ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-px9h-x66r-8mpc
path traversal in Jooby
### Impact Access to sensitive information available from classpath. ### Patches Patched version: 1.6.7 and 2.8.2 Commit 1.x: https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009 Commit 2.x: https://github.com/jooby-project/jooby/commit/c81479de67036993f406ccdec23990b44b0bec32 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References Latest 1.x version: 1.6.6 #### Arbitrary class path resource access 1 When sharing a *File System* directory as in: ``` java assets("/static/**", Paths.get("static")); ``` The class path is also searched for the file (`org.jooby.handlers.AssetHandler.loader`): [jooby/AssetHandler.java at 1.x · jooby-project/jooby · GitHub](https://github.com/jooby-project/jooby/blob/1.x/jooby/src/main/java/org/jooby/handlers/AssetHandler.java) ``` java private static Loader loader(final Path basedir, final ClassLoader classloader) { if (Files.exists(basedir)) { return name -> { Path path = basedir.resolve(name).normalize(); if (Files.exists(path) && path.startsWith(basedir)) { try { return path.toUri().toURL(); } catch (MalformedURLException x) { // shh } } return classloader.getResource(name); }; } return classloader::getResource; } ``` If we send `/static/WEB-INF/web.xml` it will fail to load it from the file system but will go into `classloader.getResource(name)` where name equals `/WEB-INF/web.xml` so will succeed and return the requested file. This way we can get any configuration file or even the application class files If assets are configured for a certain extension we can still bypass it. eg: ```java assets("/static/**/*.js", Paths.get("static")); ``` We can send: ``` http://localhost:8080/static/io/yiss/App.class.js ``` #### Arbitrary class path resource access 2 This vulnerability also affects assets configured to access resources from the root of the class path. eg: ```java assets("/static/**"); ``` In this case we can traverse `static` by sending: ``` http://localhost:8080/static/..%252fio/yiss/App.class ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [jooby](https://github.com/jooby-project/jooby/issues) * Email us at [support@jooby.io](mailto:support@jooby.io)
{'CVE-2020-7647'}
2021-08-25T21:08:33Z
2020-05-13T16:29:26Z
MODERATE
5.3
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807', 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-568806', 'https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7647', 'https://github.com/advisories/GHSA-px9h-x66r-8mpc', 'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807,', 'https://github.com/jooby-project/jooby/security/advisories/GHSA-px9h-x66r-8mpc', 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-568806,'}
null
GHSA
GHSA-p8fm-w787-x6x3
Malicious Package in portionfatty12
All versions of `portionfatty12` are considered malicious. The package is malware designed to steal user's data. When installed it uploads the user's public SSH keys to a remote server. ## Recommendation This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
null
2021-10-01T13:42:28Z
2020-09-02T15:50:28Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/765', 'https://github.com/advisories/GHSA-p8fm-w787-x6x3'}
null
GHSA
GHSA-fgxq-p49f-qw99
Directory Traversal in isomorphic-git
isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.
{'CVE-2021-30483'}
2021-09-02T22:00:20Z
2021-09-02T22:00:20Z
MODERATE
5.3
{'CWE-22'}
{'https://vuln.ryotak.me/advisories/28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30483', 'https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2', 'https://github.com/isomorphic-git/isomorphic-git/pull/1339', 'https://github.com/advisories/GHSA-fgxq-p49f-qw99'}
null
GHSA
GHSA-67c7-5v9j-227r
Cross-site Scripting in kimai2
kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3983'}
2021-12-03T20:43:06Z
2021-12-03T20:43:06Z
MODERATE
6.3
{'CWE-79'}
{'https://github.com/advisories/GHSA-67c7-5v9j-227r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3983', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3', 'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0', 'https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413'}
null
GHSA
GHSA-43m5-c88r-cjvv
XSS due to lack of CSRF validation for replying/publishing
### Impact Due to lack of CSRF validation, a logged in user is potentially vulnerable to an XSS attack which could allow a third party to post on their behalf on the forum. ### Patches Upgrade to the latest version v0.7.0 ### Workarounds You can cherry-pick the following commit: [https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618](https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618) ### References Visit https://community.nodebb.org if you have any questions about this issue or on how to patch / upgrade your instance.
{'CVE-2020-15156'}
2022-04-19T19:02:33Z
2020-08-26T18:55:38Z
MODERATE
6.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15156', 'https://www.npmjs.com/package/nodebb-plugin-blog-comments', 'https://github.com/advisories/GHSA-43m5-c88r-cjvv', 'https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618', 'https://github.com/psychobunny/nodebb-plugin-blog-comments/security/advisories/GHSA-43m5-c88r-cjvv'}
null
GHSA
GHSA-86hp-cj9j-33vv
Insertion of Sensitive Information into Log File, Invocation of Process Using Visible Sensitive Information, and Exposure of Sensitive Information to an Unauthorized Actor in Ansible
A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.
{'CVE-2020-1753'}
2022-04-07T15:11:08Z
2021-04-07T20:33:26Z
MODERATE
5.5
{'CWE-200', 'CWE-532'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1753', 'https://security.gentoo.org/glsa/202006-11', 'https://www.debian.org/security/2021/dsa-4950', 'https://github.com/advisories/GHSA-86hp-cj9j-33vv', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://github.com/ansible-collections/kubernetes/pull/51', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}
null
GHSA
GHSA-96r7-mrqf-jhcc
Prototype Pollution in ini-parser
All versions of `ini-parser` are vulnerable to prototype pollution. The `parse` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2020-7617'}
2021-08-30T13:39:07Z
2020-06-10T20:27:53Z
CRITICAL
9.8
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7617', 'https://snyk.io/vuln/SNYK-JS-INIPARSER-564122', 'https://www.npmjs.com/advisories/1508', 'https://github.com/advisories/GHSA-96r7-mrqf-jhcc', 'https://github.com/rawiroaisen/node-ini-parser/blob/master/index.js#L14'}
null
GHSA
GHSA-j29g-g982-pwpv
Cross-site scripting (XSS)
ImpressCMS 1.4.0 is affected by XSS in modules/system/admin.php which may result in arbitrary remote code execution.
{'CVE-2020-17551'}
2021-03-12T21:34:11Z
2021-03-12T21:34:11Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/ImpressCMS/impresscms/issues/659', 'https://www.impresscms.org/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17551', 'https://github.com/advisories/GHSA-j29g-g982-pwpv'}
null
GHSA
GHSA-qcg2-h349-vwm3
Cross-site Scripting in React Draft Wysiwyg
react-draft-wysiwyg (aka React Draft Wysiwyg) before 1.14.6 allows a javascript: URi in a Link Target of the link decorator in decorators/Link/index.js when a draft is shared across users, leading to XSS.
{'CVE-2021-31712'}
2021-05-06T15:52:35Z
2021-05-06T15:52:35Z
HIGH
0
{'CWE-79'}
{'https://github.com/jpuri/react-draft-wysiwyg/pull/1104', 'https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380', 'https://github.com/advisories/GHSA-qcg2-h349-vwm3', 'https://github.com/jpuri/react-draft-wysiwyg/issues/1102', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31712'}
null
GHSA
GHSA-vx6j-pjrh-vgjh
PHP file inclusion in the Sulu admin panel
### Impact _What kind of vulnerability is it? Who is impacted?_ An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution. * Compromised components: Arbitrary file read on the server, (Potential) Remote code execution * Exploitation pre-requisite: User account on the backend ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Overwrite the service `sulu_route.generator.expression_token_provider` and wrap the translator before passing it to the expression language. ### References _Are there any links users can visit to find out more?_ Currently not. ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)
{'CVE-2021-43836'}
2021-12-16T14:08:49Z
2021-12-15T22:54:20Z
HIGH
8.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43836', 'https://github.com/advisories/GHSA-vx6j-pjrh-vgjh', 'https://github.com/sulu/sulu/security/advisories/GHSA-vx6j-pjrh-vgjh', 'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'}
null
GHSA
GHSA-rqgp-ccph-5w65
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3901'}
2021-11-02T18:42:31Z
2021-10-28T23:14:14Z
LOW
3.5
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3901', 'https://github.com/advisories/GHSA-rqgp-ccph-5w65', 'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2', 'https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464'}
null
GHSA
GHSA-22wc-c9wj-6q2v
VVE-2021-0001: Memory corruption using function calls within arrays
### Impact When performing a function call inside an array, there is a memory corruption issue that occurs because of an incorrect pointer to the the tip of the stack. ### Patches This issue was partially fixed in [VVE-2020-0004](https://github.com/vyperlang/vyper/security/advisories/GHSA-2r3x-4mrv-mcxf), however the fix did not update similar code for arrays, which had a similar issue. The issue is fully fixed in https://github.com/vyperlang/vyper/pull/2345
null
2021-04-19T15:12:05Z
2021-04-19T15:12:05Z
MODERATE
0
{'CWE-129'}
{'https://github.com/vyperlang/vyper/security/advisories/GHSA-22wc-c9wj-6q2v', 'https://pypi.org/project/vyper', 'https://github.com/vyperlang/vyper/commit/11b7b5b7e59bc9dc859d51cd41a924b59fe47c9e', 'https://github.com/vyperlang/vyper/pull/2345', 'https://github.com/advisories/GHSA-22wc-c9wj-6q2v'}
null
GHSA
GHSA-rf3m-mhv7-x39f
Denial of Service in OpenShift Origin
The API server in OpenShift Origin 1.0.5 allows remote attackers to cause a denial of service (master process crash) via crafted JSON data.
{'CVE-2015-5250'}
2021-12-20T16:58:22Z
2021-12-20T16:58:22Z
MODERATE
4.3
{'CWE-20'}
{'https://github.com/openshift/origin/commit/dace5075e31b74703e944b6b3ebe8836be8d1b9a', 'https://bugzilla.redhat.com/show_bug.cgi?id=1259867', 'https://github.com/openshift/origin/issues/4374', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5250', 'https://access.redhat.com/errata/RHSA-2015:1736', 'https://github.com/advisories/GHSA-rf3m-mhv7-x39f', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5250'}
null
GHSA
GHSA-269m-695x-j34p
Moderate severity vulnerability that affects org.apache.qpid:qpid-broker
In Apache Qpid Broker-J 0.18 through 0.32, if the broker is configured with different authentication providers on different ports one of which is an HTTP port, then the broker can be tricked by a remote unauthenticated attacker connecting to the HTTP port into using an authentication provider that was configured on a different port. The attacker still needs valid credentials with the authentication provider on the spoofed port. This becomes an issue when the spoofed port has weaker authentication protection (e.g., anonymous access, default accounts) and is normally protected by firewall rules or similar which can be circumvented by this vulnerability. AMQP ports are not affected. Versions 6.0.0 and newer are not affected.
{'CVE-2017-15702'}
2021-08-30T15:42:27Z
2018-10-19T16:41:04Z
CRITICAL
9.8
null
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15702', 'https://qpid.apache.org/cves/CVE-2017-15702.html', 'https://github.com/advisories/GHSA-269m-695x-j34p', 'https://issues.apache.org/jira/browse/QPID-8039', 'http://www.securityfocus.com/bid/102040', 'https://lists.apache.org/thread.html/59d241e30db23b8b0af26bb273f789aa1f08515d3dc1a3868d3ba090@%3Cdev.qpid.apache.org%3E'}
null
GHSA
GHSA-w9vv-q986-vj7x
Out of bounds read in uu_od
An issue was discovered in PartialReader in the uu_od crate before 0.0.4 for Rust. Attackers can read the contents of uninitialized memory locations via a user-provided Read operation.
{'CVE-2021-29934'}
2021-08-25T20:54:24Z
2021-08-25T20:54:24Z
HIGH
7.3
{'CWE-125'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0043.html', 'https://github.com/uutils/coreutils/issues/1729', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29934', 'https://github.com/advisories/GHSA-w9vv-q986-vj7x'}
null
GHSA
GHSA-f2jv-r9rf-7988
Remote code execution in handlebars when compiling templates
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
{'CVE-2021-23369'}
2021-06-09T23:21:51Z
2021-05-06T15:57:44Z
CRITICAL
9.8
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23369', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951', 'https://github.com/advisories/GHSA-f2jv-r9rf-7988', 'https://security.netapp.com/advisory/ntap-20210604-0008/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427', 'https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8'}
null
GHSA
GHSA-462w-v97r-4m45
High severity vulnerability that affects Jinja2
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
{'CVE-2019-10906'}
2021-08-31T21:46:50Z
2019-04-10T14:30:24Z
HIGH
8.6
null
{'https://lists.apache.org/thread.html/320441dccbd9a545320f5f07306d711d4bbd31ba43dc9eebcfc602df@%3Cdevnull.infra.apache.org%3E', 'https://lists.apache.org/thread.html/46c055e173b52d599c648a98199972dbd6a89d2b4c4647b0500f2284@%3Cdevnull.infra.apache.org%3E', 'https://lists.apache.org/thread.html/57673a78c4d5c870d3f21465c7e2946b9f8285c7c57e54c2ae552f02@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/f0c4a03418bcfe70c539c5dbaf99c04c98da13bfa1d3266f08564316@%3Ccommits.airflow.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS7IVZAJBWOHNRDMFJDIZVFCMRP6YIUQ/', 'https://lists.apache.org/thread.html/09fc842ff444cd43d9d4c510756fec625ef8eb1175f14fd21de2605f@%3Cdevnull.infra.apache.org%3E', 'https://lists.apache.org/thread.html/2b52b9c8b9d6366a4f1b407a8bde6af28d9fc73fdb3b37695fd0d9ac@%3Cdevnull.infra.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSW3QZMFVVR7YE3UT4YRQA272TYAL5AF/', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html', 'https://usn.ubuntu.com/4011-1/', 'https://usn.ubuntu.com/4011-2/', 'https://github.com/advisories/GHSA-462w-v97r-4m45', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10906', 'https://lists.apache.org/thread.html/b2380d147b508bbcb90d2cad443c159e63e12555966ab4f320ee22da@%3Ccommits.airflow.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1237', 'https://lists.apache.org/thread.html/7f39f01392d320dfb48e4901db68daeece62fd60ef20955966739993@%3Ccommits.airflow.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1329', 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html', 'https://access.redhat.com/errata/RHSA-2019:1152', 'https://palletsprojects.com/blog/jinja-2-10-1-released', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCDYIS254EJMBNWOG4S5QY6AOTOR4TZU/'}
null
GHSA
GHSA-5m2v-hc64-56h6
A crafted ZIP file can cause a denial of service in Rubyzip
In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).
{'CVE-2019-16892'}
2021-08-18T19:25:00Z
2019-09-30T16:05:32Z
MODERATE
5.5
{'CWE-400'}
{'https://access.redhat.com/errata/RHBA-2019:4047', 'https://github.com/jdleesmiller/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2019-16892.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16892', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWWPORMSBHZTMP4PGF4DQD22TTKBQMMC/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J45KSFPP6DFVWLC7Z73L7SX735CKZYO6/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X255K6ZBAQC462PQN2ND5HOTTQEJ2G2X/', 'https://access.redhat.com/errata/RHSA-2019:4201', 'https://github.com/rubyzip/rubyzip/pull/403', 'https://github.com/advisories/GHSA-5m2v-hc64-56h6'}
null
GHSA
GHSA-93pj-4p65-qmr9
Insufficient user authorization in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability.
{'CVE-2022-0334'}
2022-02-02T16:13:31Z
2022-01-28T22:07:40Z
MODERATE
4.3
{'CWE-668', 'CWE-863'}
{'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68', 'https://github.com/advisories/GHSA-93pj-4p65-qmr9', 'https://moodle.org/mod/forum/discuss.php?d=431102', 'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0334', 'https://bugzilla.redhat.com/show_bug.cgi?id=2043664'}
null
GHSA
GHSA-5rc6-2r3r-fv79
Downloads Resources over HTTP in slimerjs-edge
Affected versions of `slimerjs-edge` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `slimerjs-edge`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10644'}
2021-01-08T19:48:47Z
2018-08-15T19:25:47Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10644', 'https://www.npmjs.com/advisories/243', 'https://github.com/advisories/GHSA-5rc6-2r3r-fv79', 'https://nodesecurity.io/advisories/243'}
null
GHSA
GHSA-36j3-xxf7-4pqg
Universal XSS in Android WebView
A universal cross-site scripting (UXSS) vulnerability, CVE-2020-6506 (https://crbug.com/1083819), has been identified in the Android WebView system component, which allows cross-origin iframes to execute arbitrary JavaScript in the top-level document. This vulnerability affects React Native apps which use a `react-native-webview` that allows navigation to arbitrary URLs, and when that app runs on systems with an Android WebView version prior to 83.0.4103.106. ## Pending mitigation Ensure users update their Android WebView system component via the Google Play Store to 83.0.4103.106 or higher to avoid this UXSS. 'react-native-webview' is working on a mitigation but it could take some time. ### References https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/
{'CVE-2020-6506'}
2022-04-19T19:02:34Z
2020-10-02T16:22:41Z
MODERATE
6.5
{'CWE-863', 'CWE-79'}
{'https://lists.apache.org/thread.html/r1ab80f8591d5c2147898076e3945dad1c897513630aabec556883275@%3Cissues.cordova.apache.org%3E', 'https://crbug.com/1083819', 'https://github.com/advisories/GHSA-36j3-xxf7-4pqg', 'https://lists.apache.org/thread.html/rf082834ad237f78a63671aec0cef8874f9232b7614529cc3d3e304c5@%3Ccommits.cordova.apache.org%3E', 'https://lists.apache.org/thread.html/r2769c33da7f7ece7e4e31837c1e1839d6657c7c13bb8d228670b8da0@%3Cissues.cordova.apache.org%3E', 'https://lists.apache.org/thread.html/rc81e12fc9287f8743d59099b1af40f968f1cfec9eac98a63c2c62c69@%3Cissues.cordova.apache.org%3E', 'https://github.com/react-native-community/react-native-webview/security/advisories/GHSA-36j3-xxf7-4pqg', 'https://www.npmjs.com/advisories/1560', 'https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/', 'https://lists.apache.org/thread.html/r1eadf38b38ee20405811958c8a01f78d6b28e058c84c9fa6c1a8663d@%3Cissues.cordova.apache.org%3E', 'https://lists.apache.org/thread.html/ra58733fbb88d5c513b3f14a14850083d506b9129103e0ab433c3f680@%3Cissues.cordova.apache.org%3E', 'https://lists.apache.org/thread.html/rc0ebe639927fa09e222aa56bf5ad6e700218f334ecc6ba9da4397728@%3Cissues.cordova.apache.org%3E', 'https://security.gentoo.org/glsa/202007-08', 'https://github.com/react-native-webview/react-native-webview/security/advisories/GHSA-36j3-xxf7-4pqg', 'https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_15.html', 'https://security.gentoo.org/glsa/202101-30', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6506'}
null
GHSA
GHSA-23wc-v4mf-x7v4
Directory Traversal in intsol-package
`intsol-package` is a file server. `intsol-package` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Example Request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:localhost ``` and the server's Response ``` HTTP/1.1 200 OK Date: Thu, 04 May 2017 23:59:18 GMT Connection: keep-alive Transfer-Encoding: chunked {contents of /etc/passwd} ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16178'}
2021-01-08T20:10:14Z
2018-07-23T20:44:45Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/intsol-package', 'https://github.com/advisories/GHSA-23wc-v4mf-x7v4', 'https://www.npmjs.com/advisories/461', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16178', 'https://nodesecurity.io/advisories/461'}
null
GHSA
GHSA-fx83-3ph3-9j2q
Cross-site Scripting (XSS) in Django REST Framework
A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.
{'CVE-2020-25626'}
2022-01-04T19:48:14Z
2021-03-19T21:32:47Z
MODERATE
6.1
{'CWE-20', 'CWE-79', 'CWE-77'}
{'https://github.com/advisories/GHSA-fx83-3ph3-9j2q', 'https://bugzilla.redhat.com/show_bug.cgi?id=1878635', 'https://security.netapp.com/advisory/ntap-20201016-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25626'}
null
GHSA
GHSA-pwm7-qr6j-3vjg
Prototype Pollution in realms-shim
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
{'CVE-2021-23594'}
2022-01-14T19:39:00Z
2022-01-12T22:56:13Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/advisories/GHSA-pwm7-qr6j-3vjg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23594', 'https://www.npmjs.com/package/realms-shim', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309907'}
null
GHSA
GHSA-627q-g293-49q7
Abort caused by allocating a vector that is too large in Tensorflow
### Impact During shape inference, TensorFlow can [allocate a large vector](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L788-L790) based on a value from a tensor controlled by the user: ```cc const auto num_dims = Value(shape_dim); std::vector<DimensionHandle> dims; dims.reserve(num_dims); ``` ### Patches We have patched the issue in GitHub commit [1361fb7e29449629e1df94d44e0427ebec8c83c7](https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23580'}
2022-02-11T20:38:57Z
2022-02-07T22:01:24Z
MODERATE
6.5
{'CWE-400'}
{'https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-627q-g293-49q7', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L788-L790', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23580', 'https://github.com/advisories/GHSA-627q-g293-49q7'}
null
GHSA
GHSA-55mm-5399-7r63
Reliance on Cookies without validation in OctoberCMS
### Impact Previously encrypted cookie values were not tied to the name of the cookie the value belonged to. This meant that certain classes of attacks that took advantage of other theoretical vulnerabilities in user facing code (nothing exploitable in the core project itself) had a higher chance of succeeding. Specifically, if your usage exposed a way for users to provide unfiltered user input and have it returned to them as an encrypted cookie (ex. storing a user provided search query in a cookie) they could then use the generated cookie in place of other more tightly controlled cookies; or if your usage exposed the plaintext version of an encrypted cookie at any point to the user they could theoretically provide encrypted content from your application back to it as an encrypted cookie and force the framework to decrypt it for them. ### Patches Issue has been patched in Build 468 (v1.0.468). >**NOTE**: If you are using the cookie session driver, all of your session data will be invalidated. All other session drivers should smoothly upgrade to the changes (although the backend authentication persist cookie will also be invalidated requiring users to login again once their current session expires). ### Workarounds Apply https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c to your installation manually if unable to upgrade to Build 468. ### References - https://blog.laravel.com/laravel-cookie-security-releases - https://github.com/laravel/framework/compare/4c7d118181d6c7f1f883643702df807ced016c5e...a731824421f9ebc586728ea9c7cff231a249aaa9 ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat Assessment Assessed as Low given that it is not directly exploitable within the core but requires other security vulnerabilities within the application to have an effect and the severity of its effect depends entirely on the severity of those other holes in the application's defences. ### Acknowledgements Thanks to [Takashi Terada of Mitsui Bussan Secure Directions, Inc.](https://www.linkedin.com/in/takeshi-terada-b570a6100/) for finding the original issue in Laravel and @taylorotwell for sharing the report with the October CMS team.
{'CVE-2020-15128'}
2022-04-26T18:12:52Z
2020-08-05T14:52:54Z
MODERATE
6.1
{'CWE-565'}
{'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c', 'https://github.com/octobercms/october/security/advisories/GHSA-55mm-5399-7r63', 'https://github.com/octobercms/library/pull/508', 'https://github.com/advisories/GHSA-55mm-5399-7r63', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15128'}
null
GHSA
GHSA-jfp7-4j67-8r3q
Heap buffer overflow caused by rounding
### Impact An attacker can trigger a heap buffer overflow in `tf.raw_ops.QuantizedResizeBilinear` by manipulating input values so that float rounding results in off-by-one error in accessing image elements: ```python import tensorflow as tf l = [256, 328, 361, 17, 361, 361, 361, 361, 361, 361, 361, 361, 361, 361, 384] images = tf.constant(l, shape=[1, 1, 15, 1], dtype=tf.qint32) size = tf.constant([12, 6], shape=[2], dtype=tf.int32) min = tf.constant(80.22522735595703) max = tf.constant(80.39215850830078) tf.raw_ops.QuantizedResizeBilinear(images=images, size=size, min=min, max=max, align_corners=True, half_pixel_centers=True) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/44b7f486c0143f68b56c34e2d01e146ee445134a/tensorflow/core/kernels/quantized_resize_bilinear_op.cc#L62-L66) computes two integers (representing the upper and lower bounds for interpolation) by ceiling and flooring a floating point value: ```cc const float in_f = std::floor(in); interpolation->lower[i] = std::max(static_cast<int64>(in_f), static_cast<int64>(0)); interpolation->upper[i] = std::min(static_cast<int64>(std::ceil(in)), in_size - 1); ``` For some values of `in`, `interpolation->upper[i]` might be smaller than `interpolation->lower[i]`. This is an issue if `interpolation->upper[i]` is capped at `in_size-1` as it means that `interpolation->lower[i]` points outside of the image. Then, [in the interpolation code](https://github.com/tensorflow/tensorflow/blob/44b7f486c0143f68b56c34e2d01e146ee445134a/tensorflow/core/kernels/quantized_resize_bilinear_op.cc#L245-L264), this would result in heap buffer overflow: ```cc template <int RESOLUTION, typename T, typename T_SCALE, typename T_CALC> inline void OutputLerpForChannels(const InterpolationCache<T_SCALE>& xs, const int64 x, const T_SCALE ys_ilerp, const int channels, const float min, const float max, const T* ys_input_lower_ptr, const T* ys_input_upper_ptr, T* output_y_ptr) { const int64 xs_lower = xs.lower[x]; ... for (int c = 0; c < channels; ++c) { const T top_left = ys_input_lower_ptr[xs_lower + c]; ... } } ``` For the other cases where `interpolation->upper[i]` is smaller than `interpolation->lower[i]`, we can set them to be equal without affecting the output. ### Patches We have patched the issue in GitHub commit [f851613f8f0fb0c838d160ced13c134f778e3ce7](https://github.com/tensorflow/tensorflow/commit/f851613f8f0fb0c838d160ced13c134f778e3ce7). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29529'}
2021-05-21T17:06:51Z
2021-05-21T14:22:05Z
LOW
2.5
{'CWE-131', 'CWE-193'}
{'https://github.com/advisories/GHSA-jfp7-4j67-8r3q', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jfp7-4j67-8r3q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29529', 'https://github.com/tensorflow/tensorflow/commit/f851613f8f0fb0c838d160ced13c134f778e3ce7'}
null
GHSA
GHSA-wqfh-9m4g-7x6x
Remote code execution in Apache ActiveMQ
A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack - A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code. Mitigation - Upgrade to Apache ActiveMQ 5.15.13
{'CVE-2020-11998'}
2022-02-09T22:14:58Z
2022-02-09T22:14:58Z
CRITICAL
9.8
{'CWE-94'}
{'https://github.com/advisories/GHSA-wqfh-9m4g-7x6x', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://activemq.apache.org/security-advisories.data/CVE-2020-11998-announcement.txt', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11998', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-mc22-5q92-8v85
Memory Safety Issue when using patch or merge on state and assign the result back to state
### Impact This vulnerability is a memory safety Issue when using [`patch`](https://www.tremor.rs/docs/tremor-script/index#patch) or [`merge`](https://www.tremor.rs/docs/tremor-script/index#merge) on `state` and assign the result back to `state`. In this case affected versions of Tremor and the [tremor-script crate](https://crates.io/crates/tremor-script) maintains references to memory that might have been freed already. And these memory regions can be accessed by retrieving the `state`, e.g. send it over TCP or HTTP. This requires the Tremor server (or any other program using tremor-script) to execute a tremor-script script that uses the mentioned language construct. #### Details If affects the following two tremor-script language constructs: * A [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) where we assign the result back to the target expression and the expression to be merged needs to reference the `event`: ``` let state = merge state of event end; ``` * A [Patch](https://www.tremor.rs/docs/tremor-script/index#patch) where we assign the result back to the target expression and the patch operations used need to reference the `event`: ``` let state = patch state of insert event.key => event.value end; ``` For constructs like this (it does not matter what it references in the expression to be merged or the patch operations) an optimization was applied to manipulate the target value in-place, instead of cloning it. Our `Value` struct, which underpins all event data in `tremor-script`, is representing strings as borrowed `beef::Cow<'lifetime, str>`, that reference the raw data `Vec<u8>` the event is based upon. We keep this raw byte-array next to the `Value` structure inside our `Event` as a self-referential struct, so we make sure that the structured `Value` and its references are valid across its whole lifetime. The optimization was considered safe as long as it was only possible to merge or patch `event` data or static data. When `state` was introduced to `tremor-script` (in version 0.7.3) a new possibility to keep `Value` data around for longer than the lifetime of an event emerged. If `event` data is merged or patched into `state` without cloning it first, it can still reference keys or values from the previous event, which will now be invalid. This allows access to those already freed regions of memory and to get their content out over the wire. ### Patches The issue has been patched in https://crates.io/crates/tremor-script/0.11.6 and https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6 via commit [1a2efcd](https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e) by removing the optimization and always clone the target expression of a [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) or [Patch](https://www.tremor.rs/docs/tremor-script/index#patch. ### Workarounds If an upgrade is not possible, a possible workaround is to avoid the optimization by introducing a temporary variable and not immediately reassigning to `state`: ``` let tmp = merge state of event end; let state = tmp ``` ### References The actual fix is applied in this PR: https://github.com/tremor-rs/tremor-runtime/pull/1217 ### For more information If you have any questions or comments about this advisory: * Open an issue on our repository [tremor-rs/tremor-runtime](https://github.com/tremor-rs/tremor-runtime) * Please join our discord https://chat.tremor.rs and reach out to the team.
{'CVE-2021-39228'}
2021-09-20T19:52:53Z
2021-09-20T19:52:53Z
MODERATE
6.5
{'CWE-416', 'CWE-825'}
{'https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e', 'https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6', 'https://github.com/tremor-rs/tremor-runtime/security/advisories/GHSA-mc22-5q92-8v85', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39228', 'https://github.com/advisories/GHSA-mc22-5q92-8v85', 'https://github.com/tremor-rs/tremor-runtime/pull/1217'}
null
GHSA
GHSA-4852-vrh7-28rf
Reflected XSS in GraphQL Playground
### Impact **directly impacted:** - `graphql-playground-html@<1.6.22` - all unsanitized user input for `renderPlaygroundPage()` **all of our consuming packages** of `graphql-playground-html` are impacted: - `graphql-playground-middleware-express@<1.7.16` - unsanitized user input to `expressPlayground()` - `graphql-playground-middleware-koa@<1.6.15` - unsanitized user input to `koaPlayground()` - `graphql-playground-middleware-lambda@<1.7.17` - unsanitized user input to `lambdaPlayground()` - `graphql-playground-middleware-hapi@<1.6.13` - unsanitized user input to `hapiPlayground()` as well as ***any other packages*** that use these methods with unsanitized user input. **not impacted:** - `graphql-playground-electron` - uses `renderPlaygroundPage()` statically for a webpack build for electron bundle, no dynamic user input - `graphql-playground-react` - usage of the component directly in a react application does not expose reflected XSS vulnerabilities. only the demo in `public/` contains the vulnerability, because it uses an old version of the html pacakge. ### Patches upgrading to the above mentioned versions will solve the issue. If you're using `graphql-playground-html` directly, then: ``` yarn add graphql-playground-html@^1.6.22 ``` or ``` npm install --save graphql-playground-html@^1.6.22 ``` Then, similar steps need to be taken for each middleware: - [Upgrade Express Middleware](https://www.npmjs.com/package/graphql-playground-middleware-express#security-upgrade-steps) - [Upgrade Koa Middleware](https://www.npmjs.com/package/graphql-playground-middleware-koa#security-upgrade-steps) - [Upgrade Lambda Middleware](https://www.npmjs.com/package/graphql-playground-middleware-lambda#security-upgrade-steps) - [Upgrade Hapi Middleware](https://www.npmjs.com/package/graphql-playground-middleware-hapi#security-upgrade-steps) ### Workarounds Ensure you properly sanitize *all* user input for options you use for whatever function to initialize GraphQLPlayground: for example, with `graphql-playground-html` and express: ```js const { sanitizeUrl } = require('@braintree/sanitize-url'); const qs = require('querystringify'); const { renderPlaygroundPage } = require('graphql-playground-html'); module.exports = (req, res, next) => { const { endpoint } = qs.parse(req.url) res.html(renderPlaygroundPage({endpoint: sanitizeUrl(endpoint) })).status(200) next() } ``` or, with `graphql-playground-express`: ```js const { expressPlayground } = require('graphql-playground-middleware-express'); const { sanitizeUrl } = require('@braintree/sanitize-url'); const qs = require('querystringify'); const { renderPlaygroundPage } = require('graphql-playground-html'); module.exports = (req, res, next) => { const { endpoint } = qs.parse(req.url) res.html(expressPlayground({endpoint: sanitizeUrl(endpoint) })).status(200) next() } ``` ### References - [OWASP: How to Test for CSS Reflection Attacks](https://github.com/OWASP/wstg/blob/master/document/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting.md) - [Original Report from Cure53](https://user-images.githubusercontent.com/1368727/84191028-dfb7b980-aa65-11ea-8e18-4b8706f538e2.jpg) (jpg) ### Credits Masato Kinugawa of Cure53 ### For more information If you have any questions or comments about this advisory: * Open an issue in [graphql-playground](https://github.com/prisma-labs/graphql-playground/issues/new/choose) * Email us at [rikki.schulte@gmail.com](mailto:rikki.schulte@gmail.com)
{'CVE-2020-4038'}
2021-11-04T17:11:47Z
2020-06-09T00:24:57Z
HIGH
7.4
{'CWE-79'}
{'https://github.com/prisma-labs/graphql-playground/commit/bf1883db538c97b076801a60677733816cb3cfb7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4038', 'https://github.com/prisma-labs/graphql-playground/security/advisories/GHSA-4852-vrh7-28rf', 'https://github.com/advisories/GHSA-4852-vrh7-28rf', 'https://github.com/prisma-labs/graphql-playground#security-details', 'https://github.com/graphql/graphql-playground/security/advisories/GHSA-4852-vrh7-28rf'}
null
GHSA
GHSA-6x98-fx9j-7c78
Disabled users able to log in with third party SSO plugin
### Impact Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address ### Patches Upgrade to 2.12.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2017-1000489'}
2022-04-19T19:02:45Z
2021-01-19T21:16:19Z
MODERATE
8.1
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000489', 'https://github.com/mautic/mautic/security/advisories/GHSA-6x98-fx9j-7c78', 'https://github.com/advisories/GHSA-6x98-fx9j-7c78', 'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9', 'https://github.com/mautic/mautic/releases/tag/2.12.0'}
null
GHSA
GHSA-cqhg-xjhh-p8hf
Out-of-bounds reads in Pillow
Pillow before 6.2.3 and 7.x before 7.0.1 has multiple out-of-bounds reads in libImaging/FliDecode.c.
{'CVE-2020-10177'}
2021-09-22T21:50:28Z
2020-07-27T21:52:43Z
MODERATE
5.5
{'CWE-125'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/', 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574573', 'https://github.com/advisories/GHSA-cqhg-xjhh-p8hf', 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging', 'https://github.com/python-pillow/Pillow/pull/4538', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00012.html', 'https://usn.ubuntu.com/4430-2/', 'https://usn.ubuntu.com/4430-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10177', 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html', 'https://github.com/python-pillow/Pillow/pull/4503'}
null
GHSA
GHSA-9w49-m7xh-5r39
Cross-site scripting in papermerge
Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the rename, tag, upload, or create folder function. The payload can be in a folder, a tag, or a document's filename. If email consumption is configured in Papermerge, a malicious document can be sent by email and is automatically uploaded into the Papermerge web application. Therefore, no authentication is required to exploit XSS if email consumption is configured. Otherwise authentication is required.
{'CVE-2020-29456'}
2021-04-20T16:37:56Z
2021-04-20T16:37:56Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/ciur/papermerge/releases/tag/v1.5.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29456', 'https://github.com/advisories/GHSA-9w49-m7xh-5r39', 'https://www.papermerge.com/', 'https://github.com/ciur/papermerge/issues/228'}
null
GHSA
GHSA-wg8p-w946-c482
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
{'CVE-2022-0956'}
2022-03-29T21:23:18Z
2022-03-16T00:00:47Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2', 'https://github.com/advisories/GHSA-wg8p-w946-c482', 'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0956'}
null
GHSA
GHSA-jrf8-cmgg-gv2m
Error on unsupported architectures in raw-cpuid
An issue was discovered in the raw-cpuid crate before 9.0.0 for Rust. It allows __cpuid_count() calls even if the processor does not support the CPUID instruction, which is unsound and causes a deterministic crash.
{'CVE-2021-26307'}
2021-08-25T20:53:07Z
2021-08-25T20:53:07Z
MODERATE
5.5
{'CWE-657'}
{'https://github.com/advisories/GHSA-jrf8-cmgg-gv2m', 'https://github.com/RustSec/advisory-db/pull/614', 'https://github.com/gz/rust-cpuid/issues/40', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26307', 'https://rustsec.org/advisories/RUSTSEC-2021-0013.html'}
null
GHSA
GHSA-79fv-9865-4qcv
Heap buffer overflow in `MaxPoolGrad`
### Impact The implementation of `tf.raw_ops.MaxPoolGrad` is vulnerable to a heap buffer overflow: ```python import tensorflow as tf orig_input = tf.constant([0.0], shape=[1, 1, 1, 1], dtype=tf.float32) orig_output = tf.constant([0.0], shape=[1, 1, 1, 1], dtype=tf.float32) grad = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) ksize = [1, 1, 1, 1] strides = [1, 1, 1, 1] padding = "SAME" tf.raw_ops.MaxPoolGrad( orig_input=orig_input, orig_output=orig_output, grad=grad, ksize=ksize, strides=strides, padding=padding, explicit_paddings=[]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/ab1e644b48c82cb71493f4362b4dd38f4577a1cf/tensorflow/core/kernels/maxpooling_op.cc#L194-L203) fails to validate that indices used to access elements of input/output arrays are valid: ```cc for (int index = out_start; index < out_end; ++index) { int input_backprop_index = out_arg_max_flat(index); FastBoundsCheck(input_backprop_index - in_start, in_end - in_start); input_backprop_flat(input_backprop_index) += out_backprop_flat(index); } ``` Whereas accesses to `input_backprop_flat` are guarded by `FastBoundsCheck`, the indexing in `out_backprop_flat` can result in OOB access. ### Patches We have patched the issue in GitHub commit [a74768f8e4efbda4def9f16ee7e13cf3922ac5f7](https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29579'}
2021-05-21T17:08:37Z
2021-05-21T14:26:23Z
LOW
2.5
{'CWE-119', 'CWE-787'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79fv-9865-4qcv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29579', 'https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7', 'https://github.com/advisories/GHSA-79fv-9865-4qcv'}
null
GHSA
GHSA-5phw-3jrp-3vj8
Server-Side Request Forgery in Apache Solr
The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.
{'CVE-2021-27905'}
2021-09-16T18:56:14Z
2021-05-10T15:18:06Z
HIGH
7.1
{'CWE-918'}
{'https://lists.apache.org/thread.html/r720a4a0497fc90bad5feec8aa18b777912ee15c7eeb5f882adbf523e@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r78a3a4f1138a1608b0c6d4a2ee7647848c1a20b0d5c652cd9b02c25a@%3Ccommits.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27905', 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E', 'https://github.com/advisories/GHSA-5phw-3jrp-3vj8', 'https://lists.apache.org/thread.html/r8f1152a43c36d878bbeb5a92f261e9efaf3af313b033d7acfccea59d@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/re9d64bb8e5dfefddcbf255adb4559e13a0df5b818da1b9b51329723f@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r0ddc3a82bd7523b1453cb7a5e09eb5559517145425074a42eb326b10%40%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rd232d77c57a8ce172359ab098df9512d8b37373ab87c444be911b430@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccec7fc54d82591b23c143f1f6a6e38f6e03e75db70870e4cb14a1a@%3Ccommits.ofbiz.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0009/', 'https://lists.apache.org/thread.html/rae9ccaecce9859f709ed1458545d90a4c07163070dc98b5e9e59057f@%3Cnotifications.ofbiz.apache.org%3E'}
null
GHSA
GHSA-jp55-vvmf-63mv
URL Redirection to Untrusted Site ('Open Redirect')
### Impact There's no protection against URL redirection to untrusted site, in particular some well known parameters (xredirect) can be used to perform such redirections. ### Patches The problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. ### Workarounds There's no known workaround for this issue. ### References https://jira.xwiki.org/browse/XWIKI-10309 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [Security ML](mailto:security@xwiki.org)
{'CVE-2022-23618'}
2022-02-11T15:00:57Z
2022-02-09T21:42:47Z
MODERATE
4.7
{'CWE-601'}
{'https://jira.xwiki.org/browse/XWIKI-10309', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23618', 'https://github.com/advisories/GHSA-jp55-vvmf-63mv', 'https://github.com/xwiki/xwiki-platform/commit/5251c02080466bf9fb55288f04a37671108f8096', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv'}
null
GHSA
GHSA-cqjg-whmm-8gv6
Denial of Service via malformed accept-encoding header in hapi
Affected versions of `hapi` will crash or lock the event loop when a malformed `accept-encoding` header is recieved. ## Recommendation Update to version 16.1.1 or later.
{'CVE-2017-16013'}
2021-01-08T18:57:04Z
2018-10-09T00:57:28Z
MODERATE
0
{'CWE-400'}
{'https://github.com/hapijs/hapi/issues/3466', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16013', 'https://github.com/advisories/GHSA-cqjg-whmm-8gv6', 'https://nodesecurity.io/advisories/335', 'https://www.npmjs.com/advisories/335'}
null
GHSA
GHSA-j7wp-vjj6-cp5m
Cross-Site Scripting in @progress/kendo-angular-editor
Kendo UI for Angular Editor Component (npm package @progress/kendo-angular-editor) before version 1.2.3 is vulnerable to Cross-Site Scripting. When the Editor content contains potentially malicious scripts in element event handlers, they get executed. Adding the following content to the Editor value demonstrates the issue: `<img src="" onerror=alert(document.domain)>`.
null
2021-09-23T18:55:47Z
2020-08-11T19:40:10Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-j7wp-vjj6-cp5m', 'https://stackblitz.com/edit/angular-6xzuzp-tef7lb?file=app/app.component.ts', 'https://www.npmjs.com/advisories/1549', 'https://github.com/telerik/kendo-angular-editor'}
null
GHSA
GHSA-4m6q-rxhm-675w
OS Command Injection in adb-driver
adb-driver through 0.1.8 is vulnerable to Command Injection.It allows execution of arbitrary commands via the command function.
{'CVE-2020-7636'}
2021-12-09T19:54:29Z
2021-12-09T19:54:29Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-4m6q-rxhm-675w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7636', 'https://snyk.io/vuln/SNYK-JS-ADBDRIVER-564430', 'https://www.npmjs.com/package/adb-driver'}
null
GHSA
GHSA-mg85-8mv5-ffjr
Denial of Service in ammo
All versions of `ammo` are vulnerable to Denial of Service. The Range HTTP header parser has a vulnerability which will cause the function to throw a system error if the header is set to an invalid value. Because hapi is not expecting the function to ever throw, the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation This package is deprecated and is now maintained as `@hapi/ammo`. Please update your dependencies to use `@hapi/ammo`.
null
2020-09-03T15:45:40Z
2020-09-03T15:45:40Z
HIGH
0
null
{'https://github.com/advisories/GHSA-mg85-8mv5-ffjr', 'https://www.npmjs.com/advisories/1472'}
null
GHSA
GHSA-8rc5-mr4f-m243
Use after free in rio
An issue was discovered in the rio crate through 2020-05-11 for Rust. A struct can be leaked, allowing attackers to obtain sensitive information, cause a use-after-free, or cause a data race.
{'CVE-2020-35876'}
2021-08-25T20:46:57Z
2021-08-25T20:46:57Z
CRITICAL
9.8
{'CWE-416', 'CWE-772'}
{'https://github.com/advisories/GHSA-8rc5-mr4f-m243', 'https://github.com/spacejam/rio/issues/11', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35876', 'https://github.com/spacejam/rio/pull/31', 'https://rustsec.org/advisories/RUSTSEC-2020-0021.html'}
null
GHSA
GHSA-425c-ccf3-3jrr
Critical severity vulnerability that affects slpjs
## Validator parsing discrepancy due to string encoding ### Impact A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. ### Patches All versions > 0.21.3 are patched. ### Workarounds Upgrade to any version >= 0.21.4. ### References The bug was located and fixed [here](https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701). ### For more information If you have any questions or comments about this advisory: * Open an issue in the [slpjs repo](https://github.com/simpleledger/slpjs/issues) * Email us at [info@slp.cash](mailto:info@slp.cash)
{'CVE-2019-16762'}
2021-01-08T19:58:00Z
2019-11-15T23:10:35Z
CRITICAL
5.7
{'CWE-20'}
{'https://github.com/simpleledger/slpjs/security/advisories/GHSA-425c-ccf3-3jrr', 'https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16762', 'https://github.com/advisories/GHSA-425c-ccf3-3jrr'}
null
GHSA
GHSA-pfv6-prqm-85q8
Prototype Pollution in madlib-object-utils
The package madlib-object-utils before version 0.1.8 is vulnerable to Prototype Pollution via the `setValue` method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)
{'CVE-2022-24279'}
2022-04-22T20:50:34Z
2022-04-16T00:00:26Z
HIGH
7.5
{'CWE-1321'}
{'https://github.com/advisories/GHSA-pfv6-prqm-85q8', 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572', 'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24279'}
null
GHSA
GHSA-mc6h-4qgp-37qh
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).
{'CVE-2020-14195'}
2021-10-21T21:05:46Z
2020-06-18T14:44:43Z
HIGH
8.1
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/commit/f6d9c664f6d481703138319f6a0f1fdbddb3a259', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://github.com/FasterXML/jackson-databind/issues/2765', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14195', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/advisories/GHSA-mc6h-4qgp-37qh', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-p4q6-qxjx-8jgp
Directory Traversal in spring-boot-actuator-logview
### Impact The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that `filename=../somefile` would not work), the base folder parameter was not sufficiently checked, so that `filename=somefile&base=../` could access a file outside the logging base directory). ### Patches The vulnerability has been patched in release 0.2.13. Any users of 0.2.12 should be able to update without any issues as there are no other changes in that release. ### Workarounds There is no workaround to fix the vulnerability other than updating or removing the dependency. However, removing read access of the user the application is run with to any directory not required for running the application can limit the impact. Additionally, access to the logview endpoint can be limited by deploying the application behind a reverse proxy. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [github repo](https://github.com/lukashinsch/spring-boot-actuator-logview)
{'CVE-2021-21234'}
2022-04-19T19:02:44Z
2021-01-05T17:29:40Z
HIGH
7.7
{'CWE-22'}
{'https://github.com/lukashinsch/spring-boot-actuator-logview/security/advisories/GHSA-p4q6-qxjx-8jgp', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6', 'https://github.com/advisories/GHSA-p4q6-qxjx-8jgp', 'https://search.maven.org/artifact/eu.hinsch/spring-boot-actuator-logview', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/760acbb939a8d1f7d1a7dfcd51ca848eea04e772', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21234'}
null
GHSA
GHSA-2vj5-px25-gjrp
pytorch-lightning is vulnerable to Deserialization of Untrusted Data
pytorch-lightning is vulnerable to Deserialization of Untrusted Data.
{'CVE-2021-4118'}
2022-03-30T18:25:55Z
2022-01-06T23:58:59Z
HIGH
7.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4118', 'https://github.com/PyTorchLightning/pytorch-lightning/pull/11099', 'https://huntr.dev/bounties/31832f0c-e5bb-4552-a12c-542f81f111e6', 'https://github.com/PyTorchLightning/pytorch-lightning/issues/11045', 'https://github.com/pytorchlightning/pytorch-lightning/commit/62f1e82e032eb16565e676d39e0db0cac7e34ace', 'https://github.com/PyTorchLightning/pytorch-lightning/releases/tag/1.6.0', 'https://github.com/advisories/GHSA-2vj5-px25-gjrp'}
null
GHSA
GHSA-j32x-j8pj-pg2h
Prototype Pollution in decal
This affects all versions of package decal. The vulnerability is in the extend function.
{'CVE-2020-28450'}
2021-04-13T15:20:34Z
2021-04-13T15:20:34Z
HIGH
8.6
{'CWE-94', 'CWE-400', 'CWE-1321'}
{'https://github.com/gigafied/decal.js/blob/master/src/utils/extend.js%23L23-L56', 'https://github.com/advisories/GHSA-j32x-j8pj-pg2h', 'https://snyk.io/vuln/SNYK-JS-DECAL-1051028', 'https://www.npmjs.com/package/decal', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28450'}
null
GHSA
GHSA-hj8g-cw8x-2c6m
Cross-site Scripting in Microweber
Microweber prior to version 1.3 is vulnerable to reflected cross-site scripting.
{'CVE-2022-0719'}
2022-02-26T01:18:28Z
2022-02-24T00:00:53Z
HIGH
7.6
{'CWE-79'}
{'https://github.com/advisories/GHSA-hj8g-cw8x-2c6m', 'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0719', 'https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312'}
null
GHSA
GHSA-q3wr-qw3g-3p4h
Injection/XSS in Redcarpet
Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions no HTML escaping was being performed when processing quotes. This applies even when the `:escape_html` option was being used. This is fixed in version 3.5.1 by the referenced commit.
{'CVE-2020-26298'}
2021-01-19T18:16:40Z
2021-01-11T19:06:10Z
MODERATE
6.8
{'CWE-79'}
{'https://rubygems.org/gems/redcarpet', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00014.html', 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md#version-351-security', 'https://github.com/advisories/GHSA-q3wr-qw3g-3p4h', 'https://github.com/vmg/redcarpet/commit/a699c82292b17c8e6a62e1914d5eccc252272793', 'https://www.debian.org/security/2021/dsa-4831', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26298'}
null
GHSA
GHSA-hq37-853p-g5cf
Regular Expression Denial of Service in CairoSVG
# Doyensec Vulnerability Advisory * Regular Expression Denial of Service (REDoS) in cairosvg * Affected Product: CairoSVG v2.0.0+ * Vendor: https://github.com/Kozea * Severity: Medium * Vulnerability Class: Denial of Service * Author(s): Ben Caller ([Doyensec](https://doyensec.com)) ## Summary When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS). If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time. ## Technical description The vulnerable regular expressions are https://github.com/Kozea/CairoSVG/blob/9c4a982b9a021280ad90e89707eacc1d114e4ac4/cairosvg/colors.py#L190-L191 The section between 'rgb(' and the final ')' contains multiple overlapping groups. Since all three infinitely repeating groups accept spaces, a long string of spaces causes catastrophic backtracking when it is not followed by a closing parenthesis. The complexity is cubic, so doubling the length of the malicious string of spaces makes processing take 8 times as long. ## Reproduction steps Create a malicious SVG of the form: <svg width="1" height="1"><rect fill="rgb( ;"/></svg> with the following code: '<svg width="1" height="1"><rect fill="rgb(' + (' ' * 3456) + ';"/></svg>' Note that there is no closing parenthesis before the semi-colon. Run cairosvg e.g.: cairosvg cairo-redos.svg -o x.png and notice that it hangs at 100% CPU. Increasing the number of spaces increases the processing time with cubic complexity. ## Remediation Fix the regexes to avoid overlapping parts. Perhaps remove the [ \n\r\t]* groups from the regex, and use .strip() on the returned capture group. ## Disclosure timeline - 2020-12-30: Vulnerability disclosed via email to CourtBouillon
{'CVE-2021-21236'}
2022-04-19T19:02:44Z
2021-01-06T16:57:50Z
MODERATE
0
{'CWE-400'}
{'https://github.com/Kozea/CairoSVG/releases/tag/2.5.1', 'https://github.com/Kozea/CairoSVG/security/advisories/GHSA-hq37-853p-g5cf', 'https://github.com/advisories/GHSA-hq37-853p-g5cf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21236', 'https://github.com/Kozea/CairoSVG/commit/cfc9175e590531d90384aa88845052de53d94bf3', 'https://pypi.org/project/CairoSVG/'}
null
GHSA
GHSA-3ff2-r28g-w7h9
Heap buffer overflow in `Transpose`
### Impact The [shape inference function for `Transpose`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc#L121-L185) is vulnerable to a heap buffer overflow: ```python import tensorflow as tf @tf.function def test(): y = tf.raw_ops.Transpose(x=[1,2,3,4],perm=[-10]) return y test() ``` This occurs whenever `perm` contains negative elements. The shape inference function does not validate that the indices in `perm` are all valid: ```cc for (int32_t i = 0; i < rank; ++i) { int64_t in_idx = data[i]; if (in_idx >= rank) { return errors::InvalidArgument("perm dim ", in_idx, " is out of range of input rank ", rank); } dims[i] = c->Dim(input, in_idx); } ``` where `Dim(tensor, index)` accepts either a positive index less than the rank of the tensor or the special value `-1` for unknown dimensions. ### Patches We have patched the issue in GitHub commit [c79ba87153ee343401dbe9d1954d7f79e521eb14](https://github.com/tensorflow/tensorflow/commit/c79ba87153ee343401dbe9d1954d7f79e521eb14). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41216'}
2021-11-10T18:57:19Z
2021-11-10T18:57:19Z
MODERATE
5.5
{'CWE-787', 'CWE-120'}
{'https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc#L121-L185', 'https://github.com/tensorflow/tensorflow/commit/c79ba87153ee343401dbe9d1954d7f79e521eb14', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41216', 'https://github.com/advisories/GHSA-3ff2-r28g-w7h9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3ff2-r28g-w7h9'}
null
GHSA
GHSA-mq8p-h798-xcrp
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
The YARN NodeManager in Apache Hadoop 2.7.3 and 2.7.4 can leak the password for credential store provider used by the NodeManager to YARN Applications.
{'CVE-2017-15718'}
2021-09-15T20:50:10Z
2018-12-21T17:50:20Z
CRITICAL
9.8
{'CWE-200'}
{'https://github.com/advisories/GHSA-mq8p-h798-xcrp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15718', 'https://lists.apache.org/thread.html/773c93c2d8a6a52bbe97610c2b1c2ad205b970e1b8c04fb5b2fccad6@%3Cgeneral.hadoop.apache.org%3E'}
null
GHSA
GHSA-xvch-5gv4-984h
Prototype Pollution in minimist
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
{'CVE-2021-44906'}
2022-04-04T21:39:39Z
2022-03-18T00:01:09Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/substack/minimist/issues/164', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44906', 'https://github.com/advisories/GHSA-xvch-5gv4-984h', 'https://github.com/substack/minimist/blob/master/index.js#L69', 'https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip', 'https://snyk.io/vuln/SNYK-JS-MINIMIST-559764', 'https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068'}
null
GHSA
GHSA-xhh6-956q-4q69
Argument injection in a MimeTypeGuesser in Symfony
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. This is related to symfony/http-foundation (and symfony/mime in 4.3.x).
{'CVE-2019-18888'}
2021-07-28T16:28:01Z
2019-12-02T18:08:19Z
HIGH
7.5
{'CWE-88', 'CWE-20'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/mime/CVE-2019-18888.yaml', 'https://symfony.com/blog/cve-2019-18888-prevent-argument-injection-in-a-mimetypeguesser', 'https://symfony.com/cve-2019-18888', 'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18888.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/', 'https://github.com/advisories/GHSA-xhh6-956q-4q69', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18888', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-18888.yaml'}
null
GHSA
GHSA-vm7j-4rj6-mw2p
Malicious Package in ember_cli_babe
Version 6.16.0 of `ember_cli_babe` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-29T20:46:36Z
2020-09-03T21:08:42Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1200', 'https://github.com/advisories/GHSA-vm7j-4rj6-mw2p'}
null
GHSA
GHSA-hr2v-3952-633q
Prototype Pollution in deep-extend
Versions of `deep-extend` before 0.5.1 are vulnerable to prototype pollution. ## Recommendation Update to version 0.5.1 or later.
{'CVE-2018-3750'}
2021-09-14T17:26:46Z
2018-10-09T00:44:59Z
CRITICAL
9.8
{'CWE-20'}
{'https://hackerone.com/reports/311333', 'https://www.npmjs.com/advisories/612', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3750', 'https://github.com/advisories/GHSA-hr2v-3952-633q'}
null
GHSA
GHSA-vvwp-3f54-xc39
Downloads Resources over HTTP in broccoli-closure
Affected versions of `broccoli-closure` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `broccoli-closure`. ## Recommendation Update to version 1.3.1 or later.
{'CVE-2016-10635'}
2021-01-08T01:57:12Z
2019-02-18T23:57:05Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-vvwp-3f54-xc39', 'https://www.npmjs.com/advisories/242', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10635', 'https://nodesecurity.io/advisories/242'}
null
GHSA
GHSA-j657-59rv-qwm6
Cross-Site Scripting in min-http-server
All versions of `min-http-server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-5457'}
2021-01-08T20:42:47Z
2019-07-31T04:22:27Z
HIGH
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5457', 'https://www.npmjs.com/advisories/1111', 'https://github.com/advisories/GHSA-j657-59rv-qwm6', 'https://hackerone.com/reports/570568'}
null
GHSA
GHSA-gxr4-xjj5-5px2
Potential XSS vulnerability in jQuery
### Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround the issue without upgrading, adding the following to your code: ```js jQuery.htmlPrefilter = function( html ) { return html; }; ``` You need to use at least jQuery 1.12/2.2 or newer to be able to apply this workaround. ### References https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://jquery.com/upgrade-guide/3.5/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.
{'CVE-2020-11022'}
2022-04-25T23:06:54Z
2020-04-29T22:18:55Z
MODERATE
6.9
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/', 'https://www.npmjs.com/advisories/1518', 'https://security.netapp.com/advisory/ntap-20200511-0006/', 'https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2', 'https://www.debian.org/security/2020/dsa-4693', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/', 'https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E', 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.tenable.com/security/tns-2021-02', 'https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E', 'https://www.drupal.org/sa-core-2020-002', 'https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.tenable.com/security/tns-2021-10', 'https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E', 'https://www.tenable.com/security/tns-2020-10', 'https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html', 'https://www.tenable.com/security/tns-2020-11', 'https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E', 'https://github.com/jquery/jquery/releases/tag/3.5.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11022', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/', 'http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html', 'https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E', 'https://github.com/advisories/GHSA-gxr4-xjj5-5px2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/', 'https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E', 'https://jquery.com/upgrade-guide/3.5/', 'https://security.gentoo.org/glsa/202007-03', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-p5w9-856p-8q4g
Assumed memory layout of std::net::SocketAddr
The [`socket2`](https://crates.io/crates/socket2) crate has assumed `std::net::SocketAddrV4` and `std::net::SocketAddrV6` have the same memory layout as the system C representation `sockaddr`. It has simply casted the pointers to convert the socket addresses to the system representation. The standard library does not say anything about the memory layout, and this will cause invalid memory access if the standard library changes the implementation. No warnings or errors will be emitted once the change happens.
null
2021-08-25T21:00:23Z
2021-08-25T21:00:23Z
MODERATE
0
{'CWE-824'}
{'https://github.com/rust-lang/socket2-rs/issues/119', 'https://rustsec.org/advisories/RUSTSEC-2020-0079.html', 'https://github.com/advisories/GHSA-p5w9-856p-8q4g'}
null
GHSA
GHSA-g3xp-v2ff-x5c3
Downloads Resources over HTTP in go-ipfs-dep
Affected versions of `go-ipfs-deps` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Update to version 0.4.4 or later.
{'CVE-2016-10563'}
2021-01-08T18:49:43Z
2019-02-18T23:54:18Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10563', 'https://github.com/diasdavid/go-ipfs-dep/pull/12', 'https://nodesecurity.io/advisories/156', 'https://www.npmjs.com/advisories/156', 'https://github.com/advisories/GHSA-g3xp-v2ff-x5c3'}
null
GHSA
GHSA-gjmw-vf9h-g25v
Polymorphic typing issue
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.
{'CVE-2019-17531'}
2021-07-27T22:19:14Z
2019-11-13T00:32:38Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17531', 'https://security.netapp.com/advisory/ntap-20191024-0005/', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-gjmw-vf9h-g25v', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/b3c90d38f99db546de60fea65f99a924d540fae2285f014b79606ca5@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html', 'https://github.com/FasterXML/jackson-databind/issues/2498', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:4192', 'https://access.redhat.com/errata/RHSA-2020:0164'}
null
GHSA
GHSA-2hhw-p8mg-jrm6
Path Traversal in http-live-simulator
Versions of `http-live-simulator` prior to 1.0.6 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. ## Recommendation Upgrade to version 1.0.6
{'CVE-2019-5423'}
2021-01-08T20:08:31Z
2019-04-08T15:18:40Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-2hhw-p8mg-jrm6', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5423', 'https://hackerone.com/reports/384939', 'https://www.npmjs.com/advisories/799'}
null
GHSA
GHSA-jw37-5gqr-cf9j
Server-Side Request Forgery in ftp-srv
### Background The FTP protocol creates two connections, one for commands and one for transferring data. This second data connection can be created in two ways, on the server by sending the PASV command, or on the client by sending the PORT command. The PORT command sends the IP and port for the server to connect to the client with. ### Issue Since the client can send an arbitrary IP with the PORT command, this can be used to cause the server to make a connection elsewhere. ### Patches * _fix: disallow PORT connections to alternate hosts_: e449e75219d918c400dec65b4b0759f60476abca Deprecation notices have been published for older versions. ### Workarounds Blacklisting the FTP Command `PORT` will prevent the server from exposing this behaviour through active connections until a fix is applied. ```js const ftp = new FtpSrv({ blacklist: ['PORT'] }); ``` ### References https://www.npmjs.com/advisories/1445 ### Credits Thank you to; @trs for fixing it @andreeleuterio for reporting it to us for an anonymous user (Vincent) through the NPM platform @quiquelhappy for bringing it to our attention after it slipped through the cracks during Christmas ### For more information If you have any questions or comments about this advisory: * Open an issue at [https://github.com/autovance/ftp-srv](https://github.com/autovance/ftp-srv) * Email us directly; security@autovance.com
{'CVE-2020-15152'}
2022-04-19T19:02:33Z
2020-08-17T21:44:54Z
CRITICAL
9.1
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15152', 'https://github.com/autovance/ftp-srv/commit/e449e75219d918c400dec65b4b0759f60476abca', 'https://www.npmjs.com/advisories/1445', 'https://github.com/advisories/GHSA-jw37-5gqr-cf9j', 'https://github.com/autovance/ftp-srv/security/advisories/GHSA-jw37-5gqr-cf9j', 'https://github.com/autovance/ftp-srv/commit/5508c2346cf23b24c20070ff2e8a47c647d3d5b5', 'https://github.com/autovance/ftp-srv/commit/fb32b012c3baf48ee804e1dc36544cbba70b00d3', 'https://www.npmjs.com/package/ftp-srv'}
null
GHSA
GHSA-wmv4-5w76-vp9g
Authorization Bypass in Spring Security
When using Spring Security's CAS Proxy ticket authentication a malicious CAS Service could trick another CAS Service into authenticating a proxy ticket that was not associated. This is due to the fact that the proxy ticket authentication uses the information from the HttpServletRequest which is populated based upon untrusted information within the HTTP request. This means if there are access control restrictions on which CAS services can authenticate to one another, those restrictions can be bypassed. If users are not using CAS Proxy tickets and not basing access control decisions based upon the CAS Service, then there is no impact to users. ## Mitigation Users of affected versions should apply the following mitigation: - Users of 3.2x should upgrade to 3.2.5 or later - Users of 3.1.x should upgrade to 3.1.7 or later ## Credit This issue was identified by David Ohsie and brought to our attention by the CAS Development team.
{'CVE-2014-3527'}
2021-10-04T21:18:26Z
2020-09-15T20:16:22Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/spring-projects/spring-security/issues/2907', 'https://pivotal.io/security/cve-2014-3527', 'https://github.com/advisories/GHSA-wmv4-5w76-vp9g', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3527'}
null
GHSA
GHSA-m5v7-pr32-mjx2
Critical severity vulnerability in Ignition
The Ignition page before version 2.0.5 for Laravel mishandles globals, _get, _post, _cookie, and _env. NOTE: in the 1.x series, versions 1.16.15 and later are unaffected as a consequence of the CVE-2021-43996 fix.
{'CVE-2020-13909'}
2021-11-18T20:37:41Z
2021-10-12T16:29:13Z
CRITICAL
9.8
null
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13909', 'https://github.com/github/advisory-database/issues/2316', 'https://github.com/facade/ignition/releases/tag/2.0.5', 'https://github.com/advisories/GHSA-m5v7-pr32-mjx2', 'https://www.cve.org/CVERecord?id=CVE-2020-13909', 'https://github.com/facade/ignition/compare/2.0.4...2.0.5'}
null
GHSA
GHSA-g622-r636-qfqh
SQL Injection in Couchbase Sync Gateway
The Couchbase Sync Gateway 2.1.2 in combination with a Couchbase Server is affected by a previously undisclosed N1QL-injection vulnerability in the REST API. An attacker with access to the public REST API can insert additional N1QL statements through the parameters ?startkey? and ?endkey? of the ?_all_docs? endpoint.
{'CVE-2019-9039'}
2022-04-12T22:49:51Z
2022-02-15T01:57:18Z
CRITICAL
9.8
{'CWE-89'}
{'https://docs.couchbase.com/sync-gateway/2.5/release-notes.html', 'https://github.com/advisories/GHSA-g622-r636-qfqh', 'https://www.couchbase.com/resources/security#SecurityAlerts', 'https://research.hisolutions.com/2019/06/n1ql-injection-in-couchbase-sync-gateway-cve-2019-9039/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9039', 'https://github.com/couchbase/sync_gateway/commit/97adb5b496aa96aa70398018ea96da913ffd8d8c'}
null
GHSA
GHSA-4fc4-chg7-h8gh
Unprotected dynamically loaded chunks
### Impact All dynamically loaded chunks receive an invalid integrity hash that is ignored by the browser, and therefore the browser cannot validate their integrity. This removes the additional level of protection offered by SRI for such chunks. Top-level chunks are unaffected. ### Patches This issue is patched in version 1.5.1. ### Workarounds N/A ### References https://github.com/waysact/webpack-subresource-integrity/issues/131 ### For more information If you have any questions or comments about this advisory: * Comment on [webpack-subresource-integrity issue #131](https://github.com/waysact/webpack-subresource-integrity/issues/131) * Or email us at [security@waysact.com](mailto:security@waysact.com)
{'CVE-2020-15262'}
2021-11-19T14:40:52Z
2020-10-19T20:02:44Z
LOW
3.7
{'CWE-345'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15262', 'https://github.com/advisories/GHSA-4fc4-chg7-h8gh', 'https://github.com/waysact/webpack-subresource-integrity/commit/3d7090c08c333fcfb10ad9e2d6cf72e2acb7d87f', 'https://github.com/waysact/webpack-subresource-integrity/issues/131', 'https://github.com/waysact/webpack-subresource-integrity/security/advisories/GHSA-4fc4-chg7-h8gh'}
null
GHSA
GHSA-8225-6cvr-8pqp
Large gzip Denial of Service in superagent
Affected versions of `superagent` do not check the post-decompression size of ZIP compressed HTTP responses prior to decompressing. This results in the package being vulnerable to a [ZIP bomb](https://en.wikipedia.org/wiki/Zip_bomb) attack, where an extremely small ZIP file becomes many orders of magnitude larger when decompressed. This may result in unrestrained CPU/Memory/Disk consumption, causing a denial of service condition. ## Recommendation Update to version 3.7.0 or later.
{'CVE-2017-16129'}
2021-01-08T19:13:22Z
2018-08-09T20:13:01Z
LOW
0
{'CWE-409'}
{'https://github.com/visionmedia/superagent/issues/1259', 'https://nodesecurity.io/advisories/479', 'https://github.com/advisories/GHSA-8225-6cvr-8pqp', 'https://www.npmjs.com/advisories/479', 'https://en.wikipedia.org/wiki/Zip_bomb', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16129'}
null
GHSA
GHSA-5rc4-8qqh-vq7f
Handling of URL Encoding permitting access to ignored
serve node module suffers from Improper Handling of URL Encoding by permitting access to ignored files if a filename is URL encoded.
{'CVE-2018-3718'}
2021-08-09T22:24:26Z
2021-08-09T22:24:26Z
MODERATE
0
{'CWE-177'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3718', 'https://hackerone.com/reports/308721', 'https://github.com/advisories/GHSA-5rc4-8qqh-vq7f'}
null
GHSA
GHSA-26xx-m4q2-xhq8
Authentication Bypass by CSRF Weakness
### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: * Executed whether as: * A before_action callback (the default) * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). * Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. Thanks @waiting-for-dev for reporting and providing a patch 👏 ### Patches Spree 4.3 users should update to spree_auth_devise 4.4.1 Spree 4.2 users should update to spree_auth_devise 4.2.1 Spree 4.1 users should update to spree_auth_devise 4.1.1 Older Spree version users should update to spree_auth_devise 4.0.1 ### Workarounds If possible, change your strategy to :exception: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` ### References https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
{'CVE-2021-41275'}
2021-11-25T00:20:46Z
2021-11-18T20:14:19Z
CRITICAL
9.3
{'CWE-352'}
{'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-26xx-m4q2-xhq8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41275', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/spree/spree_auth_devise/commit/adf6ed4cd94d66091776b5febd4ff3767362de63', 'https://github.com/advisories/GHSA-26xx-m4q2-xhq8'}
null
GHSA
GHSA-jrhj-2j3q-xf3v
Stored Cross-Site Scripting in simplehttpserver
All versions of simplehttpserver are vulnerable to stored cross-site scripting (XSS). To be exploited an attacker needs to control the filename of a file that is used in the directory listing output. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not use this module if the exploitable conditions are met.
{'CVE-2018-3716'}
2021-01-08T18:31:48Z
2018-07-26T15:03:30Z
HIGH
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3716', 'https://hackerone.com/reports/309648', 'https://github.com/advisories/GHSA-jrhj-2j3q-xf3v', 'https://www.npmjs.com/advisories/585'}
null
GHSA
GHSA-v4x8-gw49-7hv4
Path Traversal in swagger-injector
All versions of `swagger-injector` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the configured `dist` folder using relative paths. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-29T18:38:06Z
2020-09-03T20:37:42Z
CRITICAL
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-v4x8-gw49-7hv4', 'https://www.npmjs.com/advisories/1172'}
null
GHSA
GHSA-257v-vj4p-3w2h
Regular Expression Denial of Service (ReDOS)
In the npm package `color-string`, there is a ReDos (Regular Expression Denial of Service) vulnerability regarding an exponential time complexity for linearly increasing input lengths for `hwb()` color strings. Strings reaching more than 5000 characters would see several milliseconds of processing time; strings reaching more than 50,000 characters began seeing 1500ms (1.5s) of processing time. The cause was due to a the regular expression that parses hwb() strings - specifically, the hue value - where the integer portion of the hue value used a 0-or-more quantifier shortly thereafter followed by a 1-or-more quantifier. This caused excessive backtracking and a cartesian scan, resulting in exponential time complexity given a linear increase in input length.
{'CVE-2021-29060'}
2021-06-30T18:03:29Z
2021-06-22T01:14:09Z
MODERATE
5.3
{'CWE-770'}
{'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md', 'https://github.com/advisories/GHSA-257v-vj4p-3w2h', 'https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3', 'https://www.npmjs.com/package/color-string', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29060', 'https://github.com/Qix-/color-string/releases/tag/1.5.5', 'https://github.com/yetingli/SaveResults/blob/main/js/color-string.js'}
null
GHSA
GHSA-cv7m-wc7g-7gfp
Cross-Site Request Forgery in MAGMI
All versions of MAGMI up to and including version 0.7.24 are vulnerable to CSRF due to the lack of CSRF tokens. RCE (via phpcli command) is possible in the event that a CSRF is leveraged against an existing admin session for MAGMI.
{'CVE-2020-5776'}
2021-05-06T18:54:41Z
2021-05-06T18:54:41Z
MODERATE
8.8
{'CWE-352'}
{'https://www.tenable.com/security/research/tra-2020-51', 'https://github.com/advisories/GHSA-cv7m-wc7g-7gfp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5776'}
null
GHSA
GHSA-m5pq-gvj9-9vr8
Regular expression denial of service in Rust's regex crate
> This is a cross-post of [the official security advisory][advisory]. The official advisory contains a signed version with our PGP key, as well. [advisory]: https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw The Rust Security Response WG was notified that the `regex` crate did not properly limit the complexity of the regular expressions (regex) it parses. An attacker could use this security issue to perform a denial of service, by sending a specially crafted regex to a service accepting untrusted regexes. No known vulnerability is present when parsing untrusted input with trusted regexes. This issue has been assigned CVE-2022-24713. The severity of this vulnerability is "high" when the `regex` crate is used to parse untrusted regexes. Other uses of the `regex` crate are not affected by this vulnerability. ## Overview The `regex` crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. ## Affected versions All versions of the `regex` crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from `regex` 1.5.5. ## Mitigations We recommend everyone accepting user-controlled regexes to upgrade immediately to the latest version of the `regex` crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, we do not recommend denying known problematic regexes. ## Acknowledgements We want to thank Addison Crump for responsibly disclosing this to us according to the [Rust security policy](https://www.rust-lang.org/policies/security), and for helping review the fix. We also want to thank Andrew Gallant for developing the fix, and Pietro Albini for coordinating the disclosure and writing this advisory.
{'CVE-2022-24713'}
2022-04-20T19:12:42Z
2022-03-08T20:00:36Z
HIGH
7.5
{'CWE-400'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/', 'https://github.com/advisories/GHSA-m5pq-gvj9-9vr8', 'https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/', 'https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw', 'https://www.debian.org/security/2022/dsa-5118', 'https://lists.debian.org/debian-lts-announce/2022/04/msg00009.html', 'https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8', 'https://www.debian.org/security/2022/dsa-5113', 'https://lists.debian.org/debian-lts-announce/2022/04/msg00003.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24713'}
null
GHSA
GHSA-8px5-63x9-5c7p
Command Injection in pullit
Versions of `pullit` prior to 1.4.0 are vulnerable to Command Injection. The package does not validate input on git branch names and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system. ## Recommendation Upgrade to version 1.4.0 or later. ## Credits This vulnerability was discovered by @lirantal
null
2022-04-01T19:35:32Z
2020-09-03T16:47:30Z
HIGH
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-8px5-63x9-5c7p', 'https://github.com/jkup/pullit/issues/23', 'https://www.npmjs.com/advisories/1004', 'https://github.com/jkup/pullit/commit/4fec455774ee08f4dce0ef2ef934ffcc37219bfb', 'https://hackerone.com/reports/315773'}
null
GHSA
GHSA-r32r-3977-cgc3
Moderate severity vulnerability that affects org.keycloak:keycloak-core
JBoss KeyCloak before 1.0.3.Final allows remote attackers to cause a denial of service (resource consumption) via a large value in the size parameter to auth/qrcode, related to QR code generation.
{'CVE-2014-3651'}
2021-09-17T14:13:05Z
2018-10-18T16:50:20Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-3651', 'https://bugzilla.redhat.com/show_bug.cgi?id=1144278', 'https://github.com/advisories/GHSA-r32r-3977-cgc3', 'https://issues.jboss.org/browse/KEYCLOAK-699'}
null
GHSA
GHSA-7xxv-wpxj-mx5v
Out-of-bounds read in typed-ast and cpython may allow an attacker to crash the interpreter process (ast_for_arguments case).
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)
{'CVE-2019-19275'}
2021-08-19T15:07:51Z
2019-12-02T18:03:09Z
HIGH
7.5
{'CWE-125'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5H4Q6LFVRX7SFXLBEJMNQFI4T5SCEA/', 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e', 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c', 'https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b', 'https://github.com/advisories/GHSA-7xxv-wpxj-mx5v', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19275', 'https://bugs.python.org/issue36495', 'https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce'}
null
GHSA
GHSA-r9w3-g83q-m6hq
Prototype Pollution in deepmerge-ts
deepmerge-ts is used to merge 2 or more objects respecting type information. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). A fix was released in version 4.0.2. Currently, there is no known workaround.
{'CVE-2022-24802'}
2022-04-13T16:28:11Z
2022-04-01T17:26:03Z
HIGH
8.1
{'CWE-1321', 'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24802', 'https://github.com/RebeccaStevens/deepmerge-ts/security/advisories/GHSA-r9w3-g83q-m6hq', 'https://github.com/RebeccaStevens/deepmerge-ts/commit/d637db7e4fb2bfb113cb4bc1c85a125936d7081b', 'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72', 'https://github.com/advisories/GHSA-r9w3-g83q-m6hq'}
null
GHSA
GHSA-55xv-f85c-248q
Regular Expression Denial of Service (ReDoS) in jsx-slack
jsx-slack v4.5.1 and earlier versions are vulnerable to a regular expression denial-of-service (ReDoS) attack. ### Impact If attacker can put a lot of JSX elements into `<blockquote>` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources. ```javascript /** @jsxImportSource jsx-slack */ import { Section } from 'jsx-slack' console.log( <Section> <blockquote> {[...Array(40)].map((_, i) => ( <p>{i + 1}</p> ))} </blockquote> </Section> ) ``` ### Patches _See also: https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6_ jsx-slack v4.5.2 has updated regular expressions to prevent catastrophic backtracking. jsx-slack v4.5.1 also had patched a workaround. It has no problems to contents with ASCII characters, but _still vulnerable to contents with multibyte characters_. (https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d) ### References - https://nvd.nist.gov/vuln/detail/CVE-2021-43838 - https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d ### Credits Thanks to @hieki for finding out this vulnerability.
{'CVE-2021-43838'}
2022-04-19T19:03:18Z
2021-12-17T19:59:02Z
LOW
3.7
{'CWE-400'}
{'https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43838', 'https://github.com/advisories/GHSA-55xv-f85c-248q'}
null
GHSA
GHSA-9p5g-vg43-mj5r
Authenticated users can read data from other sources than intended
In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.
{'CVE-2021-36749'}
2021-10-04T14:15:04Z
2021-09-27T20:13:25Z
MODERATE
6.5
{'CWE-668', 'CWE-863'}
{'https://lists.apache.org/thread.html/r304dfe56a5dfe1b2d9166b24d2c74ad1c6730338b20aef77a00ed2be@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-793h-6f7r-6qvm', 'https://lists.apache.org/thread.html/rc9400a70d0ec5cdb8a3486fc5ddb0b5282961c0b63e764abfbcb9f5d%40%3Cdev.druid.apache.org%3E', 'https://github.com/advisories/GHSA-9p5g-vg43-mj5r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36749'}
null
GHSA
GHSA-2c64-vj8g-vwrq
Incorrect handling of credential expiry by NATS Server
(This advisory is canonically https://advisories.nats.io/CVE/CVE-2020-26892.txt ) ## Problem Description NATS nats-server through 2020-10-07 has Incorrect Access Control because of how expired credentials are handled. The NATS accounts system has expiration timestamps on credentials; the <https://github.com/nats-io/jwt> library had an API which encouraged misuse and an `IsRevoked()` method which misused its own API. A new `IsClaimRevoked()` method has correct handling and the nats-server has been updated to use this. The old `IsRevoked()` method now always returns true and other client code will have to be updated to avoid calling it. The CVE identifier should cover any application using the old JWT API, where the nats-server is one of those applications. ## Affected versions #### JWT library * all versions prior to 1.1.0 * fixed after nats-io/jwt PR 103 landed (2020-10-06) #### NATS Server * Version 2 prior to 2.1.9 + 2.0.0 through and including 2.1.8 are vulnerable. * fixed with nats-io/nats-server PRs 1632, 1635, 1645 ## Impact Time-based credential expiry did not work. ## Workaround Have credentials which only expire after fixes can be deployed. ## Solution Upgrade the JWT dependency in any application using it. Upgrade the NATS server if using NATS Accounts.
null
2021-05-21T16:11:49Z
2021-05-21T16:11:49Z
HIGH
0
{'CWE-284'}
{'https://github.com/nats-io/nats-server/security/advisories/GHSA-2c64-vj8g-vwrq', 'https://github.com/advisories/GHSA-2c64-vj8g-vwrq'}
null
GHSA
GHSA-c9hq-g4q8-w893
Privilage Escalation in moodle
If the upload course tool in Moodle was used to delete an enrollment method which did not exist or was not already enabled, the tool would erroneously enable that enrollment method. This could lead to unintended users gaining access to the course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
{'CVE-2020-25701'}
2021-03-29T20:42:55Z
2021-03-29T20:42:55Z
MODERATE
5.3
{'CWE-863'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://github.com/advisories/GHSA-c9hq-g4q8-w893', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25701', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895432', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://moodle.org/mod/forum/discuss.php?d=413939'}
null
GHSA
GHSA-23jv-v6qj-3fhh
Denial of Service (DoS) in HashiCorp Consul
HashiCorp Consul and Consul Enterprise up to 1.6.2 HTTP/RPC services allowed unbounded resource usage, and were susceptible to unauthenticated denial of service. Fixed in 1.6.3.
{'CVE-2020-7219'}
2021-07-28T18:12:49Z
2021-05-18T18:19:21Z
HIGH
7.5
{'CWE-400', 'CWE-770'}
{'https://github.com/advisories/GHSA-23jv-v6qj-3fhh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7219', 'https://www.hashicorp.com/blog/category/consul/', 'https://github.com/hashicorp/consul/issues/7159'}
null
GHSA
GHSA-g4xq-jx4w-4cjv
Moderate severity vulnerability that affects loofah
In the Loofah gem for Ruby, through version 2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. Users are advised to upgrade to version 2.2.3. See https://github.com/flavorjones/loofah/issues/154 for more details.
{'CVE-2018-16468'}
2021-01-08T18:49:37Z
2018-11-01T14:46:01Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16468', 'https://github.com/flavorjones/loofah/issues/154', 'https://www.debian.org/security/2019/dsa-4364', 'https://github.com/advisories/GHSA-g4xq-jx4w-4cjv'}
null
GHSA
GHSA-4wm5-q7wv-6jx3
Downloads Resources over HTTP in bkjs-wand
Affected versions of `bkjs-wand` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `bkjs-wand`. ## Recommendation Update to version 0.3.2 or later.
{'CVE-2016-10571'}
2021-01-08T19:52:59Z
2019-02-18T23:52:20Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-4wm5-q7wv-6jx3', 'https://www.npmjs.com/advisories/220', 'https://nodesecurity.io/advisories/220', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10571'}
null
GHSA
GHSA-x2gw-85w6-fjjw
Cross-site scripting in demos/demo.mysqli.php in getID3
Cross-site scripting (XSS) vulnerability in demos/demo.mysqli.php in getID3 1.X and v2.0.0-beta allows remote attackers to inject arbitrary web script or HTML via the showtagfiles parameter.
{'CVE-2021-40926'}
2021-10-05T16:02:41Z
2021-10-04T20:13:55Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-x2gw-85w6-fjjw', 'https://github.com/JamesHeinrich/getID3/issues/341', 'https://github.com/JamesHeinrich/getID3', 'https://github.com/JamesHeinrich/getID3/pull/342', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40926', 'https://github.com/JamesHeinrich/getID3/releases/tag/v1.9.21'}
null
GHSA
GHSA-c8hm-7hpq-7jhg
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.
{'CVE-2018-19362'}
2021-06-10T23:51:27Z
2019-01-04T19:07:03Z
HIGH
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4452', 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://github.com/FasterXML/jackson-databind/issues/2186', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19362', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://github.com/advisories/GHSA-c8hm-7hpq-7jhg', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://issues.apache.org/jira/browse/TINKERPOP-2121', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1782', 'http://www.securityfocus.com/bid/107985', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}
null
GHSA
GHSA-r28m-g6j9-r2h5
Information Exposure vulnerability in Eclipse Jetty
In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windows is vulnerable to exposure of the fully qualified Base Resource directory name on Windows to a remote client when it is configured for showing a Listing of directory contents. This information reveal is restricted to only the content in the configured base resource directories.
{'CVE-2019-10246'}
2021-06-15T17:04:51Z
2019-04-23T16:07:18Z
MODERATE
5.3
{'CWE-200', 'CWE-213'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10246', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546576', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-r28m-g6j9-r2h5', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://security.netapp.com/advisory/ntap-20190509-0003/', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
GHSA
GHSA-x5x7-3v85-wpc4
Apache Struts allows entering a custom URL in a form field if built-in URLValidator is used
In Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12, if an application allows entering a URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. NOTE: this vulnerability exists because of an incomplete fix for S2-047 / CVE-2017-7672.
{'CVE-2017-9804'}
2022-04-26T19:02:52Z
2018-10-16T19:37:33Z
HIGH
7.5
{'CWE-20'}
{'https://security.netapp.com/advisory/ntap-20180629-0001/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9804', 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt', 'https://github.com/advisories/GHSA-x5x7-3v85-wpc4', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2', 'http://www.securitytracker.com/id/1039261', 'http://www.securityfocus.com/bid/100612', 'https://struts.apache.org/docs/s2-050.html'}
null
GHSA
GHSA-vqx7-pw4r-29rr
Out of bounds read in bumpalo
An issue was discovered in the bumpalo crate before 3.2.1 for Rust. The realloc feature allows the reading of unknown memory. Attackers can potentially read cryptographic keys.
{'CVE-2020-35861'}
2021-08-25T20:47:13Z
2021-08-25T20:47:13Z
HIGH
7.5
{'CWE-125'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0006.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35861', 'https://github.com/advisories/GHSA-vqx7-pw4r-29rr', 'https://github.com/fitzgen/bumpalo/issues/69'}
null
GHSA
GHSA-rqgx-hpg4-456r
Use-after-free in actix-codec
An issue was discovered in the actix-codec crate before 0.3.0-beta.1 for Rust. There is a use-after-free in Framed.
{'CVE-2020-35902'}
2021-08-25T20:49:45Z
2021-08-25T20:49:45Z
CRITICAL
9.8
{'CWE-416'}
{'https://github.com/actix/actix-net/issues/91', 'https://rustsec.org/advisories/RUSTSEC-2020-0049.html', 'https://github.com/advisories/GHSA-rqgx-hpg4-456r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35902'}
null
GHSA
GHSA-838r-hvwh-24h8
XML Injection in Any23
An XML external entity (XXE) injection vulnerability was discovered in the Any23 StreamUtils.java file and is known to affect Any23 versions < 2.5. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access.
{'CVE-2021-38555'}
2021-09-24T13:10:06Z
2021-09-13T20:06:31Z
CRITICAL
9.1
{'CWE-611'}
{'https://lists.apache.org/thread.html/r589d1a9f94dbeee7a0f5dbe8513a0e300dfe669bd964ba2fbfe28e07%40%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38555', 'https://github.com/advisories/GHSA-838r-hvwh-24h8'}
null
GHSA
GHSA-9w7f-m4j4-j3xw
Gerapy < 0.9.8 may cause remote code execution
### Impact project_configure function exist remote code execute in Gerapy < 0.9.8 ### Patches Patched in version 0.9.8, please install with: ``` pip3 install -U gerapy ```
{'CVE-2021-43857'}
2022-01-06T20:20:10Z
2022-01-06T17:36:38Z
HIGH
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-9w7f-m4j4-j3xw', 'https://github.com/Gerapy/Gerapy/commit/49bcb19be5e0320e7e1535f34fe00f16a3cf3b28', 'https://github.com/Gerapy/Gerapy/security/advisories/GHSA-9w7f-m4j4-j3xw', 'http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43857', 'https://github.com/Gerapy/Gerapy/issues/219'}
null
GHSA
GHSA-5r5r-6hpj-8gg9
Serialization gadget exploit in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).
{'CVE-2020-35728'}
2022-04-22T17:25:33Z
2021-12-09T19:15:24Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35728', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-5r5r-6hpj-8gg9', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://security.netapp.com/advisory/ntap-20210129-0007/', 'https://github.com/FasterXML/jackson-databind/issues/2999', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-mjvc-j6rv-9xj8
Insertion of Sensitive Information Into Debugging Code in Microweber
Microweber prior to 1.3 may expose sensitive information about a server and a user when running the server in debug mode.
{'CVE-2022-0721'}
2022-02-26T01:18:18Z
2022-02-24T00:00:54Z
HIGH
8.8
{'CWE-215'}
{'https://github.com/advisories/GHSA-mjvc-j6rv-9xj8', 'https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0721', 'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec'}
null
GHSA
GHSA-59r9-6jp6-jcm7
XSS vulnerability in GraphQL Playground from untrusted schemas
## GraphQL Playground introspection schema template injection attack: Advisory Statement This is a security advisory for an XSS vulnerability in `graphql-playground`. A similar vulnerability affects `graphiql`, the package from which `graphql-playground` was forked. There is a corresponding `graphiql` [advisory](https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8). - [1. Impact](#1-impact) - [2. Scope](#2-scope) - [3. Patches](#3-patches) - [4. Reproducing the exploit](#4-reproducing-the-exploit) - [5. Credit](#5-credit) - [6. For more information](#6-for-more-information) ### 1. Impact All versions of `graphql-playground-react` older than `graphql-playground-react@1.7.28` are vulnerable to compromised HTTP schema introspection responses or `schema` prop values with malicious GraphQL type names, exposing a dynamic XSS attack surface that can allow code injection on operation autocomplete. In order for the attack to take place, the user must load a malicious schema in `graphql-playground`. There are several ways this can occur, including by specifying the URL to a malicious schema in the `endpoint` query parameter. If a user clicks on a link to a GraphQL Playground installation that specifies a malicious server, arbitrary JavaScript can run in the user's browser, which can be used to exfiltrate user credentials or other harmful goals. ### 2. Scope This advisory describes the impact on the `graphql-playground-react` package. The vulnerability also affects `graphiql`, the package from which `graphql-playground` was forked, with a less severe impact; see the [`graphiql` advisory](https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8) for details. It affects all versions of `graphql-playground-react` older than `v1.7.28`. This vulnerability was introduced with the first public release of `graphql-playground`, so it impacts both the original legacy `graphql-playground` and the contemporary `graphql-playground-react` npm package. It is most easily exploited on `graphql-playground-react@1.7.0` and newer, as that release added functionality which made it possible to override the endpoint URL via query parameter even if it is explicitly specified in the code. `graphql-playground-react` is commonly loaded via the `graphql-playground-html` package or a middleware package that wraps it (`graphql-playground-express`, `graphql-playground-middleware-koa`, `graphql-playground-middleware-hapi`, or `graphql-playground-middleware-lambda`). By default, these packages render an HTML page which loads the *latest* version of `graphql-playground-react` through a CDN. If you are using one of these packages to install GraphQL Playground on your domain *and you do not explicitly pass the `version` option to `renderPlaygroundPage` or the middleware function*, then you do not need to take any action to resolve this vulnerability, as the latest version of the React app will automatically be loaded. `graphql-playground-react` is also commonly loaded via HTML served by Apollo Server. Apollo Server always pins a specific version of `graphql-playground-react`, so if you are using Apollo Server you do need to take action to resolve this vulnerability. See the [Apollo Server advisory](https://github.com/apollographql/apollo-server/security/advisories/GHSA-qm7x-rc44-rrqw) for details. ### 3. Patches `graphql-playground-react@1.7.28` addresses this issue via defense in depth: - **HTML-escaping text** that should be treated as text rather than HTML. In most of the app, this happens automatically because React escapes all interpolated text by default. However, one vulnerable component uses the unsafe `innerHTML` API and interpolated type names directly into HTML. We now properly escape that type name, which fixes the known vulnerability. - **Validates the schema** upon receiving the introspection response or schema changes. Schemas with names that violate the GraphQL spec will no longer be loaded. (This includes preventing the Doc Explorer from loading.) This change is also sufficient to fix the known vulnerability. - **Ensuring that user-generated HTML is safe**. Schemas can contain Markdown in `description` and `deprecationReason` fields, and the web app renders them to HTML using the `markdown-it` library. Prior to `graphql-playground-react@1.7.28`, GraphQL Playground used two separate libraries to render Markdown: `markdown-it` and `marked`. As part of the development of `graphql-playground-react@1.7.28`, we verified that our use of `markdown-it` prevents the inclusion of arbitrary HTML. We use `markdown-it` without setting `html: true`, so we are comfortable relying on [`markdown-it`'s HTML escaping](https://github.com/markdown-it/markdown-it/blob/master/docs/security.md) here. We considered running a second level of sanitization over all rendered Markdown using a library such as `dompurify` but believe that is unnecessary as `markdown-it`'s sanitization appears to be adequate. `graphiql@1.4.3` does update to the latest version of `markdown-it` (v12, from v10) so that any security fixes in v11 and v12 will take effect. On the other hand, [`marked`](https://github.com/markedjs/marked) recommends the use of a separate HTML sanitizer if its input is untrusted. In this release, we switch the one component which uses `marked` to use `markdown-it` like the rest of the app. **If you are using `graphql-playground-react` directly in your client app**, upgrade to version 1.7.28 or later. **If you are using `graphql-playground-html` or a package which starts with `graphql-playground-middleware-` in your server** and you are passing the `version` option to a function imported from that package, change that `version` option to be at least `"1.7.28"`. **If you are using `graphql-playground-html` or a package which starts with `graphql-playground-middleware-` in your server** and you are **NOT** passing the `version` option to a function imported from that package, no action is necessary; your app automatically loads the latest version of `graphql-playground-react` from CDN. ### 4. Reproducing the exploit We are hosting a "malicious" server at https://graphql-xss-schema.netlify.app/graphql . This server has a hard-coded introspection result that includes unsafe HTML in type names. If you manually change a GraphQL Playground installation to use that endpoint, clear the operation pane, and type `{x` into the operation pane, an alert will pop up; this demonstrates execution of code provided by the malicious server. An URL like https://YOUR-PLAYGROUND-SERVER/?endpoint=https%3A%2F%2Fgraphql-xss-schema.netlify.app%2Fgraphql&query=%7B will load already configured with the endpoint in question. (This URL-based exploit works on `graphql-playground-react@1.7.0` and newer; older versions may be protected from this particular URL-based exploit depending on their configuration.) ### 5. Credit This vulnerability was discovered by [@Ry0taK](https://github.com/Ry0taK), thank you! :1st_place_medal: Others who contributed: - extensive help from [@glasser](https://github.com/glasser) at [Apollo](https://github.com/apollographql) - [@acao](https://github.com/acao) - [@imolorhe](https://github.com/imolorhe) - [@divyenduz](https://github.com/divyenduz) - [@dotansimha](https://github.com/dotansimha) - [@timsuchanek](http://github.com/timsuchanek) - [@benjie](https://github.com/Ry0taK) and many others who provided morale support ### 6. For more information If you have any questions or comments about this advisory: - The `graphiql` advisory document contains [more information](https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability) about how both the client-side and server-side vulnerabilities work - Open an issue in the [graphql-playground repo](https://github.com/graphql/graphql-playground/new/issues)
{'CVE-2021-41249'}
2022-04-19T19:03:03Z
2021-11-08T18:06:09Z
HIGH
7.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-59r9-6jp6-jcm7', 'https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability', 'https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7', 'https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad', 'https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41249'}
null