/Stuk/jszip/blob/master/lib/object.js%23L88', 'https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498', 'https://github.com/Stuk/jszip/pull/766', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1251499', 'https://snyk.io/vuln/SNYK-JS-JSZIP-1251497'} | null |
GHSA | GHSA-8v27-2fg9-7h62 | Withdrawn: Arbitrary Code Execution in static-eval | All versions of package static-eval are vulnerable to Arbitrary Code Execution using FunctionExpressions and TemplateLiterals. PoC: var evaluate = require('static-eval'); var parse = require('esprima').parse; var src="(function (x) { return ${eval("console.log(global.process.mainModule.constructor._load('child_process').execSync('ls').toString())")} })()" var ast = parse(src).body[0].expression; evaluate(ast)
# WITHDRAWN
This was deemed not a vulnerability. See [this issue](https://github.com/browserify/static-eval/issues/34) for details. | {'CVE-2021-23334'} | 2021-05-06T16:13:08Z | 2021-05-06T16:11:25Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23334', 'https://github.com/advisories/GHSA-8v27-2fg9-7h62', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071860', 'https://snyk.io/vuln/SNYK-JS-STATICEVAL-1056765', 'https://github.com/browserify/static-eval/blob/master/index.js%23L180'} | null |
GHSA | GHSA-ghjx-3jg5-h6r2 | High severity vulnerability that affects mercurial | In Mercurial before 4.1.3, "hg serve --stdio" allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using --debugger as a repository name. | {'CVE-2017-9462'} | 2021-09-10T21:36:45Z | 2018-07-13T15:17:10Z | HIGH | 8.8 | {'CWE-732'} | {'https://access.redhat.com/errata/RHSA-2017:1576', 'https://www.mercurial-scm.org/repo/hg/rev/77eaf9539499', 'https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.1.3_.282017-4-18.29', 'https://github.com/advisories/GHSA-ghjx-3jg5-h6r2', 'https://security.gentoo.org/glsa/201709-18', 'http://www.securityfocus.com/bid/99123', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html', 'http://www.debian.org/security/2017/dsa-3963', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9462', 'https://bugs.debian.org/861243'} | null |
GHSA | GHSA-62ww-4p3p-7fhj | API information disclosure flaw in Elasticsearch | Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view. | {'CVE-2021-22135'} | 2021-07-02T18:33:02Z | 2021-07-02T18:33:02Z | MODERATE | 5.3 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-22135', 'https://security.netapp.com/advisory/ntap-20210625-0003/', 'https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125', 'https://github.com/advisories/GHSA-62ww-4p3p-7fhj'} | null |
GHSA | GHSA-955p-rc5h-hg6h | Double free in arenavec | An issue was discovered in the arenavec crate through 2021-01-12 for Rust. A double drop can sometimes occur upon a panic in T::drop(). | {'CVE-2021-29931'} | 2021-08-25T20:55:04Z | 2021-08-25T20:55:04Z | HIGH | 7.5 | {'CWE-415'} | {'https://github.com/ibabushkin/arenavec/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29931', 'https://github.com/advisories/GHSA-955p-rc5h-hg6h', 'https://rustsec.org/advisories/RUSTSEC-2021-0040.html'} | null |
GHSA | GHSA-r5xw-q988-826m | Remote Memory Exposure in mongoose | Versions of `mongoose` before 4.3.6, 3.8.39 are vulnerable to remote memory exposure.
Trying to save a number to a field of type Buffer on the affected mongoose versions allocates a chunk of uninitialized memory and stores it in the database.
## Recommendation
Update to version 4.3.6, 3.8.39 or later. | null | 2021-09-23T21:51:52Z | 2020-09-01T19:39:37Z | MODERATE | 5.1 | {'CWE-201'} | {'https://www.npmjs.com/advisories/599', 'https://gist.github.com/ChALkeR/440bc3dfcbd9b6da75c3', 'https://github.com/advisories/GHSA-r5xw-q988-826m', 'https://github.com/Automattic/mongoose/issues/3764', 'https://gist.github.com/ChALkeR/d4a8055625221b6e65f0'} | null |
GHSA | GHSA-xj3h-vc9j-j823 | Directory Traversal in nodeaaaaa | Affected versions of `nodeaaaaa` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16223'} | 2021-01-08T00:00:54Z | 2018-07-23T20:39:32Z | HIGH | 0 | {'CWE-22'} | {'https://nodesecurity.io/advisories/446', 'https://www.npmjs.com/advisories/446', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16223', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeaaaaa', 'https://github.com/advisories/GHSA-xj3h-vc9j-j823'} | null |
GHSA | GHSA-x7p5-p2c9-phvg | Unexpected database bindings | This is a follow-up to the previous security advisory (GHSA-3p32-j457-pg5x) which addresses a few additional edge cases.
If a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results. | null | 2021-02-02T15:47:08Z | 2021-02-02T15:47:08Z | HIGH | 7.2 | {'CWE-74'} | {'https://github.com/advisories/GHSA-x7p5-p2c9-phvg', 'https://github.com/laravel/framework/security/advisories/GHSA-x7p5-p2c9-phvg', 'https://github.com/advisories/GHSA-3p32-j457-pg5x', 'https://packagist.org/packages/illuminate/database', 'https://packagist.org/packages/laravel/framework'} | null |
GHSA | GHSA-52qp-jpq7-6c54 | Insecure Deserialization of untrusted data in rmccue/requests | ### Impact
Unserialization of untrusted data.
### Patches
The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.
### References
Publications about the vulnerability:
* https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress
* https://github.com/ambionics/phpggc/issues/52
* https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/
* https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf
* https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf
* https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf
* https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f
Originally fixed in WordPress 5.5.2:
* https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3
* https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
Related Security Advisories:
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032
* https://nvd.nist.gov/vuln/detail/CVE-2020-28032
Notification to the Requests repo including a fix in:
* https://github.com/rmccue/Requests/pull/421 and
* https://github.com/rmccue/Requests/pull/422
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Request](https://github.com/WordPress/Requests/) | {'CVE-2021-29476'} | 2022-04-19T19:02:47Z | 2021-04-29T21:52:30Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/ambionics/phpggc/issues/52', 'https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf', 'https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/', 'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3', 'https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf', 'https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml', 'https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf', 'https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress', 'https://github.com/advisories/GHSA-52qp-jpq7-6c54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29476', 'https://github.com/rmccue/Requests/pull/421', 'https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/', 'https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54'} | null |
GHSA | GHSA-64q9-f38h-9mwx | Protection Mechanism Failure in Jenkins Doktor Plugin | Jenkins Doktor Plugin 0.4.1 and earlier implements functionality that allows agent processes to render files on the controller as Markdown or Asciidoc, and error messages allow attackers able to control agent processes to determine whether a file with a given name exists. | {'CVE-2022-25204'} | 2022-03-01T21:12:05Z | 2022-02-16T00:01:18Z | MODERATE | 5.4 | {'CWE-693'} | {'https://github.com/advisories/GHSA-64q9-f38h-9mwx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25204', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2548'} | null |
GHSA | GHSA-g8q2-24jh-5hpc | High severity vulnerability that affects jquery-ui | Withdrawn, accidental duplicate publish.
Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function. | null | 2021-12-02T23:07:07Z | 2018-07-27T14:47:52Z | HIGH | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2016-7103', 'https://github.com/advisories/GHSA-g8q2-24jh-5hpc'} | null |
GHSA | GHSA-86r9-39j9-99wp | Elliptic Curve Key Disclosure in go-jose | go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack. | {'CVE-2016-9121'} | 2021-06-23T17:17:52Z | 2021-06-23T17:17:52Z | CRITICAL | 9.1 | {'CWE-326'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-9121', 'https://www.openwall.com/lists/oss-security/2016/11/03/1', 'https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507', 'https://github.com/advisories/GHSA-86r9-39j9-99wp', 'https://hackerone.com/reports/164590'} | null |
GHSA | GHSA-h29f-7f56-j8wh | Moderate severity vulnerability that affects sinatra | An issue was discovered in rack-protection/lib/rack/protection/path_traversal.rb in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash characters. | {'CVE-2018-7212'} | 2021-09-13T14:42:42Z | 2018-02-20T19:23:20Z | MODERATE | 5.3 | {'CWE-22'} | {'https://github.com/sinatra/sinatra/commit/6ad721abcfe36334108dcdd05d046c361e1b7a9c', 'https://github.com/sinatra/sinatra/pull/1379', 'https://github.com/advisories/GHSA-h29f-7f56-j8wh', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7212'} | null |
GHSA | GHSA-365p-96qv-xr7g | ASP.NET Core allow an elevation of privilege | ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to how web applications that are created from templates validate web requests, aka "ASP.NET Core Elevation Of Privilege Vulnerability". | {'CVE-2018-0787'} | 2022-04-26T19:06:31Z | 2018-10-16T19:56:59Z | HIGH | 8.8 | {'CWE-640'} | {'https://github.com/advisories/GHSA-365p-96qv-xr7g', 'https://github.com/aspnet/Announcements/issues/295', 'http://www.securityfocus.com/bid/103282', 'http://www.securitytracker.com/id/1040525', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0787', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0787'} | null |
GHSA | GHSA-cmhx-cq75-c4mj | Regular Expression Denial of Service (ReDoS) | A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981. | {'CVE-2019-0820'} | 2021-08-04T21:03:46Z | 2021-08-04T21:03:46Z | MODERATE | 7.5 | {'CWE-400'} | {'https://access.redhat.com/errata/RHSA-2019:1259', 'https://github.com/advisories/GHSA-cmhx-cq75-c4mj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0820', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820'} | null |
GHSA | GHSA-35rf-v2jv-gfg7 | Privilege escalation to cluster admin on multi-tenant environments | Users that can create Kubernetes Secrets, Service Accounts and Flux Kustomization objects, could execute commands inside the kustomize-controller container by embedding a shell script in a Kubernetes Secret. This can be used to run `kubectl` commands under the Service Account of kustomize-controller, thus allowing an authenticated Kubernetes user to gain cluster admin privileges.
### Impact
Multitenant environments where non-admin users have permissions to create Flux Kustomization objects are affected by this issue.
### Exploit
To exploit the command injection, first we create a secret with a shell command:
```sh
kubectl create secret generic exploit-token --from-literal=token=" || kubectl api-versions"
```
Then we create a Service Account that refers to the above Secret:
```yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: exploit
namespace: default
automountServiceAccountToken: false
secrets:
- name: exploit-token
```
And finally a Kustomization that runs under the above Service Account:
```yaml
apiVersion: kustomize.toolkit.fluxcd.io/v1beta1
kind: Kustomization
metadata:
name: exploit
namespace: default
spec:
interval: 5m
path: "./deploy/"
sourceRef:
kind: GitRepository
name: app
serviceAccountName: exploit
```
When kustomize-controller reconciles the above Kustomization, it will execute the shell command from the secret.
### Patches
This vulnerability was fixed in kustomize-controller v0.15.0 (included in flux2 v0.18.0) released on 2021-10-08. Starting with v0.15, the kustomize-controller no longer executes shell commands on the container OS and the `kubectl` binary has been removed from the container image.
### Workarounds
To prevent the creation of Kubernetes Service Accounts with `secrets` in namespaces owned by tenants, a Kubernetes validation webhook such as Gatekeeper OPA or Kyverno can be used.
```yaml
apiVersion: kyverno.io/v1
kind: ClusterPolicy
metadata:
name: restrict-sa
spec:
validationFailureAction: enforce
background: false
rules:
- name: validate-sa
match:
resources:
kinds:
- ServiceAccount
namespaces:
- tenant1
- tenant2
subjects:
- kind: User
name: some@tenant1.com
- kind: User
name: some@tenant2.com
- kind: ServiceAccount
name: kustomize-controller
namespace: flux-system
- kind: ServiceAccount
name: helm-controller
namespace: flux-system
validate:
message: "Invalid service account"
pattern:
X(secrets): "*?"
```
### References
Disclosed by ADA Logics in a security audit of the Flux project sponsored by CNCF and facilitated by OSTIF.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [kustomize-controller repository](http://github.com/fluxcd/kustomize-controller)
| {'CVE-2021-41254'} | 2022-04-19T19:03:11Z | 2021-11-15T17:35:33Z | HIGH | 8.8 | {'CWE-78'} | {'https://github.com/fluxcd/kustomize-controller/security/advisories/GHSA-35rf-v2jv-gfg7', 'https://github.com/advisories/GHSA-35rf-v2jv-gfg7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41254'} | null |
GHSA | GHSA-g5gj-9ggf-9vmq | Infinite certificate chain depth results in OctoRPKI running forever | OctoRPKI does not limit the depth of a certificate chain, allowing for a CA to create children in an ad-hoc fashion, thereby making tree traversal never end.
## Patches
## For more information
If you have any questions or comments about this advisory email us at security@cloudflare.com
| {'CVE-2021-3908'} | 2022-01-13T18:25:30Z | 2021-11-10T20:38:53Z | MODERATE | 5.9 | {'CWE-400'} | {'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g5gj-9ggf-9vmq', 'https://www.debian.org/security/2022/dsa-5041', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3908', 'https://github.com/advisories/GHSA-g5gj-9ggf-9vmq', 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'} | null |
GHSA | GHSA-pq4w-qm9g-qx68 | Insufficient Nonce Validation in Eclipse Milo Client | ### Impact
Credential replay affecting those connected to a server when *all 3* of the following conditions are met:
- `SecurityPolicy` is `None`
- using username/password or X509-based authentication
- the server has a defect causing it to send null/empty or zeroed nonces
### Patches
The problem has been patched in version `0.3.6`. A more relaxed treatment of validation as agreed upon by the OPC UA Security Working Group is implemented in version `0.3.7`.
### Workarounds
Do not use username/password or X509-based authentication with `SecurityPolicy` of `None`.
### References
https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf
### For more information
If you have any questions or comments about this advisory:
* Open an issue at [https://github.com/eclipse/milo/issues](https://github.com/eclipse/milo/issues)
* Email [the mailing list](mailto:milo-dev@eclipse.org) | {'CVE-2019-19135'} | 2021-07-28T18:54:54Z | 2020-03-16T22:46:50Z | HIGH | 7.4 | {'CWE-330', 'CWE-522'} | {'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19135', 'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed', 'https://github.com/advisories/GHSA-pq4w-qm9g-qx68', 'https://github.com/eclipse/milo/security/advisories/GHSA-pq4w-qm9g-qx68', 'https://opcfoundation.org/security-bulletins/'} | null |
GHSA | GHSA-cfm4-qjh2-4765 | Improper Verification of Cryptographic Signature in node-forge | ### Impact
RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used.
### Patches
The issue has been addressed in `node-forge` `1.3.0`.
### References
For more information, please see
["Bleichenbacher's RSA signature forgery based on implementation error"](https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/)
by Hal Finney.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge)
* Email us at [example email address](mailto:security@digitalbazaar.com) | {'CVE-2022-24771'} | 2022-03-22T19:33:47Z | 2022-03-18T23:09:54Z | HIGH | 7.5 | {'CWE-347'} | {'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765', 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24771', 'https://github.com/advisories/GHSA-cfm4-qjh2-4765'} | null |
GHSA | GHSA-jpcq-cgw6-v4j6 | Potential XSS vulnerability in jQuery | ### Impact
Passing HTML containing `<option>` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code.
### Patches
This problem is patched in jQuery 3.5.0.
### Workarounds
To workaround this issue without upgrading, use [DOMPurify](https://github.com/cure53/DOMPurify) with its `SAFE_FOR_JQUERY` option to sanitize the HTML string before passing it to a jQuery method.
### References
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue. | {'CVE-2020-11023'} | 2022-04-25T23:06:58Z | 2020-04-29T22:19:14Z | MODERATE | 6.9 | {'CWE-79'} | {'https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E', 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6', 'https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11023', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/', 'https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200511-0006/', 'https://www.debian.org/security/2020/dsa-4693', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/', 'https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E', 'http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html', 'https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E', 'https://www.tenable.com/security/tns-2021-02', 'https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E', 'https://www.drupal.org/sa-core-2020-002', 'https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.tenable.com/security/tns-2021-10', 'https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html', 'https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html', 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released', 'https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E', 'https://github.com/jquery/jquery/releases/tag/3.5.0', 'https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-jpcq-cgw6-v4j6', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html', 'https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/', 'https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E', 'https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E', 'https://jquery.com/upgrade-guide/3.5/', 'https://security.gentoo.org/glsa/202007-03', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-q66c-h853-gqw2 | AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication | The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging. | {'CVE-2016-4432'} | 2022-04-26T19:03:55Z | 2018-10-16T19:49:48Z | CRITICAL | 9.1 | {'CWE-287'} | {'https://github.com/advisories/GHSA-q66c-h853-gqw2', 'https://svn.apache.org/viewvc?view=revision&revision=1743393', 'https://issues.apache.org/jira/browse/QPID-7257', 'http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E', 'https://svn.apache.org/viewvc?view=revision&revision=1743161', 'http://www.securitytracker.com/id/1035983', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4432', 'http://www.securityfocus.com/archive/1/538508/100/0/threaded', 'http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html'} | null |
GHSA | GHSA-4g4c-8gqh-m4vm | Inclusion of Functionality from Untrusted Control Sphere in Ruby | The paranoid2 gem 1.1.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.1.5. | {'CVE-2019-13589'} | 2021-05-10T22:18:29Z | 2019-07-16T00:41:55Z | CRITICAL | 9.8 | {'CWE-829'} | {'http://www.securityfocus.com/bid/109281', 'https://rubygems.org/gems/paranoid2/versions', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13589', 'https://snyk.io/vuln/SNYK-RUBY-PARANOID2-451600', 'https://github.com/rubygems/rubygems.org/issues/2051', 'https://github.com/advisories/GHSA-4g4c-8gqh-m4vm'} | null |
GHSA | GHSA-p692-7mm3-3fxg | actionpack is vulnerable to remote bypass authentication | The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences. | {'CVE-2015-7576'} | 2022-04-25T20:52:40Z | 2017-10-24T18:33:36Z | LOW | 3.7 | null | {'http://www.openwall.com/lists/oss-security/2016/01/25/8', 'http://www.securityfocus.com/bid/81803', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.securitytracker.com/id/1034816', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html', 'http://www.debian.org/security/2016/dsa-3464', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7576', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ', 'https://github.com/advisories/GHSA-p692-7mm3-3fxg'} | null |
GHSA | GHSA-g4cp-h53p-v3v8 | Allocation of Resources Without Limits or Throttling in Undertow | A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the "Expect: 100-continue" header may cause an out of memory error. This flaw may potentially lead to a denial of service. | {'CVE-2020-10705'} | 2022-02-11T21:12:34Z | 2021-04-30T17:28:42Z | HIGH | 7.5 | {'CWE-770'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1803241', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10705', 'https://security.netapp.com/advisory/ntap-20220210-0014/', 'https://github.com/advisories/GHSA-g4cp-h53p-v3v8'} | null |
GHSA | GHSA-x6m6-5hrf-fh6r | Denial of Service in markdown-it-toc-and-anchor | All versions of `markdown-it-toc-and-anchor` are vulnerable to Denial of Service. Parsing markdown containing `**text**+\n@[toc]` causes the application to enter and infinite loop.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-09-24T22:12:15Z | 2020-09-01T21:26:50Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/medfreeman/markdown-it-toc-and-anchor', 'https://www.npmjs.com/advisories/749', 'https://snyk.io/vuln/SNYK-JS-MARKDOWNITTOCANDANCHOR-73500', 'https://github.com/advisories/GHSA-x6m6-5hrf-fh6r'} | null |
GHSA | GHSA-vj3f-3286-r4pf | Path Traversal in Docker | Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile. | {'CVE-2014-9356'} | 2022-04-19T19:03:27Z | 2021-05-18T21:09:17Z | HIGH | 5.9 | {'CWE-22'} | {'https://access.redhat.com/security/cve/cve-2014-9356', 'http://www.securityfocus.com/archive/1/archive/1/534215/100/0/threaded', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9356', 'https://github.com/advisories/GHSA-vj3f-3286-r4pf', 'https://bugzilla.redhat.com/show_bug.cgi?id=1172761', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9356', 'https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ'} | null |
GHSA | GHSA-vq23-5h4f-vwpv | Update unsound DrainFilter and RString::retain | An issue was discovered in the abi_stable crate before 0.9.1 for Rust. DrainFilter lacks soundness because of a double drop. | {'CVE-2020-36212'} | 2021-08-25T21:01:35Z | 2021-08-25T21:01:35Z | HIGH | 0 | {'CWE-672'} | {'https://github.com/rodrimati1992/abi_stable_crates/issues/44', 'https://github.com/advisories/GHSA-vq23-5h4f-vwpv', 'https://rustsec.org/advisories/RUSTSEC-2020-0105.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36212'} | null |
GHSA | GHSA-qqgx-2p2h-9c37 | Prototype Pollution | ### Overview
The `ini` npm package before version 1.3.6 has a Prototype Pollution vulnerability.
If an attacker submits a malicious INI file to an application that parses it with `ini.parse`, they will pollute the prototype on the application. This can be exploited further depending on the context.
### Patches
This has been patched in 1.3.6
### Steps to reproduce
payload.ini
```
[__proto__]
polluted = "polluted"
```
poc.js:
```
var fs = require('fs')
var ini = require('ini')
var parsed = ini.parse(fs.readFileSync('./payload.ini', 'utf-8'))
console.log(parsed)
console.log(parsed.__proto__)
console.log(polluted)
```
```
> node poc.js
{}
{ polluted: 'polluted' }
{ polluted: 'polluted' }
polluted
``` | {'CVE-2020-7788'} | 2021-07-28T21:12:38Z | 2020-12-10T16:53:45Z | HIGH | 7.3 | {'CWE-1321'} | {'https://www.npmjs.com/advisories/1589', 'https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1', 'https://github.com/advisories/GHSA-qqgx-2p2h-9c37', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html', 'https://snyk.io/vuln/SNYK-JS-INI-1048974', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7788'} | null |
GHSA | GHSA-m7h5-fjjq-559f | SQL Injection in topthink/thinkphp | ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods. | {'CVE-2020-20120'} | 2021-10-07T13:56:42Z | 2021-09-30T17:11:11Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-20120', 'https://github.com/advisories/GHSA-m7h5-fjjq-559f', 'https://github.com/top-think/thinkphp/issues/553'} | null |
GHSA | GHSA-mc8v-mgrf-8f4m | Clarify Content-Type handling | ### Impact
In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently.
### Patches
The OCI Distribution Specification will be updated to require that a `mediaType` value present in a manifest or index match the Content-Type header used during the push and pull operations.
### Workarounds
Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields.
### References
https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/opencontainers/distribution-spec/
* Email us at security@opencontainers.org
| {'CVE-2021-41190'} | 2022-04-19T19:03:13Z | 2021-11-18T16:13:08Z | LOW | 3 | {'CWE-843'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A2RRFNTMFYKOTRKD37F5ANMCIO3GGJML/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YIGVQWOA5XXCQXEOOKZX4CDAGLBDRPRX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQBCYJUIM5GVCMFUPRWKRZNXMMI5EFA4/', 'https://github.com/opencontainers/distribution-spec/commit/ac28cac0557bcd3084714ab09f9f2356fe504923', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4334HT7AZPLWNYHW4ARU6JBUF3VZJPZN/', 'https://github.com/advisories/GHSA-mc8v-mgrf-8f4m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41190', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZTO6N55WHKHIZI4IMLY2QFBPMVTAERM/', 'http://www.openwall.com/lists/oss-security/2021/11/19/10', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4OJ764CKKCWCVONHD4YXTGR7HZ7LRUV/', 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TUZNDAH2B26VPBK342UC3BHZNLBUXGX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DX63GRWFEI5RVMYV6XLMCG4OHPWZML27/'} | null |
GHSA | GHSA-9xww-fwh9-95c5 | Malicious Package in uglyfi-js | Version 3.4.6 of `uglyfi-js` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T21:56:46Z | 2020-09-02T21:43:59Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/911', 'https://github.com/advisories/GHSA-9xww-fwh9-95c5'} | null |
GHSA | GHSA-5854-jvxx-2cg9 | Denial of Service in subtext | Versions of `subtext` >=4.1.0 are vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
This package is deprecated and is now maintained as `@hapi/subtext`. Please update your dependencies to use `@hapi/subtext`. | null | 2020-09-03T15:46:57Z | 2020-09-03T15:46:57Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-5854-jvxx-2cg9', 'https://www.npmjs.com/advisories/1478'} | null |
GHSA | GHSA-9cxh-gqpx-qc5m | Credential Disclosure in System.DirectoryServices.Protocols | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A Information Disclosure vulnerability exists in .NET where System.DirectoryServices.Protocols.LdapConnection may send credentials in plain text on Linux.
### Patches
Any .NET application that uses `System.DirectoryServices.Protocols` with a vulnerable version listed below on system based on Linux.
Package name | Vulnerable versions | Secure versions
------------ | ---------------- | -------------------------
System.DirectoryServices.Protocols | 5.0.0 | 5.0.1
### Other Details
- Announcement for this issue can be found at dotnet/announcements#202
- An Issue for this can be found at https://github.com/dotnet/runtime/issues/60301
- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355 | {'CVE-2021-41355'} | 2022-02-08T20:42:45Z | 2021-10-12T17:49:25Z | MODERATE | 5.7 | {'CWE-200'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41355', 'https://github.com/dotnet/runtime/issues/60301', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41355', 'https://github.com/advisories/GHSA-9cxh-gqpx-qc5m', 'https://github.com/dotnet/runtime/security/advisories/GHSA-9cxh-gqpx-qc5m', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-hr3h-x6gq-rqcp | Cross site scripting via HTML attributes in the back end | ### Impact
It is possible for untrusted users to inject malicious code into HTML attributes in the back end, which will be executed both in the element preview (back end) and on the website (front end).
Installations are only affected if there are untrusted back end users who have the rights to modify HTML fields (e.g. TinyMCE).
### Patches
Update to Contao 4.4.56, 4.9.18 or 4.11.7
### Workarounds
Disable all fields that allow HTML for untrusted back end users or disable the login for these users.
### References
https://contao.org/en/security-advisories/cross-site-scripting-via-html-attributes-in-the-back-end.html
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
### Credits
Thanks to Mikhail Khramenkov and Moritz Vondano for reporting this security issue. | {'CVE-2021-35955'} | 2022-04-19T19:03:05Z | 2021-08-25T14:45:01Z | MODERATE | 5.9 | {'CWE-79'} | {'https://github.com/advisories/GHSA-hr3h-x6gq-rqcp', 'https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35955', 'https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html'} | null |
GHSA | GHSA-79p8-4cwq-rhqh | Directory Traversal in jn_jj_server | Affected versions of `jn_jj_server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16210'} | 2021-01-08T21:05:59Z | 2018-07-23T20:40:07Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16210', 'https://nodesecurity.io/advisories/424', 'https://www.npmjs.com/advisories/424', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jn_jj_server', 'https://github.com/advisories/GHSA-79p8-4cwq-rhqh'} | null |
GHSA | GHSA-4w5x-x539-ppf5 | Incorrect handling of credential expiry by NATS Server |
## Problem Description
NATS nats-server through 2020-10-07 has Incorrect Access Control because of how expired credentials are handled.
The NATS accounts system has expiration timestamps on credentials; the <https://github.com/nats-io/jwt> library had an API which encouraged misuse and an `IsRevoked()` method which misused its own API.
A new `IsClaimRevoked()` method has correct handling and the nats-server has been updated to use this. The old `IsRevoked()` method now always returns true and other client code will have to be updated to avoid calling it.
The CVE identifier should cover any application using the old JWT API, where the nats-server is one of those applications.
## Affected versions
#### JWT library
* all versions prior to 1.1.0
* fixed after nats-io/jwt PR 103 landed (2020-10-06)
#### NATS Server
* Version 2 prior to 2.1.9
+ 2.0.0 through and including 2.1.8 are vulnerable.
* fixed with nats-io/nats-server PRs 1632, 1635, 1645
## Impact
Time-based credential expiry did not work.
## Workaround
Have credentials which only expire after fixes can be deployed.
## Solution
Upgrade the JWT dependency in any application using it.
Upgrade the NATS server if using NATS Accounts. | {'CVE-2020-26892'} | 2022-02-11T23:42:49Z | 2022-02-11T23:42:20Z | HIGH | 5.9 | {'CWE-798'} | {'https://github.com/advisories/GHSA-4w5x-x539-ppf5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26892', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT67XCLIIBYRT762SVFBYFFTQFVSM3SI/', 'https://advisories.nats.io/CVE/CVE-2020-26892.txt', 'https://github.com/nats-io/jwt/security/advisories/GHSA-4w5x-x539-ppf5', 'https://github.com/nats-io/nats-server/commit/1e08b67f08e18cd844dce833a265aaa72500a12f', 'https://github.com/nats-io/nats-server/commits/master', 'https://www.openwall.com/lists/oss-security/2020/11/02/2'} | null |
GHSA | GHSA-c43q-5hpj-4crv | Local information disclosure via system temporary directory | ## Impact
Eclipse Jersey 2.28 - 2.33 and Eclipse Jersey 3.0.0 - 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the `File.createTempFile` which creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users.
## Workaround
This issue can be mitigated by manually setting the `java.io.tmpdir` system property when launching the JVM.
## Patches
Jersey 2.34 and 3.0.2 forward sets the correct permissions on the temporary file created by Jersey.
### References
- https://github.com/eclipse-ee4j/jersey/pull/4712
- [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
- [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
## Similar Vulnerabilities
Similar, but not the same:
- JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp
- Google Guava - https://github.com/google/guava/issues/4011
- Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945
- JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824
- Eclipse Jetty - https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
---
Original Disclosure:
> Hello Jersey Security Team,
>
> Utilizing a custom CodeQL query written as a part of the [GitHub Security Lab](https://securitylab.github.com/) [Bug Bounty program](https://securitylab.github.com/bounties), I've unearthed a local temporary file information disclosure vulnerability.
>
> You can see the custom CodeQL query utilized here:
> https://lgtm.com/query/8831016213790320486/
>
> This particular vulnerability exists because on unix-like systems (not including modern versions of MacOS) the system temporary directory is shared between all users. As such, failure to correctly set file permissions and/or verify exclusive creation of directories can lead to either local information disclosure, or local file hijacking by another user.
>
> This vulnerability impacts the following locations in this project's source:
>
> - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/FileProvider.java#L64-L73
> - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/media/multipart/src/main/java/org/glassfish/jersey/media/multipart/internal/FormDataParamValueParamProvider.java#L202-L208
>
> This vulnerability exists because of the vulnerability in the `Utils.createTempFile`:
>
> https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/Utils.java#L42-L53
>
> This is because `File.createTempFile` creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system.
>
> If there is sensitive information written to these files, it is disclosed to other local users on this system.
>
> The fix for this vulnerability is to use the `Files` API (instead of the `File` API) to create temporary files/directories as this new API correctly sets the posix file permissions. | {'CVE-2021-28168'} | 2022-04-22T15:48:58Z | 2021-04-23T16:55:01Z | MODERATE | 6.2 | {'CWE-732', 'CWE-379', 'CWE-378'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r96658b899fcdbf04947257d201dc5a0abdbb5fb0a8f4ec0a6c15e70f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc6221670de35b819fe191e7d8f2d17bc000549bd554020cec644b71e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc288874c330b3af9e29a1a114c5e0d24fff7a79eaa341f551535c8c0@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4066176a7352e021d7a81af460044bde8d57f40e98f8e4a31923af3a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra3290fe51b4546fac195724c4187c4cb7fc5809bc596c2f7e97606f4@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r280438f7cb4b3b1c9dfda9d7b05fa2a5cfab68618c6afee8169ecdaa@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r42fef440487a04cf5e487a9707ef5119d2dd5b809919f25ef4296fc4@%3Cjira.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-c43q-5hpj-4crv', 'https://github.com/eclipse-ee4j/jersey/pull/4712', 'https://lists.apache.org/thread.html/r454f38e85db149869c5a92c993c402260a4f8599bf283f6cfaada972@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdff6939e6c8dd620e20b013d9a35f57d42b3cd19e1d0483d85dfa2fd@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28168', 'https://lists.apache.org/thread.html/ra2722171d569370a9e15147d9f3f6138ad9a188ee879c0156aa2d73a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd54b42edccc1b993853a9c4943a9b16db763f5e2febf6e64b7d0fe3c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r305fb82e5c005143c1e2ec986a19c0a44f42189ab2580344dc955359@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6dadc8fe82071aba841d673ffadf34728bff4357796b1990a66e3af1@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra3d7cd37fc794981a885332af2f8df0d873753380ea19935d6d847fc@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rafc3c4cee534f478cbf8acf91e48373e291a21151f030e8132662a7b@%3Cjira.kafka.apache.org%3E', 'https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv'} | null |
GHSA | GHSA-968f-66r5-5v74 | HTTP Request Smuggling in Waitress: Invalid whitespace characters in headers (Follow-up) | ### Impact
The patches introduced to fix https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 were not complete and still would allow an attacker to smuggle requests/split a HTTP request with invalid data.
This updates the existing CVE with ID: CVE-2019-16789
### Patches
Waitress version 1.4.2 has been updated to now validate HTTP headers better to avoid the issue, completely fixing all known issues with whitespace.
### Workarounds
There are no work-arounds, upgrading to Waitress 1.4.2 is highly recommended.
### References
See https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 for more information on the security issue.
### For more information
If you have any questions or comments about this advisory:
* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related) | {'CVE-2019-16789'} | 2022-04-25T23:09:38Z | 2020-01-06T18:44:21Z | HIGH | 7.1 | {'CWE-444'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16789', 'https://github.com/Pylons/waitress/security/advisories/GHSA-968f-66r5-5v74', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://github.com/github/advisory-review/pull/14604', 'https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/', 'https://access.redhat.com/errata/RHSA-2020:0720', 'https://github.com/advisories/GHSA-968f-66r5-5v74'} | null |
GHSA | GHSA-ff5x-w9wg-h275 | Holder can generate proof of ownership for credentials it does not control in vp-toolkit | ### Impact
The [`verifyVerifiablePresentation()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-presentation-signer.ts#L97) method check the cryptographic integrity of the Verifiable Presentation, but it does not check if the [`credentialSubject.id`](https://github.com/rabobank-blockchain/vp-toolkit-models/blob/develop/src/model/verifiable-credential.ts#L150) DID matches the signer of the VP proof.
The **verifier** is impacted by this vulnerability.
### Patches
Patch will be available in version 0.2.2.
### Workarounds
- Compute the address out of the `verifiablePresentation.proof.n.verificationMethod` using `getAddressFromPubKey()` from `crypt-util@0.1.5` and match it with the `credentialSubject.id` address from the credential.
### References
[Github issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14)
### For more information
If you have any questions or comments about this advisory:
* Discuss in the existing [issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14)
* [Contact me](https://github.com/rabomarnix) | null | 2020-03-06T01:15:46Z | 2020-03-06T01:15:46Z | HIGH | 0 | null | {'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b', 'https://github.com/advisories/GHSA-ff5x-w9wg-h275', 'https://github.com/rabobank-blockchain/vp-toolkit/issues/14', 'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-ff5x-w9wg-h275'} | null |
GHSA | GHSA-89gc-6cw6-4vch | Spark allows remote attackers to read arbitrary files via a .. (dot dot) in the URI | Directory traversal vulnerability in Spark 2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI. | {'CVE-2016-9177'} | 2022-04-26T18:36:08Z | 2018-10-04T19:53:35Z | HIGH | 7.5 | {'CWE-22'} | {'https://access.redhat.com/errata/RHSA-2017:0868', 'https://github.com/perwendel/spark/issues/700', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9177', 'http://www.securityfocus.com/bid/94218', 'https://github.com/advisories/GHSA-89gc-6cw6-4vch', 'http://seclists.org/fulldisclosure/2016/Nov/13'} | null |
GHSA | GHSA-f9cv-665r-275h | Prototype Pollution in merge-change | All current versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function. | {'CVE-2021-23421'} | 2021-09-01T18:36:01Z | 2021-09-01T18:36:01Z | CRITICAL | 9.8 | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-MERGECHANGE-1310985', 'https://github.com/advisories/GHSA-f9cv-665r-275h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23421', 'https://github.com/VladimirShestakov/merge-change/blob/9901f145e06158f284f52de42e6ba5b0f702fb65/utils.js#L89-L123'} | null |
GHSA | GHSA-gvff-25cc-4f66 | Path Traversal in restify-swagger-jsdoc | Versions of `restify-swagger-jsdoc` prior to 3.2.1 are vulnerable to Path Traversal. The package fails to properly sanitize URLs, which may allow attackers to access server files outside the `swagger-ui` folder by using relative paths.
## Recommendation
Upgrade to version 3.2.1 or later. | null | 2021-09-28T21:56:34Z | 2020-09-03T17:15:56Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-gvff-25cc-4f66', 'https://www.npmjs.com/advisories/1037'} | null |
GHSA | GHSA-rvpq-5xqx-pfpp | High severity vulnerability that affects rails | Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112. | {'CVE-2006-4111'} | 2021-09-20T14:44:40Z | 2017-10-24T18:33:38Z | HIGH | 0 | {'CWE-94'} | {'http://www.securityfocus.com/bid/19454', 'https://github.com/advisories/GHSA-rvpq-5xqx-pfpp', 'http://secunia.com/advisories/21466', 'http://secunia.com/advisories/21749', 'https://nvd.nist.gov/vuln/detail/CVE-2006-4111', 'http://securitytracker.com/id?1016673', 'http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits', 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml', 'http://www.vupen.com/english/advisories/2006/3237', 'http://www.novell.com/linux/security/advisories/2006_21_sr.html', 'http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html'} | null |
GHSA | GHSA-gm8g-xhh8-rmwr | Prototype Pollution in doc-path | This affects the package doc-path before 2.1.2. | {'CVE-2020-7772'} | 2021-05-10T19:17:25Z | 2021-05-10T19:17:25Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://github.com/mrodrig/doc-path/blob/stable/src/path.js%23L54', 'https://github.com/advisories/GHSA-gm8g-xhh8-rmwr', 'https://snyk.io/vuln/SNYK-JS-DOCPATH-1011952', 'https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7772'} | null |
GHSA | GHSA-h9jc-284h-533g | Context isolation bypass via contextBridge in Electron | ### Impact
Apps using both `contextIsolation` and `contextBridge` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
### Fixed Versions
* `9.0.0-beta.21`
* `8.2.4`
* `7.2.4`
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@electronjs.org](mailto:security@electronjs.org) | {'CVE-2020-4077'} | 2021-01-07T23:48:29Z | 2020-07-07T00:01:10Z | HIGH | 7.7 | {'CWE-501'} | {'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824', 'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0', 'https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4077', 'https://github.com/advisories/GHSA-h9jc-284h-533g'} | null |
GHSA | GHSA-vf94-36g5-69v8 | Division by zero in TFLite's implementation of `DepthToSpace` | ### Impact
The implementation of the `DepthToSpace` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/depth_to_space.cc#L63-L69):
```cc
const int block_size = params->block_size;
...
const int input_channels = input->dims->data[3];
...
int output_channels = input_channels / block_size / block_size;
```
An attacker can craft a model such that `params->block_size` is 0.
### Patches
We have patched the issue in GitHub commit [106d8f4fb89335a2c52d7c895b7a7485465ca8d9](https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29595'} | 2021-05-21T14:27:49Z | 2021-05-21T14:27:49Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vf94-36g5-69v8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29595', 'https://github.com/advisories/GHSA-vf94-36g5-69v8'} | null |
GHSA | GHSA-5xmj-wm96-fmw8 | Moderate severity vulnerability that affects actionpack | Withdrawn, accidental duplicate publish.
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818. | null | 2021-12-03T14:20:06Z | 2018-09-17T21:54:37Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-5xmj-wm96-fmw8', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7829'} | null |
GHSA | GHSA-h6gw-r52c-724r | NULL Pointer Dereference and Access of Uninitialized Pointer in TensorFlow | ### Impact
The [code for boosted trees in TensorFlow](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc) is still missing validation. This allows malicious users to read and write outside of bounds of heap allocated data as well as trigger denial of service (via dereferencing `nullptr`s or via `CHECK`-failures).
This follows after CVE-2021-41208 where these APIs were still vulnerable to multiple security issues.
**Note**: Given that the boosted trees implementation in TensorFlow is unmaintained, it is recommend to no longer use these APIs. Instead, please use the downstream [TensorFlow Decision Forests](https://github.com/tensorflow/decision-forests) project which is newer and supports more features.
These APIs are now deprecated in TensorFlow 2.8. We will remove TensorFlow's boosted trees APIs in subsequent releases.
### Patches
We have patched the known issues in multiple GitHub commits.
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
This should allow users to use existing boosted trees APIs for a while until they migrate to [TensorFlow Decision Forests](https://github.com/tensorflow/decision-forests), while guaranteeing that known vulnerabilities are fixed.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
These vulnerabilities have been reported by Yu Tian of Qihoo 360 AIVul Team and Faysal Hossain Shezan from University of Virginia. Some of the issues have been discovered internally after a careful audit of the APIs. | null | 2022-03-23T22:53:23Z | 2022-02-09T23:38:36Z | CRITICAL | 9.3 | {'CWE-476', 'CWE-824'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6gw-r52c-724r', 'https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc', 'https://github.com/advisories/GHSA-h6gw-r52c-724r'} | null |
GHSA | GHSA-2gw2-8q9w-cw8p | Ruby-ffi has a DLL loading issue | ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later. | {'CVE-2018-1000201'} | 2022-04-26T18:29:59Z | 2018-08-31T14:55:43Z | HIGH | 7.8 | {'CWE-426'} | {'https://github.com/advisories/GHSA-2gw2-8q9w-cw8p', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000201', 'https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c', 'https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a'} | null |
GHSA | GHSA-4qq9-rrq6-48ff | Moderate severity vulnerability that affects org.apache.nifi:nifi | The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release. | {'CVE-2018-17193'} | 2021-09-01T18:01:39Z | 2018-12-20T22:02:39Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-17193', 'https://nifi.apache.org/security.html#CVE-2018-17193', 'https://github.com/advisories/GHSA-4qq9-rrq6-48ff'} | null |
GHSA | GHSA-2fqw-684c-pvp7 | An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node. | An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node. | {'CVE-2020-35213'} | 2022-01-04T18:59:03Z | 2021-12-17T20:40:50Z | HIGH | 8.1 | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35213', 'https://github.com/advisories/GHSA-2fqw-684c-pvp7', 'https://docs.google.com/presentation/d/1i8tVVGE8z9Rtl9UTwktOJpkZwT4kBVLgIk307qMiw_8/edit?usp=sharing'} | null |
GHSA | GHSA-jgm9-xpfj-4fq6 | Path traversal in Onionshare | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerability ID: OTF-013
- Vulnerability type: Improper Hardening
- Threat level: Low
## Description:
The filesystem restriction could be hardened and should only allow for pre-defined subfolders.
## Technical description:
The Flatpak and Snap configurations allow for read-only access on the whole home folder. The relevant lines in the configuration files are `onionshare/snap/snapcraft.yaml#L20` and `onionshare/flatpak/org.onionshare.OnionShare.yaml#L19` , respectively.
The encapsulation of filesystem access via these mechanisms should be restricted to pre-defined folders and not allow for access to (configuration) files outside the Onionshare-specific folders.
Sadly Snap does not allow for further restriction to specific folders and therefore cannot be further hardened. By default both frameworks disallow access to hidden folders and therefore reduce the potential impact.
## Impact:
An adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced.
## Recommendation:
- Reduce read access in Flatpak configuration. | {'CVE-2022-21693'} | 2022-01-21T23:20:19Z | 2022-01-21T23:20:19Z | MODERATE | 6.3 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21693', 'https://github.com/onionshare/onionshare/security/advisories/GHSA-jgm9-xpfj-4fq6', 'https://github.com/advisories/GHSA-jgm9-xpfj-4fq6', 'https://github.com/onionshare/onionshare/releases/tag/v2.5'} | null |
GHSA | GHSA-m358-g4rp-533r | SQL Injection in Casdoor | The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations. | {'CVE-2022-24124'} | 2022-03-01T18:52:49Z | 2022-02-01T00:49:39Z | HIGH | 7.5 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24124', 'https://github.com/casdoor/casdoor/commit/5ec0c7a89005819960d8fe07f5ddda13d1371b8c', 'https://github.com/casdoor/casdoor/pull/442', 'https://github.com/advisories/GHSA-m358-g4rp-533r', 'https://github.com/casdoor/casdoor/compare/v1.13.0...v1.13.1', 'http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html', 'https://github.com/casdoor/casdoor/issues/439'} | null |
GHSA | GHSA-qfxv-qqvg-24pg | OS Command Injection in im-metadata | im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function. | {'CVE-2019-10788'} | 2021-04-13T15:17:36Z | 2021-04-13T15:17:36Z | HIGH | 9.8 | {'CWE-78'} | {'https://github.com/advisories/GHSA-qfxv-qqvg-24pg', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10788', 'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639', 'https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184'} | null |
GHSA | GHSA-2p99-6f47-8x9j | Malicious Package in asnc | All versions of `asnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T13:55:37Z | 2020-09-02T18:38:39Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-2p99-6f47-8x9j', 'https://www.npmjs.com/advisories/845'} | null |
GHSA | GHSA-j239-4gqg-5j54 | Inadequate Encryption Strength | Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution | {'CVE-2017-1000486'} | 2021-06-03T19:22:22Z | 2021-06-03T19:22:22Z | CRITICAL | 9.8 | {'CWE-326'} | {'https://www.exploit-db.com/exploits/43733/', 'https://cryptosense.com/weak-encryption-flaw-in-primefaces/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000486', 'https://github.com/advisories/GHSA-j239-4gqg-5j54', 'http://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html', 'https://github.com/primefaces/primefaces/issues/1152'} | null |
GHSA | GHSA-c8xf-m4ff-jcxj | Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15 | In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate. | {'CVE-2016-1000339'} | 2021-09-08T21:44:47Z | 2018-10-17T16:23:38Z | MODERATE | 5.3 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2016-1000339', 'https://usn.ubuntu.com/3727-1/', 'https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0', 'https://github.com/advisories/GHSA-c8xf-m4ff-jcxj', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2', 'https://access.redhat.com/errata/RHSA-2018:2927'} | null |
GHSA | GHSA-57hg-26h7-9qgv | pimcore is vulnerable to Cross-site Scripting | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2022-0256'} | 2022-01-25T20:49:11Z | 2022-01-21T23:48:07Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-57hg-26h7-9qgv', 'https://huntr.dev/bounties/8d88e48a-7124-4aaf-9f1d-6cfe4f9a79c1', 'https://github.com/pimcore/pimcore/commit/dff1cb0c466abcd55f1268934de3ed937b7436a7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0256'} | null |
GHSA | GHSA-m6m5-pp4g-fcc8 | S3 storage write is not aborted on errors leading to unbounded memory usage | ### Impact
Anyone using storage.blob.s3 introduced in 0.5.0 with storage.imapsql.
```
storage.imapsql local_mailboxes {
...
msg_store s3 {
...
}
}
```
### Patches
The relevant commit is pushed to master and will be included in the 0.5.1 release.
No special handling of the issue has been done due to the small amount of affected users.
### Workarounds
None.
### References
* Original report: https://github.com/foxcpp/maddy/issues/395
* Fix: https://github.com/foxcpp/maddy/commit/07c8495ee4394fabbf5aac4df8aebeafb2fb29d8 | null | 2021-10-06T17:47:35Z | 2021-10-06T17:47:35Z | HIGH | 7.5 | {'CWE-772'} | {'https://github.com/advisories/GHSA-m6m5-pp4g-fcc8', 'https://github.com/foxcpp/maddy/security/advisories/GHSA-m6m5-pp4g-fcc8'} | null |
GHSA | GHSA-xhg2-rvm8-w2jh | Cross-site Request Forgery (CSRF) | Rancher 2 through 2.2.4 is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher. The attack requires a victim to be logged into a Rancher server, and then to access a third-party site hosted by the exploiter. Once that is accomplished, the exploiter is able to execute commands against the cluster's Kubernetes API with the permissions and identity of the victim. | {'CVE-2019-13209'} | 2022-04-25T20:20:19Z | 2021-05-18T15:42:40Z | HIGH | 8.7 | {'CWE-352', 'CWE-79'} | {'https://github.com/advisories/GHSA-xhg2-rvm8-w2jh', 'https://forums.rancher.com/c/announcements', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13209', 'https://github.com/rancher/rancher/commit/0ddffe484adccb9e37d9432e8e625d8ebbfb0088', 'https://forums.rancher.com/t/rancher-release-v2-2-5-addresses-rancher-cve-2019-13209/14801'} | null |
GHSA | GHSA-wq7q-7vfh-2x3h | Downloads Resources over HTTP in install-nw | Affected versions of `install-nw` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `install-nw`.
## Recommendation
Update to version 1.1.5 or later. | {'CVE-2016-10566'} | 2021-01-08T01:39:02Z | 2019-02-18T23:54:09Z | HIGH | 0 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10566', 'https://github.com/advisories/GHSA-wq7q-7vfh-2x3h', 'https://www.npmjs.com/advisories/204', 'https://nodesecurity.io/advisories/204'} | null |
GHSA | GHSA-wpg7-2c88-r8xv | Exposure of Sensitive Information in simple-get | In versions of simple-get prior to 4.0.1, 3.1.1, and 2.8.2, when fetching a remote url with a cookie location response, headers will be followed, potentially resulting in an exposure of the session cookie to a third party. | {'CVE-2022-0355'} | 2022-02-03T16:08:57Z | 2022-01-28T22:54:16Z | HIGH | 7.5 | {'CWE-200'} | {'https://github.com/feross/simple-get/commit/e4af095e06cd69a9235013e8507e220a79b9684f', 'https://github.com/feross/simple-get/pull/76#issuecomment-1027754710', 'https://github.com/feross/simple-get/pull/75#issuecomment-1027755026', 'https://huntr.dev/bounties/42c79c23-6646-46c4-871d-219c0d4b4e31', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0355', 'https://github.com/advisories/GHSA-wpg7-2c88-r8xv'} | null |
GHSA | GHSA-vx8q-j7h9-vf6q | Exposure of Sensitive Information to an Unauthorized Actor in PhpMyAdmin | PhpMyAdmin before 5.1.3 allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section. | {'CVE-2022-0813'} | 2022-03-17T21:44:09Z | 2022-03-11T00:02:24Z | HIGH | 7.5 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0813', 'https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information', 'https://github.com/advisories/GHSA-vx8q-j7h9-vf6q', 'https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/'} | null |
GHSA | GHSA-p62g-jhg6-v3rq | Code Injection, Race Condition, and Execution with Unnecessary Privileges in Ansible | A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection. | {'CVE-2020-10684'} | 2022-01-04T18:54:45Z | 2021-04-07T20:37:06Z | LOW | 7.1 | {'CWE-94', 'CWE-862', 'CWE-362', 'CWE-250'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-10684', 'https://security.gentoo.org/glsa/202006-11', 'https://www.debian.org/security/2021/dsa-4950', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://github.com/advisories/GHSA-p62g-jhg6-v3rq', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'} | null |
GHSA | GHSA-39qv-prmh-x37f | Prototype Pollution in @strikeentco/set | This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821 | {'CVE-2021-23497'} | 2022-02-11T16:16:33Z | 2022-02-05T00:00:26Z | HIGH | 7.5 | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-2385945', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23497', 'https://github.com/advisories/GHSA-39qv-prmh-x37f', 'https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/strikeentco/set/commit/b2f942c'} | null |
GHSA | GHSA-wwrj-35w6-77ff | CSRF vulnerability in save-server | ### Impact
Versions prior to version v1.05 are affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version v1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version.
This is patched by implementing [Double submit](https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f).
The CSRF attack would require you to navigate to a malicious site while you have an active session with Save-Server (Session key stored in cookies). The malicious user would then be able to perform some actions, including:
- Upload file
- Delete file
- Add redirect
#### If you are logged in as root, this attack is significantly more severe. They can (in addition to the above):
- Create users
- Delete users
- Update users (change password)
If they updated the password of a user, that user's files would then be available. If the root password is updated, all files would be visible if they logged in with the new password.
Note that due to the same origin policy malicious actors cannot view the gallery or the response of any of the methods, nor be sure they succeeded.
### Patches
This issue has been patched. Update to version v1.0.7 or above to benefit from this fix.
### Workarounds
None. You should upgrade.
### References
What is CSRF: https://owasp.org/www-community/attacks/csrf
Fix type: https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Save-server](https://github.com/Neztore/save-server/)
* Email us at [hi@nezto.re](mailto:hi@nezto.re)
* Join our discord (preferred): [Invite](https://discord.gg/QevWabU) | {'CVE-2020-15135'} | 2021-01-07T23:42:19Z | 2020-08-04T14:54:08Z | MODERATE | 6.7 | {'CWE-352'} | {'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f', 'https://github.com/advisories/GHSA-wwrj-35w6-77ff', 'https://github.com/Neztore/save-server/security/advisories/GHSA-wwrj-35w6-77ff', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15135', 'https://www.npmjs.com/package/save-server'} | null |
GHSA | GHSA-h2rj-8wgg-mm43 | Cross-site Scripting in craftcms | Craft CMS before 3.6.13 has an XSS vulnerability. | {'CVE-2021-32470'} | 2022-03-21T20:41:37Z | 2022-03-18T17:53:37Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3613---2021-05-04', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32470', 'https://github.com/advisories/GHSA-h2rj-8wgg-mm43'} | null |
GHSA | GHSA-64wv-8vwp-xgw2 | Use of Uninitialized Resource in ash. | An issue was discovered in the ash crate before 0.33.1 for Rust. util::read_spv may read from uninitialized memory locations. | {'CVE-2021-45688'} | 2022-01-07T17:19:25Z | 2022-01-06T22:13:02Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-45688', 'https://github.com/advisories/GHSA-64wv-8vwp-xgw2', 'https://rustsec.org/advisories/RUSTSEC-2021-0090.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ash/RUSTSEC-2021-0090.md'} | null |
GHSA | GHSA-qr32-j4j6-3m7r | Command Injection in fs-git | Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution.
## Recommendation
Update to version 1.0.2 or later. | {'CVE-2017-16087'} | 2021-08-04T20:06:57Z | 2019-05-29T20:23:00Z | HIGH | 0 | {'CWE-77'} | {'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16087', 'https://www.npmjs.com/advisories/360', 'https://github.com/advisories/GHSA-qr32-j4j6-3m7r'} | null |
GHSA | GHSA-xpfp-f569-q3p2 | SQL Injection in Django | Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application. | {'CVE-2021-35042'} | 2022-03-03T20:45:47Z | 2021-09-22T17:34:49Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-35042', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://github.com/advisories/GHSA-xpfp-f569-q3p2', 'https://github.com/django/django/commit/0bd57a879a0d54920bb9038a732645fb917040e9', 'https://security.netapp.com/advisory/ntap-20210805-0008/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/', 'https://www.djangoproject.com/weblog/2021/jul/01/security-releases/', 'https://www.openwall.com/lists/oss-security/2021/07/02/2', 'https://groups.google.com/forum/#!forum/django-announce'} | null |
GHSA | GHSA-5hmm-x8q8-w5jh | LDAP authentication bypass with empty password | ### Impact
Users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider.
Only deployments where LDAP servers are configured to allow unauthenticated binds (eg. default on Active Directory) are affected.
### Patches
A fix has been implemented that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. See https://github.com/alerta/alerta/pull/1345
### Workarounds
LDAP administrators can disallow unauthenticated bind requests by clients.
### References
https://tools.ietf.org/html/rfc4513#section-5.1.2
https://pypi.org/project/alerta-server/8.1.0/
### For more information
If you have any questions or comments about this advisory:
* Add a comment to the issue [#1277](https://github.com/alerta/alerta/issues/1277)
* Email us at [admin@alerta.dev](mailto:admin@alerta.dev) | {'CVE-2020-26214'} | 2022-04-19T19:02:39Z | 2020-11-06T17:35:49Z | HIGH | 9.1 | {'CWE-287'} | {'https://github.com/alerta/alerta/security/advisories/GHSA-5hmm-x8q8-w5jh', 'https://tools.ietf.org/html/rfc4513#section-5.1.2', 'https://github.com/alerta/alerta/commit/2bfa31779a4c9df2fa68fa4d0c5c909698c5ef65', 'https://github.com/alerta/alerta/pull/1345', 'https://github.com/alerta/alerta/issues/1277', 'https://github.com/advisories/GHSA-5hmm-x8q8-w5jh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26214', 'https://pypi.org/project/alerta-server/8.1.0/'} | null |
GHSA | GHSA-8h2g-r292-j8xh | L7 deny intention results in an allow action | In HashiCorp Consul before 1.10.1 (and Consul Enterprise), xds can generate a situation where a single L7 deny intention (with a default deny policy) results in an allow action. | {'CVE-2021-36213'} | 2021-10-05T17:32:02Z | 2021-07-19T21:21:12Z | HIGH | 7.5 | null | {'https://github.com/hashicorp/consul/releases/tag/v1.10.1', 'https://www.hashicorp.com/blog/category/consul', 'https://discuss.hashicorp.com/t/hcsec-2021-16-consul-s-application-aware-intentions-deny-action-fails-open-when-combined-with-default-deny-policy/26855', 'https://github.com/advisories/GHSA-8h2g-r292-j8xh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36213'} | null |
GHSA | GHSA-pvv8-8fx9-h673 | Path Traversal in @backstage/plugin-scaffolder-backend | ### Impact
A malicious actor could read sensitive files from the environment where Scaffolder tasks are run. The attack is executed by crafting a custom Scaffolder template with a `publish:github:pull-request` action using a particular source path. When the template is executed the sensitive files would be included in the published pull request.
This vulnerability is mitigated by the fact that an attacker would need access to create and register templates in the Backstage catalog, and that the attack is very visible given that the exfiltration happens via a pull request.
### Patches
The vulnerability is patched in the `0.15.9` release of `@backstage/plugin-scaffolder-backend`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage) | {'CVE-2021-41151'} | 2021-10-25T20:07:48Z | 2021-10-19T15:28:03Z | MODERATE | 6.8 | {'CWE-22'} | {'https://github.com/backstage/backstage/releases/tag/release-2021-10-16', 'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006', 'https://github.com/backstage/backstage/security/advisories/GHSA-pvv8-8fx9-h673', 'https://github.com/advisories/GHSA-pvv8-8fx9-h673', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41151'} | null |
GHSA | GHSA-cg3q-59w7-rvc2 | Reliance on Cookies without Validation and Integrity Checking in getgrav/grav | grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking. A cookie with an overly broad path can be accessed through other applications on the same domain. Since cookies often carry sensitive information such as session identifiers, sharing cookies across applications can lead a vulnerability in one application to cause a compromise in another. | {'CVE-2021-3818'} | 2021-10-04T14:11:39Z | 2021-09-29T17:12:51Z | MODERATE | 6.3 | {'CWE-565'} | {'https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07', 'https://github.com/advisories/GHSA-cg3q-59w7-rvc2', 'https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea'} | null |
GHSA | GHSA-fr77-rrx3-cp7g | Heap OOB read in `tf.ragged.cross` | ### Impact
The [shape inference code for `tf.ragged.cross`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/ragged_array_ops.cc#L64) can trigger a read outside of bounds of heap allocated array:
```python
import tensorflow as tf
@tf.function
def test():
y = tf.raw_ops.RaggedCross(ragged_values=[],
ragged_row_splits=[],
sparse_indices=[[5]],
sparse_values=[],
sparse_shape=[5],
dense_inputs=[['a']],
input_order='RD',
hashed_output=False,
num_buckets=5,
hash_key=2,
out_values_type=tf.string,
out_row_splits_type=tf.int64)
return y
test()
```
### Patches
We have patched the issue in GitHub commit [fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8](https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41212'} | 2021-11-10T19:00:31Z | 2021-11-10T19:00:31Z | HIGH | 7.1 | {'CWE-125'} | {'https://github.com/advisories/GHSA-fr77-rrx3-cp7g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41212', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g', 'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'} | null |
GHSA | GHSA-w9fg-xffh-p362 | Denial of service (via resource exhaustion) due to improper input validation on third-party identifier endpoints | ### Impact
Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion.
### Patches
The issue is fixed by #9321.
### Workarounds
Depending on the needs and configuration of the homeserver a few options are available:
1. Using email as third-party identifiers be disabled by not configuring the `email` setting.
2. Using phone numbers as third-party identifiers can be disabled by ensuring that `account_threepid_delegates.msisdn` is not configured.
3. Additionally, the affected endpoint patterns can be blocked at a reverse proxy:
* `^/_matrix/client/(r0|unstable)/register/email`
* `^/_matrix/client/(r0|unstable)/register/msisdn`
* `^/_matrix/client/(r0|unstable)/account/password`
* `^/_matrix/client/(r0|unstable)/account/3pid` | {'CVE-2021-21394'} | 2021-08-31T21:08:03Z | 2021-04-13T15:12:51Z | MODERATE | 5.3 | {'CWE-20'} | {'https://github.com/advisories/GHSA-w9fg-xffh-p362', 'https://github.com/matrix-org/synapse/pull/9393', 'https://github.com/matrix-org/synapse/pull/9321', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21394', 'https://pypi.org/project/matrix-synapse/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-w9fg-xffh-p362'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.