ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-vq36-27g6-p492
Out of bounds read in Tensorflow
### Impact TensorFlow's [type inference](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229) can cause a heap OOB read as the bounds checking is done in a `DCHECK` (which is a no-op during production): ```cc if (node_t.type_id() != TFT_UNSET) { int ix = input_idx[i]; DCHECK(ix < node_t.args_size()) << "input " << i << " should have an output " << ix << " but instead only has " << node_t.args_size() << " outputs: " << node_t.DebugString(); input_types.emplace_back(node_t.args(ix)); // ... } ``` An attacker can control `input_idx` such that `ix` would be larger than the number of values in `node_t.args`. ### Patches We have patched the issue in GitHub commit [c99d98cd189839dcf51aee94e7437b54b31f8abd](https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd). The fix will be included in TensorFlow 2.8.0. This is the only affected version. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23592'}
2022-03-28T19:30:23Z
2022-02-09T23:31:48Z
HIGH
8.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq36-27g6-p492', 'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23592', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229', 'https://github.com/advisories/GHSA-vq36-27g6-p492'}
null
GHSA
GHSA-jh63-28gx-7p26
Command Injection in CasaOS
CasaOS before v0.2.7 was discovered to contain a command injection vulnerability via the component leave or join zerotier api.
{'CVE-2022-24193'}
2022-05-05T13:34:12Z
2022-03-11T00:02:17Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24193', 'https://github.com/IceWhaleTech/CasaOS/issues/84', 'https://www.star123.top/2022/01/08/A-vulnerability-in-CasaOS/#more', 'https://www.star123.top/2022/01/08/A-vulnerability-in-CasaOS/', 'https://github.com/IceWhaleTech/CasaOS/commit/d060968b7ab08e7f8cbfe7ca9ccdfa47afe9bb06', 'https://github.com/advisories/GHSA-jh63-28gx-7p26'}
null
GHSA
GHSA-82xf-8h9p-c6qj
Cross-Site Request Forgery in forkcms
Cross-site request forgery (CSRF) in Fork-CMS before 5.8.2 allow remote attackers to hijack the authentication of logged administrators.
{'CVE-2020-23264'}
2021-06-22T15:23:45Z
2021-06-22T15:23:45Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23264', 'https://github.com/advisories/GHSA-82xf-8h9p-c6qj', 'https://github.com/forkcms/forkcms/pull/3123'}
null
GHSA
GHSA-q2q7-5pp4-w6pg
Catastrophic backtracking in URL authority parser when passed URL containing many @ characters
### Impact When provided with a URL containing many `@` characters in the authority component the authority regular expression exhibits catastrophic backtracking causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect. ### Patches The issue has been fixed in urllib3 v1.26.5. ### References - [CVE-2021-33503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503) - [JVNVU#92413403 (English)](https://jvn.jp/en/vu/JVNVU92413403/) - [JVNVU#92413403 (Japanese)](https://jvn.jp/vu/JVNVU92413403/) - [urllib3 v1.26.5](https://github.com/urllib3/urllib3/releases/tag/1.26.5) ### For more information If you have any questions or comments about this advisory: * Ask in our [community Discord](https://discord.gg/urllib3) * Email [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)
{'CVE-2021-33503'}
2022-04-19T19:02:58Z
2021-06-01T21:19:32Z
HIGH
7.5
{'CWE-400'}
{'https://security.gentoo.org/glsa/202107-36', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-q2q7-5pp4-w6pg', 'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec', 'https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33503', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/'}
null
GHSA
GHSA-cfjh-p3g4-3q2f
VBScript Content Injection in marked
Versions 0.3.2 and earlier of `marked` are affected by a cross-site scripting vulnerability even when `sanitize:true` is set. ## Proof of Concept ( IE10 Compatibility Mode Only ) `[xss link](vbscript:alert(1&#41;)` will get a link `<a href="vbscript:alert(1)">xss link</a>` ## Recommendation Update to version 0.3.3 or later.
{'CVE-2015-1370'}
2021-09-09T17:02:03Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/24', 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1', 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba', 'http://www.openwall.com/lists/oss-security/2015/01/23/2', 'https://github.com/advisories/GHSA-cfjh-p3g4-3q2f', 'https://github.com/chjj/marked/issues/492', 'https://nodesecurity.io/advisories/marked_vbscript_injection', 'https://github.com/markedjs/marked/issues/492', 'https://www.npmjs.com/advisories/24/versions', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1370'}
null
GHSA
GHSA-4vpc-5jx4-cfqg
User enumeration leak using switch user functionality in Symfony
An issue was discovered in Symfony 4.2.0 to 4.2.11 and 4.3.0 to 4.3.7. The ability to enumerate users was possible due to different handling depending on whether the user existed when making unauthorized attempts to use the switch users functionality. This is related to symfony/security.
{'CVE-2019-18886'}
2021-07-28T15:49:17Z
2019-12-02T18:09:21Z
MODERATE
5.3
{'CWE-200', 'CWE-203'}
{'https://github.com/advisories/GHSA-4vpc-5jx4-cfqg', 'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://symfony.com/blog/cve-2019-18886-prevent-user-enumeration-using-switch-user-functionality', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-18886.yaml', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18886', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18886.yaml', 'https://symfony.com/cve-2019-18886'}
null
GHSA
GHSA-vf4w-fg7r-5v94
Improper Certificate Validation in phpseclib
phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification.
{'CVE-2021-30130'}
2021-04-23T00:22:50Z
2021-04-07T20:56:55Z
HIGH
7.5
{'CWE-347', 'CWE-295'}
{'https://github.com/phpseclib/phpseclib/releases/tag/2.0.31', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30130', 'https://github.com/phpseclib/phpseclib/pull/1635', 'https://github.com/phpseclib/phpseclib/releases/tag/3.0.7', 'https://github.com/advisories/GHSA-vf4w-fg7r-5v94'}
null
GHSA
GHSA-pfj3-56hm-jwq5
Template injection in cron-utils
### Impact A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. ### Patches The issue was patched and a new version released. Please upgrade to version 9.1.3. ### Workarounds There are no known workarounds up to this moment. ### References A description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461) ### For more information If you have any questions or comments about this advisory: * Open an issue in [cron-utils Github repository](https://github.com/jmrozanec/cron-utils)
{'CVE-2020-26238'}
2022-04-19T19:02:40Z
2020-11-24T23:48:38Z
CRITICAL
7.9
{'CWE-74'}
{'https://github.com/jmrozanec/cron-utils/issues/461', 'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26238', 'https://lists.apache.org/thread.html/r5f601d15292e3302ad0ae0e89527029546945b1cd5837af7e838d354@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/ra9e81244d323898dde3c979dd7df6996e4037d14a01b6629ea443548@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r855aead591697dc2e85faf66c99036e49f492431940b78d4e6d895b5@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r50e1b5544c37e408ed7e9a958b28237b1cb9660ba2b3dba46f343e23@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r390bb7630b7ea8f02bf7adbbe69c0ae8b562c527d663c543d965f959@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r432a69a1a85cbcb1f1bad2aa0fbfce0367bf894bf917f6ed7118e7f0@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r71083c759dc627f198571b3d48b6745fe798b1d53c34f7ef8de9e7dd@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9ae9a9fb1c8e2bf95c676e7e4cd06aa04f0a3a8a9ec1a6b787afb00f@%3Cissues.hive.apache.org%3E', 'https://github.com/advisories/GHSA-pfj3-56hm-jwq5', 'https://lists.apache.org/thread.html/r737406bc17d49ffe8fe6a8828d390ee0a02e45e5a5b4f931180b9a93@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r96937fc9c82f3201b59311c067e97bce71123944f93102169a95bf5c@%3Cissues.hive.apache.org%3E', 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-pfj3-56hm-jwq5'}
null
GHSA
GHSA-hf6f-jq25-8gq9
Remote Code Execution (RCE)
Gitea before 1.5.4 allows remote code execution because it does not properly validate session IDs. This is related to session ID handling in the go-macaron/session code for Macaron.
{'CVE-2018-18926'}
2022-04-12T22:10:40Z
2022-02-15T01:57:18Z
CRITICAL
8.1
{'CWE-94'}
{'https://github.com/advisories/GHSA-hf6f-jq25-8gq9', 'https://github.com/go-gitea/gitea/issues/5140', 'https://github.com/go-gitea/gitea/pull/5177', 'https://github.com/go-gitea/gitea/commit/aeb5655c25053bdcd7eee94ea37df88468374162', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18926'}
null
GHSA
GHSA-rhcw-wjcm-9h6g
Denial of service in Undertow
A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1.
{'CVE-2020-27782'}
2022-02-09T00:54:12Z
2022-02-09T00:54:12Z
HIGH
7.5
{'CWE-400'}
{'https://issues.redhat.com/browse/UNDERTOW-1813', 'https://github.com/advisories/GHSA-rhcw-wjcm-9h6g', 'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90', 'https://bugzilla.redhat.com/show_bug.cgi?id=1901304', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27782'}
null
GHSA
GHSA-9h6g-gp95-x3q5
actionpack is vulnerable to denial of service because of a wildcard controller route
actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
{'CVE-2015-7581'}
2022-04-25T20:52:01Z
2017-10-24T18:33:36Z
HIGH
7.5
null
{'http://www.openwall.com/lists/oss-security/2016/01/25/16', 'https://github.com/advisories/GHSA-9h6g-gp95-x3q5', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/dthJ5wL69JE/IdvCimtZEgAJ', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7581', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.securitytracker.com/id/1034816', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'http://www.debian.org/security/2016/dsa-3464', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://www.securityfocus.com/bid/81677'}
null
GHSA
GHSA-3c7p-vv5r-cmr5
Incorrect Authorization in Apache Solr
Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvented by using a combination of UPLOAD/CREATE actions.
{'CVE-2020-13957'}
2022-02-24T13:48:18Z
2022-02-10T00:31:27Z
CRITICAL
9.8
{'CWE-863'}
{'https://security.netapp.com/advisory/ntap-20201023-0002/', 'https://lists.apache.org/thread.html/r7512ae552cd9d14ab8b1bc0a7e95f2ec52ae85364f068d4034398ede@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r2f8d33a4de07db9459fb2a98a1cd39747066137636b53f84a13e5628@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r2236fdf99ac3efbfc36c2df96d3a88f822baa6f45e13fec7ff558e34@%3Cdev.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r3d1e24a73e6bffa1d6534e1f34c8f5cbd9999495e7d933640f4fa0ed@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r13a728994c60be5b5a7049282b5c926dac1fc6a9a0b2362f6adfa573@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r226c1112bb41e7cd427862d875eff9877a20a40242c2542f4dd39e4a@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r999f828e6e37d9e825e207471cbfd2681c3befcd7f3abd59ed87c0d5@%3Cissues.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r1c783d3d81ba62f3381a17a4d6c826f7dead3a132ba42349c90df075@%3Ccommits.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r3da9895cea476bcee2557531bebd4e8f6f367dc3ea900a65e2f51cd8@%3Cissues.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r9d7356f209ee30d702b6a921c866564eb2e291b126640c7ab70feea7@%3Ccommits.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rf1a32f00017e83ff29a74be2de02e28e4302dddb5f14c624e297a8c0@%3Cdev.bigtop.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13957', 'https://lists.apache.org/thread.html/r5557641fcf5cfd99260a7037cfbc8788fb546b72c98a900570edaa2e@%3Cissues.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-3c7p-vv5r-cmr5', 'https://lists.apache.org/thread.html/r853fdc6d0b91d5e01a26c7bd5becb044ad775a231703d634ca5d55c9@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rb1de6ba50a468e9baff32a249edaa08f6bcec7dd7cc208e25e6b48c8@%3Cissues.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r8b1782d42d0a4ce573495d5d9345ad328d652c68c411ccdb245c57e3@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r4ca8ba5980d9049cf3707798aa3116ee76c1582f171ff452ad2ca75e@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://mail-archives.us.apache.org/mod_mbox/www-announce/202010.mbox/%3CCAECwjAWCVLoVaZy%3DTNRQ6Wk9KWVxdPRiGS8NT%2BPHMJCxbbsEVg%40mail.gmail.com%3E', 'https://lists.apache.org/thread.html/rb2f1c7fd3d3ea719dfac4706a80e6affddecae8663dda04e1335347f@%3Ccommits.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r2a6600fe9afd502c04d26fd112823ec3f3c3ad1b4a289d10567a78a0@%3Cdev.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r622a043c2890327f8a4aea16b131e8a7137a282a004614369fceb224@%3Cdev.bigtop.apache.org%3E'}
null
GHSA
GHSA-gqq4-937c-2282
Malicious Package in juffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:18:16Z
2020-09-03T22:49:42Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1272', 'https://github.com/advisories/GHSA-gqq4-937c-2282'}
null
GHSA
GHSA-wfrj-qqc2-83cm
Remote command injection when using sendmail email transport
### Impact Sites using the `sendmail` transport as part of their `mail` config are vulnerable to remote command injection due to a [vulnerability](https://github.com/advisories/GHSA-48ww-j4fc-435p) in the `nodemailer` dependency. Ghost defaults to the `direct` transport so this is only exploitable if the `sendmail` transport is explicitly used. ### Patches Fixed in 4.15.0, all sites should upgrade as soon as possible. ### Workarounds * Use an alternative email transport as described in the [docs](https://ghost.org/docs/config/#mail). ### For more information If you have any questions or comments about this advisory: * email us at security@ghost.org
null
2021-09-20T19:52:41Z
2021-09-20T19:52:41Z
MODERATE
5.8
{'CWE-88'}
{'https://github.com/advisories/GHSA-48ww-j4fc-435p', 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-wfrj-qqc2-83cm', 'https://github.com/advisories/GHSA-wfrj-qqc2-83cm'}
null
GHSA
GHSA-7vvq-7r29-5vg3
Cross site scripting in three.js
# CVE has been withdrawn Versions of three.js prior to 0.137.0 load untrusted iframes and allow for attackers to inject arbitrary javascript into a users browser.
{'CVE-2022-0177'}
2022-01-28T21:29:42Z
2022-01-27T16:00:48Z
HIGH
7.1
{'CWE-79'}
{'https://github.com/mrdoob/three.js/commit/0c31bc605e21965aad8a6479bb1969351773f76d', 'https://github.com/advisories/GHSA-7vvq-7r29-5vg3', 'https://github.com/mrdoob/three.js/pull/23245', 'https://huntr.dev/bounties/16901080-99b4-4fb5-8c5b-931bfbf33cba', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0177'}
null
GHSA
GHSA-7752-f4gf-94gc
Cross-Site Scripting in materialize-css
All versions of `materialize-css` are vulnerable to Cross-Site Scripting. The `autocomplete` component does not sufficiently sanitize user input, allowing an attacker to execute arbitrary JavaScript code if the malicious input is rendered by a user. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
{'CVE-2019-11003'}
2021-09-02T19:56:39Z
2019-04-09T19:44:38Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/Dogfalo/materialize/issues/6286', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11003', 'https://github.com/advisories/GHSA-7752-f4gf-94gc', 'https://www.npmjs.com/advisories/817', 'https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-174144'}
null
GHSA
GHSA-5fxv-xx5p-g2fv
Integer Overflow in microweber
Microweber is a new generation CMS with drag and drop. The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters
{'CVE-2022-0968'}
2022-03-25T17:13:37Z
2022-03-16T00:00:46Z
HIGH
7.2
{'CWE-190'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0968', 'https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e', 'https://github.com/advisories/GHSA-5fxv-xx5p-g2fv', 'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'}
null
GHSA
GHSA-4rv9-5vc4-88cg
Command injection in node-ps
This affects all versions of package node-ps. The injection point is located in line 72 in lib/index.js.
{'CVE-2020-7785'}
2021-07-28T18:20:01Z
2021-03-19T21:21:06Z
CRITICAL
9.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-NODEPS-1048335', 'https://github.com/advisories/GHSA-4rv9-5vc4-88cg', 'https://github.com/fortruce/node-ps/blob/master/lib/index.js%23L72', 'https://www.npmjs.com/package/node-ps', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7785'}
null
GHSA
GHSA-7hfm-57qf-j43q
Excessive Iteration in Compress
When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
{'CVE-2021-35515'}
2022-04-26T18:07:43Z
2021-08-02T16:55:07Z
HIGH
7.5
{'CWE-835', 'CWE-834'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r19ebfd71770ec0617a9ea180e321ef927b3fefb4c81ec5d1902d20ab%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35515', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88@%3Ccommits.druid.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'http://www.openwall.com/lists/oss-security/2021/07/13/1', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-7hfm-57qf-j43q', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rbaea15ddc5a7c0c6b66660f1d6403b28595e2561bb283eade7d7cd69@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}
null
GHSA
GHSA-jxhc-q857-3j6g
Regular Expression Denial of Service in Addressable templates
### Impact Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. ### Patches The vulnerability was introduced in version 2.3.0 (previously yanked) and has been present in all subsequent versions up to, and including, 2.7.0. It is fixed in version 2.8.0. ### Workarounds The vulnerability can be avoided by only creating Template objects from trusted sources that have been validated not to produce catastrophic backtracking. ### References - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS - https://cwe.mitre.org/data/definitions/1333.html - https://www.regular-expressions.info/catastrophic.html ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/sporkmonger/addressable/issues)
{'CVE-2021-32740'}
2021-08-30T22:21:21Z
2021-07-12T16:58:33Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-jxhc-q857-3j6g', 'https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc', 'https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDFQM2NHNAZ3NNUQZEJTYECYZYXV4UDS/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32740', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYPVOOQU7UB277UUERJMCNQLRCXRCIQ5/', 'https://github.com/sporkmonger/addressable/commit/89c76130ce255c601f642a018cb5fb5a80e679a7'}
null
GHSA
GHSA-5pm8-492c-92p5
Prototype Pollution in chartkick
Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{"__proto__": {"polluted": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server. ## Recommendation Upgrade to version 3.2.0 or later.
{'CVE-2019-18841'}
2021-09-22T18:05:53Z
2019-12-02T18:04:11Z
HIGH
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-18841', 'https://rubygems.org/gems/chartkick/', 'https://github.com/ankane/chartkick/commits/master', 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa', 'https://www.npmjs.com/advisories/1312', 'https://chartkick.com', 'https://github.com/advisories/GHSA-5pm8-492c-92p5', 'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md', 'https://github.com/ankane/chartkick.js/issues/117'}
null
GHSA
GHSA-ww6v-677g-p656
Sandbox Breakout in safe-eval
Affected versions of `safe-eval` are vulnerable to a sandbox escape. By accessing object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox. ## Proof of Concept: This code accesses the process object and calls `.exit()` ``` var safeEval = require('safe-eval'); safeEval("this.constructor.constructor('return process')().exit()"); ``` ## Recommendation Update to version 0.4.0 or later
{'CVE-2017-16088'}
2021-01-08T00:48:18Z
2018-07-18T18:28:10Z
CRITICAL
0
{'CWE-610'}
{'https://github.com/hacksparrow/safe-eval/pull/13', 'https://github.com/patriksimek/vm2/issues/59', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16088', 'https://github.com/hacksparrow/safe-eval/issues/5', 'https://nodesecurity.io/advisories/337', 'https://www.npmjs.com/advisories/337', 'https://github.com/advisories/GHSA-ww6v-677g-p656'}
null
GHSA
GHSA-9j8q-m9x5-9g6j
Data races in async-coap
An issue was discovered in the async-coap crate through 2020-12-08 for Rust. Affected versions of this crate implement Send/Sync for `ArcGuard<RC, T>` with no trait bounds on `RC`. This allows users to send `RC: !Send` to other threads and also allows users to concurrently access `Rc: !Sync` from multiple threads. This can result in memory corruption from data race or other undefined behavior caused by sending `T: !Send` to other threads (e.g. dropping `MutexGuard<T>` in another thread that didn't lock its mutex).
{'CVE-2020-36444'}
2021-08-25T20:59:11Z
2021-08-25T20:59:11Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36444', 'https://rustsec.org/advisories/RUSTSEC-2020-0124.html', 'https://github.com/google/rust-async-coap/issues/33', 'https://github.com/advisories/GHSA-9j8q-m9x5-9g6j'}
null
GHSA
GHSA-hxhm-96pp-2m43
Remote Code Execution in Angular Expressions
### Impact The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input. * If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). * If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution. ### Patches Users should upgrade to version 1.0.1 of angular-expressions ### Workarounds A temporary workaround might be either to : * disable user-controlled input that will be fed into angular-expressions in your application OR * allow only following characters in the userControlledInput : ```js if (/^[|a-zA-Z.0-9 :"'+-?]+$/.test(userControlledInput)) { var result = expressions.compile(userControlledInput); } else { result = undefined; } ``` ### References [Removal of angular-expression sandbox](http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [angular-expressions](https://github.com/peerigon/angular-expressions/issues) * [Email us](mailto:contact@javascript-ninja.fr) ### Credits The issue was reported by Maxime Nadeau from GoSecure, Inc.
{'CVE-2020-5219'}
2022-04-19T19:02:21Z
2020-01-24T15:27:25Z
HIGH
8.7
{'CWE-74'}
{'https://github.com/advisories/GHSA-hxhm-96pp-2m43', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5219', 'https://github.com/peerigon/angular-expressions/security/advisories/GHSA-hxhm-96pp-2m43', 'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html'}
null
GHSA
GHSA-96v6-hrwg-p378
Weak Password Requirements in Daybyday CRM
In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort.
{'CVE-2022-22110'}
2022-01-24T22:07:09Z
2022-01-08T00:31:51Z
HIGH
7.5
{'CWE-521'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22110', 'https://github.com/advisories/GHSA-96v6-hrwg-p378', 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110'}
null
GHSA
GHSA-gprh-7767-cw39
Code Injection in Bolt CMS
Bolt CMS <= 4.2 is vulnerable to Remote Code Execution. Unsafe theme rendering allows an authenticated attacker to edit theme to inject server-side template injection that leads to remote code execution.
{'CVE-2021-40219'}
2022-04-22T20:18:25Z
2022-04-12T00:00:34Z
HIGH
8.8
{'CWE-94'}
{'https://github.com/bolt/core/blob/3b21a73ebf519b76756d3ad2841312d10ef11461/src/Controller/Frontend/TemplateController.php', 'https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-40219', 'https://github.com/bolt/core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40219', 'https://github.com/advisories/GHSA-gprh-7767-cw39', 'http://boltcms.com'}
null
GHSA
GHSA-9jf3-f2pg-7868
Downloads Resources over HTTP in nw-with-arm
Affected versions of `nw-with-arm` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw-with-arm`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10629'}
2021-01-08T21:05:13Z
2019-02-18T23:57:01Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10629', 'https://github.com/advisories/GHSA-9jf3-f2pg-7868', 'https://nodesecurity.io/advisories/226', 'https://www.npmjs.com/advisories/226'}
null
GHSA
GHSA-5gjm-fj42-x983
Cross-site Request Forgery (CSRF)
A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
{'CVE-2018-1098'}
2022-04-12T22:10:13Z
2022-02-15T01:57:18Z
HIGH
8.8
{'CWE-352'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1552714', 'https://github.com/advisories/GHSA-5gjm-fj42-x983', 'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56', 'https://github.com/coreos/etcd/issues/9353', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1098'}
null
GHSA
GHSA-3872-f48p-pxqj
Improper Neutralization of Special Elements used in a Command ('Command Injection') in Weblate
### Impact Weblate didn't correctly sanitize some arguments passed to Git and Mercurial, which allowed changing their behavior in an unintended way. ### Patches The issues were fixed in the 4.11.1 release. The following commits are addressing it: * 35d59f1f040541c358cece0a8d4a63183ca919b8 * d83672a3e7415da1490334e2c9431e5da1966842 ### Workarounds Instances in which untrusted users cannot create new components are not affected. ### References * [SNYK-PYTHON-WEBLATE-2414088](https://security.snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088) ### For more information If you have any questions or comments about this advisory: * Open a topic in [discussions](https://github.com/WeblateOrg/weblate/discussions) * Email us at [care@weblate.org](mailto:care@weblate.org)
{'CVE-2022-23915'}
2022-04-19T19:03:25Z
2022-03-04T21:15:31Z
HIGH
8.8
{'CWE-88', 'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23915', 'https://github.com/WeblateOrg/weblate/releases/tag/weblate-4.11.1', 'https://github.com/WeblateOrg/weblate/pull/7338', 'https://github.com/advisories/GHSA-3872-f48p-pxqj', 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj', 'https://github.com/WeblateOrg/weblate/pull/7337', 'https://security.snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088', 'https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088'}
null
GHSA
GHSA-699m-mcjm-9cw8
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/translation_helper.rb in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem.
{'CVE-2013-4491'}
2021-09-02T15:48:02Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-79'}
{'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'https://github.com/advisories/GHSA-699m-mcjm-9cw8', 'http://rhn.redhat.com/errata/RHSA-2014-0008.html', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://secunia.com/advisories/57836', 'http://www.securityfocus.com/bid/64076', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4491', 'http://rhn.redhat.com/errata/RHSA-2013-1794.html', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'http://www.debian.org/security/2014/dsa-2888', 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/', 'https://puppet.com/security/cve/cve-2013-4491'}
null
GHSA
GHSA-grgm-pph5-j5h7
Exposure of Sensitive Information to an Unauthorized Actor in ansible
A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.
{'CVE-2019-10156'}
2022-04-20T19:15:25Z
2019-07-31T04:22:49Z
MODERATE
5.4
{'CWE-200'}
{'https://github.com/ansible/ansible/pull/57188', 'https://access.redhat.com/errata/RHSA-2019:3744', 'https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html', 'https://www.debian.org/security/2021/dsa-4950', 'https://access.redhat.com/errata/RHSA-2019:3789', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10156', 'https://github.com/advisories/GHSA-grgm-pph5-j5h7', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156'}
null
GHSA
GHSA-hwv5-w8gm-fq9f
Directory Traversal vulnerability in GET/PUT allows attackers to Disclose Information or Write Files via a crafted GET/PUT request
### Impact #### Information Disclosure When the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic. For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access. If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances. #### File Write If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload. ### Patches PR #12 fixes the issue. The PR has been merged into version 0.4.0 and 0.4.0 has been released and pushed to PyPI. Users are advised to upgrade immediately. ### Workarounds - Apache can apparently be configured to filter such malicious paths when reverse-proxying. - There are no other workarounds known. ### References - [Pull Request #12](https://github.com/horazont/xmpp-http-upload/pull/12)
{'CVE-2020-15239'}
2022-04-19T19:02:36Z
2020-10-06T18:21:02Z
LOW
3.5
{'CWE-22'}
{'https://github.com/horazont/xmpp-http-upload/security/advisories/GHSA-hwv5-w8gm-fq9f', 'https://pypi.org/project/xmpp-http-upload/#history', 'https://github.com/horazont/xmpp-http-upload/pull/12', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15239', 'https://github.com/advisories/GHSA-hwv5-w8gm-fq9f', 'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'}
null
GHSA
GHSA-w428-f65r-h4q2
Deserialization of Untrusted Data in rust-cpuid
An issue was discovered in the raw-cpuid crate before 9.1.1 for Rust. If the serialize feature is used (which is not the the default), a Deserialize operation may lack sufficient validation, leading to memory corruption or a panic.
{'CVE-2021-45687'}
2022-01-07T17:23:22Z
2022-01-06T22:13:12Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45687', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/raw-cpuid/RUSTSEC-2021-0089.md', 'https://github.com/advisories/GHSA-w428-f65r-h4q2', 'https://rustsec.org/advisories/RUSTSEC-2021-0089.html'}
null
GHSA
GHSA-3mcp-9wr4-cjqf
Remote Code Execution (RCE) vulnerability in dropwizard-validation
Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. ### Summary A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability. If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.19 or 2.0.2 is strongly recommended. ### Impact This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**. ### Patches The issue has been fixed in **dropwizard-validation** **1.3.19** and **2.0.2**. We strongly recommend upgrading to one of these versions. ### Workarounds If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html). Example: ```java @SelfValidation public void validateFullName(ViolationCollector col) { if (fullName.contains("_")) { // Sanitize fullName variable by escaping relevant characters such as "$" col.addViolation("Full name contains invalid characters: " + sanitizeJavaEl(fullName)); } } ``` See also: https://github.com/dropwizard/dropwizard/blob/v2.0.2/dropwizard-validation/src/main/java/io/dropwizard/validation/selfvalidating/ViolationCollector.java#L84-L98 ### References * https://github.com/dropwizard/dropwizard/pull/3157 * https://github.com/dropwizard/dropwizard/pull/3160 * https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm * https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions * https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation ### For more information If you have any questions or comments about this advisory: * Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new) * Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev) ### Security contact If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy): https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability
{'CVE-2020-5245'}
2022-04-25T23:06:16Z
2020-02-24T17:27:27Z
HIGH
7.9
{'CWE-74'}
{'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation', 'https://github.com/dropwizard/dropwizard/pull/3157', 'https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm', 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf', 'https://github.com/dropwizard/dropwizard/pull/3160', 'https://github.com/advisories/GHSA-3mcp-9wr4-cjqf', 'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5245'}
null
GHSA
GHSA-8hcm-jj4x-4gmr
Cross-site scripting in tribalsystems/zenario
Cross Site Scripting (XSS) in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to execute arbitrary code by injecting arbitrary HTML into the "cID" parameter when creating a new HTML component.
{'CVE-2021-27673'}
2021-06-14T21:28:39Z
2021-06-08T20:11:40Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-8hcm-jj4x-4gmr', 'https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27673', 'http://packetstormsecurity.com/files/163083/Zenario-CMS-8.8.52729-SQL-Injection.html', 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370'}
null
GHSA
GHSA-4328-8hgf-7wjr
Global node_modules Binary Overwrite in npm
Versions of the npm CLI prior to 6.13.4 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This will not overwrite system binaries but only binaries put into the global node_modules directory. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.4 or later.
{'CVE-2019-16777'}
2022-04-19T19:02:23Z
2019-12-13T15:39:32Z
LOW
7.7
{'CWE-22'}
{'https://access.redhat.com/errata/RHEA-2020:0330', 'https://access.redhat.com/errata/RHSA-2020:0597', 'https://security.gentoo.org/glsa/202003-48', 'https://access.redhat.com/errata/RHSA-2020:0602', 'https://access.redhat.com/errata/RHSA-2020:0573', 'https://www.npmjs.com/advisories/1437', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16777', 'https://github.com/advisories/GHSA-4328-8hgf-7wjr', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html', 'https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr', 'https://access.redhat.com/errata/RHSA-2020:0579', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli'}
null
GHSA
GHSA-gh88-3pxp-6fm8
Infinite Loop in colors.js
The package colors after 1.4.0 are vulnerable to Denial of Service (DoS) that was introduced through an infinite loop in the americanFlag module. Unfortunately this appears to have been a purposeful attempt by a maintainer of colors to make the package unusable, other maintainers' controls over this package appear to have been revoked in an attempt to prevent them from fixing the issue. Vulnerable Code js for (let i = 666; i < Infinity; i++;) { Alternative Remediation Suggested * Pin dependancy to 1.4.0
{'CVE-2021-23567'}
2022-01-21T23:39:50Z
2022-01-21T23:39:50Z
HIGH
7.5
{'CWE-835'}
{'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://snyk.io/vuln/SNYK-JS-COLORS-2331906', 'https://github.com/advisories/GHSA-gh88-3pxp-6fm8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6%23diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18', 'https://snyk.io/blog/open-source-maintainer-pulls-the-plug-on-npm-packages-colors-and-faker-now-what/'}
null
GHSA
GHSA-2479-qvv7-47qq
Denial of Service in parse-server
Versions of `parse-server` prior to 3.4.1 are vulnerable to Denial of Service (DoS). POST requests to `/parse/classes/_Audience` (or other volatile classes) cause the server to respond with a `500 Internal Server Error` for any subsequent POST requests. ## Recommendation Upgrade to version 3.4.1 or later.
{'CVE-2019-1020012'}
2021-08-30T15:00:15Z
2019-06-13T16:22:13Z
HIGH
7.5
{'CWE-444'}
{'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455635', 'https://www.npmjs.com/advisories/1113', 'https://github.com/advisories/GHSA-2479-qvv7-47qq', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020012', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2479-qvv7-47qq'}
null
GHSA
GHSA-f97h-2pfx-f59f
HTTP response splitting in uvicorn
This affects all versions of package uvicorn. Uvicorn's implementation of the HTTP protocol for the httptools parser is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
{'CVE-2020-7695'}
2021-09-23T17:28:02Z
2020-07-29T18:07:20Z
HIGH
7.5
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7695', 'https://github.com/advisories/GHSA-f97h-2pfx-f59f', 'https://github.com/encode/uvicorn', 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471'}
null
GHSA
GHSA-7prf-vw4p-qr59
Prototype pollution in supermixer
Prototype pollution in Stampit supermixer allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation.
{'CVE-2020-24939'}
2021-12-10T19:03:07Z
2021-12-10T19:03:07Z
HIGH
7.5
{'CWE-1321', 'CWE-915'}
{'https://github.com/stampit-org/supermixer/issues/9', 'https://github.com/advisories/GHSA-7prf-vw4p-qr59', 'https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5', 'https://hackerone.com/reports/959987', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24939', 'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'}
null
GHSA
GHSA-54g4-5cf6-hjp3
Exposure of Sensitive Information to an Unauthorized Actor and Observable Timing Discrepancy in Apache Hive
Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8
{'CVE-2020-1926'}
2022-02-09T00:48:54Z
2022-02-09T00:48:54Z
MODERATE
5.9
{'CWE-200', 'CWE-208'}
{'https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E', 'https://issues.apache.org/jira/browse/HIVE-22708', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1926', 'https://github.com/advisories/GHSA-54g4-5cf6-hjp3'}
null
GHSA
GHSA-2cqg-q7jm-j35c
snipe-it is vulnerable to Cross-site Scripting
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3938'}
2021-11-17T21:13:27Z
2021-11-15T23:19:42Z
LOW
3.9
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3938', 'https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063', 'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9', 'https://github.com/advisories/GHSA-2cqg-q7jm-j35c'}
null
GHSA
GHSA-5v34-g2px-j4fw
Improper Handling of Length Parameter Inconsistency in Apache Ant
When reading a specially crafted ZIP archive, or a derived formats, an Apache Ant build can be made to allocate large amounts of memory that leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Commonly used derived formats from ZIP archives are for instance JAR files and many office files. Apache Ant prior to 1.9.16 and 1.10.11 were affected.
{'CVE-2021-36374'}
2022-04-22T15:45:00Z
2021-08-02T16:56:31Z
MODERATE
5.5
{'CWE-130'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-5v34-g2px-j4fw', 'https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a@%3Cnotifications.groovy.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36374', 'https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d@%3Ccommits.groovy.apache.org%3E', 'https://ant.apache.org/security.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20210819-0007/', 'https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38%40%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a@%3Ccommits.groovy.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-24x4-6qmh-88qg
Use after free in `DecodePng` kernel
### Impact A malicious user can cause a use after free behavior when [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346): ```cc if (/* ... error conditions ... */) { png::CommonFreeDecode(&decode); OP_REQUIRES(context, false, errors::InvalidArgument("PNG size too large for int: ", decode.width, " by ", decode.height)); } ``` After `png::CommonFreeDecode(&decode)` gets called, the values of `decode.width` and `decode.height` are in an unspecified state. ### Patches We have patched the issue in GitHub commit [e746adbfcfee15e9cfdb391ff746c765b99bdf9b](https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23584'}
2022-02-11T20:36:59Z
2022-02-09T23:57:42Z
HIGH
7.6
{'CWE-416'}
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23584', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x4-6qmh-88qg', 'https://github.com/advisories/GHSA-24x4-6qmh-88qg', 'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b'}
null
GHSA
GHSA-5325-xw5m-phm3
Cross-site Scripting in ammonia
An issue was discovered in the ammonia crate before 3.1.0 for Rust. XSS can occur because the parsing differences for HTML, SVG, and MathML are mishandled, a similar issue to CVE-2020-26870.
{'CVE-2021-38193'}
2021-08-25T20:55:56Z
2021-08-25T20:55:56Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-5325-xw5m-phm3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38193', 'https://github.com/rust-ammonia/ammonia/pull/142', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ammonia/RUSTSEC-2021-0074.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0074.html'}
null
GHSA
GHSA-765h-qjxv-5f44
Prototype Pollution in handlebars
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.
{'CVE-2021-23383'}
2022-02-10T23:51:42Z
2022-02-10T23:51:42Z
CRITICAL
9.8
{'CWE-1321'}
{'https://www.npmjs.com/package/handlebars', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031', 'https://security.netapp.com/advisory/ntap-20210618-0007/', 'https://github.com/advisories/GHSA-765h-qjxv-5f44', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23383', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'}
null
GHSA
GHSA-m2jh-fxw4-gphm
HTTP Host Header Injection
### Meta * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C` (3.5) ### Problem It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP _Host_ header. TYPO3 uses the HTTP _Host_ header, for example, to generate absolute URLs during the frontend rendering process. Since the host header itself is provided by the client, it can be forged to any value, even in a name-based virtual hosts environment. This vulnerability is the same as described in [TYPO3-CORE-SA-2014-001 (CVE-2014-3941)](https://typo3.org/security/advisory/typo3-core-sa-2014-001/). A regression, introduced during TYPO3 v11 development, led to this situation. The already existing setting _$GLOBALS['TYPO3_CONF_VARS']['SYS']['trustedHostsPattern']_ (used as an effective mitigation strategy in previous TYPO3 versions) was not evaluated anymore, and reintroduced the vulnerability. ### Solution Update your instance to TYPO3 version 11.5.0 which addresses the problem described. ### Credits Thanks to TYPO3 framework merger Benjamin Franzke who reported and fixed the issue. ### References * [TYPO3-CORE-SA-2021-015](https://typo3.org/security/advisory/typo3-core-sa-2021-015) * [CVE-2014-3941](https://nvd.nist.gov/vuln/detail/CVE-2014-3941) reintroduced in TYPO3 v11.0.0
{'CVE-2021-41114'}
2022-04-19T19:03:11Z
2021-10-05T20:23:35Z
MODERATE
4.8
{'CWE-20', 'CWE-644'}
{'https://github.com/advisories/GHSA-m2jh-fxw4-gphm', 'https://typo3.org/security/advisory/typo3-core-sa-2021-015', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3941', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41114', 'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4', 'https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm'}
null
GHSA
GHSA-vvg4-vgrv-xfr7
Incomplete validation in `tf.raw_ops.CTCLoss`
### Impact Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap: ```python import tensorflow as tf inputs = tf.constant([], shape=[10, 16, 0], dtype=tf.float32) labels_indices = tf.constant([], shape=[8, 0], dtype=tf.int64) labels_values = tf.constant([-100] * 8, shape=[8], dtype=tf.int32) sequence_length = tf.constant([-100] * 16, shape=[16], dtype=tf.int32) tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, labels_values=labels_values, sequence_length=sequence_length, preprocess_collapse_repeated=True, ctc_merge_repeated=False, ignore_longer_outputs_than_inputs=True) ``` An attacker can also trigger a heap buffer overflow: ```python import tensorflow as tf inputs = tf.constant([], shape=[7, 2, 0], dtype=tf.float32) labels_indices = tf.constant([-100, -100], shape=[2, 1], dtype=tf.int64) labels_values = tf.constant([-100, -100], shape=[2], dtype=tf.int32) sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32) tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, labels_values=labels_values, sequence_length=sequence_length, preprocess_collapse_repeated=False, ctc_merge_repeated=False, ignore_longer_outputs_than_inputs=False) ``` Finally, an attacker can trigger a null pointer dereference: ```python import tensorflow as tf inputs = tf.constant([], shape=[0, 2, 11], dtype=tf.float32) labels_indices = tf.constant([], shape=[0, 2], dtype=tf.int64) labels_values = tf.constant([], shape=[0], dtype=tf.int32) sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32) tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, labels_values=labels_values, sequence_length=sequence_length, preprocess_collapse_repeated=False, ctc_merge_repeated=False, ignore_longer_outputs_than_inputs=False) ``` ### Patches We have patched the issue in GitHub commit[14607c0707040d775e06b6817325640cb4b5864c](https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c) followed by GitHub commit [4504a081af71514bb1828048363e6540f797005b](https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b). The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29613'}
2021-05-21T14:28:39Z
2021-05-21T14:28:39Z
MODERATE
6.3
{'CWE-665'}
{'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29613', 'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vvg4-vgrv-xfr7', 'https://github.com/advisories/GHSA-vvg4-vgrv-xfr7'}
null
GHSA
GHSA-9w87-4j72-gcv7
Insecure Default Configuration in graphql-code-generator
Versions of `graphql-code-generator` prior to 0.18.2 have an Insecure Default Configuration. The packages sets `NODE_TLS_REJECT_UNAUTHORIZED` to 0, disabling certificate verification for the entire project. This results in Insecure Communication for the process. ## Recommendation Upgrade to version 0.18.2 or later.
null
2020-09-02T18:27:54Z
2020-09-02T18:27:54Z
HIGH
0
null
{'https://github.com/dotansimha/graphql-code-generator/issues/1806', 'https://github.com/advisories/GHSA-9w87-4j72-gcv7', 'https://www.npmjs.com/advisories/834'}
null
GHSA
GHSA-3374-7h99-xr85
Cross-site scripting in forkcms
Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML.
{'CVE-2020-23049'}
2021-10-29T13:52:24Z
2021-10-25T19:43:05Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23049', 'https://www.vulnerability-lab.com/get_content.php?id=2208', 'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6', 'https://github.com/advisories/GHSA-3374-7h99-xr85'}
null
GHSA
GHSA-r7j3-vvh2-xrpj
OS Command Injection in MiniMagick
In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.
{'CVE-2019-13574'}
2021-05-10T21:50:50Z
2019-07-18T13:19:22Z
HIGH
7.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-r7j3-vvh2-xrpj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13574', 'https://seclists.org/bugtraq/2019/Jul/20', 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/', 'https://www.debian.org/security/2019/dsa-4481', 'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00007.html', 'https://github.com/minimagick/minimagick/releases/tag/v4.9.4', 'https://github.com/minimagick/minimagick/compare/d484786...293f9bb'}
null
GHSA
GHSA-rvh4-g2rj-hr9c
Path Traversal in Jenkins Warnings Next Generation Plugin
Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.
{'CVE-2022-23107'}
2022-01-21T23:38:05Z
2022-01-21T23:38:05Z
HIGH
8.1
{'CWE-22'}
{'https://github.com/advisories/GHSA-rvh4-g2rj-hr9c', 'https://github.com/jenkinsci/warnings-ng-plugin/releases/tag/v9.10.3', 'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2090', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23107'}
null
GHSA
GHSA-2fmp-7xwf-wvwr
Arbitrary File Read in Snyk Broker
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
{'CVE-2020-7650'}
2021-07-29T17:47:30Z
2020-06-03T22:02:16Z
MODERATE
6.5
{'CWE-22'}
{'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570609', 'https://github.com/advisories/GHSA-2fmp-7xwf-wvwr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7650'}
null
GHSA
GHSA-5ggx-g294-qj3q
Malicious Package in buffeb-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:57:43Z
2020-09-03T21:47:29Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-5ggx-g294-qj3q', 'https://www.npmjs.com/advisories/1239'}
null
GHSA
GHSA-534w-937m-v7x3
High severity vulnerability that affects restforce
A flaw in how restforce constructs URLs may allow an attacker to inject additional parameters into Salesforce API requests. Impact ------ This flaw is only exploitable in applications that pass user input directly to restforce's select, find, describe, update, upsert, and destroy methods. Vulnerable code might look like: ```ruby client.select('SomeSalesForceObject', params[:some-id], ...) ``` In such an application, attackers could pass `0016000000MRatd/describe` as a request parameter, causing the server to make a request to a different endpoint than the server is designed to handle. Since the Salesforce REST API supports overriding HTTP methods via a request parameter, an attacker could also cause the client's `select()` method to modify data, by passing `0016000000MRatd/?_HttpMethod=PATCH&other-query-params=...`. Workarounds ------ If possible, applications should track salesforce IDs internally, rather than passing user-supplied IDs to salesforce. Such practice mitigates this vulnerability, and in general is desirable for ensuring strong access control.
{'CVE-2018-3777'}
2021-01-08T19:52:05Z
2018-08-03T21:04:02Z
HIGH
0
{'CWE-20'}
{'https://github.com/advisories/GHSA-534w-937m-v7x3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3777', 'https://github.com/restforce/restforce/pull/392'}
null
GHSA
GHSA-fphq-gw9m-ghrv
CHECK-fail in `CTCGreedyDecoder`
### Impact An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.CTCGreedyDecoder`: ```python import tensorflow as tf inputs = tf.constant([], shape=[18, 2, 0], dtype=tf.float32) sequence_length = tf.constant([-100, 17], shape=[2], dtype=tf.int32) merge_repeated = False tf.raw_ops.CTCGreedyDecoder(inputs=inputs, sequence_length=sequence_length, merge_repeated=merge_repeated) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1615440b17b364b875eb06f43d087381f1460a65/tensorflow/core/kernels/ctc_decoder_ops.cc#L37-L50) has a `CHECK_LT` inserted to validate some invariants. When this condition is false, the program aborts, instead of returning a valid error to the user. This abnormal termination can be weaponized in denial of service attacks. ### Patches We have patched the issue in GitHub commit [ea3b43e98c32c97b35d52b4c66f9107452ca8fb2](https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29543'}
2021-05-21T14:23:18Z
2021-05-21T14:23:18Z
LOW
2.5
{'CWE-617'}
{'https://github.com/advisories/GHSA-fphq-gw9m-ghrv', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fphq-gw9m-ghrv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29543', 'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'}
null
GHSA
GHSA-7qx4-pp76-vrqh
Remote code execution in Apache Commons Configuration
Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.
{'CVE-2020-1953'}
2021-07-28T18:49:54Z
2020-05-21T19:08:08Z
CRITICAL
10
{'CWE-20'}
{'https://github.com/advisories/GHSA-7qx4-pp76-vrqh', 'https://lists.apache.org/thread.html/rde2186ad6ac0d6ed8d51af7509244adcf1ce0f9a3b7e1d1dd3b64676@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1953', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641', 'https://lists.apache.org/thread.html/r16a2e949e35780c8974cf66104e812410f3904f752df6b66bf292269@%3Ccommits.servicecomb.apache.org%3E'}
null
GHSA
GHSA-xmvg-w4f9-99r7
Moderate severity vulnerability that affects org.bedework.caleng:bw-calendar-engine
bw-calendar-engine version <= bw-calendar-engine-3.12.0 contains a XML External Entity (XXE) vulnerability in IscheduleClient XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Man in the Middle or malicious server.
{'CVE-2018-1000836'}
2021-09-22T14:43:00Z
2018-12-20T22:02:51Z
CRITICAL
9
{'CWE-611'}
{'https://0dd.zone/2018/10/28/bw-calendar-engine-XXE-MitM/', 'https://github.com/advisories/GHSA-xmvg-w4f9-99r7', 'https://github.com/Bedework/bw-calendar-engine/issues/3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000836'}
null
GHSA
GHSA-x68c-4gmm-5g43
kimai2 is vulnerable to Cross-site Scripting
kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3985'}
2021-12-03T20:40:38Z
2021-12-03T20:40:38Z
HIGH
8
{'CWE-79'}
{'https://github.com/advisories/GHSA-x68c-4gmm-5g43', 'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3985', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3', 'https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4'}
null
GHSA
GHSA-5rcr-q3rx-j7vr
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1106.
{'CVE-2019-1107'}
2021-03-29T21:03:41Z
2021-03-29T20:57:35Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/advisories/GHSA-5rcr-q3rx-j7vr', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1107', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1107'}
null
GHSA
GHSA-ff7x-qrg7-qggm
Prototype Pollution in dot-prop
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.
{'CVE-2020-8116'}
2022-01-04T19:34:32Z
2020-07-29T20:56:59Z
HIGH
7.3
{'CWE-425', 'CWE-471'}
{'https://hackerone.com/reports/719856', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8116', 'https://github.com/advisories/GHSA-ff7x-qrg7-qggm', 'https://github.com/sindresorhus/dot-prop/tree/v4', 'https://github.com/sindresorhus/dot-prop/issues/63'}
null
GHSA
GHSA-qh73-qc3p-rjv2
Uncaught Exception in fastify-multipart
### Impact This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136). By providing a `name=constructor` property it is still possible to crash the application. The original fix only checks for the key `__proto__` (https://github.com/fastify/fastify-multipart/pull/116). All users are recommended to upgrade ### Patches v5.3.1 includes a patch ### Workarounds No workarounds are possible. ### References Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/fastify/fastify-multipart](https://github.com/fastify/fastify-multipart) * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
{'CVE-2021-23597'}
2022-04-19T19:03:23Z
2022-02-11T18:57:53Z
HIGH
7.5
{'CWE-400'}
{'https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/', 'https://github.com/fastify/fastify-multipart/releases/tag/v5.3.1', 'https://github.com/fastify/fastify-multipart/pull/116', 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-qh73-qc3p-rjv2', 'https://github.com/advisories/GHSA-qh73-qc3p-rjv2', 'https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480', 'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23597'}
null
GHSA
GHSA-wv2f-3rxv-jqhp
Path Traversal in general-file-server
All versions of `general-file-server` are vulnerable to path traversal. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not use this module until a fix has been provided.
{'CVE-2018-3724'}
2021-01-08T01:00:28Z
2018-07-26T15:21:04Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-wv2f-3rxv-jqhp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3724', 'https://hackerone.com/reports/310943', 'https://www.npmjs.com/advisories/592'}
null
GHSA
GHSA-x67x-vg9m-65c3
Integer overflow in base64
Affected versions of this crate suffered from an integer overflow bug when calculating the size of a buffer to use when encoding base64 using the `encode_config_buf` and `encode_config` functions. If the input string was large, this would cause a buffer to be allocated that was too small. Since this function writes to the buffer using unsafe code, it would allow an attacker to write beyond the buffer, causing memory corruption and possibly the execution of arbitrary code. This flaw was corrected by using checked arithmetic to calculate the size of the buffer.
{'CVE-2017-1000430'}
2021-08-25T20:55:27Z
2021-08-25T20:55:27Z
CRITICAL
9.8
{'CWE-119'}
{'https://rustsec.org/advisories/RUSTSEC-2017-0004', 'https://github.com/alicemaz/rust-base64/commit/24ead980daf11ba563e4fb2516187a56a71ad319', 'https://github.com/advisories/GHSA-x67x-vg9m-65c3', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000430'}
null
GHSA
GHSA-8fgg-5v78-6g76
Deserializing an array can free uninitialized memory in byte_struct
Byte_struct stack and unpack structure as raw bytes with packed or bit field layout. An issue was discovered in the byte_struct crate before 0.6.1 for Rust. There can be a drop of uninitialized memory if a certain deserialization method panics.
{'CVE-2021-28033'}
2022-05-05T00:44:49Z
2021-08-25T20:52:03Z
CRITICAL
9.8
{'CWE-119', 'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28033', 'https://github.com/advisories/GHSA-8fgg-5v78-6g76', 'https://github.com/wwylele/byte-struct-rs/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2021-0032.html'}
null
GHSA
GHSA-3h68-wvv6-8r5h
Improper Removal of Sensitive Information Before Storage or Transfer in Apache Jackrabbit Oak
The optional initial password change and password expiration features present in Apache Jackrabbit Oak 1.2.0 to 1.22.0 are prone to a sensitive information disclosure vulnerability. The code mandates the changed password to be passed as an additional attribute to the credentials object but does not remove it upon processing during the first phase of the authentication. In combination with additional, independent authentication mechanisms, this may lead to the new password being disclosed.
{'CVE-2020-1940'}
2021-12-10T17:20:11Z
2021-12-10T17:20:11Z
HIGH
7.5
{'CWE-200', 'CWE-212'}
{'http://www.openwall.com/lists/oss-security/2020/01/28/1', 'https://lists.apache.org/thread.html/rc35a57ecdeae342d46f729d6bc9750ba860c101f450cc171798dba28@%3Coak-commits.jackrabbit.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1940', 'https://lists.apache.org/thread.html/r601637e38ee743e845856a4e24915cb8db26ae80ca782bef91989cbc@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rb3023cfd45441b570c1abaa347d0cac78df97b5d3f27d674d01b3d2a@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rbef4701b5ce4d827182e70ad7b4d987a9157682ba3643e05a9ef5a7b@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0@%3Cannounce.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/ra295f919586b19def7cc7713d9d78595507d5f703362fccb779eeeb9@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/ra6b3e78f5ed545c1d859d664f66c6d3fc5d731d9b1d842349654e4f0@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r3da8e2fd253ecd4d3a0de71ce255631148b54be8500225b5812f7737@%3Coak-commits.jackrabbit.apache.org%3E', 'https://github.com/advisories/GHSA-3h68-wvv6-8r5h', 'https://lists.apache.org/thread.html/rba884dbe733781cbaaffa28b77bc37a6a9f948b3a72a1bdad5e1587c@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r45b0e2fb6ac51c5a03952b08b5e0efde1249ecb809884cc87eb0bd99@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0%40%3Cusers.jackrabbit.apache.org%3E'}
null
GHSA
GHSA-g86p-hgx5-2pfh
Improper Authentication in Buildbot
Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token from OAuth and uses it to authenticate a user. If an attacker has a token allowing them to read the user details of a victim, they can login as the victim.
{'CVE-2019-12300'}
2022-03-04T21:16:27Z
2019-05-29T18:48:11Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/buildbot/buildbot/wiki/OAuth-vulnerability-in-using-submitted-authorization-token-for-authentication', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12300', 'https://github.com/advisories/GHSA-g86p-hgx5-2pfh'}
null
GHSA
GHSA-f3vw-587g-r29g
Path Traversal in sapper
Versions of `sapper` prior to 0.27.11 are vulnerable to Path Traversal. It is possible to access sensitive files on the server through HTTP requests containing URL-encoded `../`. You may test a `sapper` application running in prod mode with `curl -vvv http://localhost:3000/client/750af05c3a69ddc6073a/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/etc/passwd`. ## Recommendation Upgrade to version 0.27.11 or later.
null
2021-10-04T21:07:25Z
2020-09-03T15:50:38Z
CRITICAL
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/1494', 'https://github.com/advisories/GHSA-f3vw-587g-r29g'}
null
GHSA
GHSA-984p-xq9m-4rjw
Rate Limiting Bypass in express-brute
All versions of `express-brute` are vulnerable to Rate Limiting Bypass. Concurrent requests may lead to race conditions that cause the package to incorrectly count requests. This may allow an attacker to bypass the rate limiting provided by the package and execute requests without limiting. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-08-04T21:03:17Z
2019-06-07T21:01:53Z
MODERATE
5.6
{'CWE-77'}
{'https://www.npmjs.com/advisories/823', 'https://snyk.io/vuln/SNYK-JS-EXPRESSBRUTE-174457', 'https://github.com/AdamPflug/express-brute/issues/46', 'https://github.com/advisories/GHSA-984p-xq9m-4rjw'}
null
GHSA
GHSA-hg79-j56m-fxgv
Cross-Site Scripting in react
Versions of `react` prior to 0.14.0 are vulnerable to Cross-Site Scripting (XSS). The package's `createElement` function fails to properly validate its input object, allowing attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 0.14.0 or later.
null
2022-04-19T19:03:25Z
2020-09-04T15:26:04Z
HIGH
0
{'CWE-79'}
{'https://reactjs.org/blog/2015/10/07/react-v0.14.html#notable-enhancements', 'https://www.npmjs.com/advisories/1347', 'https://github.com/advisories/GHSA-hg79-j56m-fxgv', 'http://danlec.com/blog/xss-via-a-spoofed-react-element', 'https://github.com/facebook/react', 'https://reactjs.org/blog/2019/10/22/react-release-channels.html#experimental-channel', 'https://snyk.io/vuln/npm:react:20150318'}
null
GHSA
GHSA-9mp7-45qh-r8j8
Use of Uninitialized Resource in columnar.
An issue was discovered in the columnar crate through 2021-01-07 for Rust. ColumnarReadExt::read_typed_vec may read from uninitialized memory locations.
{'CVE-2021-45685'}
2022-01-07T17:34:42Z
2022-01-06T22:13:46Z
CRITICAL
9.8
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45685', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/columnar/RUSTSEC-2021-0087.md', 'https://github.com/advisories/GHSA-9mp7-45qh-r8j8', 'https://rustsec.org/advisories/RUSTSEC-2021-0087.html'}
null
GHSA
GHSA-27wq-qx3q-fxm9
Improper Handling of Unexpected Data Type in ced
### Impact In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash. ### Patches The problem has been patched in [ced v1.0.0](https://github.com/sonicdoe/ced/releases/tag/v1.0.0). You can upgrade from v0.1.0 without any breaking changes. ### Workarounds Before passing an argument to ced, verify it’s a `Buffer` using [`Buffer.isBuffer(obj)`](https://nodejs.org/api/buffer.html#buffer_static_method_buffer_isbuffer_obj). ### CVSS score [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C) Base Score: 7.5 (High) Temporal Score: 7.2 (High) Since ced is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, accepting data from untrusted sources over a network and passing it directly to ced. Depending on your specific implementation, the vulnerability’s severity in your program may be different. ### Proof of concept ```js const express = require("express"); const bodyParser = require("body-parser"); const ced = require("ced"); const app = express(); app.use(bodyParser.raw()); app.post("/", (req, res) => { const encoding = ced(req.body); res.end(encoding); }); app.listen(3000); ``` `curl --request POST --header "Content-Type: text/plain" --data foo http://localhost:3000` crashes the server. ### References - https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3
{'CVE-2021-39131'}
2022-04-19T19:03:05Z
2021-08-23T19:42:28Z
HIGH
7.5
{'CWE-241'}
{'https://github.com/sonicdoe/ced/releases/tag/v1.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39131', 'https://github.com/advisories/GHSA-27wq-qx3q-fxm9', 'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3', 'https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9'}
null
GHSA
GHSA-hwqm-x785-qh8p
Incorrect Permission Assignment for Critical Resource in Hashicorp Consul
HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
{'CVE-2020-12797'}
2021-06-23T17:52:33Z
2021-06-23T17:52:33Z
MODERATE
3.7
{'CWE-732'}
{'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12797', 'https://github.com/hashicorp/consul/issues/5606', 'https://github.com/hashicorp/consul/pull/8047', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'https://github.com/hashicorp/consul/commit/98eea08d3ba1b220a14cf6eedf3b6b07ae2795d7', 'https://github.com/advisories/GHSA-hwqm-x785-qh8p'}
null
GHSA
GHSA-m738-3rc4-5xv3
A user without PR can reset user authentication failures information
### Impact The script service method used to reset the authentication failures record can be executed by any user with Script rights and does not require Programming rights as it should have. Note that being able to reset the authentication failure record mean that an attacker with script right might use it to try performing a bruteforce attack since she'd been able to virtually deactivate the mechanism introduced to mitigate those attacks. ### Patches The problem has been patched in version 12.6.8, 12.10.4 and 13.0. ### Workarounds There's no workaround besides upgrading and being careful on which user should have Script right access. Note that any bruteforce attack on the authentication should be visible in the logs since the authentication failures are logged. ### References https://jira.xwiki.org/browse/XWIKI-18276 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org) * Email us at [the security mailing-list](mailto:security@xwiki.org)
{'CVE-2021-32729'}
2021-07-13T14:27:39Z
2021-07-02T19:19:31Z
LOW
2
{'CWE-287', 'CWE-693'}
{'https://github.com/advisories/GHSA-m738-3rc4-5xv3', 'https://jira.xwiki.org/browse/XWIKI-18276', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m738-3rc4-5xv3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32729'}
null
GHSA
GHSA-x7p2-x2j6-mwhr
Moderate severity vulnerability that affects gemirro
Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attackers to inject arbitrary web script via a crafted javascript: URL in the "homepage" value of a ".gemspec" file.
{'CVE-2017-16833'}
2021-09-21T22:16:07Z
2017-11-29T23:19:51Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-x7p2-x2j6-mwhr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16833', 'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de'}
null
GHSA
GHSA-76wq-xw4h-f8wj
High severity vulnerability that affects activerecord
The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.
{'CVE-2012-2695'}
2021-09-02T19:50:27Z
2017-10-24T18:33:38Z
HIGH
0
{'CWE-89'}
{'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2695', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'https://github.com/advisories/GHSA-76wq-xw4h-f8wj'}
null
GHSA
GHSA-88f9-7xxh-c688
Configuration leak
### Impact Authenticated users, regardless of their privileges (_User_ or _Admin_), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). ### Patches This issue was addressed by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. ### Workarounds Only allow trusted source IP addresses to access to the administration dashboard. ### References Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time. ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; - The maintainers, by opening an issue on this repository.
{'CVE-2021-39174'}
2022-04-19T19:03:01Z
2021-08-30T16:11:43Z
HIGH
8.8
{'CWE-75'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39174', 'https://github.com/fiveai/Cachet/releases/tag/v2.5.1', 'https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688', 'https://github.com/advisories/GHSA-88f9-7xxh-c688'}
null
GHSA
GHSA-rwxp-hwwf-653v
Insecure template handling in express-hbs
express-hbs is an Express handlebars template engine. express-hbs mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .hbs appended to them. For complete details refer to the referenced GHSL-2021-019 report. Notes in documentation have been added to help users of express-hbs avoid this potential information exposure vulnerability.
{'CVE-2021-32817'}
2021-05-17T20:58:51Z
2021-05-17T20:58:51Z
MODERATE
5.4
{'CWE-200'}
{'https://www.npmjs.com/package/express-hbs', 'https://github.com/TryGhost/express-hbs#%EF%B8%8F-this-creates-a-potential-security-vulnerability', 'https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/', 'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e', 'https://github.com/advisories/GHSA-rwxp-hwwf-653v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32817'}
null
GHSA
GHSA-8v9x-9xqg-r8mr
Prototype pollution in json8-merge-patch
Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor.
{'CVE-2020-8268'}
2021-05-10T19:17:15Z
2021-05-10T19:17:15Z
HIGH
7.5
{'CWE-20', 'CWE-471', 'CWE-1321'}
{'https://www.npmjs.com/package/json8-merge-patch', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8268', 'https://github.com/sonnyp/JSON8/issues/113', 'https://github.com/advisories/GHSA-8v9x-9xqg-r8mr', 'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387', 'https://hackerone.com/reports/980649'}
null
GHSA
GHSA-3w8g-xr3f-2mp8
Out of bounds write in nalgebra
The `Deserialize` implementation for `VecStorage` did not maintain the invariant that the number of elements must equal `nrows * ncols`. Deserialization of specially crafted inputs could allow memory access beyond allocation of the vector. This flaw was introduced in v0.11.0 ([`086e6e`](https://github.com/dimforge/nalgebra/commit/086e6e719f53fecba6dadad2e953a487976387f5)) due to the addition of an automatically derived implementation of `Deserialize` for `MatrixVec`. `MatrixVec` was later renamed to `VecStorage` in v0.16.13 ([`0f66403`](https://github.com/dimforge/nalgebra/commit/0f66403cbbe9eeac15cedd8a906c0d6a3d8841f2)) and continued to use the automatically derived implementation of `Deserialize`.
{'CVE-2021-38190'}
2021-08-25T20:55:49Z
2021-08-25T20:55:49Z
CRITICAL
9.8
{'CWE-119', 'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-38190', 'https://rustsec.org/advisories/RUSTSEC-2021-0070.html', 'https://github.com/dimforge/nalgebra/issues/883', 'https://github.com/dimforge/nalgebra/pull/889', 'https://github.com/dimforge/nalgebra/blob/dev/CHANGELOG.md#0270', 'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5', 'https://github.com/advisories/GHSA-3w8g-xr3f-2mp8'}
null
GHSA
GHSA-2j5v-fc74-j9q2
Cross-Site Scripting in editor.md
All versions of `editor.md` are vulnerable to Cross-Site Scripting. User input is insufficiently sanitized, allowing attackers to inject malicious code in payloads containing base64-encoded content. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
{'CVE-2019-9737'}
2021-08-30T21:58:23Z
2019-03-14T15:38:56Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9737', 'https://github.com/pandao/editor.md/issues/662', 'https://github.com/advisories/GHSA-2j5v-fc74-j9q2', 'https://www.npmjs.com/advisories/794'}
null
GHSA
GHSA-c3px-v9c7-m734
Prototype Pollution in mithril
Affected versions of `mithril`are vulnerable to prototype pollution. The function `parseQueryString` may allow a malicious user to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. A payload such as `__proto__%5BtoString%5D=123` in the query string would change the `toString()` function to `123`. ## Recommendation If you are using mithril 2.x, upgrade to version 2.0.2 or later. If you are using mithril 1.x, upgrade to version 1.1.7 or later.
null
2021-09-29T16:24:21Z
2020-09-03T19:04:39Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1094', 'https://github.com/advisories/GHSA-c3px-v9c7-m734'}
null
GHSA
GHSA-4ph2-8337-hm62
Key Caching behavior in the DynamoDB Encryption Client.
### Impact This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified. When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider. ### Patches Fixed as of 1.3.0. We recommend users to modify their code and adopt `CachingMostRecentProvider`. ### Workarounds Users who cannot upgrade to use the `CachingMostRecentProvider` can call `clear()` on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.
null
2021-02-08T17:43:49Z
2021-02-08T17:43:49Z
LOW
0
{'CWE-862'}
{'https://github.com/aws/aws-dynamodb-encryption-python/blob/master/CHANGELOG.rst#130----2021-02-04', 'https://pypi.org/project/dynamodb-encryption-sdk', 'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b', 'https://github.com/advisories/GHSA-4ph2-8337-hm62', 'https://github.com/aws/aws-dynamodb-encryption-python/security/advisories/GHSA-4ph2-8337-hm62'}
null
GHSA
GHSA-h7vq-5qgw-jwwq
CSV Injection Vulnerability
### Impact In some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel. If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update. ### Patches This has been patched in Craft 3.7.14. ### References * https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28 * https://twitter.com/craftcmsupdates/status/1442928690145366018 ### For more information If you have any questions or comments about this advisory, email us at support@craftcms.com ---------- Credits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli
{'CVE-2021-41824'}
2021-10-18T19:11:02Z
2021-10-18T19:04:16Z
HIGH
8.8
{'CWE-1236'}
{'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq', 'https://twitter.com/craftcmsupdates/status/1442928690145366018', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824', 'https://github.com/advisories/GHSA-h7vq-5qgw-jwwq', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28', 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}
null
GHSA
GHSA-v6c5-hwqg-3x5q
Improper Authorization in passport-cognito
All versions of `passport-cognito` are vulnerable to Improper Authorization. The package fails to properly scope the variables containing authorization information, such as access token, refresh token and ID token. This causes a race condition where simultaneous authenticated users may receive authorization tokens for a different user. This would allow a user to take actions on another user's behalf. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-19723'}
2021-10-04T20:43:40Z
2020-09-04T17:23:03Z
CRITICAL
0
{'CWE-285'}
{'https://www.npmjs.com/advisories/1443', 'https://github.com/advisories/GHSA-v6c5-hwqg-3x5q', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19723'}
null
GHSA
GHSA-44g9-w23c-5rw7
Directory Traversal in nhouston
All versions of the static file server module nhouston are vulnerable to directory traversal. An attacker can provide input such as `../` to read files outside of the served directory. ## Recommendation It is recommended that a different module be used, as we have been unable to reacher the maintainer of this module. We will continue to reach out to them, and if an update becomes available that fixes the issue, we will update this advisory accordingly.
{'CVE-2014-8883'}
2021-09-23T20:57:50Z
2020-08-31T22:53:54Z
MODERATE
5.3
{'CWE-23'}
{'https://github.com/advisories/GHSA-44g9-w23c-5rw7', 'http://en.wikipedia.org/wiki/Directory_traversal_attack', 'https://snyk.io/vuln/npm:nhouston:20141114', 'https://www.npmjs.com/advisories/25', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8883'}
null
GHSA
GHSA-9mqp-7v2h-2382
Denial of Service in Tensorflow
### Impact The `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L235-L241 Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape. Hence, malicious users can pass a bad `grad_values_t` to trigger an assertion failure in `vec`, causing denial of service in serving installations. ### Patches We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability is a variant of [GHSA-63xm-rx5p-xvqr](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr)
{'CVE-2020-15194'}
2021-08-26T15:10:19Z
2020-09-25T18:28:19Z
MODERATE
5.3
{'CWE-20', 'CWE-617'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15194', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382', 'https://github.com/advisories/GHSA-9mqp-7v2h-2382'}
null
GHSA
GHSA-55x5-fj6c-h6m8
HTML Cleaner allows crafted and SVG embedded scripts to pass through
### Impact The HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5. ### Patches The issue has been resolved in lxml 4.6.5. ### Workarounds None. ### References The issues are tracked under the report IDs GHSL-2021-1037 and GHSL-2021-1038.
{'CVE-2021-43818'}
2022-04-22T15:39:59Z
2021-12-13T18:14:36Z
HIGH
8.2
{'CWE-74', 'CWE-79'}
{'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html', 'https://github.com/advisories/GHSA-55x5-fj6c-h6m8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/', 'https://security.netapp.com/advisory/ntap-20220107-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43818', 'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a', 'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776', 'https://www.debian.org/security/2022/dsa-5043', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/', 'https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/'}
null
GHSA
GHSA-cpq8-x35g-m439
Cross-site Scripting in yourls
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in arbitrary path handling.
{'CVE-2021-3783'}
2021-09-20T20:43:15Z
2021-09-20T20:43:15Z
MODERATE
6.6
{'CWE-79'}
{'https://github.com/advisories/GHSA-cpq8-x35g-m439', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3783', 'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4', 'https://huntr.dev/bounties/b688e553-d0d9-4ddf-95a3-ff4b78004984'}
null
GHSA
GHSA-rrgw-3hg3-9x8c
XSS vulnerability in translations
### Summary An attacker with admin privileges and access to Translations management functionality may add JS payload to translation values via: - Translation management UI. - Translations downloaded via the Crowdin service may also contain JS strings used for XSS attacks, for a successful attack poisoned translation should be enabled, downloaded, and installed. - Translations uploaded via Upload translation file on the All Languages grid ### Workarounds There are no workarounds that address this vulnerability.
null
2022-01-12T21:49:49Z
2022-01-12T21:49:49Z
MODERATE
6.9
null
{'https://github.com/advisories/GHSA-rrgw-3hg3-9x8c', 'https://github.com/oroinc/platform-er/security/advisories/GHSA-rrgw-3hg3-9x8c'}
null
GHSA
GHSA-8wg9-92fr-6j7v
Downloads Resources over HTTP in marionette-socket-host
Affected versions of `marionette-socket-host` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `marionette-socket-host`. ## Recommendation No patch is currently available for this vulnerability, and the package author has removed the package from their Github account. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10648'}
2021-09-16T20:53:54Z
2018-08-15T18:50:31Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://github.com/advisories/GHSA-8wg9-92fr-6j7v', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10648', 'https://nodesecurity.io/advisories/252', 'https://www.npmjs.com/advisories/252'}
null
GHSA
GHSA-w3wf-cfx3-6gcx
SAML authentication vulnerability due to stdlib XML parsing
### Impact Due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP. Users that configure Fleet with SSO login may be vulnerable to this issue. ### Patches This issue is patched in 3.5.1 using https://github.com/mattermost/xml-roundtrip-validator. ### Workarounds If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet. ### References See https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ for more information about the underlying vulnerabilities. ### For more information If you have any questions or comments about this advisory: * Email us at [security@fleetdm.com](mailto:security@fleetdm.com) * Join #fleet in [osquery Slack](https://join.slack.com/t/osquery/shared_invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw)
{'CVE-2020-26276'}
2022-02-11T23:59:21Z
2022-02-11T23:59:14Z
HIGH
0
{'CWE-290'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26276', 'https://github.com/mattermost/xml-roundtrip-validator', 'https://github.com/fleetdm/fleet/security/advisories/GHSA-w3wf-cfx3-6gcx', 'https://github.com/advisories/GHSA-w3wf-cfx3-6gcx', 'https://github.com/fleetdm/fleet/blob/master/CHANGELOG.md#fleet-351-dec-14-2020', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities', 'https://github.com/fleetdm/fleet/commit/57812a532e5f749c8e18c6f6a652eca65c083607'}
null
GHSA
GHSA-x2xg-6wcj-6xf9
SafeCurl before 0.9.2 has a DNS rebinding vulnerability.
SafeCurl before 0.9.2 has a DNS rebinding vulnerability.
{'CVE-2020-36474'}
2021-08-25T14:49:48Z
2021-08-25T14:49:48Z
CRITICAL
9.8
null
{'https://github.com/vanilla/safecurl/releases/tag/v0.9.2', 'https://github.com/advisories/GHSA-x2xg-6wcj-6xf9', 'https://github.com/vanilla/safecurl/pull/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36474'}
null
GHSA
GHSA-4ccc-jm2p-vg3p
Downloads Resources over HTTP in windows-latestchromedriver
Affected versions of `windows-latestchromedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-latestchromedriver`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10696'}
2021-01-14T15:56:40Z
2020-09-01T16:14:22Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/295', 'https://nodesecurity.io/advisories/295', 'https://github.com/advisories/GHSA-4ccc-jm2p-vg3p', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10696'}
null
GHSA
GHSA-x8m7-cv39-xmg9
Malicious Package in jq-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:35:23Z
2020-09-03T22:56:10Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-x8m7-cv39-xmg9', 'https://www.npmjs.com/advisories/1278'}
null
GHSA
GHSA-w4pj-7p68-3vgv
Stored XSS in October
### Impact A user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field. ### Patches Issue has been patched in Build 466 (v1.0.466) & RainLab.Blog v1.4.1 by restricting the ability to store JS in markdown to only users that have been explicitly granted the `backend.allow_unsafe_markdown` permission. ### Workarounds Apply https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746 & https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94 to your installation manually if unable to upgrade to Build 466 or v1.4.1 of RainLab.Blog (if using that plugin). ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1100" alt="Screen Shot 2020-03-31 at 2 01 52 PM" src="https://user-images.githubusercontent.com/7253840/78070158-8f7ef580-7358-11ea-950c-226533f6a0a3.png">
{'CVE-2020-11083'}
2022-04-19T19:02:27Z
2020-08-05T14:52:44Z
LOW
3.5
{'CWE-79'}
{'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://github.com/advisories/GHSA-w4pj-7p68-3vgv', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11083', 'https://github.com/octobercms/october/security/advisories/GHSA-w4pj-7p68-3vgv', 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94', 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746'}
null
GHSA
GHSA-gc37-9g7f-96fx
Exposure of sensitive information in Apache Ozone
In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints.
{'CVE-2021-41532'}
2021-11-23T18:17:50Z
2021-11-23T18:17:50Z
MODERATE
5.3
{'CWE-668'}
{'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3Ce0bc6598-9669-b897-fc28-de8a896e36aa%40apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/11/19/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41532', 'https://github.com/advisories/GHSA-gc37-9g7f-96fx'}
null
GHSA
GHSA-fqfh-778m-2v32
GitHub CLI can execute a git binary from the current directory
### Impact GitHub CLI depends on a `git.exe` executable being found in system `%PATH%` on Windows. However, if a malicious `.\git.exe` or `.\git.bat` is found in the current working directory at the time of running `gh`, the malicious command will be invoked instead of the system one. Windows users who run `gh` inside untrusted directories are affected. ### Patches Users should upgrade to GitHub CLI v1.2.1. ### Workarounds Other than avoiding untrusted repositories, there is no workaround. ### References https://github.com/golang/go/issues/38736
null
2022-04-19T19:02:39Z
2022-02-11T23:41:11Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-fqfh-778m-2v32', 'https://github.com/cli/cli/security/advisories/GHSA-fqfh-778m-2v32'}
null
GHSA
GHSA-8grg-q944-cch5
SQL Injection in Hibernate ORM
A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.
{'CVE-2019-14900'}
2022-05-03T02:28:28Z
2022-02-10T23:05:04Z
MODERATE
6.5
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-14900', 'https://security.netapp.com/advisory/ntap-20220210-0020/', 'https://lists.apache.org/thread.html/r833c1276e41334fa675848a08daf0c61f39009f9f9a400d9f7006d44@%3Cdev.turbine.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=1666499', 'https://github.com/advisories/GHSA-8grg-q944-cch5'}
null
GHSA
GHSA-7vmw-7x57-q6jw
Cross-site scripting
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 suffer from an authenticated stored XSS in administration vulnerability. Users are recommend to update to the version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
{'CVE-2021-32713'}
2021-09-08T18:00:00Z
2021-09-08T18:00:00Z
MODERATE
4.8
{'CWE-79'}
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32713', 'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12', 'https://github.com/advisories/GHSA-7vmw-7x57-q6jw', 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq'}
null