ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-g4mq-6fp5-qwcf | Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible | A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'. | {'CVE-2020-1733'} | 2022-04-26T18:13:07Z | 2021-04-20T16:46:12Z | MODERATE | 5 | {'CWE-362', 'CWE-377', 'CWE-668'} | {'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html', 'https://security.gentoo.org/glsa/202006-11', 'https://www.debian.org/security/2021/dsa-4950', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://github.com/advisories/GHSA-g4mq-6fp5-qwcf', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1733', 'https://github.com/ansible/ansible/issues/67791', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'} | null |
GHSA | GHSA-wjf2-7f9g-86f5 | Malicious Package in fast-requests | All versions of `fast-requests` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company. | null | 2021-09-30T20:05:44Z | 2020-09-03T18:23:38Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-wjf2-7f9g-86f5', 'https://www.npmjs.com/advisories/1086'} | null |
GHSA | GHSA-xmxh-g7wj-8m4m | OS Command Injection in curling | npm package `curling` before version 1.1.0 is vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization. | {'CVE-2019-10789'} | 2021-04-13T15:32:26Z | 2021-04-13T15:32:26Z | HIGH | 9.8 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10789', 'https://github.com/advisories/GHSA-xmxh-g7wj-8m4m', 'https://snyk.io/vuln/SNYK-JS-CURLING-546484', 'https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53/lib/curl-transport.js#L56'} | null |
GHSA | GHSA-xxfr-jrgh-x392 | Remote code execution in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1057, CVE-2020-1180. | {'CVE-2020-1172'} | 2021-08-02T17:29:01Z | 2021-08-02T17:29:01Z | HIGH | 7.5 | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1172', 'https://github.com/advisories/GHSA-xxfr-jrgh-x392', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1172', 'https://github.com/chakra-core/ChakraCore/pull/6500'} | null |
GHSA | GHSA-p4x4-rw2p-8j8m | Cross-site Scripting in Sanitize | When HTML is sanitized using Sanitize's "relaxed" config or a custom config that allows certain elements, some content in a `<math>` or `<svg>` element may not be sanitized correctly even if `math` and `svg` are not in the allowlist.
You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements:
- `iframe`
- `math`
- `noembed`
- `noframes`
- `noscript`
- `plaintext`
- `script`
- `style`
- `svg`
- `xmp`
### Impact
Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser.
### Releases
This problem has been fixed in Sanitize 5.2.1.
### Workarounds
If upgrading is not possible, a workaround is to override the default value of Sanitize's `:remove_contents` config option with the following value, which ensures that the contents of `math` and `svg` elements (among others) are removed entirely when those elements are not in the allowlist:
```ruby
%w[iframe math noembed noframes noscript plaintext script style svg xmp]
```
For example, if you currently use Sanitize's relaxed config, you can create a custom config object that overrides the default value of `:remove_contents` like this:
```ruby
custom_config = Sanitize::Config.merge(
Sanitize::Config::RELAXED,
:remove_contents => %w[iframe math noembed noframes noscript plaintext script style svg xmp]
)
```
You would then pass this custom config to Sanitize when sanitizing HTML.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in the [Sanitize repo](https://github.com/rgrove/sanitize).
- See Sanitize's [security policy](https://github.com/rgrove/sanitize/security/policy).
### Credits
Many thanks to Michal Bentkowski of Securitum for reporting this bug and helping to verify the fix.
### References
- [GHSA-p4x4-rw2p-8j8m](https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m)
- [CVE-2020-4054](https://nvd.nist.gov/vuln/detail/CVE-2020-4054)
- https://github.com/rgrove/sanitize/releases/tag/v5.2.1 | {'CVE-2020-4054'} | 2021-01-08T17:08:41Z | 2020-06-16T22:08:06Z | HIGH | 7.3 | {'CWE-79'} | {'https://github.com/advisories/GHSA-p4x4-rw2p-8j8m', 'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9', 'https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4054', 'https://github.com/rgrove/sanitize/releases/tag/v5.2.1', 'https://www.debian.org/security/2020/dsa-4730', 'https://usn.ubuntu.com/4543-1/'} | null |
GHSA | GHSA-wc4x-4gm2-74j8 | Improper Certificate Validation in Apache Geode | When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack. | {'CVE-2019-10091'} | 2022-02-10T20:51:04Z | 2022-02-10T20:51:04Z | MODERATE | 7.4 | {'CWE-295'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10091', 'https://lists.apache.org/thread.html/r3342077ac4798631300366be86e545d0c08753cca8fd2663867fe200%40%3Cdev.geode.apache.org%3E', 'https://github.com/advisories/GHSA-wc4x-4gm2-74j8'} | null |
GHSA | GHSA-32xf-jwmv-9hf3 | Directory traversal attack in Spring Cloud Config | Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack. | {'CVE-2020-5410'} | 2021-01-08T20:13:13Z | 2020-06-05T16:13:20Z | MODERATE | 0 | {'CWE-23'} | {'https://github.com/advisories/GHSA-32xf-jwmv-9hf3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5410', 'https://tanzu.vmware.com/security/cve-2020-5410'} | null |
GHSA | GHSA-g2pf-qjgf-6fw3 | Downloads Resources over HTTP in openframe-glslviewer | Affected versions of `openframe-glslviewer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-glslviewer`.
## Recommendation
No patch is currently available for this vulnerability, and the package hasn't been updated since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10607'} | 2021-09-16T20:41:46Z | 2019-02-18T23:33:42Z | HIGH | 0 | {'CWE-311', 'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10607', 'https://github.com/advisories/GHSA-g2pf-qjgf-6fw3', 'https://nodesecurity.io/advisories/208', 'https://www.npmjs.com/advisories/208'} | null |
GHSA | GHSA-6rmq-x2hv-vxpp | Vulnerable third party libraries in certain configurations of Symfony | In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details | {'CVE-2019-6338'} | 2021-08-19T15:23:19Z | 2019-12-02T18:11:25Z | HIGH | 8 | {'CWE-502'} | {'https://www.debian.org/security/2019/dsa-4370', 'http://www.securityfocus.com/bid/106706', 'https://lists.debian.org/debian-lts-announce/2019/02/msg00032.html', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6338.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6338', 'https://github.com/advisories/GHSA-6rmq-x2hv-vxpp', 'https://www.drupal.org/sa-core-2019-001'} | null |
GHSA | GHSA-gggp-gh2p-996x | Path Traversal in LemMinX | A flaw was found in LemMinX in versions prior to 0.19.0. Cache poisoning of external schema files is possible due to directory traversal. | {'CVE-2022-0673'} | 2022-03-02T21:56:44Z | 2022-02-19T00:01:27Z | MODERATE | 6.5 | {'CWE-22'} | {'https://github.com/eclipse/lemminx/pull/1171', 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14-2022', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0673', 'https://github.com/advisories/GHSA-gggp-gh2p-996x'} | null |
GHSA | GHSA-6rhx-hqxm-8p36 | Double free in http | An issue was discovered in the http crate before 0.1.20 for Rust. The HeaderMap::Drain API can use a raw pointer, defeating soundness. | {'CVE-2019-25009'} | 2021-08-25T20:46:44Z | 2021-08-25T20:46:44Z | CRITICAL | 9.8 | {'CWE-415'} | {'https://rustsec.org/advisories/RUSTSEC-2019-0034.html', 'https://github.com/advisories/GHSA-6rhx-hqxm-8p36', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25009'} | null |
GHSA | GHSA-xg6r-5gx4-qxjm | invoiceninja is vulnerable to Cross-site Scripting | invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-3977'} | 2022-01-06T21:58:34Z | 2022-01-06T21:58:34Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/invoiceninja/invoiceninja/releases/tag/v5.3.35', 'https://github.com/advisories/GHSA-xg6r-5gx4-qxjm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3977', 'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f', 'https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde'} | null |
GHSA | GHSA-769c-qphh-g3wm | Downloads Resources over HTTP in macaca-chromedriver | Affected versions of `macaca-chromedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `macaca-chromedriver`.
## Recommendation
Update to version 1.0.29 or later. | {'CVE-2016-10586'} | 2021-01-08T20:58:41Z | 2019-02-18T23:51:09Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/advisories/GHSA-769c-qphh-g3wm', 'https://www.npmjs.com/advisories/180', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10586', 'https://nodesecurity.io/advisories/180'} | null |
GHSA | GHSA-6p48-xfj3-jw67 | Downloads Resources over HTTP in fibjs | Affected versions of `fibjs` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fibjs`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10621'} | 2021-01-08T19:21:02Z | 2019-02-18T23:56:54Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/advisories/GHSA-6p48-xfj3-jw67', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10621', 'https://nodesecurity.io/advisories/217', 'https://www.npmjs.com/advisories/217'} | null |
GHSA | GHSA-f94m-mqhr-mc29 | Moderate severity vulnerability that affects io.spray:spray-json_2.10, io.spray:spray-json_2.11, and io.spray:spray-json_2.12 | Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of a field composed of many decimal digits. | {'CVE-2018-18853'} | 2021-09-09T21:50:22Z | 2018-11-09T17:42:26Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/advisories/GHSA-f94m-mqhr-mc29', 'https://github.com/spray/spray-json/issues/278', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18853'} | null |
GHSA | GHSA-5q6m-3h65-w53x | Improper Neutralization of Special Elements used in an OS Command. | react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you. | {'CVE-2021-24033'} | 2021-03-11T22:26:09Z | 2021-03-11T22:26:09Z | MODERATE | 0 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-24033', 'https://github.com/facebook/create-react-app/pull/10644', 'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268', 'https://www.facebook.com/security/advisories/cve-2021-24033', 'https://github.com/advisories/GHSA-5q6m-3h65-w53x'} | null |
GHSA | GHSA-rprj-g6xc-p5gq | Moderate severity vulnerability that affects wicked | Directory traversal vulnerability in controller/concerns/render_redirect.rb in the Wicked gem before 1.0.1 for Ruby allows remote attackers to read arbitrary files via a %2E%2E%2F (encoded dot dot slash) in the step. | {'CVE-2013-4413'} | 2021-09-17T19:24:02Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-rprj-g6xc-p5gq', 'http://www.securityfocus.com/bid/62891', 'http://secunia.com/advisories/55151', 'http://seclists.org/oss-sec/2013/q4/43', 'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87783', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4413'} | null |
GHSA | GHSA-64x2-gq24-75pv | Cross-site scripting in Apache CXF | By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573. | {'CVE-2020-13954'} | 2022-04-22T17:19:15Z | 2021-04-22T16:15:23Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r640719c9ce5671f239a6f002c20e14062effe4b318a580b6746aa5ef@%3Cdev.syncope.apache.org%3E', 'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20210513-0010/', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2020-13954.txt.asc?version=1&modificationDate=1605183670659&api=v2', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-64x2-gq24-75pv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13954', 'http://www.openwall.com/lists/oss-security/2020/11/12/2', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E'} | null |
GHSA | GHSA-m72m-mhq2-9p6c | Uncaught Exception in jsoup | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Those using jsoup to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Users should upgrade to jsoup 1.14.2
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Users may rate limit input parsing. Users should limit the size of inputs based on system resources. Users should implement thread watchdogs to cap and timeout parse runtimes.
| {'CVE-2021-37714'} | 2022-04-19T19:03:05Z | 2021-08-23T19:42:38Z | HIGH | 7.5 | {'CWE-248', 'CWE-835'} | {'https://jsoup.org/news/release-1.14.2', 'https://lists.apache.org/thread.html/r377b93d79817ce649e9e68b3456e6f499747ef1643fa987b342e082e@%3Cissues.maven.apache.org%3E', 'https://github.com/advisories/GHSA-m72m-mhq2-9p6c', 'https://lists.apache.org/thread.html/r215009dbf7467a9f6506d0c0024cb36cad30071010e62c9352cfaaf0@%3Cissues.maven.apache.org%3E', 'https://lists.apache.org/thread.html/r3d71f18adb78e50f626dde689161ca63d3b7491bd9718fcddfaecba7@%3Cissues.maven.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0022/', 'https://lists.apache.org/thread.html/r97404676a5cf591988faedb887d64e278f522adcaa823d89ca69defe@%3Cnotifications.james.apache.org%3E', 'https://jsoup.org/news/release-1.14.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37714', 'https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c', 'https://lists.apache.org/thread.html/r50e9c9466c592ca9d707a5dea549524d19e3287da08d8392f643960e@%3Cissues.maven.apache.org%3E', 'https://lists.apache.org/thread.html/r685c5235235ad0c26e86d0ee987fb802c9675de6081dbf0516464e0b@%3Cnotifications.james.apache.org%3E', 'https://lists.apache.org/thread.html/rc3354080fc67fb50b45b3c2d12dc4ca2a3c1c78dad3d3ba012c038aa@%3Cnotifications.james.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-p32g-242c-76h3 | Malicious Package in geoheat | Version 1.3.2 of `geoheat` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | null | 2020-09-11T21:14:49Z | 2020-09-11T21:14:49Z | CRITICAL | 0 | null | {'https://www.npmjs.com/advisories/932', 'https://github.com/advisories/GHSA-p32g-242c-76h3'} | null |
GHSA | GHSA-458f-26r3-x2c3 | Cross-site Scripting in github.com/schollz/rwtxt | Cross-site scripting vulnerability in rwtxt versions prior to v1.8.6 allows a remote attacker to inject an arbitrary script via unspecified vectors. | {'CVE-2021-20848'} | 2021-11-29T18:00:21Z | 2021-11-29T18:00:21Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-458f-26r3-x2c3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20848', 'https://github.com/schollz/rwtxt', 'https://jvn.jp/en/jp/JVN22515597/index.html'} | null |
GHSA | GHSA-qwj8-p662-3m7x | Path Traversal in localhost-now | All versions of `localhost-now` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | {'CVE-2019-5416'} | 2021-01-08T20:11:38Z | 2019-03-25T16:17:05Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-5416', 'https://hackerone.com/reports/334837', 'https://github.com/advisories/GHSA-qwj8-p662-3m7x', 'https://www.npmjs.com/advisories/1005'} | null |
GHSA | GHSA-7jfh-2xc9-ccv7 | Cross-Site Scripting in public | All versions of `public` are vulnerable to stored cross-site scripting (XSS).
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time. | null | 2021-08-04T20:24:18Z | 2019-05-31T23:46:40Z | LOW | 0 | {'CWE-79'} | {'https://hackerone.com/reports/316346', 'https://github.com/advisories/GHSA-7jfh-2xc9-ccv7', 'https://www.npmjs.com/advisories/609'} | null |
GHSA | GHSA-cfw5-v7cw-69cw | Critical severity vulnerability that affects org.apache.directory.api:apache-ldap-api | In Apache LDAP API before 1.0.2, a bug in the way the SSL Filter was setup made it possible for another thread to use the connection before the TLS layer has been established, if the connection has already been used and put back in a pool of connections, leading to leaking any information contained in this request (including the credentials when sending a BIND request). | {'CVE-2018-1337'} | 2021-09-09T17:08:41Z | 2018-11-09T17:49:49Z | CRITICAL | 9.8 | {'CWE-200'} | {'https://lists.apache.org/thread.html/r56b304fb9960c869995efbb31da3b9b7c6d53ee31f7f7048eb80434b@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4da40aa50cfdb2158898f2bc6df81feec1d42c6a06db6537d5cc0496@%3Cjira.kafka.apache.org%3E', 'http://www.securityfocus.com/bid/104744', 'https://lists.apache.org/thread.html/r0e645b3f6ca977dc60b7cec231215c59a9471736c2402c1fef5a0616@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1a258430d820a90ff9d4558319296cc517ff2252327d7b3546d16749@%3Cjira.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1337', 'https://github.com/advisories/GHSA-cfw5-v7cw-69cw', 'https://lists.apache.org/thread.html/r1815fb5b0c345f571c740e7a1b48d7477647edd4ffcf9d5321e69446@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r55e74532e7f9e84ecfa56b4e0a50a5fe0ba6f7a76880520e4400b0d7@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/d66081195e9a02ee7cc20fb243b60467d1419586eed28297d820768f@%3Cdev.directory.apache.org%3E'} | null |
GHSA | GHSA-xg5r-8j97-2wrj | Directory Traversal in restafary | Affected versions of `restafary` are susceptible to a directory traversal vulnerability when a root path is specified in the configuration.
Proof of Concept
```
curl -i -s -k -X 'GET' -H 'Authorization: Basic YWRtaW46cGFzc3dvcmQ=' 'http://localhost:8000/api/v1/fs/..%2f..%2fetc/passwd'
```
## Recommendation
Update to version 1.6.1 or later. | {'CVE-2016-10528'} | 2021-01-08T00:07:32Z | 2019-02-18T23:39:22Z | MODERATE | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10528', 'https://github.com/advisories/GHSA-xg5r-8j97-2wrj', 'https://www.npmjs.com/advisories/89', 'https://nodesecurity.io/advisories/89'} | null |
GHSA | GHSA-v5rv-hpxg-8x49 | Signature validation bypass in ServiceStack | ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature. | {'CVE-2020-28042'} | 2021-01-13T19:13:11Z | 2021-01-13T19:13:11Z | MODERATE | 0 | {'CWE-347'} | {'https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850', 'https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/', 'https://www.nuget.org/packages/ServiceStack/', 'https://snyk.io/vuln/SNYK-DOTNET-SERVICESTACK-1035519', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28042', 'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee', 'https://github.com/advisories/GHSA-v5rv-hpxg-8x49', 'https://www.shielder.it/blog/2020/11/re-discovering-a-jwt-authentication-bypass-in-servicestack/'} | null |
GHSA | GHSA-rmp7-f2vp-3rq4 | Cross-site scripting in SiCKRAGE | in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information. | {'CVE-2021-25925'} | 2021-04-23T19:28:53Z | 2021-04-20T16:31:54Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925', 'https://github.com/advisories/GHSA-rmp7-f2vp-3rq4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25925'} | null |
GHSA | GHSA-vf77-8h7g-gghp | Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat | An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service. | {'CVE-2020-13934'} | 2022-02-10T11:35:14Z | 2022-02-08T22:05:00Z | HIGH | 7.5 | {'CWE-119', 'CWE-476'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://usn.ubuntu.com/4596-1/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html', 'https://www.debian.org/security/2020/dsa-4727', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html', 'https://github.com/advisories/GHSA-vf77-8h7g-gghp', 'https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/ra072b1f786e7d139e86f1d1145572e0ff71cef38a96d9c6f5362aac8@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13934', 'https://security.netapp.com/advisory/ntap-20200724-0003/'} | null |
GHSA | GHSA-52vv-3vf7-f7wh | Server-Side Request Forgery and Uncontrolled Resource Consumption in LemMinX | A flaw was found in vscode-xml in versions prior to 0.19.0. Schema download could lead to blind SSRF or DoS via a large file. | {'CVE-2022-0671'} | 2022-03-02T21:57:10Z | 2022-02-19T00:01:28Z | CRITICAL | 9.1 | {'CWE-400', 'CWE-918'} | {'https://github.com/eclipse/lemminx/issues/1169', 'https://github.com/redhat-developer/vscode-xml/blob/master/CHANGELOG.md#0190-february-14-2022', 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14-2022', 'https://github.com/advisories/GHSA-52vv-3vf7-f7wh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0671'} | null |
GHSA | GHSA-7xj5-fwqr-5378 | Cross-site Scripting in craftcms/cms | Craft CMS before 3.7.29 allows cross-site scripting. | {'CVE-2022-28378'} | 2022-04-18T22:20:40Z | 2022-04-04T00:00:54Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28378', 'https://github.com/advisories/GHSA-7xj5-fwqr-5378', 'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'} | null |
GHSA | GHSA-79mx-88w7-8f7q | XSS Filter Bypass via Encoded URL in validator | Versions of `validator` prior to 2.0.0 contained an xss filter method that is affected by several filter bypasses. This may result in a cross-site scripting vulnerability.
## Proof of Concept
The xss() function removes the word "javascript" when contained inside an attribute.
However, it does not properly handle cases where characters have been hex-encoded.
As a result, it is possible to build an input that bypasses the filter but which the browser will accept as valid JavaScript.
For example:
```<a href="javascript:...">abc</a>```
will render as:
```<a href="javascript:...">abc</a>```
## Recommendation
The package author has decided to remove the xss filter functionality in the latest version of this module. If this feature is not currently being used, you are not affected by the vulnerability. If it is being used, updating to the latest version of the module will break your application.
In order for affected users to mitigate this vulnerability, it is necessary to use an [alternative package](https://www.npmjs.com/search?q=xss%20filter&page=1&ranking=optimal) that provides similar functionality. | {'CVE-2014-9772'} | 2021-09-02T21:06:03Z | 2018-11-06T23:12:49Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/chriso/validator.js/issues/181', 'http://www.securityfocus.com/bid/97102', 'https://github.com/advisories/GHSA-79mx-88w7-8f7q', 'https://www.npmjs.com/advisories/43', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://nodesecurity.io/advisories/43'} | null |
GHSA | GHSA-mw75-qvfr-hpmr | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0938'} | 2022-03-23T15:39:32Z | 2022-03-15T00:01:01Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0938', 'https://github.com/advisories/GHSA-mw75-qvfr-hpmr', 'https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e', 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'} | null |
GHSA | GHSA-mpq4-rjj8-fjph | Uncontrolled Resource Consumption in github.com/google/fscrypt | fscrypt through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to fscrypt 0.3.3 or above and adjusting the permissions on existing fscrypt metadata directories where applicable. | {'CVE-2022-25326'} | 2022-03-07T13:42:34Z | 2022-02-26T00:00:44Z | MODERATE | 5.5 | {'CWE-400'} | {'https://github.com/google/fscrypt/pull/346', 'https://github.com/advisories/GHSA-mpq4-rjj8-fjph', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25326'} | null |
GHSA | GHSA-wg9m-gw3h-hg83 | Injection in field_test | The field_test gem 0.3.0 for Ruby has unvalidated input. A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. If an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting (XSS). | {'CVE-2019-13146'} | 2021-05-11T14:27:51Z | 2019-07-16T00:42:27Z | MODERATE | 5.3 | {'CWE-74'} | {'https://github.com/advisories/GHSA-wg9m-gw3h-hg83', 'http://www.securityfocus.com/bid/109114', 'https://rubygems.org/gems/field_test', 'https://github.com/ankane/field_test/issues/17', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13146'} | null |
GHSA | GHSA-v2p6-4mp7-3r9v | Regular Expression Denial of Service in underscore.string | Versions of `underscore.string` prior to *3.3.5* are vulnerable to Regular Expression Denial of Service (ReDoS).
The function `unescapeHTML` is vulnerable to ReDoS due to an overly-broad regex. The slowdown is approximately 2s for 50,000 characters but grows exponentially with larger inputs.
## Recommendation
Upgrade to version 3.3.5 or higher. | null | 2021-08-16T23:29:45Z | 2019-06-14T16:26:22Z | MODERATE | 0 | {'CWE-400'} | {'https://github.com/advisories/GHSA-v2p6-4mp7-3r9v', 'https://github.com/epeli/underscore.string/pull/517', 'https://www.npmjs.com/advisories/745', 'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029', 'https://github.com/epeli/underscore.string/issues/510'} | null |
GHSA | GHSA-ph32-23p8-9rw5 | Improper Input Validation in network-manager | network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the "execSync()" argument. | {'CVE-2019-10786'} | 2021-07-28T18:30:27Z | 2021-04-13T15:17:45Z | CRITICAL | 9.8 | {'CWE-20', 'CWE-78'} | {'https://github.com/advisories/GHSA-ph32-23p8-9rw5', 'https://snyk.io/vuln/SNYK-JS-NETWORKMANAGER-544035', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10786'} | null |
GHSA | GHSA-3p9j-442x-hjp7 | Business Logic Errors in microweber | microweber prior to 1.2.11 allows multiple uses of a single-use coupon. | {'CVE-2022-0689'} | 2022-02-26T01:15:36Z | 2022-02-20T00:00:31Z | MODERATE | 5.3 | null | {'https://github.com/advisories/GHSA-3p9j-442x-hjp7', 'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04', 'https://huntr.dev/bounties/fa5dbbd3-97fe-41a9-8797-2e54d9a9c649', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0689'} | null |
GHSA | GHSA-6pc9-xqrg-wfqw | Exposure of Sensitive information in httpie | httpie is a modern, user-friendly command-line HTTP client for the API era. Prior to version 3.1.0, all cookies saved to session storage are supercookies. At this time, there is no known workaround. Users are recommended to update to version 3.1.0. | {'CVE-2022-0430'} | 2022-04-05T18:50:32Z | 2022-03-16T00:00:47Z | LOW | 2.4 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0430', 'https://github.com/advisories/GHSA-6pc9-xqrg-wfqw', 'https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f', 'https://github.com/pypa/advisory-database/tree/main/vulns/httpie/PYSEC-2022-167.yaml', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} | null |
GHSA | GHSA-xpwj-7v8q-mcgj | Static imports inside dynamically imported modules do not adhere to permission checks | ### Impact
Modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. In Deno 1.5.x and 1.6.x only programs dynamically importing (especially transitively) untrusted code are affected. In Deno 1.7.x all programs importing (especially transitively) untrusted code are affected.
In effect an attacker in control of a (possibly remote) module in a programs module graph has been able to, **irrespective of permissions**:
1. initiate GET requests to arbitrary URLs on the internet (including LAN) and possibly read (parts of) the contents of these resources.
2. check for existence of arbitrary paths on the file system, and possibly read (parts of) the contents of these files.
In Deno 1.5.x (October 27th, 2020) and Deno 1.6.x (December 8th, 2020) the attacker module had to have been granted permissions to load dynamically through the network / fs read permission. Since Deno 1.7.x (January 19th, 2021) this vulnerability was able to be exploited in a fully sandboxed isolate (without any permissions). This vulnerability was not present in releases prior to 1.5.0.
Arbitrary non-GET requests, control over request headers, or file system writes are not possible through this vulnerability. Users of the `deno_core`, `deno_runtime`, or other `deno_*` crates are not affected. This is a Deno CLI only vulnerability.
We are relatively confident this was not abused in the wild, as by default Deno prints out a green "Download" message when remote imports are downloaded, and this would have caused suspicion if it occurred in the middle of a programs execution. This message can be silenced with the `--quiet` flag.
### Patches
The vulnerability has been patched in Deno release 1.10.2. You can upgrade to the latest Deno version by running the `deno upgrade` command. The release is available through all official download channels.
### Workarounds
There is no workaround for this issue.
### For more information
If you have any questions or comments about this advisory:
* Open an issue on [the issue tracker](https://github.com/denoland/deno)
* Discuss on [Discord](https://discord.gg/deno)
| {'CVE-2021-32619'} | 2022-04-19T19:02:57Z | 2021-09-23T23:18:03Z | CRITICAL | 9.8 | {'CWE-285'} | {'https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj', 'https://github.com/advisories/GHSA-xpwj-7v8q-mcgj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32619'} | null |
GHSA | GHSA-vw5m-qw2r-m923 | Use of Uninitialized Resource in messagepack-rs. | An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_binary may read from uninitialized memory locations. | {'CVE-2021-45690'} | 2022-01-07T17:13:28Z | 2022-01-06T22:11:46Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-45690', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/messagepack-rs/RUSTSEC-2021-0092.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0092.html', 'https://github.com/advisories/GHSA-vw5m-qw2r-m923'} | null |
GHSA | GHSA-7c9w-qmrq-ff8r | Path Traversal in http-live-simulator | Versions of `http-live-simulator` prior to 1.0.7 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. For example: `curl --path-as-is http://localhost:8080//../../../../etc/passwd`.
## Recommendation
Upgrade to version 1.0.7 | {'CVE-2018-16479'} | 2021-01-08T19:16:25Z | 2019-02-07T18:14:21Z | HIGH | 0 | {'CWE-22'} | {'https://hackerone.com/reports/411405', 'https://www.npmjs.com/advisories/772', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/486.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16479', 'https://github.com/advisories/GHSA-7c9w-qmrq-ff8r'} | null |
GHSA | GHSA-q4hg-rmq2-52q9 | Improper Locking in Apache Tomcat | The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. | {'CVE-2019-10072'} | 2021-06-15T17:05:52Z | 2019-06-26T01:09:40Z | MODERATE | 7.5 | {'CWE-667'} | {'https://www.debian.org/security/2020/dsa-4680', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://support.f5.com/csp/article/K17321505', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'http://www.securityfocus.com/bid/108874', 'https://usn.ubuntu.com/4128-2/', 'https://security.netapp.com/advisory/ntap-20190625-0002/', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html', 'https://usn.ubuntu.com/4128-1/', 'https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-q4hg-rmq2-52q9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10072', 'https://www.synology.com/security/advisory/Synology_SA_19_29', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2019:3931', 'https://www.oracle.com/security-alerts/cpuapr2020.html'} | null |
GHSA | GHSA-7phr-5m9x-rw9q | Directory traversal in fast-http | This affects all versions of package fast-http. There is no path sanitization in the path provided at fs.readFile in index.js. | {'CVE-2020-7687'} | 2021-09-22T21:15:29Z | 2020-07-27T16:02:57Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/advisories/GHSA-7phr-5m9x-rw9q', 'https://snyk.io/vuln/SNYK-JS-FASTHTTP-572892', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7687'} | null |
GHSA | GHSA-qphc-hf5q-v8fc | Open Redirect in actionpack | Specially crafted "X-Forwarded-Host" headers in combination with certain
"allowed host" formats can cause the Host Authorization middleware in Action
Pack to redirect users to a malicious website.
Impacted applications will have allowed hosts with a leading dot. For example,
configuration files that look like this:
```
config.hosts << '.EXAMPLE.com'
```
When an allowed host contains a leading dot, a specially crafted Host header
can be used to redirect to a malicious website.
This vulnerability is similar to CVE-2021-22881 and CVE-2021-22942.
Releases
--------
The fixed releases are available at the normal locations.
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 6-0-host-authorzation-open-redirect.patch - Patch for 6.0 series
* 6-1-host-authorzation-open-redirect.patch - Patch for 6.1 series
* 7-0-host-authorzation-open-redirect.patch - Patch for 7.0 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at
present. Users of earlier unsupported releases are advised to upgrade as soon
as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases. | {'CVE-2021-44528'} | 2022-04-27T22:24:24Z | 2021-12-14T21:19:08Z | MODERATE | 6.1 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-44528', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-44528.yml', 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ?utm_medium=email&utm_source=footer', 'https://github.com/advisories/GHSA-qphc-hf5q-v8fc', 'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815', 'https://github.com/rails/rails/blob/v6.1.4.2/actionpack/CHANGELOG.md#rails-6142-december-14-2021', 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ'} | null |
GHSA | GHSA-2v7q-2xqx-f4q5 | Potential SQL Injection in sequelize | Affected versions of `sequelize` are vulnerable to SQL Injection when user input is passed into `findOne` or into a statement such as `where: "user input"`.
## Recommendation
Update to version 3.0.0 or later.
Version 3.0.0 will introduce a number of breaking changes.
Thankfully, the project authors have provided a 2.x -> 3.x [upgrade guide](https://github.com/sequelize/sequelize/wiki/Upgrade-from-2.0-to-3.0) to ease this transition.
If upgrading is not an option, it is also possible to mitigate this by ensuring that all uses of `where: "input"` and `findOne("input")` are properly sanitized, such as by the use of a wrapper function. | {'CVE-2016-10553'} | 2021-01-08T20:06:22Z | 2019-02-18T23:54:32Z | HIGH | 0 | {'CWE-89'} | {'https://github.com/sequelize/sequelize/blob/master/changelog.md#300', 'https://nodesecurity.io/advisories/109', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10553', 'https://github.com/advisories/GHSA-2v7q-2xqx-f4q5', 'https://www.npmjs.com/advisories/109'} | null |
GHSA | GHSA-3qxp-qjq7-w4hf | CHECK-fail in tf.raw_ops.EncodePng | ### Impact
An attacker can trigger a `CHECK` fail in PNG encoding by providing an empty input tensor as the pixel data:
```python
import tensorflow as tf
image = tf.zeros([0, 0, 3])
image = tf.cast(image, dtype=tf.uint8)
tf.raw_ops.EncodePng(image=image)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L57-L60) only validates that the total number of pixels in the image does not overflow. Thus, an attacker can send an empty matrix for encoding. However, if the tensor is empty, then the associated buffer is `nullptr`. Hence, when [calling `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L79-L93), the first argument (i.e., `image.flat<T>().data()`) is `NULL`. This then triggers the `CHECK_NOTNULL` in the [first line of `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/lib/png/png_io.cc#L345-L349).
```cc
template <typename T>
bool WriteImageToBuffer(
const void* image, int width, int height, int row_bytes, int num_channels,
int channel_bits, int compression, T* png_string,
const std::vector<std::pair<std::string, std::string> >* metadata) {
CHECK_NOTNULL(image);
...
}
```
Since `image` is null, this results in `abort` being called after printing the stacktrace. Effectively, this allows an attacker to mount a denial of service attack.
### Patches
We have patched the issue in GitHub commit [26eb323554ffccd173e8a79a8c05c15b685ae4d1](https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29531'} | 2021-05-21T14:22:13Z | 2021-05-21T14:22:13Z | LOW | 2.5 | {'CWE-754'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29531', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qxp-qjq7-w4hf', 'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1', 'https://github.com/advisories/GHSA-3qxp-qjq7-w4hf'} | null |
GHSA | GHSA-pp2h-95hm-hv9r | Improper Neutralization of Formula Elements in a CSV File in pimcore/pimcore | ### Impact
Data Object CSV import allows formular injection.
### Patches
Problem is patched in 10.1.1
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/9992.patch
### References
https://cwe.mitre.org/data/definitions/1236.html
| {'CVE-2021-37702'} | 2021-08-30T16:13:13Z | 2021-08-30T16:13:13Z | MODERATE | 0 | {'CWE-1236'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37702', 'https://github.com/pimcore/pimcore/pull/9992', 'https://github.com/advisories/GHSA-pp2h-95hm-hv9r', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-pp2h-95hm-hv9r'} | null |
GHSA | GHSA-5679-7qrc-5m7j | IDOR can reveal execution data and logs to unauthorized user in Rundeck | ### Impact
Authenticated users can craft a request that reveals Execution data and logs and Job details that they are not authorized to see.
> Depending on the configuration and the way that Rundeck is used, this could result in anything between a high severity risk, or a very low risk. If access is tightly restricted and all users on the system have access to all projects, this is not really much of an issue. If access is wider and allows login for users that do not have access to any projects, or project access is restricted, there is a larger issue. If access is meant to be restricted and secrets, sensitive data, or intellectual property are exposed in Rundeck execution output and job data, the risk becomes much higher.
### Details
An authenticated user could craft a request to:
* View Executions and download execution logs without access to `read` or `view` the associated Job, or ad-hoc resource.
* Get the list of running executions in a project, without Event `read` access, if they have `read` access to view the project.
* View the Options definitions of a Job without access to view the Job.
* View the definition of a workflow step of a Job without access to view the Job.
* View the SCM diff of a modified Job definition if SCM is enabled, without Project `export` access level.
* View the New User Profile Form for a different username, without User `admin` access. Note: they would not be allowed to create or modify a profile for a different user, or reveal any user profile information for a different user.
Some authenticated API requests were not correctly checking appropriate authorization levels:
* The list of running Executions would be sent without `read` access to Events.
* The Plugin Input Parameters for a SCM plugin would be sent without authorization for project `import`,`scm_import`,`export`, or `scm_export` actions.
* Job Retry action could retry an execution without `read` or `view` access to the Execution, which would reveal the Execution's option values. (`run` access to the Job was still required).
### Patches
Upgrade to Rundeck version 3.2.6
### Workarounds
None
### References
[3.2.6 Release Notes](https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html)
### Report
If you have any questions or comments about this advisory:
* Email us at [security@rundeck.com](mailto:security@rundeck.com)
To report security issues to Rundeck please use the form at [http://rundeck.com/security](http://rundeck.com/security)
Reporter: Justine Osborne of Apple Information Security | {'CVE-2020-11009'} | 2022-04-19T19:02:25Z | 2020-04-29T16:31:12Z | MODERATE | 6.5 | {'CWE-200', 'CWE-639'} | {'https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html', 'https://github.com/rundeck/rundeck/security/advisories/GHSA-5679-7qrc-5m7j', 'https://github.com/advisories/GHSA-5679-7qrc-5m7j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11009'} | null |
GHSA | GHSA-xwx6-vmj4-5rv8 | Denial of service via deserialization attack in nifi | A vulnerability found in Apache NIFI before 1.5.0-RC1. Attacker can perform XXE attacks through JAXB. | {'CVE-2017-15703'} | 2021-08-18T22:04:42Z | 2019-10-25T19:42:50Z | MODERATE | 5 | {'CWE-502'} | {'https://github.com/advisories/GHSA-xwx6-vmj4-5rv8', 'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'} | null |
GHSA | GHSA-6g47-63mv-qpgh | Prototype Pollution in dotty | This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays. | {'CVE-2021-23624'} | 2021-11-08T17:55:48Z | 2021-11-08T17:55:48Z | MODERATE | 5.6 | {'CWE-843', 'CWE-1321'} | {'https://github.com/advisories/GHSA-6g47-63mv-qpgh', 'https://snyk.io/vuln/SNYK-JS-DOTTY-1577292', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23624', 'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'} | null |
GHSA | GHSA-7wq4-89xx-g62j | Password exposure in ShenYu | The HTTP response will disclose the user password. This issue affected Apache ShenYu 2.4.0 and 2.4.1. | {'CVE-2022-23223'} | 2022-02-02T16:15:03Z | 2022-01-28T22:13:57Z | HIGH | 7.5 | {'CWE-522'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23223', 'http://www.openwall.com/lists/oss-security/2022/01/26/4', 'https://github.com/apache/incubator-shenyu/releases/tag/v2.4.2', 'http://www.openwall.com/lists/oss-security/2022/01/25/7', 'https://github.com/advisories/GHSA-7wq4-89xx-g62j', 'https://lists.apache.org/thread/q2gg6ny6lpkph7nkrvjzqdvqpm805v8s'} | null |
GHSA | GHSA-2p6p-v69p-9mm9 | XSS in login form | In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form. | {'CVE-2019-13235'} | 2021-08-18T22:26:43Z | 2019-11-12T22:58:16Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'https://github.com/advisories/GHSA-2p6p-v69p-9mm9', 'https://aetsu.github.io/OpenCms', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13235', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'} | null |
GHSA | GHSA-9rgv-h7x4-qw8g | Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server | In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system. | {'CVE-2018-12536'} | 2021-06-10T23:55:07Z | 2018-10-19T16:15:56Z | MODERATE | 5.3 | {'CWE-209'} | {'https://github.com/advisories/GHSA-9rgv-h7x4-qw8g', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'http://www.securitytracker.com/id/1041194', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535670', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12536', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
GHSA | GHSA-vpgw-ffh3-648h | Prototype Pollution in fullpage.js | fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability.
Javascript is "prototype" language which means when a new "object" is created, it carries the predefined properties and methods of an "object" with itself like toString, constructor etc. By using prototype-pollution vulnerability, an attacker can overwrite/create the property of that "object" type. If the victim developer has used that property anywhere in the code, then it will have severe effect on the application. | {'CVE-2022-1295'} | 2022-04-22T20:20:56Z | 2022-04-12T00:00:38Z | HIGH | 7.3 | {'CWE-1321'} | {'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48', 'https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295', 'https://github.com/advisories/GHSA-vpgw-ffh3-648h'} | null |
GHSA | GHSA-hwvv-438r-mhvj | Exposure of Sensitive Information to an Unauthorized Actor | A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view. | {'CVE-2021-22134'} | 2022-04-22T16:50:20Z | 2021-03-18T19:23:57Z | MODERATE | 4.3 | {'CWE-200'} | {'https://github.com/advisories/GHSA-hwvv-438r-mhvj', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835', 'https://security.netapp.com/advisory/ntap-20210430-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22134'} | null |
GHSA | GHSA-gppw-3h6h-v6q2 | Data race in internment | An issue was discovered in the internment crate before 0.4.2 for Rust. There is a data race that can cause memory corruption because of the unconditional implementation of Sync for Intern<T>. | {'CVE-2021-28037'} | 2021-08-25T20:52:08Z | 2021-08-25T20:52:08Z | CRITICAL | 9.8 | {'CWE-362'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0036.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28037', 'https://github.com/droundy/internment/issues/20', 'https://github.com/advisories/GHSA-gppw-3h6h-v6q2'} | null |
GHSA | GHSA-ccjp-w723-2jf2 | Moderate severity vulnerability that affects org.apache.tika:tika-core | Apache Tika server (aka tika-server) in Apache Tika 1.9 might allow remote attackers to read arbitrary files via the HTTP fileUrl header. | {'CVE-2015-3271'} | 2021-09-08T22:00:50Z | 2018-10-17T15:44:10Z | MODERATE | 5.3 | {'CWE-200'} | {'https://github.com/advisories/GHSA-ccjp-w723-2jf2', 'http://www.securityfocus.com/bid/95020', 'http://www.openwall.com/lists/oss-security/2015/08/13/5', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3271', 'https://lists.apache.org/thread.html/d2b3e7afb0251fac95fdee9817423cbc91e3d99a848c25a51d91c1e8@1439485507@%3Cdev.tika.apache.org%3E'} | null |
GHSA | GHSA-49mg-94fc-2fx6 | Command Injection in npm-git-publish | All versions of `npm-git-publish` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `execSync` call, which may allow attackers to execute arbitrary code in the system. The `publish` function is vulnerable through the `gitRemoteUrl` variable.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-10-04T20:47:52Z | 2020-09-04T17:32:49Z | CRITICAL | 0 | {'CWE-77'} | {'https://hackerone.com/reports/730121', 'https://www.npmjs.com/advisories/1458', 'https://github.com/advisories/GHSA-49mg-94fc-2fx6'} | null |
GHSA | GHSA-8qx4-r7fx-xc4v | Malicious Package in requst | All versions of `requst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:08:31Z | 2020-09-11T21:08:19Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-8qx4-r7fx-xc4v', 'https://www.npmjs.com/advisories/865'} | null |
GHSA | GHSA-6354-6mhv-mvv5 | Regular Expression Denial of Service in jadedown | The `jadedown` package is affected by a regular expression denial of service vulnerability when certain types of user input are passed in.
### Proof of concept
```
var jadedown = require('jadedown');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
for (i=1;i<=10000000;i=i+1) {
console.log("COUNT: " + i);
var str = genstr(i, 'f') + genstr(i, '#') + '{';
console.log("LENGTH: " + str.length);
var start = process.hrtime();
jadedown(str)
var end = process.hrtime(start);
console.log(end);
}
```
Results demonstrating blocking for 5 seconds using only 48 characters.
```
$ node jadedown.js
COUNT: 1
LENGTH: 6
[ 0, 4014065 ]
COUNT: 4
LENGTH: 12
[ 0, 503507 ]
COUNT: 7
LENGTH: 18
[ 0, 325225 ]
COUNT: 10
LENGTH: 24
[ 0, 1632684 ]
COUNT: 13
LENGTH: 30
[ 0, 7541230 ]
COUNT: 16
LENGTH: 36
[ 0, 80889495 ]
COUNT: 19
LENGTH: 42
[ 0, 636009936 ]
COUNT: 22
LENGTH: 48
[ 5, 820586760 ]
```
# Timeline
- October 24, 2015 - Vulnerability Identified
- October 24, 2015 - Maintainers Notified
- October 25, 2015 - Response from Maintainers with intent to fix
- January 5, 2016 - Advisory Published
- January 11, 2016 - CVE Requested
## Recommendation
This package is not actively maintained, and has not seen an update since 2011.
The package also provides unique functionality in the form of a templating language that is not available elsewhere. If this package is used to process user input, the best available mitigation is to refactor the dependent application to not make use of this module. | {'CVE-2016-10520'} | 2021-01-08T19:47:38Z | 2019-02-18T23:38:38Z | LOW | 0 | {'CWE-400'} | {'https://www.npmjs.com/advisories/52', 'https://nodesecurity.io/advisories/52', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10520', 'https://github.com/advisories/GHSA-6354-6mhv-mvv5'} | null |
GHSA | GHSA-87mg-h5r3-hw88 | Cross-Site Scripting in bootbox | All version of `bootbox` are vulnerable to Cross-Site Scripting. The package does not sanitize user input in the provided dialog boxes, allowing attackers to inject HTML code and execute arbitrary JavaScript.
## Recommendation
Sanitize user input being passed to `bootbox` or consider using an alternative package. | null | 2021-09-16T21:01:14Z | 2019-05-30T17:23:28Z | MODERATE | 0 | {'CWE-64', 'CWE-79'} | {'https://github.com/advisories/GHSA-87mg-h5r3-hw88', 'https://hackerone.com/reports/508446', 'https://www.npmjs.com/advisories/882', 'https://github.com/makeusabrew/bootbox/issues/661'} | null |
GHSA | GHSA-v83p-xwm9-v4g8 | Injection in Apache Archiva | Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects. | {'CVE-2020-9495'} | 2022-02-10T23:06:22Z | 2022-02-10T23:06:22Z | MODERATE | 5.3 | {'CWE-74'} | {'http://www.openwall.com/lists/oss-security/2020/06/19/1', 'https://github.com/advisories/GHSA-v83p-xwm9-v4g8', 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9495', 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cusers.archiva.apache.org%3E', 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cdev.archiva.apache.org%3E', 'http://archiva.apache.org/security.html#CVE-2020-9495', 'https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d@%3Cusers.maven.apache.org%3E'} | null |
GHSA | GHSA-8gw6-w5rw-4g5c | Incorrect Default Permissions in Apache JSPWiki | Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later. | {'CVE-2021-44140'} | 2021-11-30T14:44:45Z | 2021-11-29T17:59:24Z | CRITICAL | 9.1 | {'CWE-276'} | {'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-44140', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44140', 'https://github.com/advisories/GHSA-8gw6-w5rw-4g5c', 'https://lists.apache.org/thread/5qglpjdhvobppx7j550lf1sk28f6011t'} | null |
GHSA | GHSA-xpmx-h7xq-xffh | Potential access control security issue in apollo-adminservice | ### Impact
If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have built-in access control. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's configurations.
### Patches
Access control for admin service was added in #3233 and was released in [v1.7.1](https://github.com/ctripcorp/apollo/releases/tag/v1.7.1).
### Workarounds
To fix the potential issue without upgrading, simply follow the advice that do not expose apollo-adminservice to internet.
### Credits
[Lexu](https://github.com/lllllx) reported the issue and provided the required information to reproduce it.
### References
[Apollo Security Guidence](https://github.com/ctripcorp/apollo/wiki/Apollo%E4%BD%BF%E7%94%A8%E6%8C%87%E5%8D%97#71-%E5%AE%89%E5%85%A8%E7%9B%B8%E5%85%B3)
### For more information
If you have any questions or comments about this advisory:
* Open an [issue](https://github.com/ctripcorp/apollo/issues)
* Email to one of the active [project maintainers](https://github.com/ctripcorp/apollo/graphs/contributors) | {'CVE-2020-15170'} | 2022-04-19T19:02:34Z | 2020-10-02T16:33:41Z | HIGH | 7 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15170', 'https://github.com/ctripcorp/apollo/security/advisories/GHSA-xpmx-h7xq-xffh', 'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf', 'https://github.com/advisories/GHSA-xpmx-h7xq-xffh'} | null |
GHSA | GHSA-hgmw-x865-hf9x | High severity vulnerability that affects arabic-prawn | lib/string_utf_support.rb in the Arabic Prawn 0.0.1 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) downloaded_file or (2) url variable. | {'CVE-2014-2322'} | 2022-04-19T19:03:25Z | 2017-10-24T18:33:36Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-hgmw-x865-hf9x', 'http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-2322', 'http://www.openwall.com/lists/oss-security/2014/03/12/6', 'http://www.openwall.com/lists/oss-security/2014/03/10/8'} | null |
GHSA | GHSA-54qm-37qr-w5wq | Sandbox Breakout / Arbitrary Code Execution in veval | All versions of `veval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2020-09-04T15:04:20Z | 2020-09-04T15:04:20Z | CRITICAL | 0 | null | {'https://www.npmjs.com/advisories/1321', 'https://github.com/advisories/GHSA-54qm-37qr-w5wq'} | null |
GHSA | GHSA-r5hc-9xx5-97rw | Moderate severity vulnerability that affects i18n | Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call. | {'CVE-2013-4492'} | 2021-09-17T14:34:46Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://www.securityfocus.com/bid/64076', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4492', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html', 'https://github.com/advisories/GHSA-r5hc-9xx5-97rw', 'http://www.debian.org/security/2013/dsa-2830'} | null |
GHSA | GHSA-j858-xp5v-f8xx | Remote code execution in Dragonfly | An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility. | {'CVE-2021-33564'} | 2021-06-11T13:19:25Z | 2021-06-02T21:42:49Z | CRITICAL | 9.8 | {'CWE-88', 'CWE-94'} | {'https://github.com/markevans/dragonfly/issues/513', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33564', 'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5', 'https://github.com/advisories/GHSA-j858-xp5v-f8xx', 'https://github.com/mlr0p/CVE-2021-33564', 'https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml', 'https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0', 'https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/'} | null |
GHSA | GHSA-fqgw-6qj5-8hmp | Infinite Loop in Apache James | In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated to exploit this vulnerability. This affected Apache James prior to version 3.6.1. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. | {'CVE-2021-40111'} | 2022-01-13T18:34:16Z | 2022-01-08T00:40:37Z | MODERATE | 0 | {'CWE-835'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-40111', 'https://www.openwall.com/lists/oss-security/2022/01/04/3', 'https://github.com/advisories/GHSA-fqgw-6qj5-8hmp', 'http://www.openwall.com/lists/oss-security/2022/01/04/3'} | null |
GHSA | GHSA-jphw-p3m6-pj3c | Data races in multiqueue2 | An issue was discovered in the multiqueue2 crate before 0.1.7 for Rust. Because a non-Send type can be sent to a different thread, a data race can occur. | {'CVE-2020-36214'} | 2021-08-25T20:51:54Z | 2021-08-25T20:51:54Z | MODERATE | 5.9 | {'CWE-662'} | {'https://github.com/abbychau/multiqueue2/issues/10', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36214', 'https://github.com/advisories/GHSA-jphw-p3m6-pj3c', 'https://rustsec.org/advisories/RUSTSEC-2020-0106.html'} | null |
GHSA | GHSA-q547-gmf8-8jr7 | Signature Validation Bypass in goxmldsig | ### Impact
With a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one.
### Patches
A patch is available, all users of goxmldsig should upgrade to v1.1.0.
### For more information
If you have any questions or comments about this advisory open an issue at https://github.com/russellhaering/goxmldsig | {'CVE-2020-15216'} | 2022-04-19T19:02:35Z | 2021-05-24T16:57:32Z | MODERATE | 5.3 | {'CWE-347'} | {'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GUH33FPUXED3FHYL25BJOQPRKFGPOMS2/', 'https://github.com/advisories/GHSA-q547-gmf8-8jr7', 'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64', 'https://pkg.go.dev/github.com/russellhaering/goxmldsig?tab=overview', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15216', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZECBFD4M4PHBMBOCMSQ537NOU37QOVWP/'} | null |
GHSA | GHSA-mj8x-cpr8-x39h | Remote code execution in Apache Tapestry | A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.2, upgrade to 5.6.3 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later. | {'CVE-2021-27850'} | 2021-06-16T17:33:19Z | 2021-06-16T17:33:19Z | CRITICAL | 0 | {'CWE-502', 'CWE-922'} | {'https://lists.apache.org/thread.html/r237ff7f286bda31682c254550c1ebf92b0ec61329b32fbeb2d1c8751%40%3Cusers.tapestry.apache.org%3E', 'https://github.com/advisories/GHSA-mj8x-cpr8-x39h', 'https://security.netapp.com/advisory/ntap-20210528-0002/', 'http://www.openwall.com/lists/oss-security/2021/04/15/1', 'https://issues.apache.org/jira/browse/TAP5-2663', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27850'} | null |
GHSA | GHSA-77hp-pfxw-4w63 | Moderate severity vulnerability that affects org.codelibs.fess:fess | codelibs fess version before commit faa265b contains a XML External Entity (XXE) vulnerability in GSA XML file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via specially crafted GSA XML files. This vulnerability appears to have been fixed in after commit faa265b. | {'CVE-2018-1000822'} | 2021-09-02T20:09:25Z | 2018-12-20T22:02:09Z | CRITICAL | 10 | {'CWE-611'} | {'https://0dd.zone/2018/10/27/fess-XXE/', 'https://github.com/advisories/GHSA-77hp-pfxw-4w63', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000822', 'https://github.com/codelibs/fess/issues/1851'} | null |
GHSA | GHSA-j84c-j8qm-g47r | The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password | The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid username. | {'CVE-2016-0733'} | 2022-04-27T13:41:42Z | 2018-10-17T17:21:11Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://mail-archives.apache.org/mod_mbox/ranger-dev/201602.mbox/%3CD2D9A4C5.114ECA%25vel@apache.org%3E', 'https://github.com/advisories/GHSA-j84c-j8qm-g47r', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0733', 'http://www.securityfocus.com/bid/82871', 'https://issues.apache.org/jira/browse/RANGER-835', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'} | null |
GHSA | GHSA-wph7-x527-w3h5 | Missing Release of Resource after Effective Lifetime in Apache Tomcat | The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError. | {'CVE-2021-42340'} | 2022-04-22T15:41:40Z | 2021-10-15T18:51:34Z | HIGH | 7.5 | {'CWE-772'} | {'https://security.netapp.com/advisory/ntap-20211104-0001/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.debian.org/security/2021/dsa-5009', 'https://lists.apache.org/thread.html/r8097a2d1550aa78e585fc77e602b9046e6d4099d8d132497c5387784@%3Ccommits.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42340', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10379', 'https://github.com/advisories/GHSA-wph7-x527-w3h5', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-844m-cpr9-jcmh | Secure/signed cookies share secrets between sites in a multi-site application | ### Impact
This vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application.
### Patches
The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture. | {'CVE-2021-41263'} | 2021-11-17T21:09:27Z | 2021-11-15T17:54:01Z | MODERATE | 6.2 | {'CWE-200', 'CWE-565'} | {'https://github.com/advisories/GHSA-844m-cpr9-jcmh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41263', 'https://github.com/discourse/rails_multisite/security/advisories/GHSA-844m-cpr9-jcmh', 'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0'} | null |
GHSA | GHSA-jj6g-7j8p-7gf2 | Cross-Site Scripting in bracket-template | All versions of `bracket-template` are vulnerable to stored cross-site scripting (XSS). This is exploitable when a variable passed in via a GET parameter is used in a template.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time. | null | 2021-08-04T20:20:04Z | 2019-05-30T21:03:24Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-jj6g-7j8p-7gf2', 'https://hackerone.com/reports/317125', 'https://www.npmjs.com/advisories/608'} | null |
GHSA | GHSA-924m-4pmx-c67h | High severity vulnerability that affects pysaml2 | pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password. | {'CVE-2017-1000433'} | 2021-09-07T20:34:39Z | 2018-07-13T16:01:17Z | HIGH | 8.1 | {'CWE-287'} | {'https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html', 'https://security.gentoo.org/glsa/201801-11', 'https://github.com/advisories/GHSA-924m-4pmx-c67h', 'https://github.com/rohe/pysaml2/issues/451', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000433'} | null |
GHSA | GHSA-p8c3-7rj8-q963 | ECDSA signature validation vulnerability by accepting wrong ASN.1 encoding in jsrsasign | ### Impact
Jsrsasign supports ECDSA signature validation which signature value is represented by ASN.1 DER encoding. This vulnerablity may accept a wrong ASN.1 DER encoded ECDSA signature such as:
- wrong multi-byte ASN.1 length of TLV (ex. 0x820045 even though 0x45 is correct)
- prepending zeros with ASN.1 INTEGER value (ex. 0x00000123 even though 0x0123 is correct)
- appending zeros to signature of ASN.1 TLV (ex. 0x3082....1fbc000000 even though 0x3082....1fbc, appending zeros are ignored.)
This vulnerability was fixed by strict ASN.1 DER checking.
Here is an assessment of this vulnerability:
- If you are not use ECDSA signature validation, this vulnerability is not affected.
- Not ASN.1 format signature like just concatenation of R and S value is not affected such as Bitcoin.
- This vulnerability is affected to all ECC curve parameters.
- Risk to accept a forged or crafted message to be signed is low.
- Risk to raise memory corruption is low since jsrsasign uses BigInteger class.
- ECDSA signatures semantically the same to valid one may be accepted as valid. There are many malleable variants.
As discussed [here](https://crypto.stackexchange.com/questions/24862/ber-or-der-x9-62-for-ecdsa-signature), there is no standards like X9.62 which requires ASN.1 DER. So ASN.1 BER can be applied to ECDSA however most of implementations like OpenSSL do strict ASN.1 DER checking.
### Patches
Users using ECDSA signature validation should upgrade to 8.0.19.
### Workarounds
Do strict ASN.1 DER checking for ASN.1 encoded ECDSA signature value.
### References
https://nvd.nist.gov/vuln/detail/CVE-2020-14966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966
https://vuldb.com/?id.157123
https://github.com/kjur/jsrsasign/issues/437
https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html
https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER
https://www.itu.int/rec/T-REC-X.690
| {'CVE-2020-14966'} | 2021-10-06T22:01:37Z | 2020-06-26T16:54:15Z | HIGH | 7.5 | {'CWE-347'} | {'https://github.com/advisories/GHSA-p8c3-7rj8-q963', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://vuldb.com/?id.157123', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-p8c3-7rj8-q963', 'https://github.com/kjur/jsrsasign/issues/437', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html', 'https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14966', 'https://www.npmjs.com/package/jsrsasign'} | null |
GHSA | GHSA-25f5-gc4h-hc22 | Improper Privilege Management in devise_masquerade | The devise_masquerade gem before 1.3 allows certain attacks when a password's salt is unknown. An application that uses this gem to let administrators masquerade/impersonate users loses one layer of security protection compared to a situation where Devise (without this extension) is used. If the server-side secret_key_base value became publicly known (for instance if it is committed to a public repository by mistake), there are still other protections in place that prevent an attacker from impersonating any user on the site. When masquerading is not used in a plain Devise application, one must know the password salt of the target user if one wants to encrypt and sign a valid session cookie. When devise_masquerade is used, however, an attacker can decide which user the "back" action will go back to without knowing that user's password salt and simply knowing the user ID, by manipulating the session cookie and pretending that a user is already masqueraded by an administrator. | {'CVE-2021-28680'} | 2021-12-14T15:33:15Z | 2021-12-08T19:55:30Z | HIGH | 8.1 | {'CWE-269'} | {'https://labanskoller.se/blog/2021/03/23/the-devise-extension-that-peeled-off-one-layer-of-the-security-onion-cve-2021-28680/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28680', 'https://github.com/oivoodoo/devise_masquerade/issues/83', 'https://github.com/advisories/GHSA-25f5-gc4h-hc22', 'https://github.com/oivoodoo/devise_masquerade/releases/tag/v1.3.1', 'https://github.com/oivoodoo/devise_masquerade/pull/76'} | null |
GHSA | GHSA-86p3-4gfq-38f2 | Denial of Service in url-relative | All versions of `url-relative` are vulnerable to Denial of Service. If the values `to` and `from` are equal, the function hangs and never returns. This may cause a Denial of Service.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-08-04T21:31:03Z | 2019-06-05T14:10:34Z | MODERATE | 5.9 | {'CWE-400'} | {'https://github.com/junosuarez/url-relative/issues/3', 'https://www.npmjs.com/advisories/783', 'https://github.com/advisories/GHSA-86p3-4gfq-38f2', 'https://snyk.io/vuln/SNYK-JS-URLRELATIVE-173691'} | null |
GHSA | GHSA-r38r-qp28-2m63 | Critical severity vulnerability that affects rope | base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load. | {'CVE-2014-3539'} | 2022-03-23T20:45:02Z | 2018-07-26T16:08:49Z | CRITICAL | 9.8 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2014-3539', 'https://bugzilla.redhat.com/show_bug.cgi?id=1116485', 'https://github.com/advisories/GHSA-r38r-qp28-2m63', 'http://www.openwall.com/lists/oss-security/2015/02/07/1', 'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb'} | null |
GHSA | GHSA-27fj-mc8w-j9wg | RSA signature validation vulnerability on maleable encoded message in jsrsasign | ### Impact
Vulnerable jsrsasign will accept RSA signature with improper PKCS#1.5 padding.
Decoded RSA signature value consists following form:
01(ff...(8 or more ffs)...ff)00[ASN.1 OF DigestInfo]
Its byte length shall be the same as RSA key length however such checking was not sufficient.
To make crafted message for practical attack is very hard.
### Patches
Users validating RSA signature should upgrade to 10.2.0 or later.
### Workarounds
There is no workaround. Not to use RSA signature validation in jsrsasign.
### ACKNOWLEDGEMENT
Thanks to Daniel Yahyazadeh @yahyazadeh for reporting and analyzing this vulnerability. | {'CVE-2021-30246'} | 2021-04-22T14:32:46Z | 2021-04-16T19:52:35Z | CRITICAL | 9.1 | {'CWE-347'} | {'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/releases/tag/10.1.13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246', 'https://github.com/advisories/GHSA-27fj-mc8w-j9wg', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-27fj-mc8w-j9wg', 'https://github.com/kjur/jsrsasign/issues/478'} | null |
GHSA | GHSA-3q5x-7mxp-rp6j | Remote code execution via vulnerable Symphony dependecy injection | A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Dependency injection through Symphony framework allows service identifiers to be derived from user controlled data, which can lead to remote code execution. | {'CVE-2019-8135'} | 2021-08-18T22:23:57Z | 2019-11-12T22:59:32Z | CRITICAL | 9.8 | {'CWE-74'} | {'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8135', 'https://github.com/advisories/GHSA-3q5x-7mxp-rp6j', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8135.yaml'} | null |
GHSA | GHSA-fcwc-p4fc-c5cc | Null pointer dereference in `MatrixDiagPartOp` | ### Impact
If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first:
```python
import tensorflow as tf
tf.raw_ops.MatrixDiagPartV2(
input=tf.ones(2,dtype=tf.int32),
k=tf.ones(2,dtype=tf.int32),
padding_value=[])
```
Although this example is given for `MatrixDiagPartV2`, all versions of the operation are affected.
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L89) reads the first value from a tensor buffer without first checking that the tensor has values to read from.
### Patches
We have patched the issue in GitHub commit [482da92095c4d48f8784b1f00dda4f81c28d2988](https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37643'} | 2021-08-25T14:43:42Z | 2021-08-25T14:43:42Z | HIGH | 7.7 | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc', 'https://github.com/advisories/GHSA-fcwc-p4fc-c5cc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37643', 'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988'} | null |
GHSA | GHSA-77gc-fj98-665h | Signature Validation Bypass | Go JOSE before 1.1.0 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the library might mistakenly read protected header values from an attached signature that was different from the one originally validated. | {'CVE-2016-9122'} | 2021-05-18T19:15:09Z | 2021-05-18T19:15:09Z | HIGH | 7.5 | {'CWE-284'} | {'http://www.openwall.com/lists/oss-security/2016/11/03/1', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9122', 'https://github.com/square/go-jose/pull/111', 'https://github.com/advisories/GHSA-77gc-fj98-665h', 'https://hackerone.com/reports/169629', 'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6'} | null |
GHSA | GHSA-6w62-hx7r-mw68 | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39154](https://x-stream.github.io/CVE-2021-39154.html).
### Credits
ka1n4t found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39154'} | 2022-04-22T15:42:03Z | 2021-08-25T14:46:38Z | HIGH | 8.5 | {'CWE-434', 'CWE-502'} | {'https://x-stream.github.io/CVE-2021-39154.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-6w62-hx7r-mw68', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39154', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-jh2g-xhqq-x4w9 | Send/Sync bound needed on T for Send/Sync impl of RcuCell<T> | Affected versions of this crate unconditionally implement Send/Sync for `RcuCell<T>`.
This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell<T>`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell<T>` that provide access to `&T`.
This can result in memory corruption caused by data races.
| null | 2021-08-25T21:00:07Z | 2021-08-25T21:00:07Z | MODERATE | 0 | {'CWE-362'} | {'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2', 'https://github.com/advisories/GHSA-jh2g-xhqq-x4w9', 'https://rustsec.org/advisories/RUSTSEC-2020-0131.html', 'https://github.com/Xudong-Huang/rcu_cell/issues/3'} | null |
GHSA | GHSA-5v3f-73gv-x7x5 | cairo is vulnerable to denial of service due to a null pointer dereference | Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash. | {'CVE-2017-7475'} | 2022-04-25T20:55:53Z | 2017-11-15T20:41:14Z | MODERATE | 5.5 | {'CWE-476'} | {'https://bugs.freedesktop.org/show_bug.cgi?id=100763', 'https://github.com/advisories/GHSA-5v3f-73gv-x7x5', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7475', 'http://seclists.org/oss-sec/2017/q2/151', 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E'} | null |
GHSA | GHSA-gj26-g5qf-jrh7 | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0. | {'CVE-2022-0589'} | 2022-02-24T13:06:11Z | 2022-02-16T00:01:51Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-gj26-g5qf-jrh7', 'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa', 'https://huntr.dev/bounties/d943d95c-076f-441a-ab21-cbf6b15f6768', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0589', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html'} | null |
GHSA | GHSA-q6j2-g8qf-wvf7 | Verification check bypass in Gate One | An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list. | {'CVE-2020-19003'} | 2021-10-12T22:34:28Z | 2021-10-12T22:34:28Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-q6j2-g8qf-wvf7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19003', 'https://github.com/liftoff/GateOne/issues/728'} | null |
GHSA | GHSA-ffhg-7mh4-33c4 | Improper Verification of Cryptographic Signature in golang.org/x/crypto | golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client. | {'CVE-2020-9283'} | 2022-01-04T19:50:38Z | 2021-05-18T15:29:31Z | MODERATE | 7.5 | {'CWE-347'} | {'https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html', 'https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9283', 'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236', 'http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html', 'https://www.exploit-db.com/exploits/48121', 'https://github.com/advisories/GHSA-ffhg-7mh4-33c4'} | null |
GHSA | GHSA-4jf5-jggp-g56j | Cross-Site Request Forgery in com.softwaremill.akka-http-session:core_2.12 | This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the same value for both the X-XSRF-TOKEN header and the XSRF-TOKEN cookie value, as the check in randomTokenCsrfProtection only checks that the two values are equal and non-empty. | {'CVE-2020-28452'} | 2022-01-06T20:23:05Z | 2022-01-06T20:23:05Z | HIGH | 8.8 | {'CWE-352'} | {'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1058933', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28452', 'https://github.com/softwaremill/akka-http-session/issues/77', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046675', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046674', 'https://github.com/advisories/GHSA-4jf5-jggp-g56j', 'https://github.com/softwaremill/akka-http-session/pull/79'} | null |
GHSA | GHSA-962m-m8jw-8wrr | Path Traversal in Zope | Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. | {'CVE-2021-32633'} | 2021-08-31T21:04:33Z | 2021-06-15T16:10:49Z | HIGH | 8.8 | {'CWE-22'} | {'http://www.openwall.com/lists/oss-security/2021/05/21/1', 'https://github.com/advisories/GHSA-962m-m8jw-8wrr', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36', 'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32633', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/'} | null |
GHSA | GHSA-5x29-3hr9-6wpw | TPM 1.2 key authorization values vulnerable to TPM transport eavesdropper in go-tpm | ### Impact
TPM 2.0 users are unaffected by this issue.
An adversary eavesdropping on the TPM 1.2 transport path can calculate `usageAuth` for a key created with CreateWrapKey, even though this value is encrypted as part of the TPM 1.2 command protocol.
The TPM 1.2 CreateWrapKey command accepts two secrets: `usageAuth` and `migrationAuth`. The ADIP protocol (TPM 1.2 specification, part 1, section 13.4) calls for these values to be encrypted with two different XOR keys.
Due to a bug in go-tpm prior to version 0.3.0, both `usageAuth` and `migrationAuth` are encrypted with the same XOR keystream. This allows an adversary to XOR `encUsageAuth` and `encMigrationAuth` together to calculate `usageAuth ^ encMigrationAuth`. Since `migrationAuth` is moot for all keys created with go-tpm's `CreateWrapKey` (since all keys created with this function are marked non-migratable), an adversary may guess or know (from code/binary inspection) that `migrationAuth` is all 0x00 bytes or some other fixed value. Such an adversary can then calculate `usageAuth` and use this value later to improperly use the created key, unbeknownst to the creator of the key.
### Patches
Fixed in go-tpm version 0.3.0.
### Workarounds
- TPM 2.0 users: No workaround needed. This issue only affects TPM 1.2 users.
- TPM 1.2 users: Call CreateWrapKey with a random 20-byte value for `migrationAuth`, even though that value is not used again (since CreateWrapKey creates keys that are non-migratable). Do not store or log this value.
### Details
TPM 1.2 uses a protocol called ADIP (Authorization Data Insertion Protocol) to encrypt authorization values over-the-wire for newly created objects. This prevents a bus-snooping attack like those publicized by TPM Genie. TPM 2.0 makes this optional (the way to do it is with parameter-encryption sessions). You can read more about ADIP in section 13.4 of Part 1: Design Principles in the latest [TPM 1.2 specification](https://trustedcomputinggroup.org/resource/tpm-main-specification/). Normally, ADIP consists of the following steps:
```
Key := SHA1(authSession.SharedSecret || a nonce)
Note: nonces and auth values in TPM 1.2 are always 20 bytes
EncAuth := XOR(Key, Auth)
```
When commands require one ADIP-encrypted auth value, the nonce is the last nonceEven (last nonce from the TPM).
When commands require two ADIP-encrypted auth values, the nonce for the first auth value is still nonceEven, and the nonce for the second auth value is the last nonceOdd, which is the one being provided by the caller along with the current command on the session.
The reason for this is that you wouldn't want an adversary to be able to XOR the two encrypted auth values together and come up with (auth 1 XOR key) XOR (auth 2 XOR key) where the "one-time" pad key is used twice and cancels itself out.
Here are the commands that take one authorization value by ADIP:
- Seal (the sealed data's auth value)
- Sealx (the sealed data's auth value)
- CreateKey (the key's auth value)
- MakeIdentity (the AIK's auth value)
- ChangeAuth (the entity's new auth value)
- ChangeAuthOwner (the new owner auth value)
- Delegate_CreateKeyDelegation (the new delegation auth value)
- Delegate_CreateOwnerDelegation (the new delegation auth value)
- NV_DefineSpace (the NV's auth value)
- CreateCounter (the counter's auth value)
Here are the commands that take two authorization values by ADIP:
- CreateWrapKey (the key's auth value, and the key's migration (to export out of the TPM) auth value)
The migrationAuth value is never used if the key does not have the TPM_KEY_FLAGS.migratable flag set on it. go-tpm does not currently allow the caller to set this flag.
Here was the bug in our implementation of CreateWrapKey():
https://github.com/google/go-tpm/blob/16766ac4521425bd02ad23868fbdf24749268669/tpm/tpm.go#L1322-L1329
Here we see that both usageAuth and migrationAuth are encrypted by the same XOR key. This is the correct key (i.e., it is based on nonceEven) for usageAuth, but not migrationAuth.
This means 2 things:
**First: migrationAuth is being set to some value that is effectively unrelated to migrationAuth as passed by the caller.** Again, this is not interesting to all current callers (given that there is no way for them to pass TPM_KEY_FLAGS.migratable via the current API; migrationAuth is not a meaningful value).
**Second, and much more importantly: a user of go-tpm is vulnerable to the following attack by a passive bus-snooping adversary (CVE-2020-8918)**
Wait for a CreateWrapKey command
Collect encUsageAuth and encMigrationAuth
Calculate (usageAuth XOR migrationAuth) := (encUsageAuth XOR encMigrationAuth)
Assuming migrationAuth is all 0x00 (a reasonable assumption for a caller who knows the key is not migratable), the calculation in (3) is the usage auth of the key. | {'CVE-2020-8918'} | 2022-04-19T19:02:31Z | 2022-02-11T23:18:09Z | HIGH | 7.1 | {'CWE-665'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8918', 'https://github.com/google/go-tpm/security/advisories/GHSA-5x29-3hr9-6wpw', 'https://github.com/advisories/GHSA-5x29-3hr9-6wpw', 'https://github.com/google/go-tpm/pull/195'} | null |
GHSA | GHSA-gvcp-948f-8f2p | Use of Uninitialized Resource in libp2p-deflate | An issue was discovered in the libp2p-deflate crate before 0.27.1 for Rust. An uninitialized buffer is passed to AsyncRead::poll_read(), which is a user-provided trait function. | {'CVE-2020-36443'} | 2021-08-25T20:59:04Z | 2021-08-25T20:59:04Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-36443', 'https://rustsec.org/advisories/RUSTSEC-2020-0123.html', 'https://github.com/advisories/GHSA-gvcp-948f-8f2p'} | null |
GHSA | GHSA-3v5x-qjrp-q2hq | Unrestricted Upload of File with Dangerous Type in ButterCMS | An arbitrary file upload vulnerability in the file upload component of ButterCMS v1.2.8 allows attackers to execute arbitrary code via a crafted SVG file. | {'CVE-2022-27260'} | 2022-04-26T18:01:52Z | 2022-04-13T00:00:24Z | CRITICAL | 9.8 | {'CWE-434'} | {'https://github.com/advisories/GHSA-3v5x-qjrp-q2hq', 'https://www.youtube.com/watch?v=Tw8OhtVd-mE', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27260', 'https://github.com/ButterCMS/buttercms-js'} | null |
GHSA | GHSA-hm2h-f456-6j88 | Cross-site scripting in Plone | Plone through 5.2.4 allows stored XSS attacks (by a Contributor) by uploading an SVG or HTML document. | {'CVE-2021-33512'} | 2021-06-08T23:20:04Z | 2021-06-08T23:20:04Z | MODERATE | 5.4 | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33512', 'https://plone.org/security/hotfix/20210518/stored-xss-from-file-upload-svg-html', 'https://github.com/advisories/GHSA-hm2h-f456-6j88'} | null |
GHSA | GHSA-94qw-r73x-j7hg | Users with ROLE_COURSE_ADMIN can create new users in Opencast | ### Impact
Users with the role `ROLE_COURSE_ADMIN` can use the user-utils endpoint to create new users not including the role `ROLE_ADMIN`. For example:
```bash
# Use the admin to create a new user with ROLE_COURSE_ADMIN using the admin user.
# We expect this to work.
% curl -i -u admin:opencast 'https://example.opencast.org/user-utils/xy.json' -X PUT \
--data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D'
HTTP/2 201
# Use the new user to create more new users.
# We don't expüect a user with just role ROLE_COURSE_ADMIN to succeed.
# But it does work
% curl -i -u xy:f 'https://example.opencast.org/user-utils/ab.json' -X PUT \
--data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D'
HTTP/2 201
```
`ROLE_COURSE_ADMIN` is a non-standard role in Opencast which is referenced neither in the documentation nor in any code (except for tests) but only in the security configuration. From the name – implying an admin for a specific course – users would never expect that this role allows user creation.
### Patches
This issue is fixed in 7.6 and 8.1 which both ship a new default security configuration.
### Workarounds
You can fix this issue by removing all instances of `ROLE_COURSE_ADMIN` in your organization's security configuration (`etc/security/mh_default_org.xml` by default).
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at security@opencast.org | {'CVE-2020-5231'} | 2021-10-20T18:03:32Z | 2020-01-30T21:21:37Z | MODERATE | 4.8 | {'CWE-285'} | {'https://github.com/advisories/GHSA-94qw-r73x-j7hg', 'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee', 'https://github.com/opencast/opencast/security/advisories/GHSA-94qw-r73x-j7hg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5231'} | null |
GHSA | GHSA-g4h2-4wvh-grc5 | Uncontrolled Resource Consumption in simple_asn1 | An issue was discovered in the simple_asn1 crate 0.6.0 before 0.6.1 for Rust. There is a panic if UTCTime data, supplied by a remote attacker, has a second character greater than 0x7f. | {'CVE-2021-45711'} | 2022-01-07T18:25:30Z | 2022-01-06T22:05:05Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-45711', 'https://rustsec.org/advisories/RUSTSEC-2021-0125.html', 'https://github.com/advisories/GHSA-g4h2-4wvh-grc5', 'https://github.com/acw/simple_asn1/issues/27', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/simple_asn1/RUSTSEC-2021-0125.md'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.