ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-phph-xpj4-wvcv | Cross-Site Scripting in hexo-admin | All versions of `hexo-admin` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize rendered markdown, allowing attackers to execute arbitrary JavaScript in a victim's browser if they are able to create new posts.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-09-29T18:51:18Z | 2020-09-03T21:13:07Z | HIGH | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/1211', 'https://github.com/advisories/GHSA-phph-xpj4-wvcv', 'https://github.com/jaredly/hexo-admin/issues/185'} | null |
GHSA | GHSA-32m2-9f76-4gv8 | Business Logic Errors in SilverStripe Framework | SilverStripe Framework prior to version 4.10.1 is vulnerable to business logic errors. | {'CVE-2022-0227'} | 2022-02-11T20:51:41Z | 2022-02-06T00:01:01Z | MODERATE | 4.3 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0227', 'https://github.com/advisories/GHSA-32m2-9f76-4gv8', 'https://huntr.dev/bounties/35631e3a-f4b9-41ad-857c-7e3021932a72', 'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'} | null |
GHSA | GHSA-3w67-q784-6w7c | Division by zero in TFLite's implementation of `GatherNd` | ### Impact
The reference implementation of the `GatherNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/reference_ops.h#L966):
```cc
ret.dims_to_count[i] = remain_flat_size / params_shape.Dims(i);
```
An attacker can craft a model such that `params` input would be an empty tensor. In turn, `params_shape.Dims(.)` would be zero, in at least one dimension.
### Patches
We have patched the issue in GitHub commit [8e45822aa0b9f5df4b4c64f221e64dc930a70a9d](https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29589'} | 2021-05-21T14:26:51Z | 2021-05-21T14:26:51Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3w67-q784-6w7c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29589', 'https://github.com/advisories/GHSA-3w67-q784-6w7c'} | null |
GHSA | GHSA-mgh5-4h95-qj4p | Information Exposure in Snyk Broker | All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG. | {'CVE-2020-7654'} | 2021-07-29T17:51:24Z | 2020-06-03T22:02:14Z | HIGH | 7.5 | {'CWE-532'} | {'https://github.com/advisories/GHSA-mgh5-4h95-qj4p', 'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7654', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570613'} | null |
GHSA | GHSA-cf4q-4cqr-7g7w | SVG with embedded scripts can lead to cross-site scripting attacks in xml2rfc | xml2rfc allows `script` elements in SVG sources.
In HTML output having these script elements can lead to XSS attacks.
Sample XML snippet:
```
<artwork type="svg" src="data:image/svg+xml,%3Csvg viewBox='0 0 10 10' xmlns='http://www.w3.org/2000/svg'%3E%3Cscript%3E window.alert('Test Alert'); %3C/script%3E%3C/svg%3E">
</artwork>
```
### Impact
This vulnerability impacts website that publish HTML drafts and RFCs.
### Patches
This has been fixed in version [3.12.4](https://github.com/ietf-tools/xml2rfc/releases/tag/v3.12.4).
### Workarounds
If SVG source is self-contained within the XML, scraping `script` elements from SVG files.
### References
* https://developer.mozilla.org/en-US/docs/Web/SVG/Element/script
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [xml2rfc](https://github.com/ietf-tools/xml2rfc/)
* Email us at [operational-vulnerability@ietf.org](mailto:operational-vulnerability@ietf.org)
* [Infrastructure and Services Vulnerability Disclosure](https://www.ietf.org/about/administration/policies-procedures/vulnerability-disclosure/)
| null | 2022-04-22T20:25:55Z | 2022-04-22T20:25:53Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-cf4q-4cqr-7g7w', 'https://github.com/ietf-tools/xml2rfc/security/advisories/GHSA-cf4q-4cqr-7g7w'} | null |
GHSA | GHSA-43vf-2x6g-p2m5 | Malicious Package in browserift | Version 16.3.3 of `browserift` contained malicious code as a preinstall script. The package was a backdoor that opened a connection to a remote server and executed incoming commands on both Unix and Windows machines
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T21:37:55Z | 2020-09-02T21:33:26Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/900', 'https://github.com/advisories/GHSA-43vf-2x6g-p2m5'} | null |
GHSA | GHSA-qq97-vm5h-rrhg | OCI Manifest Type Confusion Issue | ### Impact
Systems that rely on digest equivalence for image attestations may be vulnerable to type confusion.
### Patches
Upgrade to at least `v2.8.0-beta.1` if you are running `v2.x` release. If you use the code from the `main` branch, update at least to the commit after [b59a6f827947f9e0e67df0cfb571046de4733586](https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586).
### Workarounds
There is no way to work around this issue without patching.
### References
Due to [an oversight in the OCI Image Specification](https://github.com/opencontainers/image-spec/pull/411) that removed the embedded `mediaType` field from manifests, a maliciously crafted OCI Container Image can cause registry clients to parse the same image in two different ways without modifying the image’s digest by modifying the `Content-Type` header returned by a registry. This can invalidate a common pattern of relying on container image digests for equivalence.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [distribution](https://github.com/distribution/distribution)
* Open an issue in [distribution-spec](https://github.com/opencontainers/distribution-spec)
* Email us at [cncf-distribution-security@lists.cncf.io](mailto:cncf-distribution-security@lists.cncf.io)
| null | 2022-04-19T19:03:14Z | 2022-02-08T18:53:56Z | LOW | 3 | {'CWE-843'} | {'https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586', 'https://github.com/advisories/GHSA-qq97-vm5h-rrhg', 'https://github.com/distribution/distribution/security/advisories/GHSA-qq97-vm5h-rrhg', 'https://github.com/opencontainers/image-spec/pull/411'} | null |
GHSA | GHSA-j3f7-7rmc-6wqj | Improper certificate management in AWS IoT Device SDK v2 | The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to address this behavior. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.7.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.14.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.6.0 on macOS. Amazon Web Services AWS-C-IO 0.10.7 on macOS. | {'CVE-2021-40831'} | 2021-12-03T15:22:23Z | 2021-11-24T20:35:03Z | MODERATE | 6.3 | {'CWE-295'} | {'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/advisories/GHSA-j3f7-7rmc-6wqj', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/awslabs/aws-c-io/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40831'} | null |
GHSA | GHSA-j6px-jwvv-vpwq | Angular Expressions - Remote Code Execution | ### Impact
The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input.
This time, the security of the package could be bypassed by using a more complex payload, using a `.constructor.constructor` technique.
* If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput).
* If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution.
### Patches
Users should upgrade to version 1.1.2 of angular-expressions
### Workarounds
A temporary workaround might be either to :
* disable user-controlled input that will be fed into angular-expressions in your application
OR
* allow only following characters in the userControlledInput :
```js
if (/^[|a-zA-Z.0-9 :"'+-?]+$/.test(userControlledInput)) {
var result = expressions.compile(userControlledInput);
}
else {
result = undefined;
}
```
### References
[Removal of angular-expression sandbox](http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [angular-expressions](https://github.com/peerigon/angular-expressions/issues)
* [Email us](mailto:contact@javascript-ninja.fr)
### Credits
The issue was reported by Maxime Nadeau from GoSecure, Inc. | {'CVE-2021-21277'} | 2021-02-02T15:23:09Z | 2021-02-01T15:01:26Z | LOW | 0 | {'CWE-74'} | {'https://github.com/peerigon/angular-expressions/commit/07edb62902b1f6127b3dcc013da61c6316dd0bf1', 'https://www.npmjs.com/package/angular-expressions', 'https://github.com/advisories/GHSA-j6px-jwvv-vpwq', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html', 'https://github.com/peerigon/angular-expressions/security/advisories/GHSA-j6px-jwvv-vpwq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21277'} | null |
GHSA | GHSA-v8g7-9qv2-j865 | Malicious Package in bitcoin-osp | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:42:19Z | 2020-09-04T16:38:55Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1365', 'https://github.com/advisories/GHSA-v8g7-9qv2-j865'} | null |
GHSA | GHSA-4hj2-r2pm-3hc6 | Incorrect Default Permissions in CRI-O | ### Impact
A bug was found in CRI-O where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted.
This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.
### Patches
This bug will been fixed in the following versions of CRI-O:
- v1.24.0
Users should update to the version corresponding to their minor release as soon as possible. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset.
This fix changes CRI-O behavior such that containers are started with a more typical Linux environment. Refer to `capabilities(7)` for a description of how capabilities work. Note that permitted file capabilities continue to allow for privileges to be raised up to the container's bounding set and that processes may add capabilities to their own inheritable set up to the container's bounding set per the rules described in the manual page. In all cases the container's bounding set provides an upper bound on the capabilities that can be assumed and provides for the container security sandbox.
### Workarounds
The entrypoint of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting.
### Credits
CRI-O would like to thank [Andrew G. Morgan](https://github.com/AndrewGMorgan) for responsibly disclosing this issue, as well as the Moby (Docker Engine) project for working with the other container engines in coordinating a fix.
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/cri-o/cri-o/issues/new)
* Email us at [cncf-crio-security@lists.cncf.io](cncf-crio-security@lists.cncf.io) if you think you’ve found a security bug
------------------
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.8/Medium
|Metric |Value |Comments |
|--- |--- |--- |
|Attack Vector (AV) |Local |An attacker requires local control to launch a container with files that have inheritable capabilities. |
|Attack Complexity (AC) |Low |Modifying a file to have inheritable capabilities is not difficult. |
|Privileges Required (PR) |Low |An attacker requires enough privilege to cause a container to be launched with a compromised image. Moby's API is typically bound to a local Unix domain socket and requires calls to be made from a process that is either UID 0 or present in the configured group. |
|User Interaction (UI) |Required |An attacker must cause the compromised image to be run. |
|Scope (S) |Unchanged |The container boundary set by Moby, including the bounding capability set, is not modified. A successful attack gains access to privileges and resources within the boundary, not outside of it. |
|Confidentiality (C) |Low |An attacker may gain access to some confidential information through elevation of CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FOWNER, CAP_SETFCAP, or CAP_SETPCAP, but the exposed information is limited to that which is already inside the container. |
|Integrity (I) |Low |An attacker may be able to tamper with data inside the container through elevation of CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FOWNER, CAP_SETFCAP, or CAP_SETPCAP, or spoof packets with CAP_NET_RAW, but the tampered data is limited to that which is already inside the container. |
|Availability (A) |Low |An attacker may be able to affect the availability of an application running inside the container through elevation of CAP_KILL or CAP_NET_RAW, or may be able to affect availability through tampering with file dependencies. |
| {'CVE-2022-27652'} | 2022-04-22T20:42:46Z | 2022-04-22T20:42:46Z | MODERATE | 4.8 | {'CWE-276'} | {'https://github.com/advisories/GHSA-4hj2-r2pm-3hc6', 'https://bugzilla.redhat.com/show_bug.cgi?id=2066839', 'https://github.com/cri-o/cri-o/security/advisories/GHSA-4hj2-r2pm-3hc6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27652'} | null |
GHSA | GHSA-v6gv-fg46-h89j | Sensitive Data Exposure in put | All versions of `put` are vulnerable to Uninitialized Memory Exposure. The package incorrectly calculates the allocated Buffer size and does not trim the bytes written, which may allow attackers to access uninitialized memory containing sensitive data. This vulnerability only affects versions of Node.js <=6.x.
## Recommendation
Upgrade your Node.js version or consider using an alternative package. | null | 2021-09-28T17:06:31Z | 2020-09-03T16:48:36Z | LOW | 0 | {'CWE-200'} | {'https://hackerone.com/reports/321702', 'https://www.npmjs.com/advisories/1007', 'https://github.com/advisories/GHSA-v6gv-fg46-h89j'} | null |
GHSA | GHSA-7x92-2j68-h32c | Directory Traversal in featurebook | Affected versions of `featurebook` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
The `featurebook` package is not intended to be run in production code nor to be exposed to an untrusted network.
## Proof of Concept
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No direct patch is currently available.
At this time, the best mitigation is to ensure that `featurebook` is not running in production or exposed to an untrusted network. | null | 2021-09-23T21:48:31Z | 2020-09-01T19:03:02Z | MODERATE | 0 | {'CWE-22'} | {'https://hackerone.com/reports/296305', 'https://github.com/advisories/GHSA-7x92-2j68-h32c', 'https://www.npmjs.com/advisories/556'} | null |
GHSA | GHSA-7rq6-7gv8-c37h | Missing Authorization with Default Settings in Dashboard UI | Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, `LocalRequestsOnlyAuthorizationFilter` filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings.
However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed.
### Impact
Missing authorization when default options are used for the Dashboard UI, e.g. when no custom authorization rules are used as recommended in the [Using Dashboard](https://docs.hangfire.io/en/latest/configuration/using-dashboard.html#configuring-authorization) documentation article.
#### Impacted
If you are using `UseHangfireDashboard` method with default `DashboardOptions.Authorization` property value, then your installation is impacted:
```csharp
app.UseHangfireDashboard(); // Impacted
app.UseHangfireDashboard("/hangfire", new DashboardOptions()); // Impacted
```
#### Not Impacted
If any other authorization filter is specified in the `DashboardOptions.Authorization` property, the you are not impacted:
```csharp
app.UseHangfireDashboard("/hangfire", new DashboardOptions
{
Authorization = new []{ new SomeAuthorizationFilter(); } // Not impacted
});
```
### Patches
Patch is already available in version [1.7.26](https://github.com/HangfireIO/Hangfire/releases/tag/v1.7.26) and already available on NuGet.org, please see [Hangfire.Core 1.7.26](https://www.nuget.org/packages/Hangfire.Core/1.7.26). Default authorization rules now prohibit remote requests by default again by including the `LocalRequestsOnlyAuthorizationFilter` filter to the default settings. Please upgrade to the newest version in order to mitigate the issue.
### Workarounds
It is possible to fix the issue by using the `LocalRequestsOnlyAuthorizationFilter` explicitly when configuring the Dashboard UI. In this case upgrade is not required.
```csharp
// using Hangfire.Dashboard;
app.UseHangfireDashboard("/hangfire", new DashboardOptions
{
Authorization = new []{ new LocalRequestsOnlyAuthorizationFilter(); }
});
```
### References
Original GitHub Issue: https://github.com/HangfireIO/Hangfire/issues/1958 | {'CVE-2021-41238'} | 2021-11-03T17:32:45Z | 2021-11-03T17:30:59Z | HIGH | 8.6 | {'CWE-862'} | {'https://www.nuget.org/packages/Hangfire.Core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41238', 'https://github.com/HangfireIO/Hangfire/security/advisories/GHSA-7rq6-7gv8-c37h', 'https://github.com/advisories/GHSA-7rq6-7gv8-c37h', 'https://github.com/HangfireIO/Hangfire/issues/1958'} | null |
GHSA | GHSA-9h36-4jf2-hx53 | High severity vulnerability that affects extlib | The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. | {'CVE-2013-1802'} | 2021-09-07T21:40:42Z | 2017-10-24T18:33:37Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-9h36-4jf2-hx53', 'https://bugzilla.redhat.com/show_bug.cgi?id=917233', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1802', 'https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5'} | null |
GHSA | GHSA-72fg-jqhx-c68p | Open Redirect in st | st is a module for serving static files.
An attacker is able to craft a request that results in an `HTTP 301` (redirect) to an entirely different domain.
A request for: `http://some.server.com//nodesecurity.org/%2e%2e` would result in a 301 to `//nodesecurity.org/%2e%2e` which most browsers treat as a proper redirect as `//` is translated into the current schema being used.
Mitigating factor:
In order for this to work, `st` must be serving from the root of a server (`/`) rather than the typical sub directory (`/static/`) and the redirect URL will end with some form of URL encoded `..` ("%2e%2e", "%2e.", ".%2e").
Code example (provided by Xin Gao):
[example.js]
```
var st = require('st')
var http = require('http')
http.createServer(st(process.cwd())).listen(1337)
```
```
$ curl -v http://localhost:1337//cve.mitre.com/%2e%2e
* Trying ::1...
* TCP_NODELAY set
* Connected to localhost (::1) port 1337 (#0)
> GET //cve.mitre.com/%2e%2e HTTP/1.1
> Host: localhost:1337
> User-Agent: curl/7.54.0
> Accept: */*
>
< HTTP/1.1 301 Moved Permanently
< cache-control: public, max-age=600
< last-modified: Fri, 13 Oct 2017 22:56:33 GMT
< etag: "16777220-46488904-1507935393000"
< location: //cve.mitre.com/%2e%2e/
< Date: Fri, 13 Oct 2017 22:56:41 GMT
< Connection: keep-alive
< Content-Length: 30
<
* Connection #0 to host localhost left intact
```
## Recommendation
Update to version 1.2.2 or later. | {'CVE-2017-16224'} | 2021-01-08T19:19:20Z | 2018-08-06T21:33:31Z | MODERATE | 0 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16224', 'https://www.npmjs.com/advisories/547', 'https://nodesecurity.io/advisories/547', 'https://github.com/advisories/GHSA-72fg-jqhx-c68p'} | null |
GHSA | GHSA-xmjj-3c76-5w84 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in directus | ### Impact
Unauthorized JavaScript can be executed by inserting an iframe into the rich text html interface that links to a file uploaded HTML file that loads another uploaded JS file in its script tag. This satisfies the regular content security policy header, which in turn allows the file to run any arbitrary JS.
### Patches
This was resolved in https://github.com/directus/directus/pull/12020 which is released in 9.7.0
### Workarounds
You can disable the live embed in the WYSIWYG by adding `{ "media_live_embeds": false }` to the _Options Overrides_ option of the Rich Text HTML interface.
### References
https://github.com/directus/directus/pull/12020
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [directus/directus](https://github.com/directus/directus)
* Email us at [security@directus.io](mailto:security@directus.io)
| {'CVE-2022-24814'} | 2022-04-06T18:47:51Z | 2022-04-05T18:30:15Z | HIGH | 8.8 | {'CWE-79'} | {'https://github.com/advisories/GHSA-xmjj-3c76-5w84', 'https://github.com/directus/directus/pull/12020', 'https://github.com/directus/directus/security/advisories/GHSA-xmjj-3c76-5w84', 'https://github.com/directus/directus/releases/tag/v9.7.0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24814'} | null |
GHSA | GHSA-6mrq-7r7m-hh4p | Malicious Package in hs-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-30T16:21:59Z | 2020-09-03T22:52:58Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1275', 'https://github.com/advisories/GHSA-6mrq-7r7m-hh4p'} | null |
GHSA | GHSA-cmwx-9m2h-x7v4 | Ansible apt_key module does not properly verify key fingerprint | A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key. | {'CVE-2016-8614'} | 2022-04-26T18:41:33Z | 2018-10-10T17:23:26Z | HIGH | 7.5 | {'CWE-358'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-8614', 'https://github.com/advisories/GHSA-cmwx-9m2h-x7v4'} | null |
GHSA | GHSA-x345-32rc-8h85 | Denial of service attack via push rule patterns in matrix-synapse | ### Impact
"Push rules" can specify [conditions](https://matrix.org/docs/spec/client_server/r0.6.1#conditions) under which they will match, including `event_match`, which matches event content against a pattern including wildcards.
Certain patterns can cause very poor performance in the matching engine, leading to a denial-of-service when processing moderate length events.
### Patches
The issue is patched by https://github.com/matrix-org/synapse/commit/03318a766cac9f8b053db2214d9c332a977d226c.
### Workarounds
A potential workaround might be to prevent users from making custom push rules, by blocking such requests at a reverse-proxy.
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org. | {'CVE-2021-29471'} | 2022-04-07T15:09:54Z | 2021-05-13T20:22:51Z | LOW | 3.7 | {'CWE-331', 'CWE-400'} | {'https://github.com/matrix-org/synapse/commit/03318a766cac9f8b053db2214d9c332a977d226c', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-x345-32rc-8h85', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29471', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/advisories/GHSA-x345-32rc-8h85', 'https://github.com/matrix-org/synapse/releases/tag/v1.33.2'} | null |
GHSA | GHSA-jp32-vmm6-3vf5 | Directory Traversal in Kubernetes | Directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0, allows attackers to write to arbitrary files via a crafted object type name, which is not properly handled before passing it to etcd. | {'CVE-2015-5305'} | 2022-04-12T22:38:09Z | 2022-02-15T01:57:18Z | MODERATE | 6.5 | {'CWE-22'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1273969', 'https://access.redhat.com/errata/RHSA-2015:1945', 'https://github.com/kubernetes/kubernetes/commit/68f2add9bd5d43b9da1424d87d88f83d120e17d0', 'https://github.com/advisories/GHSA-jp32-vmm6-3vf5', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5305', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5305'} | null |
GHSA | GHSA-gjxw-5w2q-7grf | Moderate severity vulnerability that affects rails | Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs. | {'CVE-2010-3933'} | 2021-09-10T22:04:03Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-20'} | {'http://securitytracker.com/id?1024624', 'https://github.com/advisories/GHSA-gjxw-5w2q-7grf', 'https://nvd.nist.gov/vuln/detail/CVE-2010-3933', 'http://www.vupen.com/english/advisories/2010/2719', 'http://secunia.com/advisories/41930', 'http://weblog.rubyonrails.org/2010/10/15/security-vulnerability-in-nested-attributes-code-in-ruby-on-rails-2-3-9-and-3-0-0'} | null |
GHSA | GHSA-j24p-r6wx-r79w | High severity vulnerability that affects thin | lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header. | {'CVE-2009-3287'} | 2021-09-14T18:09:45Z | 2017-10-24T18:33:38Z | HIGH | 0 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2009-3287', 'http://github.com/macournoyer/thin/blob/master/CHANGELOG', 'http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a', 'https://github.com/advisories/GHSA-j24p-r6wx-r79w', 'http://www.openwall.com/lists/oss-security/2009/09/12/1'} | null |
GHSA | GHSA-jvg4-9rc2-wvcr | Generation of fake documents via public GET-call | ### Impact
Generation of fake documents via public GET-call
### Patches
We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021 | null | 2021-09-27T21:00:30Z | 2021-02-10T02:32:07Z | LOW | 0 | {'CWE-862'} | {'https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351', 'https://github.com/shopware/platform/security/advisories/GHSA-jvg4-9rc2-wvcr', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021', 'https://github.com/advisories/GHSA-jvg4-9rc2-wvcr', 'https://packagist.org/packages/shopware/platform'} | null |
GHSA | GHSA-8wf2-3ggj-78q9 | Improper Authentication in phpmyadmin | An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances. | {'CVE-2022-23807'} | 2022-01-28T22:44:40Z | 2022-01-28T22:44:40Z | MODERATE | 4.3 | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23807', 'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32', 'https://www.phpmyadmin.net/security/PMASA-2022-1/', 'https://github.com/advisories/GHSA-8wf2-3ggj-78q9'} | null |
GHSA | GHSA-9cq3-fj2h-ggj5 | Vulnerability in remove function leads to arbitrary code execution via filePath parameters | Aaptjs is a node wraper for aapt. An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | {'CVE-2020-36379'} | 2022-05-05T13:48:10Z | 2021-11-02T15:42:31Z | CRITICAL | 9.8 | {'CWE-77', 'CWE-78'} | {'https://github.com/advisories/GHSA-9cq3-fj2h-ggj5', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36379'} | null |
GHSA | GHSA-g8wg-cjwc-xhhp | Heap OOB in nested `tf.map_fn` with `RaggedTensor`s | ### Impact
It is possible to nest a `tf.map_fn` within another `tf.map_fn` call. However, if the input tensor is a `RaggedTensor` and there is no function signature provided, code assumes the output is a fully specified tensor and fills output buffer with uninitialized contents from the heap:
```python
import tensorflow as tf
x = tf.ragged.constant([[1,2,3], [4,5], [6]])
t = tf.map_fn(lambda r: tf.map_fn(lambda y: r, r), x)
z = tf.ragged.constant([[[1,2,3],[1,2,3],[1,2,3]],[[4,5],[4,5]],[[6]]])
```
The `t` and `z` outputs should be identical, however this is not the case. The last row of `t` contains data from the heap which can be used to leak other memory information.
The bug lies in the conversion from a `Variant` tensor to a `RaggedTensor`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/ragged_tensor_from_variant_op.cc#L177-L190) does not check that all inner shapes match and this results in the additional dimensions in the above example.
The same implementation can result in data loss, if input tensor is tweaked:
```python
import tensorflow as tf
x = tf.ragged.constant([[1,2], [3,4,5], [6]])
t = tf.map_fn(lambda r: tf.map_fn(lambda y: r, r), x)
```
Here, the output tensor will only have 2 elements for each inner dimension.
### Patches
We have patched the issue in GitHub commit [4e2565483d0ffcadc719bd44893fb7f609bb5f12](https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Haris Sahovic. | {'CVE-2021-37679'} | 2021-08-25T14:41:00Z | 2021-08-25T14:41:00Z | HIGH | 7.1 | {'CWE-681', 'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37679', 'https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12', 'https://github.com/advisories/GHSA-g8wg-cjwc-xhhp', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g8wg-cjwc-xhhp'} | null |
GHSA | GHSA-4xww-6h7v-29jg | User enumeration in livehelperchat | livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information. There is an observable discrepancy between errors generated for users that exist and those that do not. | {'CVE-2022-0083'} | 2022-01-21T23:37:07Z | 2022-01-21T23:37:07Z | MODERATE | 0 | {'CWE-209'} | {'https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0083', 'https://github.com/advisories/GHSA-4xww-6h7v-29jg', 'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'} | null |
GHSA | GHSA-9w6v-m7wp-jwg4 | Http request which redirect to another hostname do not strip authorization header in @actions/http-client | ### Impact
If consumers of the http-client:
1. make an http request with an authorization header
2. that request leads to a redirect (302) and
3. the redirect url redirects to another domain or hostname
The authorization header will get passed to the other domain.
Note that since this library is for actions, the GITHUB_TOKEN that is available in actions is generated and scoped per job with [these permissions](https://help.github.com/en/actions/configuring-and-managing-workflows/authenticating-with-the-github_token#permissions-for-the-github_token).
### Patches
The problem is fixed in 1.0.8 at [npm here](https://www.npmjs.com/package/@actions/http-client). In 1.0.8, the authorization header is stripped before making the redirected request if the hostname is different.
### Workarounds
None.
### References
https://github.com/actions/http-client/pull/27
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/actions/http-client/issues | {'CVE-2020-11021'} | 2021-08-25T21:03:12Z | 2020-04-29T17:58:53Z | MODERATE | 6.3 | {'CWE-200'} | {'https://github.com/actions/http-client/security/advisories/GHSA-9w6v-m7wp-jwg4', 'https://github.com/advisories/GHSA-9w6v-m7wp-jwg4', 'https://github.com/actions/http-client/pull/27', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11021', 'https://github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53a'} | null |
GHSA | GHSA-77xq-cpvg-7xm2 | Prototype pollution in @tsed/core | "This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program." | {'CVE-2020-7748'} | 2021-08-02T15:31:01Z | 2021-05-10T19:07:56Z | MODERATE | 5.6 | {'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7748', 'https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b', 'https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36', 'https://github.com/advisories/GHSA-77xq-cpvg-7xm2', 'https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382'} | null |
GHSA | GHSA-xgpf-p52j-pf7m | XSS in CreateQueuedJobTask | A vulnerability has been identified in the Silverstripe CMS 3 and 4 version of the symbiote/silverstripe-queuedjobs module. A Cross Site Scripting vulnerability allows an attacker to inject an arbitrary payload in the CreateQueuedJobTask dev task via a specially crafted URL. | {'CVE-2021-27938'} | 2021-03-24T17:42:02Z | 2021-03-24T17:42:02Z | MODERATE | 0 | {'CWE-79'} | {'https://www.silverstripe.org/download/security-releases/cve-2021-27938', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27938', 'https://github.com/symbiote/silverstripe-queuedjobs/releases', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symbiote/silverstripe-queuedjobs/CVE-2021-27938.yaml', 'https://github.com/advisories/GHSA-xgpf-p52j-pf7m'} | null |
GHSA | GHSA-c9qf-r67m-p7cg | Null pointer dereference in `CompressElement` | ### Impact
It is possible to trigger a null pointer dereference in TensorFlow by passing an invalid input to `tf.raw_ops.CompressElement`:
```python
import tensorflow as tf
tf.raw_ops.CompressElement(components=[[]])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/data/compression_utils.cc#L34) was accessing the size of a buffer obtained from the return of a separate function call before validating that said buffer is valid.
### Patches
We have patched the issue in GitHub commit [5dc7f6981fdaf74c8c5be41f393df705841fb7c5](https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. Concurrently, it was resolved in `master` branch as it was also discovered internally and fixed before the report was handled. | {'CVE-2021-37637'} | 2021-08-25T14:44:12Z | 2021-08-25T14:44:12Z | HIGH | 7.7 | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9qf-r67m-p7cg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37637', 'https://github.com/advisories/GHSA-c9qf-r67m-p7cg'} | null |
GHSA | GHSA-3cgf-9m6x-pwwr | Data races in rusqlite | An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via UnlockNotification. | {'CVE-2020-35868'} | 2021-08-25T20:47:50Z | 2021-08-25T20:47:50Z | CRITICAL | 9.8 | {'CWE-362'} | {'https://github.com/advisories/GHSA-3cgf-9m6x-pwwr', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35868', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://github.com/rusqlite/rusqlite/commit/45fd77ee43c38eea4d6f4e2e56c1667a55ec654f'} | null |
GHSA | GHSA-x7jg-6pwg-fx5h | HTTP Smuggling via Transfer-Encoding Header in Puma | ### Impact
By using an invalid transfer-encoding header, an attacker could [smuggle an HTTP response.](https://portswigger.net/web-security/request-smuggling)
Originally reported by @ZeddYu, who has our thanks for the detailed report.
### Patches
The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Puma](https://github.com/puma/puma)
* See our [security policy](https://github.com/puma/puma/security/policy) | {'CVE-2020-11076'} | 2022-04-19T19:02:26Z | 2020-05-22T14:55:05Z | HIGH | 7.5 | {'CWE-444'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html', 'https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html', 'https://github.com/advisories/GHSA-x7jg-6pwg-fx5h', 'https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22', 'https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11076'} | null |
GHSA | GHSA-c32g-2mgr-cfq7 | Out-of-bounds Write in iText | iText v7.1.17 was discovered to contain a stack-based buffer overflow via the component ByteBuffer.append, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. | {'CVE-2022-24197'} | 2022-04-17T17:02:19Z | 2022-02-02T00:01:45Z | MODERATE | 6.5 | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24197', 'https://github.com/itext/itext7/pull/78#issuecomment-1089282165', 'https://github.com/advisories/GHSA-c32g-2mgr-cfq7', 'https://github.com/itext/itext7/pull/78'} | null |
GHSA | GHSA-rjvg-q57v-mjjc | XSS in Apache Airflow | In Apache Airflow before 1.10.5 when running with the "classic" UI, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. The new "RBAC" UI is unaffected. | {'CVE-2019-12398'} | 2021-08-25T21:05:59Z | 2020-05-06T19:51:02Z | MODERATE | 4.8 | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2020/01/14/2', 'https://lists.apache.org/thread.html/r72487ad6b23d18689896962782f8c93032afe5c72a6bfd23b253352b@%3Cdev.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r72487ad6b23d18689896962782f8c93032afe5c72a6bfd23b253352b%40%3Cusers.airflow.apache.org%3E', 'https://github.com/apache/airflow/blob/1.10.5/CHANGELOG.txt', 'https://github.com/advisories/GHSA-rjvg-q57v-mjjc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12398'} | null |
GHSA | GHSA-5wrh-4jwv-5w78 | Open redirect via transitional IPv6 addresses on dual-stack networks | ### Impact
Requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addresses were used. Outbound requests to federation, identity servers, when calculating the key validity for third-party invite events, sending push notifications, and generating URL previews are affected. This could cause Synapse to make requests to internal infrastructure on dual-stack networks.
### Patches
This issue is fixed by #9240.
### Workarounds
Outbound requests to the following address ranges can be blocked by a firewall, if unused for internal communication between systems:
* `::ffff/80`
* `::0000/80` (note that this IP range is considered deprecated by the IETF)
* `2002::/16` (note that this IP range is considered deprecated by the IETF)
### References
* [RFC3056](https://tools.ietf.org/html/rfc3056)
* [RFC4291](https://tools.ietf.org/html/rfc4291) | {'CVE-2021-21392'} | 2022-04-19T19:02:47Z | 2021-04-13T15:13:08Z | MODERATE | 6.3 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21392', 'https://github.com/matrix-org/synapse/pull/9240', 'https://github.com/advisories/GHSA-5wrh-4jwv-5w78', 'https://pypi.org/project/matrix-synapse/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-5wrh-4jwv-5w78'} | null |
GHSA | GHSA-v543-gqhh-6gww | Moderate severity vulnerability that affects activemodel | Withdrawn, accidental duplicate publish.
Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters. | null | 2021-12-03T14:23:18Z | 2018-09-17T21:55:43Z | MODERATE | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2016-0753', 'https://github.com/advisories/GHSA-v543-gqhh-6gww'} | null |
GHSA | GHSA-gff7-g5r8-mg8m | Prototype Pollution in simple-plist | simple-plist v1.3.0 was discovered to contain a prototype pollution vulnerability via .parse(). | {'CVE-2022-26260'} | 2022-03-29T21:44:08Z | 2022-03-23T00:00:22Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-26260', 'https://github.com/wollardj/simple-plist/issues/60', 'https://github.com/advisories/GHSA-gff7-g5r8-mg8m'} | null |
GHSA | GHSA-xv7x-x6wr-xx7g | Moderate severity vulnerability that affects org.apache.ranger:ranger | Apache Ranger before 0.6.3 policy engine incorrectly matches paths in certain conditions when policy does not contain wildcards and has recursion flag set to true. | {'CVE-2016-8746'} | 2021-09-22T16:46:50Z | 2018-10-17T17:22:05Z | MODERATE | 5.9 | {'CWE-426'} | {'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'http://www.securityfocus.com/bid/95998', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8746', 'https://github.com/advisories/GHSA-xv7x-x6wr-xx7g'} | null |
GHSA | GHSA-2w8q-69fh-9gq6 | Malicious Package in bufger-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T21:27:55Z | 2020-09-03T22:25:09Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-2w8q-69fh-9gq6', 'https://www.npmjs.com/advisories/1263'} | null |
GHSA | GHSA-pgcq-h79j-2f69 | Incomplete validation of shapes in multiple TF ops | ### Impact
Several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenarios writes and reads from heap populated arrays are also possible.
We have discovered these issues internally via tooling while working on improving/testing GPU op determinism. As such, we don't have reproducers and there will be multiple fixes for these issues.
### Patches
We have patched the issue in GitHub commits [68422b215e618df5ad375bcdc6d2052e9fd3080a](https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a), [4d74d8a00b07441cba090a02e0dd9ed385145bf4](https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4), [579261dcd446385831fe4f7457d802a59685121d](https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d), [da4aad5946be30e5f049920fa076e1f7ef021261](https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261), [4dddb2fd0b01cdd196101afbba6518658a2c9e07](https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07), and [e7f497570abb6b4ae5af4970620cd880e4c0c904](https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904).
These fixes will be included in TensorFlow 2.7.0. We will also cherrypick these commits on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2021-41206'} | 2021-11-10T19:03:38Z | 2021-11-10T19:03:38Z | HIGH | 7 | {'CWE-354'} | {'https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261', 'https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69', 'https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d', 'https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a', 'https://github.com/advisories/GHSA-pgcq-h79j-2f69', 'https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41206', 'https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07'} | null |
GHSA | GHSA-3m3h-v9hv-9j4h | Cross-site Scripting in django-wiki | In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript. | {'CVE-2021-25986'} | 2021-12-02T17:49:40Z | 2021-12-02T17:49:40Z | MODERATE | 5.4 | {'CWE-79'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986', 'https://github.com/advisories/GHSA-3m3h-v9hv-9j4h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25986', 'https://github.com/django-wiki/django-wiki/pull/1148', 'https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5'} | null |
GHSA | GHSA-jxm5-5xcw-h57q | Moderate severity vulnerability that affects org.exist-db:exist-core | exist version <= 5.0.0-RC4 contains a XML External Entity (XXE) vulnerability in XML Parser for REST Server that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. | {'CVE-2018-1000823'} | 2021-06-10T22:57:25Z | 2018-12-20T22:02:17Z | CRITICAL | 10 | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1000823', 'https://0dd.zone/2018/10/27/exist-XXE/', 'https://github.com/eXist-db/exist/issues/2180', 'https://github.com/advisories/GHSA-jxm5-5xcw-h57q'} | null |
GHSA | GHSA-h79x-98r2-g6qc | Impersonation of other users (passing XBOX Live authentication) by theft of logins in PocketMine-MP | # Impact
Minecraft Bedrock authentication and its protocol encryption are inseparably linked. One is not complete without the other.
This vulnerability affects servers which are able to be directly connected to via the internet (i.e. not behind a proxy).
If you are using a proxy, please check that it supports protocol encryption and that it is enabled.
# Technical details
<details>
<summary>click to expand</summary>
## Basics
1. The client generates a private ECC key `clientPriv` which it uses to complete ECDH for encryption.
2. A JWT containing the public key `clientPub` corresponding to this key is signed by Microsoft servers with the [Mojang root public key](https://github.com/pmmp/PocketMine-MP/blob/stable/src/network/mcpe/auth/ProcessLoginTask.php#L42) `mojangPub`.
3. The server verifies that the token was issued by Microsoft servers by verifying the JWT signature with `mojangPub`.
## Why this is a problem
However, this only ensures that the token was issued by Microsoft. It does _not_ ensure that the client actually possesses the private key corresponding to the public key in the token.
In a login replay attack, the attacker sends a login captured from another session. This login is valid because it is verifiable by `mojangPub`; however, without encryption, the server doesn't know that the client actually possesses `clientPriv`, and the authenticity of the client cannot be verified.
## How encryption prevents the attack
1. The server calculates a shared secret for encryption using ECDH of `serverPriv` and `clientPub`.
2. It then signs a return token using `serverPriv` and sends this to the client, along with `serverPub`.
3. The client then verifies the JWT using `serverPub`, and calculates the same shared secret as the server using `clientPriv` and `serverPub`.
If the client does not possess `clientPriv` (i.e. because it replayed a stolen login), then the session cannot proceed once encryption is enabled, since the client cannot calculate the shared secret needed to decrypt the server packets and encrypt its own packets.
**Since PM3 does not implement protocol encryption, this means that ALL versions of PM3 are affected by this login stealing attack.**
## How does the attacker capture a login in the first place?
The typical way to do this would be to trick a player into joining a server controlled by the attacker. This would allow the attacker to grab the login from the connection and store it for future use.
## Are the logins valid forever?
No. All the JWTs have expiry dates after which they cannot be used. These expiry dates are typically 2-3 days after the token was issued by XBOX servers. PocketMine-MP 3.x does verify these expiry dates, so the use-by dates of these attacks are limited.
</details>
# Patches
This problem has been fixed in all 4.x versions by implementing Minecraft protocol encryption.
~This has not yet been addressed on 3.x, but since this vulnerability is already public knowledge, the advisory has been released early to make sure people are aware of it and the mitigation steps they can take.~
Update 2022-01-22: This has been fixed on 3.x by d28be4eaf24a890f7ef110a51181a3d806a6acca.
# Workarounds
- Use a proxy that supports encryption such as [gophertunnel](https://github.com/Sandertv/gophertunnel) between your server and players. Make sure that the server only accepts connections from the proxy. If the proxy is on the same machine as the server, you can use `server-ip=127.0.0.1` to ensure that only the proxy can create connections for you.
The following things may help mitigate the problem:
- Verify that the `LoginPacket` `serverAddress` field is the same as the server's exposed domain name. For example: https://github.com/JustTalDevelops/AntiLoginForger
**WARNING: THIS DOES NOT SOLVE THE ROOT ISSUE. YOU WILL REMAIN VULNERABLE UNLESS YOU UPGRADE.**
# For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null | 2022-01-24T22:08:05Z | 2022-01-21T23:02:15Z | MODERATE | 4.7 | null | {'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-h79x-98r2-g6qc', 'https://github.com/advisories/GHSA-h79x-98r2-g6qc', 'https://github.com/pmmp/PocketMine-MP/issues/4580'} | null |
GHSA | GHSA-57wx-m983-2f88 | Incomplete validation in boosted trees code | ### Impact
The [code for boosted trees in TensorFlow](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc) is still missing validation. As a result, attackers can trigger denial of service (via dereferencing `nullptr`s or via `CHECK`-failures) as well as abuse undefined behavior (binding references to `nullptr`s). An attacker can also read and write from heap buffers, depending on the API that gets used and the arguments that are passed to the call.
**Note**: Given that the boosted trees implementation in TensorFlow is unmaintained, it is recommend to no longer use these APIs. Instead, please use the downstream [TensorFlow Decision Forests](https://github.com/tensorflow/decision-forests) project which is newer and supports more features. We will deprecate TensorFlow's boosted trees APIs in subsequent releases.
### Patches
We have patched the issue in GitHub commit [5c8c9a8bfe750f9743d0c859bae112060b216f5c](https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41208'} | 2021-11-10T19:37:56Z | 2021-11-10T19:37:56Z | CRITICAL | 9.3 | {'CWE-476', 'CWE-824'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41208', 'https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88', 'https://github.com/advisories/GHSA-57wx-m983-2f88'} | null |
GHSA | GHSA-rcvx-rmvf-mxch | Cross-site Scripting in Eclipse Hawkbit | In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client. | {'CVE-2020-27219'} | 2022-02-09T22:19:44Z | 2022-02-09T22:19:44Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-27219', 'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=570289', 'https://github.com/eclipse/hawkbit/issues/1067', 'https://github.com/advisories/GHSA-rcvx-rmvf-mxch'} | null |
GHSA | GHSA-qwp9-52h8-xgg8 | Prototype pollution in JointJS | The package jointjs before 3.3.0 are vulnerable to Prototype Pollution via util.setByPath (https://resources.jointjs.com/docs/jointjs/v3.2/joint.htmlutil.setByPath). The path used the access the object's key and set the value is not properly sanitized, leading to a Prototype Pollution. | {'CVE-2020-28480'} | 2021-01-20T21:21:16Z | 2021-01-20T21:21:16Z | HIGH | 0 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444', 'https://github.com/advisories/GHSA-qwp9-52h8-xgg8', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036', 'https://github.com/clientIO/joint/blob/master/src/util/util.mjs%23L150', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28480', 'https://github.com/clientIO/joint/pull/1406', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037'} | null |
GHSA | GHSA-jphg-qwrw-7w9g | Unsafe object creation in json RubyGem | The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269/GHSA-x457-cw4h-hq5f, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent. | {'CVE-2020-10663'} | 2021-09-23T13:55:55Z | 2020-07-27T18:08:21Z | HIGH | 7.5 | {'CWE-20'} | {'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2020-10663.yml', 'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html', 'https://github.com/advisories/GHSA-jphg-qwrw-7w9g', 'https://github.com/flori/json/blob/master/CHANGES.md#2019-12-11-230', 'https://support.apple.com/kb/HT211931', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/', 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10663', 'https://security.netapp.com/advisory/ntap-20210129-0003/', 'https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/', 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/', 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html', 'https://www.debian.org/security/2020/dsa-4721', 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E', 'http://seclists.org/fulldisclosure/2020/Dec/32'} | null |
GHSA | GHSA-gfjr-xqhm-qvv3 | Malicious Package in aysnc | All versions of `aysnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:01:13Z | 2020-09-02T20:16:09Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-gfjr-xqhm-qvv3', 'https://www.npmjs.com/advisories/848'} | null |
GHSA | GHSA-cgc7-mwp4-3ccx | Cross-site Scripting in Joplin | An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag. | {'CVE-2020-15930'} | 2021-05-07T16:29:05Z | 2021-05-07T16:29:05Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/laurent22/joplin/releases/tag/v1.1.4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15930', 'https://github.com/advisories/GHSA-cgc7-mwp4-3ccx', 'http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html', 'https://github.com/laurent22/joplin/issues/3552'} | null |
GHSA | GHSA-x55w-vjjp-222r | Inefficient Regular Expression in inflect | inflect is customizable inflections for nodejs. inflect is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3820'} | 2022-05-05T13:49:05Z | 2021-09-29T17:12:19Z | MODERATE | 5.3 | {'CWE-400', 'CWE-697', 'CWE-1333'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3820', 'https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b', 'https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a', 'https://github.com/advisories/GHSA-x55w-vjjp-222r'} | null |
GHSA | GHSA-q34h-97wf-8r8j | vault-cli contains possible RCE when reading user-defined data | ### Impact
_What kind of vulnerability is it? Who is impacted?_
vault-cli features the ability for rendering templated values (as explained in the [documentation](https://github.com/peopledoc/vault-cli/blob/2.2.1/docs/howto/templated_secrets.rst)). When a secret starts with the prefix `!template!`, vault-cli interprets the rest of the contents of the secret as a Jinja2 template.
Jinja2 is a powerful templating engine and it's not designed to safely render arbitrary templates. An attacker controlling a jinja2 template rendered on a machine can trigger arbitrary code, making this a Remote Code Execution (RCE) risk.
If the content of the vault can be completely trusted, then this is not a problem. Otherwise, if your threat model includes cases where an attacker can manipulate a secret value read from the vault using vault-cli, then this vulnerability may impact you.
This does not impact `vault` itself, except for the fact that the attacker, having an RCE on the machine that executes `vault-cli`, may abuse the token that `vault-cli` uses, to read, write or delete other data from the vault.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
In 3.0.0, the code related to interpreting vault templated secrets has been removed entirely.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Using the environment variable `VAULT_CLI_RENDER=false` or the flag `--no-render` (placed between `vault-cli` and the subcommand, e.g. `vault-cli --no-render get-all`) or adding `render: false` to the vault-cli configuration yaml file disables rendering and removes the vulnerability.
Using the python library, you can use: `vault_cli.get_client(render=False)` when creating your client to get a client that will not render templated secrets and thus operates securely.
### References
_Are there any links users can visit to find out more?_
Here's an article explaining how jinja2 templates might be exploited to have side effects: https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the vault-cli repo](https://github.com/peopledoc/vault-cli/issues/new)
| {'CVE-2021-43837'} | 2022-04-19T19:03:18Z | 2021-12-16T21:02:12Z | HIGH | 8.4 | {'CWE-74'} | {'https://github.com/peopledoc/vault-cli/releases/tag/3.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43837', 'https://github.com/peopledoc/vault-cli/security/advisories/GHSA-q34h-97wf-8r8j', 'https://github.com/advisories/GHSA-q34h-97wf-8r8j', 'https://github.com/peopledoc/vault-cli/pull/198', 'https://github.com/peopledoc/vault-cli/commit/3ba3955887fd6b7d4d646c8b260f21cebf5db852', 'https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/'} | null |
GHSA | GHSA-w5rh-j4g3-jr29 | Missing Authorization in Jenkins S3 publisher Plugin | Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain the list of configured profiles. | {'CVE-2021-21651'} | 2021-06-16T17:29:17Z | 2021-06-16T17:29:17Z | MODERATE | 4.3 | {'CWE-862'} | {'https://github.com/advisories/GHSA-w5rh-j4g3-jr29', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2201', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21651'} | null |
GHSA | GHSA-4v6p-cxf9-98rf | Allocation of Resources Without Limits or Throttling in metadata-extractor | When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library. | {'CVE-2022-24614'} | 2022-03-08T21:10:21Z | 2022-02-25T00:01:05Z | MODERATE | 5.5 | {'CWE-770'} | {'https://github.com/drewnoakes/metadata-extractor/issues/561', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24614', 'https://github.com/advisories/GHSA-4v6p-cxf9-98rf'} | null |
GHSA | GHSA-3mf3-2gv9-h39j | Uninitialized buffer use in marc | An issue was discovered in the marc crate before 2.0.0 for Rust. A user-provided Read implementation can gain access to the old contents of newly allocated memory, violating soundness. | {'CVE-2021-26308'} | 2021-08-25T20:53:14Z | 2021-08-25T20:53:14Z | HIGH | 7.5 | {'CWE-908'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0014.html', 'https://github.com/blackbeam/rust-marc/issues/7', 'https://github.com/advisories/GHSA-3mf3-2gv9-h39j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26308'} | null |
GHSA | GHSA-6j89-jhpr-849f | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1308, CVE-2019-1335, CVE-2019-1366. | {'CVE-2019-1307'} | 2021-03-29T20:55:46Z | 2021-03-29T20:55:46Z | HIGH | 7.5 | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1307', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1307', 'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b', 'https://github.com/advisories/GHSA-6j89-jhpr-849f'} | null |
GHSA | GHSA-vqqv-v9m2-48p2 | Critical severity vulnerability that affects bootstrap-sass | Arbitrary code execution (via backdoor code) was discovered in bootstrap-sass 3.2.0.3, when downloaded from rubygems.org. An unauthenticated attacker can craft the ___cfduid cookie value with base64 arbitrary code to be executed via eval(), which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the __cfduid cookie that is legitimately used by Cloudflare. | {'CVE-2019-10842'} | 2021-09-20T22:15:49Z | 2019-04-04T16:28:47Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://snyk.io/blog/malicious-remote-code-execution-backdoor-discovered-in-the-popular-bootstrap-sass-ruby-gem/', 'https://github.com/twbs/bootstrap-sass/issues/1195', 'https://snyk.io/vuln/SNYK-RUBY-BOOTSTRAPSASS-174093', 'https://github.com/advisories/GHSA-vqqv-v9m2-48p2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10842', 'http://dgb.github.io/2019/04/05/bootstrap-sass-backdoor.html'} | null |
GHSA | GHSA-395w-qhqr-9fr6 | Path Traversal in Apache Flink | A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master. | {'CVE-2020-17519'} | 2021-03-05T21:37:59Z | 2021-01-06T20:01:34Z | MODERATE | 0 | {'CWE-552', 'CWE-22'} | {'https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-395w-qhqr-9fr6', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/01/05/2', 'https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r2fc60b30557e4a537c2a6293023049bd1c49fd92b518309aa85a0398@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1@%3Cissues.flink.apache.org%3E', 'http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html', 'https://lists.apache.org/thread.html/r229167538863518738e02f4c1c5a8bb34c1d45dadcc97adf6676b0c1@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17519', 'https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/ra8c96bf3ccb4e491f9ce87ba35f134b4449beb2a38d1ce28fd89001f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d@%3Cissues.flink.apache.org%3E'} | null |
GHSA | GHSA-59qg-grp7-5r73 | Weave Net clusters susceptible to MitM attacks via IPv6 rogue router advertisements | ### Impact
An attacker able to run a process as root in a container is able to respond to DNS requests from the host and thereby insert themselves as a fake service.
In a cluster with an IPv4 internal network, if IPv6 is not totally disabled on the host (via ipv6.disable=1 on the kernel cmdline), it will be either unconfigured or configured on some interfaces, but it’s pretty likely that ipv6 forwarding is disabled, ie /proc/sys/net/ipv6/conf//forwarding == 0. Also by default, /proc/sys/net/ipv6/conf//accept_ra == 1. The combination of these 2 sysctls means that the host accepts router advertisements and configure the IPv6 stack using them.
By sending “rogue” router advertisements, an attacker can reconfigure the host to redirect part or all of the IPv6 traffic of the host to the attacker controlled container.
Even if there was no IPv6 traffic before, if the DNS returns A (IPv4) and AAAA (IPv6) records, many HTTP libraries will try to connect via IPv6 first then fallback to IPv4, giving an opportunity to the attacker to respond.
If by chance you also have on the host a vulnerability like last year’s RCE in apt (CVE-2019-3462), you can now escalate to the host.
### Patches
Weave Net version 2.6.3 (to be released soon) will disable the accept_ra option on the veth devices that it creates.
### Workarounds
Users should not run containers with CAP_NET_RAW capability. This has been the advice from Weave Net for years.
https://www.weave.works/docs/net/latest/kubernetes/kube-addon/#-securing-the-setup
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Weave Net repo](https://github.com/weaveworks/weave/issues/new)
* Join the <a href="https://slack.weave.works/" target="_blank">Weave Users Slack</a>. | {'CVE-2020-11091'} | 2021-05-27T19:00:08Z | 2021-05-27T19:00:08Z | MODERATE | 5.8 | {'CWE-350'} | {'https://github.com/weaveworks/weave/security/advisories/GHSA-59qg-grp7-5r73', 'https://github.com/weaveworks/weave/commit/15f21f1899060f7716c70a8555a084e836f39a60', 'https://github.com/advisories/GHSA-59qg-grp7-5r73', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11091'} | null |
GHSA | GHSA-5vj8-3v2h-h38v | Remote Code Execution in next | Versions of `next` prior to 5.1.0 are vulnerable to Remote Code Execution. The `/path:` route fails to properly sanitize input and passes it to a `require()` call. This allows attackers to execute JavaScript code on the server. Note that prior version 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
## Recommendation
Upgrade to version 5.1.0. | null | 2022-04-28T19:57:45Z | 2020-09-04T18:04:08Z | HIGH | 0 | {'CWE-20'} | {'https://www.npmjs.com/advisories/1538', 'https://github.com/advisories/GHSA-5vj8-3v2h-h38v'} | null |
GHSA | GHSA-g694-m8vq-gv9h | URL Confusion When Scheme Not Supplied in medialize/uri.js | When parsing a URL without a scheme and with excessive slashes, like ///www.example.com, URI.js will parse the hostname as null and the path as /www.example.com.
Such behaviour is different from that exhibited by browsers, which will parse ///www.example.com as http://www.example.com instead. For example, the following will cause a redirect to http://www.example.com: | {'CVE-2022-1233'} | 2022-04-15T02:53:33Z | 2022-04-05T00:00:17Z | MODERATE | 6.5 | {'CWE-601', 'CWE-115'} | {'https://github.com/advisories/GHSA-g694-m8vq-gv9h', 'https://huntr.dev/bounties/228d5548-1109-49f8-8aee-91038e88371c', 'https://github.com/medialize/uri.js/commit/88805fd3da03bd7a5e60947adb49d182011f1277', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1233'} | null |
GHSA | GHSA-9r7h-6639-v5mw | Cross-Site Scripting in bootstrap-select | Versions of `bootstrap-select` prior to 1.13.6 are vulnerable to Cross-Site Scripting (XSS). The package does not escape `title` values on `<option>` tags. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 1.13.6 or later. | null | 2021-10-04T21:12:36Z | 2020-09-03T15:54:00Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-9r7h-6639-v5mw', 'https://www.npmjs.com/advisories/1522', 'https://github.com/dimpu/ngx-md/issues/129', 'https://github.com/snapappointments/bootstrap-select/issues/2199'} | null |
GHSA | GHSA-h3m2-h22h-695r | Malicious Package in ali-contributor | All versions of `ali-contributor` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T17:49:52Z | 2020-09-03T17:29:31Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1045', 'https://github.com/advisories/GHSA-h3m2-h22h-695r'} | null |
GHSA | GHSA-6wp2-fw3v-mfmc | Memory corruption in array-tools | An issue was discovered in the array-tools crate before 0.3.2 for Rust. Affected versions of this crate don't guard against panics, so that partially uninitialized buffer is dropped when user-provided `T::clone()` panics in `FixedCapacityDequeLike<T, A>::clone()`. This causes memory corruption.
| {'CVE-2020-36452'} | 2021-08-25T20:57:19Z | 2021-08-25T20:57:19Z | CRITICAL | 9.8 | {'CWE-909', 'CWE-908'} | {'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/array-tools/RUSTSEC-2020-0132.md', 'https://github.com/L117/array-tools/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2020-0132.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36452', 'https://github.com/advisories/GHSA-6wp2-fw3v-mfmc'} | null |
GHSA | GHSA-w65j-g6c7-g3m4 | Multiple memory safety issues in actix-web | Affected versions contain multiple memory safety issues, such as:
- Unsoundly coercing immutable references to mutable references
- Unsoundly extending lifetimes of strings
- Adding the `Send` marker trait to objects that cannot be safely sent between threads
This may result in a variety of memory corruption scenarios, most likely use-after-free.
A signficant refactoring effort has been conducted to resolve these issues.
| null | 2021-08-25T20:42:50Z | 2021-08-25T20:42:50Z | MODERATE | 0 | {'CWE-362'} | {'https://github.com/advisories/GHSA-w65j-g6c7-g3m4', 'https://github.com/actix/actix-web/issues/289', 'https://rustsec.org/advisories/RUSTSEC-2018-0019'} | null |
GHSA | GHSA-hj48-42vr-x3v9 | Regular Expression Denial of Service in path-parse | Affected versions of npm package `path-parse` are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity. | {'CVE-2021-23343'} | 2021-08-10T15:34:57Z | 2021-08-10T15:33:47Z | MODERATE | 5.3 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028', 'https://github.com/jbgutierrez/path-parse/issues/8', 'https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067', 'https://github.com/advisories/GHSA-hj48-42vr-x3v9', 'https://github.com/jbgutierrez/path-parse/pull/10', 'https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23343'} | null |
GHSA | GHSA-7xcv-wvr7-4h6p | Malicious npm package: an0n-chat-lib | The npm `an0n-chat-lib` package has been identified as malicious and removed from the npm package registry.
## Remediation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-01-29T18:12:19Z | 2021-01-29T18:12:19Z | CRITICAL | 0 | {'CWE-506'} | {'https://github.com/advisories/GHSA-7xcv-wvr7-4h6p', 'https://www.npmjs.com/advisories/1598', 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755'} | null |
GHSA | GHSA-q485-j897-qc27 | Moderate severity vulnerability that affects com.mchange:c3p0 | c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization. | {'CVE-2018-20433'} | 2021-09-16T19:29:38Z | 2019-01-07T19:14:34Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://lists.debian.org/debian-lts-announce/2018/12/msg00021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20433', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/', 'https://github.com/advisories/GHSA-q485-j897-qc27', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/', 'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b'} | null |
GHSA | GHSA-h26f-j4mv-84g7 | Malicious Package in asycn | All versions of `asycn` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:00:38Z | 2020-09-02T18:39:43Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/846', 'https://github.com/advisories/GHSA-h26f-j4mv-84g7'} | null |
GHSA | GHSA-v4qh-6367-4cx2 | Server-Side Request Forgery (SSRF) in Apache Olingo | Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker. | {'CVE-2020-1925'} | 2021-08-19T16:54:37Z | 2020-02-04T22:38:38Z | HIGH | 7.5 | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1925', 'https://mail-archives.apache.org/mod_mbox/olingo-user/202001.mbox/%3CCAGSZ4d6HwpF2woOrZJg_d0SkHytXJaCtAWXa3ZtBn33WG0YFvw%40mail.gmail.com%3E', 'https://github.com/advisories/GHSA-v4qh-6367-4cx2'} | null |
GHSA | GHSA-69wp-xwm7-69wm | Exposure of Resource to Wrong Sphere in ThinkPHP Framework | ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. | {'CVE-2022-25481'} | 2022-04-05T20:52:39Z | 2022-03-22T00:00:43Z | HIGH | 7.5 | {'CWE-668'} | {'https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md', 'https://github.com/advisories/GHSA-69wp-xwm7-69wm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25481'} | null |
GHSA | GHSA-4mp3-385r-v63f | Denial of service attack due to invalid JSON | ### Impact
A denial of service attack against Matrix clients can be exploited by sending an event including invalid JSON data to Synapse. Synapse would relay the data to clients which could crash or hang. Impact is long-lasting if the event is made part of the room state.
### Patches
At a minimum #8106 and #8291 must be applied. #7372 and #8124 include additional checks.
### Workarounds
There are no known workarounds.
### Upgrading notes
If an invalid event is accepted by an earlier Synapse it can become part of the room state and will not be fixed by upgrading Synapse. Redacting the invalid event should avoid clients receiving the invalid event. | {'CVE-2020-26890'} | 2022-04-19T19:02:38Z | 2020-11-24T22:58:58Z | HIGH | 0 | {'CWE-20'} | {'https://github.com/matrix-org/synapse/security/advisories/GHSA-4mp3-385r-v63f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7YXMMYQP46PYL664JQUXCA3LPBJU7DQ/', 'https://github.com/advisories/GHSA-4mp3-385r-v63f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U34DPP4ZLOEDUY2ZCWOHQPU5GA5LYNUQ/', 'https://pypi.org/project/matrix-synapse/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26890'} | null |
GHSA | GHSA-7jgj-8wvc-jh57 | .NET Core Information Disclosure | An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0. | {'CVE-2018-8292'} | 2021-04-21T19:16:06Z | 2021-04-21T19:16:06Z | HIGH | 7.5 | {'CWE-200'} | {'https://github.com/dotnet/announcements/issues/88', 'http://www.securityfocus.com/bid/105548', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8292', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8292', 'https://access.redhat.com/errata/RHSA-2018:2902', 'https://github.com/advisories/GHSA-7jgj-8wvc-jh57'} | null |
GHSA | GHSA-fx46-whrj-73v5 | Bypassing Sanitization using DOM clobbering in html-janitor | All versions of `html-janitor` are vulnerable to cross-site scripting (XSS).
Arbitrary HTML can pass the sanitization process, which can be unexpected and dangerous (XSS) in case user-controlled input is passed to the clean function."
## Recommendation
Upgrade to version 2.0.4 or later. | {'CVE-2017-0928'} | 2021-09-21T17:04:18Z | 2018-07-24T20:06:17Z | HIGH | 0 | {'CWE-642', 'CWE-547'} | {'https://github.com/advisories/GHSA-fx46-whrj-73v5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0928', 'https://hackerone.com/reports/308158', 'https://github.com/guardian/html-janitor/issues/35', 'https://www.npmjs.com/advisories/569'} | null |
GHSA | GHSA-h5q8-5697-9p9h | Cross-Site Request Forgery in express-cart | The express-cart package through 1.1.10 for Node.js allows CSRF. | {'CVE-2020-22403'} | 2021-09-10T17:11:55Z | 2021-08-30T17:22:15Z | HIGH | 8.8 | {'CWE-352'} | {'https://github.com/advisories/GHSA-h5q8-5697-9p9h', 'https://www.npmjs.com/package/express-cart', 'https://nvd.nist.gov/vuln/detail/CVE-2020-22403', 'https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb', 'https://hackerone.com/reports/395944', 'https://security.netapp.com/advisory/ntap-20210909-0004/'} | null |
GHSA | GHSA-f6mq-5m25-4r72 | Improper Validation of Specified Type of Input | Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshalling Go objects into BSON. A malicious user could use a Go object with specific string to potentially inject additional fields into marshalled documents. This issue affects all MongoDB GO Drivers up to (and including) 1.5.0. | {'CVE-2021-20329'} | 2021-06-24T13:04:10Z | 2021-06-15T16:08:16Z | MODERATE | 6.8 | {'CWE-20', 'CWE-1287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-20329', 'https://github.com/advisories/GHSA-f6mq-5m25-4r72', 'https://github.com/mongodb/mongo-go-driver/releases/tag/v1.5.1'} | null |
GHSA | GHSA-2r5h-gh4x-8hp9 | Resources Downloaded over Insecure Protocol in igniteui | Affected versions of `igniteui` download Javascript and CSS resources over an unencrypted HTTP connection. An attacker with a privileged network position can intercept and view or modify any content sent or recieved over an unencrypted HTTP connection.
## Recommendation
The `igniteui` package has been deprecated by the package author and now exists under [`ignite-ui`](https://preview.npmjs.com/package/ignite-ui), which should be used in place of this package. | {'CVE-2016-10552'} | 2021-01-08T20:06:38Z | 2019-02-18T23:40:14Z | LOW | 0 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10552', 'https://github.com/advisories/GHSA-2r5h-gh4x-8hp9', 'https://nodesecurity.io/advisories/116', 'https://www.npmjs.com/advisories/116'} | null |
GHSA | GHSA-6v39-p2xq-g5c3 | Missing authentication in ShenYu | User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1. | {'CVE-2022-23944'} | 2022-02-02T16:16:06Z | 2022-01-28T22:13:44Z | CRITICAL | 9.1 | {'CWE-862', 'CWE-306'} | {'https://lists.apache.org/thread/dbrjnnlrf80dr0f92k5r2ysfvf1kr67y', 'http://www.openwall.com/lists/oss-security/2022/01/25/15', 'http://www.openwall.com/lists/oss-security/2022/01/25/5', 'https://github.com/advisories/GHSA-6v39-p2xq-g5c3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23944', 'http://www.openwall.com/lists/oss-security/2022/01/26/2'} | null |
GHSA | GHSA-p7qp-3fh7-pv4p | Malicious Package in buffur-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T21:27:38Z | 2020-09-03T22:24:04Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-p7qp-3fh7-pv4p', 'https://www.npmjs.com/advisories/1262'} | null |
GHSA | GHSA-728c-42pc-fwxg | Unrestricted Upload of File with Dangerous Type in Crater | Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0. | {'CVE-2022-0242'} | 2022-01-21T23:54:50Z | 2022-01-21T23:54:50Z | HIGH | 7.2 | {'CWE-434'} | {'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0242', 'https://github.com/advisories/GHSA-728c-42pc-fwxg', 'https://huntr.dev/bounties/19f3e5f7-b419-44b1-9c37-7e4404cbec94'} | null |
GHSA | GHSA-2xw5-3767-qxvm | Malicious Package in ng-ui-library | Version 1.0.987 of `ng-ui-library` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | null | 2021-09-30T22:07:45Z | 2020-09-11T21:21:20Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/940', 'https://github.com/advisories/GHSA-2xw5-3767-qxvm'} | null |
GHSA | GHSA-qp49-3pvw-x4m5 | sinatra does not validate expanded path matches | Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files. | {'CVE-2022-29970'} | 2022-05-03T20:59:52Z | 2022-05-03T00:00:43Z | MODERATE | 0 | {'CWE-426'} | {'https://github.com/sinatra/sinatra/pull/1683/commits/462c3ca1db53ed3cfc394cf5948e9c948ad1c10e', 'https://github.com/advisories/GHSA-qp49-3pvw-x4m5', 'https://github.com/skylightio/skylight-ruby/pull/294', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29970'} | null |
GHSA | GHSA-8cpw-73f2-w58m | Cross-Site Scripting in selectize-plugin-a11y | Versions of `selectize-plugin-a11y ` prior to 1.1.0 are vulnerable to Cross-Site Scripting. The `accessibility.liveRegion.speak` function does not sanitize the `msg` variable before rendering it as HTML. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 1.1.0 or later. | {'CVE-2019-15482'} | 2021-08-17T22:13:01Z | 2019-08-27T17:38:33Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/SLMNBJ/selectize-plugin-a11y/pull/9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15482', 'https://www.npmjs.com/package/selectize-plugin-a11y/v/1.1.0', 'https://github.com/advisories/GHSA-8cpw-73f2-w58m', 'https://www.npmjs.com/advisories/1145'} | null |
GHSA | GHSA-57gr-jvqr-3hwm | Incorrect access control in typo3_forum | The typo3_forum extension before 1.2.1 for TYPO3 has Incorrect Access Control. | {'CVE-2020-15513'} | 2021-09-23T17:35:17Z | 2020-07-29T18:07:38Z | MODERATE | 5.3 | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15513', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-010', 'https://github.com/advisories/GHSA-57gr-jvqr-3hwm'} | null |
GHSA | GHSA-w973-2qcc-p78x | User Impersonation in converse.js | Versions of `converse.js` prior to 1.0.7 for 1.x or 2.0.5 for 2.x are vulnerable to User Impersonation. The package provides an incorrect implementation of [XEP-0280: Message Carbons](https://xmpp.org/extensions/xep-0280.html) that allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks.
## Recommendation
If you're using `converse.js` 1.x, upgrade to 1.0.7 or later.
If you're using `converse.js` 2.x, upgrade to 2.0.5 or later. | {'CVE-2017-5858'} | 2021-09-28T16:56:36Z | 2020-09-11T21:19:09Z | MODERATE | 5.9 | {'CWE-346', 'CWE-20'} | {'https://rt-solutions.de/wp-content/uploads/2017/02/CVE-2017-5589_xmpp_carbons.pdf', 'https://github.com/advisories/GHSA-w973-2qcc-p78x', 'https://www.npmjs.com/advisories/974', 'http://openwall.com/lists/oss-security/2017/02/09/29', 'https://snyk.io/vuln/SNYK-JS-CONVERSEJS-449664', 'http://www.securityfocus.com/bid/96183', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5858', 'https://www.openwall.com/lists/oss-security/2017/02/09/29', 'https://rt-solutions.de/en/2017/02/CVE-2017-5589_xmpp_carbons/', 'https://github.com/jcbrand/converse.js/commit/42f249cabbbf5c026398e6d3b350f6f9536ea572'} | null |
GHSA | GHSA-hxmg-hm46-cf62 | Remote code execution in mongo-express | mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769. | {'CVE-2020-24391'} | 2021-04-13T15:41:01Z | 2021-04-13T15:41:01Z | HIGH | 0 | {'CWE-20'} | {'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a', 'https://github.com/advisories/GHSA-hxmg-hm46-cf62', 'https://github.com/mongodb-js/query-parser/issues/16', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24391'} | null |
GHSA | GHSA-rv62-4pmj-xw6h | Moderate severity vulnerability that affects jupyterhub and notebook | An Open Redirect vulnerability for all browsers in Jupyter Notebook before 5.7.8 and some browsers (Chrome, Firefox) in JupyterHub before 0.9.6 allows crafted links to the login page, which will redirect to a malicious site after successful login. Servers running on a base_url prefix are not affected. | {'CVE-2019-10255'} | 2021-09-17T20:42:44Z | 2019-04-02T15:46:54Z | MODERATE | 6.1 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10255', 'https://github.com/jupyter/notebook/commit/70fe9f0ddb3023162ece21fbb77d5564306b913b', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMDPJBVXOVO6LYGAT46VZNHH6JKSCURO/', 'https://github.com/jupyter/notebook/compare/05aa4b2...16cf97c', 'https://github.com/advisories/GHSA-rv62-4pmj-xw6h', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UP5RLEES2JBBNSNLBR65XM6PCD4EMF7D/', 'https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4', 'https://github.com/jupyter/notebook/commit/d65328d4841892b412aef9015165db1eb029a8ed', 'https://github.com/jupyter/notebook/commit/08c4c898182edbe97aadef1815cce50448f975cb'} | null |
GHSA | GHSA-w4wq-rvmq-77x7 | Cross-site scripting in anchorme | All versions of package anchorme are vulnerable to Cross-site Scripting (XSS) via the main functionality. | {'CVE-2021-23411'} | 2021-08-02T22:48:27Z | 2021-07-26T21:23:58Z | MODERATE | 5.4 | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1320695', 'https://snyk.io/vuln/SNYK-JS-ANCHORME-1311008', 'https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts%23L81', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23411', 'https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts#23L81', 'https://github.com/advisories/GHSA-w4wq-rvmq-77x7'} | null |
GHSA | GHSA-j5mg-fpq8-vvxv | Directory Traversal in commentapp.stetsonwood | Affected versions of `commentapp.stetsonwood` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16143'} | 2021-01-08T21:04:24Z | 2018-07-23T20:48:14Z | HIGH | 0 | {'CWE-22'} | {'https://nodesecurity.io/advisories/470', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16143', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/commentapp.stetsonwood', 'https://github.com/advisories/GHSA-j5mg-fpq8-vvxv', 'https://www.npmjs.com/advisories/470'} | null |
GHSA | GHSA-hwhh-2fwm-cfgw | Doorkeeper is vulnerable to stored XSS and code execution | Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link. This vulnerability appears to have been fixed in 4.2.6, 4.3.0. | {'CVE-2018-1000088'} | 2022-04-26T17:36:13Z | 2018-03-13T20:44:48Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/rubysec/ruby-advisory-db/pull/328/files', 'https://github.com/advisories/GHSA-hwhh-2fwm-cfgw', 'https://github.com/doorkeeper-gem/doorkeeper/issues/969', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000088', 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.3.0', 'https://github.com/doorkeeper-gem/doorkeeper/pull/970'} | null |
GHSA | GHSA-w3hj-wr2q-x83g | Discovery uses the same AES/GCM Nonce throughout the session | Discovery uses the same AES/GCM Nonce throughout the session though it should be generated on per message basis which can lead to the leaking of the session key. As the actual ENR record is signed with a different key it is not possible for an attacker to alter the ENR record. Note that the node private key is not compromised, only the session key generated to communicate with an individual peer.
From [discovery spec](https://github.com/ethereum/devp2p/blob/f97b8a5b8e9589d3355ebbd9d4a58d5d1644bdf7/discv5/discv5-theory.md#session-cache):
> The number of messages which can be encrypted with a certain session key is limited because encryption of each message requires a unique nonce for AES-GCM. In addition to the keys, the session cache must also keep track of the count of outgoing messages to ensure the uniqueness of nonce values. Since the wire protocol uses 96 bit AES-GCM nonces, it is strongly recommended to generate them by encoding the current outgoing message count into the first 32 bits of the nonce and filling the remaining 64 bits with random data generated by a cryptographically secure random number generator. | null | 2022-04-19T19:02:52Z | 2021-04-06T17:22:17Z | LOW | 0 | {'CWE-323'} | {'https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g', 'https://github.com/advisories/GHSA-w3hj-wr2q-x83g'} | null |
GHSA | GHSA-gf2c-93hm-r9j5 | Cross-site Scripting in kimai2 | kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) in deleting invoice templates. This vulnerability is capable of tricking admin user to delete invoice templates. | {'CVE-2021-3963'} | 2021-11-23T18:16:43Z | 2021-11-23T18:16:43Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514', 'https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8', 'https://github.com/advisories/GHSA-gf2c-93hm-r9j5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3963'} | null |
GHSA | GHSA-6gc6-m364-85ww | Log injection in SimpleSAMLphp | ### Background
SimpleSAMLphp has a logging functionality that allows system administrators to keep track of the activity, errors, and statistics. Additionally, it allows users to report errors, shall they happen. An error report contains a report identifier, which is logged once submitted.
### Description
The `www/erroreport.php` script, which receives error reports and sends them via email to the system administrator, didn't properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID.
When configured to use the `file` logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the `reportID` parameter received in a request sent to `www/errorreport.php` was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content.
### Affected versions
SimpleSAMLphp versions up to **1.18.3**.
### Impact
An attacker may use this issue to inject logs messages into a SimpleSAMLphp log file, trying to trick or confuse system administrators. However, the attack surface is considered small, as the attack will only work with the `file` logging handler, which opens the log file in _append-only_ mode. This means an attacker cannot edit or remove existing log messages, and even if non-ascii characters are written to the log, the file will always be readable with a simple text editor.
### Resolution
Upgrade the SimpleSAMLphp installation to version **1.18.4**.
### Credit
This vulnerability was discovered and reported by Frederic Vleminckx on January 23, 2020. | {'CVE-2020-5225'} | 2021-01-08T20:33:07Z | 2020-01-24T21:26:13Z | LOW | 4.4 | {'CWE-532'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5225', 'https://github.com/advisories/GHSA-6gc6-m364-85ww', 'https://simplesamlphp.org/security/202001-02', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-6gc6-m364-85ww'} | null |
GHSA | GHSA-h76r-vgf3-j6w5 | Auth bypass and account takeover in October CMS | ### Impact
An attacker can exploit this vulnerability to bypass authentication using a specially crafted persist cookie.
- To exploit this vulnerability, an attacker must obtain a Laravel’s secret key for cookie encryption and signing.
- Due to the logic of how this mechanism works, a targeted user account must be logged in while
the attacker is exploiting the vulnerability.
- Authorization via persist cookie not shown in access logs.
### Patches
- Issue has been patched in Build 472 and v1.1.5
- [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648)
### Workarounds
Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade.
[**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here.
### Recommendations
We recommend the following steps to make sure your server stays secure:
- Keep server OS and system software up to date.
- Keep October CMS software up to date.
- Use a multi-factor authentication plugin.
- Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area.
- Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities.
### References
Bugs found as part of Solar Security CMS Research. Credits to:
• Andrey Basarygin
• Andrey Guzei
• Mikhail Khramenkov
• Alexander Sidukov
• Maxim Teplykh
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
| {'CVE-2021-29487'} | 2022-01-20T15:39:15Z | 2021-08-30T16:13:50Z | HIGH | 7.4 | {'CWE-287'} | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/october/security/advisories/GHSA-h76r-vgf3-j6w5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29487', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://github.com/advisories/GHSA-h76r-vgf3-j6w5'} | null |
GHSA | GHSA-jj53-8fmw-f2w2 | Adding a private/unlisted room to a community exposes room metadata in an unauthorised manner. | ### Impact
Unauthorised users can access the name, avatar, topic and number of members of a room if they know the ID of the room. This vulnerability is limited to homeservers where:
- the vulnerable homeserver is in the room; and
- untrusted users are permitted to create groups (communities).
By default, only homeserver administrators can create groups. However, homeserver administrators can already access this information in the database or using the admin API. As a result, only homeservers where the configuration setting `enable_group_creation` has been set to `true` are impacted.
### Patches
Server administrators should upgrade to 1.41.1 or higher.
### Workarounds
Server administrators can set `enable_group_creation` to `false` in their homeserver configuration (this is the default value) to prevent creation of groups by non-administrators.
Administrators that are using a reverse proxy could, with partial loss of group functionality, block the following endpoints:
* `/_matrix/client/r0/groups/{group_id}/rooms`
* `/_matrix/client/unstable/groups/{group_id}/rooms`
### References
n/a
### For more information
If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
| {'CVE-2021-39163'} | 2022-04-19T19:03:11Z | 2021-09-01T18:25:44Z | LOW | 3.1 | {'CWE-200'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/', 'https://github.com/matrix-org/synapse/commit/cb35df940a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39163', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jj53-8fmw-f2w2', 'https://github.com/advisories/GHSA-jj53-8fmw-f2w2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/', 'https://github.com/matrix-org/synapse/releases/tag/v1.41.1'} | null |
GHSA | GHSA-xcrg-29h7-h4cj | XXE in PHPSpreadsheet due to encoding issue | securityScan() in PHPOffice PhpSpreadsheet through 1.5.0 allows a bypass of protection mechanisms for XXE via UTF-7 encoding in a .xlsx file | {'CVE-2018-19277'} | 2022-04-19T20:14:25Z | 2019-11-20T01:38:52Z | HIGH | 8.8 | {'CWE-91'} | {'https://github.com/PHPOffice/PhpSpreadsheet/issues/771', 'https://github.com/advisories/GHSA-xcrg-29h7-h4cj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19277', 'https://www.bishopfox.com/news/2018/11/phpoffice-versions/', 'https://github.com/MewesK/TwigSpreadsheetBundle/issues/18', 'https://www.drupal.org/sa-contrib-2021-043'} | null |
GHSA | GHSA-pffw-p2q5-w6vh | Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-builder and org.apache.jspwiki:jspwiki-war | A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details. | {'CVE-2019-0225'} | 2021-06-10T21:56:00Z | 2019-04-08T16:23:36Z | HIGH | 7.5 | {'CWE-22'} | {'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/6251c06cb11e0b495066be73856592dbd7ed712487ef283d10972831@%3Cdev.jspwiki.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0225', 'https://github.com/advisories/GHSA-pffw-p2q5-w6vh', 'https://lists.apache.org/thread.html/03ddbcb1d6322e04734e65805a147a32bcfdb71b8fc5821fb046ba8d@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/03/26/2', 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/4f19fdbd8b9c4caf6137a459d723f4ec60379b033ed69277eb4e0af9@%3Cuser.jspwiki.apache.org%3E', 'http://www.securityfocus.com/bid/107627', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225'} | null |
GHSA | GHSA-gc58-v8h3-x2gr | Incorrect Default Permissions in Apache Tomcat | A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1. | {'CVE-2020-8022'} | 2022-02-09T23:05:38Z | 2022-02-09T23:01:49Z | HIGH | 7.8 | {'CWE-276'} | {'https://lists.apache.org/thread.html/ra87ec20a0f4b226c81c7eed27e5d7433ccdc41e61a8da408a45f0fa1@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r393d4f431683e99c839b4aed68f720b8583bca6c35cd84adccaa02be@%3Cjava-dev.axis.apache.org%3E', 'https://github.com/advisories/GHSA-gc58-v8h3-x2gr', 'https://lists.apache.org/thread.html/rf50d02409e5732c4ee37f19a193af171251a25a652599ce3c2bc69e7@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r5be80ba868a11a1f64e4922399f171b8619bca4bc2039f79cf913928@%3Cjava-dev.axis.apache.org%3E', 'https://bugzilla.suse.com/show_bug.cgi?id=1172405', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00066.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8022'} | null |
GHSA | GHSA-m6q2-9pfm-2wvr | Malicious Package in wallet-address-vaildator | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-04T15:56:06Z | 2020-09-03T17:02:49Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-m6q2-9pfm-2wvr', 'https://www.npmjs.com/advisories/1412'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.