ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-phph-xpj4-wvcv
Cross-Site Scripting in hexo-admin
All versions of `hexo-admin` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize rendered markdown, allowing attackers to execute arbitrary JavaScript in a victim's browser if they are able to create new posts. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-29T18:51:18Z
2020-09-03T21:13:07Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1211', 'https://github.com/advisories/GHSA-phph-xpj4-wvcv', 'https://github.com/jaredly/hexo-admin/issues/185'}
null
GHSA
GHSA-32m2-9f76-4gv8
Business Logic Errors in SilverStripe Framework
SilverStripe Framework prior to version 4.10.1 is vulnerable to business logic errors.
{'CVE-2022-0227'}
2022-02-11T20:51:41Z
2022-02-06T00:01:01Z
MODERATE
4.3
null
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0227', 'https://github.com/advisories/GHSA-32m2-9f76-4gv8', 'https://huntr.dev/bounties/35631e3a-f4b9-41ad-857c-7e3021932a72', 'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'}
null
GHSA
GHSA-3w67-q784-6w7c
Division by zero in TFLite's implementation of `GatherNd`
### Impact The reference implementation of the `GatherNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/reference_ops.h#L966): ```cc ret.dims_to_count[i] = remain_flat_size / params_shape.Dims(i); ``` An attacker can craft a model such that `params` input would be an empty tensor. In turn, `params_shape.Dims(.)` would be zero, in at least one dimension. ### Patches We have patched the issue in GitHub commit [8e45822aa0b9f5df4b4c64f221e64dc930a70a9d](https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29589'}
2021-05-21T14:26:51Z
2021-05-21T14:26:51Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3w67-q784-6w7c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29589', 'https://github.com/advisories/GHSA-3w67-q784-6w7c'}
null
GHSA
GHSA-mgh5-4h95-qj4p
Information Exposure in Snyk Broker
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.
{'CVE-2020-7654'}
2021-07-29T17:51:24Z
2020-06-03T22:02:14Z
HIGH
7.5
{'CWE-532'}
{'https://github.com/advisories/GHSA-mgh5-4h95-qj4p', 'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7654', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570613'}
null
GHSA
GHSA-cf4q-4cqr-7g7w
SVG with embedded scripts can lead to cross-site scripting attacks in xml2rfc
xml2rfc allows `script` elements in SVG sources. In HTML output having these script elements can lead to XSS attacks. Sample XML snippet: ``` <artwork type="svg" src="data:image/svg+xml,%3Csvg viewBox='0 0 10 10' xmlns='http://www.w3.org/2000/svg'%3E%3Cscript%3E window.alert('Test Alert'); %3C/script%3E%3C/svg%3E"> </artwork> ``` ### Impact This vulnerability impacts website that publish HTML drafts and RFCs. ### Patches This has been fixed in version [3.12.4](https://github.com/ietf-tools/xml2rfc/releases/tag/v3.12.4). ### Workarounds If SVG source is self-contained within the XML, scraping `script` elements from SVG files. ### References * https://developer.mozilla.org/en-US/docs/Web/SVG/Element/script ### For more information If you have any questions or comments about this advisory: * Open an issue in [xml2rfc](https://github.com/ietf-tools/xml2rfc/) * Email us at [operational-vulnerability@ietf.org](mailto:operational-vulnerability@ietf.org) * [Infrastructure and Services Vulnerability Disclosure](https://www.ietf.org/about/administration/policies-procedures/vulnerability-disclosure/)
null
2022-04-22T20:25:55Z
2022-04-22T20:25:53Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-cf4q-4cqr-7g7w', 'https://github.com/ietf-tools/xml2rfc/security/advisories/GHSA-cf4q-4cqr-7g7w'}
null
GHSA
GHSA-43vf-2x6g-p2m5
Malicious Package in browserift
Version 16.3.3 of `browserift` contained malicious code as a preinstall script. The package was a backdoor that opened a connection to a remote server and executed incoming commands on both Unix and Windows machines ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:37:55Z
2020-09-02T21:33:26Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/900', 'https://github.com/advisories/GHSA-43vf-2x6g-p2m5'}
null
GHSA
GHSA-qq97-vm5h-rrhg
OCI Manifest Type Confusion Issue
### Impact Systems that rely on digest equivalence for image attestations may be vulnerable to type confusion. ### Patches Upgrade to at least `v2.8.0-beta.1` if you are running `v2.x` release. If you use the code from the `main` branch, update at least to the commit after [b59a6f827947f9e0e67df0cfb571046de4733586](https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586). ### Workarounds There is no way to work around this issue without patching. ### References Due to [an oversight in the OCI Image Specification](https://github.com/opencontainers/image-spec/pull/411) that removed the embedded `mediaType` field from manifests, a maliciously crafted OCI Container Image can cause registry clients to parse the same image in two different ways without modifying the image’s digest by modifying the `Content-Type` header returned by a registry. This can invalidate a common pattern of relying on container image digests for equivalence. ### For more information If you have any questions or comments about this advisory: * Open an issue in [distribution](https://github.com/distribution/distribution) * Open an issue in [distribution-spec](https://github.com/opencontainers/distribution-spec) * Email us at [cncf-distribution-security@lists.cncf.io](mailto:cncf-distribution-security@lists.cncf.io)
null
2022-04-19T19:03:14Z
2022-02-08T18:53:56Z
LOW
3
{'CWE-843'}
{'https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586', 'https://github.com/advisories/GHSA-qq97-vm5h-rrhg', 'https://github.com/distribution/distribution/security/advisories/GHSA-qq97-vm5h-rrhg', 'https://github.com/opencontainers/image-spec/pull/411'}
null
GHSA
GHSA-j3f7-7rmc-6wqj
Improper certificate management in AWS IoT Device SDK v2
The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to address this behavior. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.7.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.14.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.6.0 on macOS. Amazon Web Services AWS-C-IO 0.10.7 on macOS.
{'CVE-2021-40831'}
2021-12-03T15:22:23Z
2021-11-24T20:35:03Z
MODERATE
6.3
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/advisories/GHSA-j3f7-7rmc-6wqj', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/awslabs/aws-c-io/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40831'}
null
GHSA
GHSA-j6px-jwvv-vpwq
Angular Expressions - Remote Code Execution
### Impact The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input. This time, the security of the package could be bypassed by using a more complex payload, using a `.constructor.constructor` technique. * If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). * If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution. ### Patches Users should upgrade to version 1.1.2 of angular-expressions ### Workarounds A temporary workaround might be either to : * disable user-controlled input that will be fed into angular-expressions in your application OR * allow only following characters in the userControlledInput : ```js if (/^[|a-zA-Z.0-9 :"'+-?]+$/.test(userControlledInput)) { var result = expressions.compile(userControlledInput); } else { result = undefined; } ``` ### References [Removal of angular-expression sandbox](http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [angular-expressions](https://github.com/peerigon/angular-expressions/issues) * [Email us](mailto:contact@javascript-ninja.fr) ### Credits The issue was reported by Maxime Nadeau from GoSecure, Inc.
{'CVE-2021-21277'}
2021-02-02T15:23:09Z
2021-02-01T15:01:26Z
LOW
0
{'CWE-74'}
{'https://github.com/peerigon/angular-expressions/commit/07edb62902b1f6127b3dcc013da61c6316dd0bf1', 'https://www.npmjs.com/package/angular-expressions', 'https://github.com/advisories/GHSA-j6px-jwvv-vpwq', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html', 'https://github.com/peerigon/angular-expressions/security/advisories/GHSA-j6px-jwvv-vpwq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21277'}
null
GHSA
GHSA-v8g7-9qv2-j865
Malicious Package in bitcoin-osp
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:42:19Z
2020-09-04T16:38:55Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1365', 'https://github.com/advisories/GHSA-v8g7-9qv2-j865'}
null
GHSA
GHSA-4hj2-r2pm-3hc6
Incorrect Default Permissions in CRI-O
### Impact A bug was found in CRI-O where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted. This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. ### Patches This bug will been fixed in the following versions of CRI-O: - v1.24.0 Users should update to the version corresponding to their minor release as soon as possible. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset. This fix changes CRI-O behavior such that containers are started with a more typical Linux environment. Refer to `capabilities(7)` for a description of how capabilities work. Note that permitted file capabilities continue to allow for privileges to be raised up to the container's bounding set and that processes may add capabilities to their own inheritable set up to the container's bounding set per the rules described in the manual page. In all cases the container's bounding set provides an upper bound on the capabilities that can be assumed and provides for the container security sandbox. ### Workarounds The entrypoint of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting. ### Credits CRI-O would like to thank [Andrew G. Morgan](https://github.com/AndrewGMorgan) for responsibly disclosing this issue, as well as the Moby (Docker Engine) project for working with the other container engines in coordinating a fix. ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/cri-o/cri-o/issues/new) * Email us at [cncf-crio-security@lists.cncf.io](cncf-crio-security@lists.cncf.io) if you think you’ve found a security bug ------------------ https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L 4.8/Medium |Metric |Value |Comments | |--- |--- |--- | |Attack Vector (AV) |Local |An attacker requires local control to launch a container with files that have inheritable capabilities. | |Attack Complexity (AC) |Low |Modifying a file to have inheritable capabilities is not difficult. | |Privileges Required (PR) |Low |An attacker requires enough privilege to cause a container to be launched with a compromised image. Moby's API is typically bound to a local Unix domain socket and requires calls to be made from a process that is either UID 0 or present in the configured group. | |User Interaction (UI) |Required |An attacker must cause the compromised image to be run. | |Scope (S) |Unchanged |The container boundary set by Moby, including the bounding capability set, is not modified. A successful attack gains access to privileges and resources within the boundary, not outside of it. | |Confidentiality (C) |Low |An attacker may gain access to some confidential information through elevation of CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FOWNER, CAP_SETFCAP, or CAP_SETPCAP, but the exposed information is limited to that which is already inside the container. | |Integrity (I) |Low |An attacker may be able to tamper with data inside the container through elevation of CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FOWNER, CAP_SETFCAP, or CAP_SETPCAP, or spoof packets with CAP_NET_RAW, but the tampered data is limited to that which is already inside the container. | |Availability (A) |Low |An attacker may be able to affect the availability of an application running inside the container through elevation of CAP_KILL or CAP_NET_RAW, or may be able to affect availability through tampering with file dependencies. |
{'CVE-2022-27652'}
2022-04-22T20:42:46Z
2022-04-22T20:42:46Z
MODERATE
4.8
{'CWE-276'}
{'https://github.com/advisories/GHSA-4hj2-r2pm-3hc6', 'https://bugzilla.redhat.com/show_bug.cgi?id=2066839', 'https://github.com/cri-o/cri-o/security/advisories/GHSA-4hj2-r2pm-3hc6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27652'}
null
GHSA
GHSA-v6gv-fg46-h89j
Sensitive Data Exposure in put
All versions of `put` are vulnerable to Uninitialized Memory Exposure. The package incorrectly calculates the allocated Buffer size and does not trim the bytes written, which may allow attackers to access uninitialized memory containing sensitive data. This vulnerability only affects versions of Node.js <=6.x. ## Recommendation Upgrade your Node.js version or consider using an alternative package.
null
2021-09-28T17:06:31Z
2020-09-03T16:48:36Z
LOW
0
{'CWE-200'}
{'https://hackerone.com/reports/321702', 'https://www.npmjs.com/advisories/1007', 'https://github.com/advisories/GHSA-v6gv-fg46-h89j'}
null
GHSA
GHSA-7x92-2j68-h32c
Directory Traversal in featurebook
Affected versions of `featurebook` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. The `featurebook` package is not intended to be run in production code nor to be exposed to an untrusted network. ## Proof of Concept ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No direct patch is currently available. At this time, the best mitigation is to ensure that `featurebook` is not running in production or exposed to an untrusted network.
null
2021-09-23T21:48:31Z
2020-09-01T19:03:02Z
MODERATE
0
{'CWE-22'}
{'https://hackerone.com/reports/296305', 'https://github.com/advisories/GHSA-7x92-2j68-h32c', 'https://www.npmjs.com/advisories/556'}
null
GHSA
GHSA-7rq6-7gv8-c37h
Missing Authorization with Default Settings in Dashboard UI
Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, `LocalRequestsOnlyAuthorizationFilter` filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings. However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed. ### Impact Missing authorization when default options are used for the Dashboard UI, e.g. when no custom authorization rules are used as recommended in the [Using Dashboard](https://docs.hangfire.io/en/latest/configuration/using-dashboard.html#configuring-authorization) documentation article. #### Impacted If you are using `UseHangfireDashboard` method with default `DashboardOptions.Authorization` property value, then your installation is impacted: ```csharp app.UseHangfireDashboard(); // Impacted app.UseHangfireDashboard("/hangfire", new DashboardOptions()); // Impacted ``` #### Not Impacted If any other authorization filter is specified in the `DashboardOptions.Authorization` property, the you are not impacted: ```csharp app.UseHangfireDashboard("/hangfire", new DashboardOptions { Authorization = new []{ new SomeAuthorizationFilter(); } // Not impacted }); ``` ### Patches Patch is already available in version [1.7.26](https://github.com/HangfireIO/Hangfire/releases/tag/v1.7.26) and already available on NuGet.org, please see [Hangfire.Core 1.7.26](https://www.nuget.org/packages/Hangfire.Core/1.7.26). Default authorization rules now prohibit remote requests by default again by including the `LocalRequestsOnlyAuthorizationFilter` filter to the default settings. Please upgrade to the newest version in order to mitigate the issue. ### Workarounds It is possible to fix the issue by using the `LocalRequestsOnlyAuthorizationFilter` explicitly when configuring the Dashboard UI. In this case upgrade is not required. ```csharp // using Hangfire.Dashboard; app.UseHangfireDashboard("/hangfire", new DashboardOptions { Authorization = new []{ new LocalRequestsOnlyAuthorizationFilter(); } }); ``` ### References Original GitHub Issue: https://github.com/HangfireIO/Hangfire/issues/1958
{'CVE-2021-41238'}
2021-11-03T17:32:45Z
2021-11-03T17:30:59Z
HIGH
8.6
{'CWE-862'}
{'https://www.nuget.org/packages/Hangfire.Core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41238', 'https://github.com/HangfireIO/Hangfire/security/advisories/GHSA-7rq6-7gv8-c37h', 'https://github.com/advisories/GHSA-7rq6-7gv8-c37h', 'https://github.com/HangfireIO/Hangfire/issues/1958'}
null
GHSA
GHSA-9h36-4jf2-hx53
High severity vulnerability that affects extlib
The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
{'CVE-2013-1802'}
2021-09-07T21:40:42Z
2017-10-24T18:33:37Z
HIGH
0
null
{'https://github.com/advisories/GHSA-9h36-4jf2-hx53', 'https://bugzilla.redhat.com/show_bug.cgi?id=917233', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1802', 'https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5'}
null
GHSA
GHSA-72fg-jqhx-c68p
Open Redirect in st
st is a module for serving static files. An attacker is able to craft a request that results in an `HTTP 301` (redirect) to an entirely different domain. A request for: `http://some.server.com//nodesecurity.org/%2e%2e` would result in a 301 to `//nodesecurity.org/%2e%2e` which most browsers treat as a proper redirect as `//` is translated into the current schema being used. Mitigating factor: In order for this to work, `st` must be serving from the root of a server (`/`) rather than the typical sub directory (`/static/`) and the redirect URL will end with some form of URL encoded `..` ("%2e%2e", "%2e.", ".%2e"). Code example (provided by Xin Gao): [example.js] ``` var st = require('st') var http = require('http') http.createServer(st(process.cwd())).listen(1337) ``` ``` $ curl -v http://localhost:1337//cve.mitre.com/%2e%2e * Trying ::1... * TCP_NODELAY set * Connected to localhost (::1) port 1337 (#0) > GET //cve.mitre.com/%2e%2e HTTP/1.1 > Host: localhost:1337 > User-Agent: curl/7.54.0 > Accept: */* > < HTTP/1.1 301 Moved Permanently < cache-control: public, max-age=600 < last-modified: Fri, 13 Oct 2017 22:56:33 GMT < etag: "16777220-46488904-1507935393000" < location: //cve.mitre.com/%2e%2e/ < Date: Fri, 13 Oct 2017 22:56:41 GMT < Connection: keep-alive < Content-Length: 30 < * Connection #0 to host localhost left intact ``` ## Recommendation Update to version 1.2.2 or later.
{'CVE-2017-16224'}
2021-01-08T19:19:20Z
2018-08-06T21:33:31Z
MODERATE
0
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16224', 'https://www.npmjs.com/advisories/547', 'https://nodesecurity.io/advisories/547', 'https://github.com/advisories/GHSA-72fg-jqhx-c68p'}
null
GHSA
GHSA-xmjj-3c76-5w84
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in directus
### Impact Unauthorized JavaScript can be executed by inserting an iframe into the rich text html interface that links to a file uploaded HTML file that loads another uploaded JS file in its script tag. This satisfies the regular content security policy header, which in turn allows the file to run any arbitrary JS. ### Patches This was resolved in https://github.com/directus/directus/pull/12020 which is released in 9.7.0 ### Workarounds You can disable the live embed in the WYSIWYG by adding `{ "media_live_embeds": false }` to the _Options Overrides_ option of the Rich Text HTML interface. ### References https://github.com/directus/directus/pull/12020 ### For more information If you have any questions or comments about this advisory: * Open an issue in [directus/directus](https://github.com/directus/directus) * Email us at [security@directus.io](mailto:security@directus.io)
{'CVE-2022-24814'}
2022-04-06T18:47:51Z
2022-04-05T18:30:15Z
HIGH
8.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-xmjj-3c76-5w84', 'https://github.com/directus/directus/pull/12020', 'https://github.com/directus/directus/security/advisories/GHSA-xmjj-3c76-5w84', 'https://github.com/directus/directus/releases/tag/v9.7.0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24814'}
null
GHSA
GHSA-6mrq-7r7m-hh4p
Malicious Package in hs-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:21:59Z
2020-09-03T22:52:58Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1275', 'https://github.com/advisories/GHSA-6mrq-7r7m-hh4p'}
null
GHSA
GHSA-cmwx-9m2h-x7v4
Ansible apt_key module does not properly verify key fingerprint
A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.
{'CVE-2016-8614'}
2022-04-26T18:41:33Z
2018-10-10T17:23:26Z
HIGH
7.5
{'CWE-358'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-8614', 'https://github.com/advisories/GHSA-cmwx-9m2h-x7v4'}
null
GHSA
GHSA-x345-32rc-8h85
Denial of service attack via push rule patterns in matrix-synapse
### Impact "Push rules" can specify [conditions](https://matrix.org/docs/spec/client_server/r0.6.1#conditions) under which they will match, including `event_match`, which matches event content against a pattern including wildcards. Certain patterns can cause very poor performance in the matching engine, leading to a denial-of-service when processing moderate length events. ### Patches The issue is patched by https://github.com/matrix-org/synapse/commit/03318a766cac9f8b053db2214d9c332a977d226c. ### Workarounds A potential workaround might be to prevent users from making custom push rules, by blocking such requests at a reverse-proxy. ### For more information If you have any questions or comments about this advisory, email us at security@matrix.org.
{'CVE-2021-29471'}
2022-04-07T15:09:54Z
2021-05-13T20:22:51Z
LOW
3.7
{'CWE-331', 'CWE-400'}
{'https://github.com/matrix-org/synapse/commit/03318a766cac9f8b053db2214d9c332a977d226c', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-x345-32rc-8h85', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29471', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/advisories/GHSA-x345-32rc-8h85', 'https://github.com/matrix-org/synapse/releases/tag/v1.33.2'}
null
GHSA
GHSA-jp32-vmm6-3vf5
Directory Traversal in Kubernetes
Directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0, allows attackers to write to arbitrary files via a crafted object type name, which is not properly handled before passing it to etcd.
{'CVE-2015-5305'}
2022-04-12T22:38:09Z
2022-02-15T01:57:18Z
MODERATE
6.5
{'CWE-22'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1273969', 'https://access.redhat.com/errata/RHSA-2015:1945', 'https://github.com/kubernetes/kubernetes/commit/68f2add9bd5d43b9da1424d87d88f83d120e17d0', 'https://github.com/advisories/GHSA-jp32-vmm6-3vf5', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5305', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5305'}
null
GHSA
GHSA-gjxw-5w2q-7grf
Moderate severity vulnerability that affects rails
Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs.
{'CVE-2010-3933'}
2021-09-10T22:04:03Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-20'}
{'http://securitytracker.com/id?1024624', 'https://github.com/advisories/GHSA-gjxw-5w2q-7grf', 'https://nvd.nist.gov/vuln/detail/CVE-2010-3933', 'http://www.vupen.com/english/advisories/2010/2719', 'http://secunia.com/advisories/41930', 'http://weblog.rubyonrails.org/2010/10/15/security-vulnerability-in-nested-attributes-code-in-ruby-on-rails-2-3-9-and-3-0-0'}
null
GHSA
GHSA-j24p-r6wx-r79w
High severity vulnerability that affects thin
lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header.
{'CVE-2009-3287'}
2021-09-14T18:09:45Z
2017-10-24T18:33:38Z
HIGH
0
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2009-3287', 'http://github.com/macournoyer/thin/blob/master/CHANGELOG', 'http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a', 'https://github.com/advisories/GHSA-j24p-r6wx-r79w', 'http://www.openwall.com/lists/oss-security/2009/09/12/1'}
null
GHSA
GHSA-jvg4-9rc2-wvcr
Generation of fake documents via public GET-call
### Impact Generation of fake documents via public GET-call ### Patches We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021
null
2021-09-27T21:00:30Z
2021-02-10T02:32:07Z
LOW
0
{'CWE-862'}
{'https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351', 'https://github.com/shopware/platform/security/advisories/GHSA-jvg4-9rc2-wvcr', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021', 'https://github.com/advisories/GHSA-jvg4-9rc2-wvcr', 'https://packagist.org/packages/shopware/platform'}
null
GHSA
GHSA-8wf2-3ggj-78q9
Improper Authentication in phpmyadmin
An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.
{'CVE-2022-23807'}
2022-01-28T22:44:40Z
2022-01-28T22:44:40Z
MODERATE
4.3
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23807', 'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32', 'https://www.phpmyadmin.net/security/PMASA-2022-1/', 'https://github.com/advisories/GHSA-8wf2-3ggj-78q9'}
null
GHSA
GHSA-9cq3-fj2h-ggj5
Vulnerability in remove function leads to arbitrary code execution via filePath parameters
Aaptjs is a node wraper for aapt. An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
{'CVE-2020-36379'}
2022-05-05T13:48:10Z
2021-11-02T15:42:31Z
CRITICAL
9.8
{'CWE-77', 'CWE-78'}
{'https://github.com/advisories/GHSA-9cq3-fj2h-ggj5', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36379'}
null
GHSA
GHSA-g8wg-cjwc-xhhp
Heap OOB in nested `tf.map_fn` with `RaggedTensor`s
### Impact It is possible to nest a `tf.map_fn` within another `tf.map_fn` call. However, if the input tensor is a `RaggedTensor` and there is no function signature provided, code assumes the output is a fully specified tensor and fills output buffer with uninitialized contents from the heap: ```python import tensorflow as tf x = tf.ragged.constant([[1,2,3], [4,5], [6]]) t = tf.map_fn(lambda r: tf.map_fn(lambda y: r, r), x) z = tf.ragged.constant([[[1,2,3],[1,2,3],[1,2,3]],[[4,5],[4,5]],[[6]]]) ``` The `t` and `z` outputs should be identical, however this is not the case. The last row of `t` contains data from the heap which can be used to leak other memory information. The bug lies in the conversion from a `Variant` tensor to a `RaggedTensor`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/ragged_tensor_from_variant_op.cc#L177-L190) does not check that all inner shapes match and this results in the additional dimensions in the above example. The same implementation can result in data loss, if input tensor is tweaked: ```python import tensorflow as tf x = tf.ragged.constant([[1,2], [3,4,5], [6]]) t = tf.map_fn(lambda r: tf.map_fn(lambda y: r, r), x) ``` Here, the output tensor will only have 2 elements for each inner dimension. ### Patches We have patched the issue in GitHub commit [4e2565483d0ffcadc719bd44893fb7f609bb5f12](https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Haris Sahovic.
{'CVE-2021-37679'}
2021-08-25T14:41:00Z
2021-08-25T14:41:00Z
HIGH
7.1
{'CWE-681', 'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37679', 'https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12', 'https://github.com/advisories/GHSA-g8wg-cjwc-xhhp', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g8wg-cjwc-xhhp'}
null
GHSA
GHSA-4xww-6h7v-29jg
User enumeration in livehelperchat
livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information. There is an observable discrepancy between errors generated for users that exist and those that do not.
{'CVE-2022-0083'}
2022-01-21T23:37:07Z
2022-01-21T23:37:07Z
MODERATE
0
{'CWE-209'}
{'https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0083', 'https://github.com/advisories/GHSA-4xww-6h7v-29jg', 'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'}
null
GHSA
GHSA-9w6v-m7wp-jwg4
Http request which redirect to another hostname do not strip authorization header in @actions/http-client
### Impact If consumers of the http-client: 1. make an http request with an authorization header 2. that request leads to a redirect (302) and 3. the redirect url redirects to another domain or hostname The authorization header will get passed to the other domain. Note that since this library is for actions, the GITHUB_TOKEN that is available in actions is generated and scoped per job with [these permissions](https://help.github.com/en/actions/configuring-and-managing-workflows/authenticating-with-the-github_token#permissions-for-the-github_token). ### Patches The problem is fixed in 1.0.8 at [npm here](https://www.npmjs.com/package/@actions/http-client). In 1.0.8, the authorization header is stripped before making the redirected request if the hostname is different. ### Workarounds None. ### References https://github.com/actions/http-client/pull/27 ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/actions/http-client/issues
{'CVE-2020-11021'}
2021-08-25T21:03:12Z
2020-04-29T17:58:53Z
MODERATE
6.3
{'CWE-200'}
{'https://github.com/actions/http-client/security/advisories/GHSA-9w6v-m7wp-jwg4', 'https://github.com/advisories/GHSA-9w6v-m7wp-jwg4', 'https://github.com/actions/http-client/pull/27', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11021', 'https://github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53a'}
null
GHSA
GHSA-77xq-cpvg-7xm2
Prototype pollution in @tsed/core
"This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program."
{'CVE-2020-7748'}
2021-08-02T15:31:01Z
2021-05-10T19:07:56Z
MODERATE
5.6
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7748', 'https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b', 'https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36', 'https://github.com/advisories/GHSA-77xq-cpvg-7xm2', 'https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382'}
null
GHSA
GHSA-xgpf-p52j-pf7m
XSS in CreateQueuedJobTask
A vulnerability has been identified in the Silverstripe CMS 3 and 4 version of the symbiote/silverstripe-queuedjobs module. A Cross Site Scripting vulnerability allows an attacker to inject an arbitrary payload in the CreateQueuedJobTask dev task via a specially crafted URL.
{'CVE-2021-27938'}
2021-03-24T17:42:02Z
2021-03-24T17:42:02Z
MODERATE
0
{'CWE-79'}
{'https://www.silverstripe.org/download/security-releases/cve-2021-27938', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27938', 'https://github.com/symbiote/silverstripe-queuedjobs/releases', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symbiote/silverstripe-queuedjobs/CVE-2021-27938.yaml', 'https://github.com/advisories/GHSA-xgpf-p52j-pf7m'}
null
GHSA
GHSA-c9qf-r67m-p7cg
Null pointer dereference in `CompressElement`
### Impact It is possible to trigger a null pointer dereference in TensorFlow by passing an invalid input to `tf.raw_ops.CompressElement`: ```python import tensorflow as tf tf.raw_ops.CompressElement(components=[[]]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/data/compression_utils.cc#L34) was accessing the size of a buffer obtained from the return of a separate function call before validating that said buffer is valid. ### Patches We have patched the issue in GitHub commit [5dc7f6981fdaf74c8c5be41f393df705841fb7c5](https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360. Concurrently, it was resolved in `master` branch as it was also discovered internally and fixed before the report was handled.
{'CVE-2021-37637'}
2021-08-25T14:44:12Z
2021-08-25T14:44:12Z
HIGH
7.7
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/commit/5dc7f6981fdaf74c8c5be41f393df705841fb7c5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9qf-r67m-p7cg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37637', 'https://github.com/advisories/GHSA-c9qf-r67m-p7cg'}
null
GHSA
GHSA-3cgf-9m6x-pwwr
Data races in rusqlite
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via UnlockNotification.
{'CVE-2020-35868'}
2021-08-25T20:47:50Z
2021-08-25T20:47:50Z
CRITICAL
9.8
{'CWE-362'}
{'https://github.com/advisories/GHSA-3cgf-9m6x-pwwr', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35868', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://github.com/rusqlite/rusqlite/commit/45fd77ee43c38eea4d6f4e2e56c1667a55ec654f'}
null
GHSA
GHSA-x7jg-6pwg-fx5h
HTTP Smuggling via Transfer-Encoding Header in Puma
### Impact By using an invalid transfer-encoding header, an attacker could [smuggle an HTTP response.](https://portswigger.net/web-security/request-smuggling) Originally reported by @ZeddYu, who has our thanks for the detailed report. ### Patches The problem has been fixed in Puma 3.12.5 and Puma 4.3.4. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
{'CVE-2020-11076'}
2022-04-19T19:02:26Z
2020-05-22T14:55:05Z
HIGH
7.5
{'CWE-444'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html', 'https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html', 'https://github.com/advisories/GHSA-x7jg-6pwg-fx5h', 'https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22', 'https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11076'}
null
GHSA
GHSA-c32g-2mgr-cfq7
Out-of-bounds Write in iText
iText v7.1.17 was discovered to contain a stack-based buffer overflow via the component ByteBuffer.append, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
{'CVE-2022-24197'}
2022-04-17T17:02:19Z
2022-02-02T00:01:45Z
MODERATE
6.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24197', 'https://github.com/itext/itext7/pull/78#issuecomment-1089282165', 'https://github.com/advisories/GHSA-c32g-2mgr-cfq7', 'https://github.com/itext/itext7/pull/78'}
null
GHSA
GHSA-rjvg-q57v-mjjc
XSS in Apache Airflow
In Apache Airflow before 1.10.5 when running with the "classic" UI, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. The new "RBAC" UI is unaffected.
{'CVE-2019-12398'}
2021-08-25T21:05:59Z
2020-05-06T19:51:02Z
MODERATE
4.8
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2020/01/14/2', 'https://lists.apache.org/thread.html/r72487ad6b23d18689896962782f8c93032afe5c72a6bfd23b253352b@%3Cdev.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r72487ad6b23d18689896962782f8c93032afe5c72a6bfd23b253352b%40%3Cusers.airflow.apache.org%3E', 'https://github.com/apache/airflow/blob/1.10.5/CHANGELOG.txt', 'https://github.com/advisories/GHSA-rjvg-q57v-mjjc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12398'}
null
GHSA
GHSA-5wrh-4jwv-5w78
Open redirect via transitional IPv6 addresses on dual-stack networks
### Impact Requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addresses were used. Outbound requests to federation, identity servers, when calculating the key validity for third-party invite events, sending push notifications, and generating URL previews are affected. This could cause Synapse to make requests to internal infrastructure on dual-stack networks. ### Patches This issue is fixed by #9240. ### Workarounds Outbound requests to the following address ranges can be blocked by a firewall, if unused for internal communication between systems: * `::ffff/80` * `::0000/80` (note that this IP range is considered deprecated by the IETF) * `2002::/16` (note that this IP range is considered deprecated by the IETF) ### References * [RFC3056](https://tools.ietf.org/html/rfc3056) * [RFC4291](https://tools.ietf.org/html/rfc4291)
{'CVE-2021-21392'}
2022-04-19T19:02:47Z
2021-04-13T15:13:08Z
MODERATE
6.3
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21392', 'https://github.com/matrix-org/synapse/pull/9240', 'https://github.com/advisories/GHSA-5wrh-4jwv-5w78', 'https://pypi.org/project/matrix-synapse/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-5wrh-4jwv-5w78'}
null
GHSA
GHSA-v543-gqhh-6gww
Moderate severity vulnerability that affects activemodel
Withdrawn, accidental duplicate publish. Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.
null
2021-12-03T14:23:18Z
2018-09-17T21:55:43Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-0753', 'https://github.com/advisories/GHSA-v543-gqhh-6gww'}
null
GHSA
GHSA-gff7-g5r8-mg8m
Prototype Pollution in simple-plist
simple-plist v1.3.0 was discovered to contain a prototype pollution vulnerability via .parse().
{'CVE-2022-26260'}
2022-03-29T21:44:08Z
2022-03-23T00:00:22Z
CRITICAL
9.8
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26260', 'https://github.com/wollardj/simple-plist/issues/60', 'https://github.com/advisories/GHSA-gff7-g5r8-mg8m'}
null
GHSA
GHSA-xv7x-x6wr-xx7g
Moderate severity vulnerability that affects org.apache.ranger:ranger
Apache Ranger before 0.6.3 policy engine incorrectly matches paths in certain conditions when policy does not contain wildcards and has recursion flag set to true.
{'CVE-2016-8746'}
2021-09-22T16:46:50Z
2018-10-17T17:22:05Z
MODERATE
5.9
{'CWE-426'}
{'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'http://www.securityfocus.com/bid/95998', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8746', 'https://github.com/advisories/GHSA-xv7x-x6wr-xx7g'}
null
GHSA
GHSA-2w8q-69fh-9gq6
Malicious Package in bufger-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:27:55Z
2020-09-03T22:25:09Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-2w8q-69fh-9gq6', 'https://www.npmjs.com/advisories/1263'}
null
GHSA
GHSA-pgcq-h79j-2f69
Incomplete validation of shapes in multiple TF ops
### Impact Several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenarios writes and reads from heap populated arrays are also possible. We have discovered these issues internally via tooling while working on improving/testing GPU op determinism. As such, we don't have reproducers and there will be multiple fixes for these issues. ### Patches We have patched the issue in GitHub commits [68422b215e618df5ad375bcdc6d2052e9fd3080a](https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a), [4d74d8a00b07441cba090a02e0dd9ed385145bf4](https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4), [579261dcd446385831fe4f7457d802a59685121d](https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d), [da4aad5946be30e5f049920fa076e1f7ef021261](https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261), [4dddb2fd0b01cdd196101afbba6518658a2c9e07](https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07), and [e7f497570abb6b4ae5af4970620cd880e4c0c904](https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904). These fixes will be included in TensorFlow 2.7.0. We will also cherrypick these commits on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2021-41206'}
2021-11-10T19:03:38Z
2021-11-10T19:03:38Z
HIGH
7
{'CWE-354'}
{'https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261', 'https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69', 'https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d', 'https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a', 'https://github.com/advisories/GHSA-pgcq-h79j-2f69', 'https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41206', 'https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07'}
null
GHSA
GHSA-3m3h-v9hv-9j4h
Cross-site Scripting in django-wiki
In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.
{'CVE-2021-25986'}
2021-12-02T17:49:40Z
2021-12-02T17:49:40Z
MODERATE
5.4
{'CWE-79'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986', 'https://github.com/advisories/GHSA-3m3h-v9hv-9j4h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25986', 'https://github.com/django-wiki/django-wiki/pull/1148', 'https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5'}
null
GHSA
GHSA-jxm5-5xcw-h57q
Moderate severity vulnerability that affects org.exist-db:exist-core
exist version <= 5.0.0-RC4 contains a XML External Entity (XXE) vulnerability in XML Parser for REST Server that can result in Disclosure of confidential data, denial of service, SSRF, port scanning.
{'CVE-2018-1000823'}
2021-06-10T22:57:25Z
2018-12-20T22:02:17Z
CRITICAL
10
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000823', 'https://0dd.zone/2018/10/27/exist-XXE/', 'https://github.com/eXist-db/exist/issues/2180', 'https://github.com/advisories/GHSA-jxm5-5xcw-h57q'}
null
GHSA
GHSA-h79x-98r2-g6qc
Impersonation of other users (passing XBOX Live authentication) by theft of logins in PocketMine-MP
# Impact Minecraft Bedrock authentication and its protocol encryption are inseparably linked. One is not complete without the other. This vulnerability affects servers which are able to be directly connected to via the internet (i.e. not behind a proxy). If you are using a proxy, please check that it supports protocol encryption and that it is enabled. # Technical details <details> <summary>click to expand</summary> ## Basics 1. The client generates a private ECC key `clientPriv` which it uses to complete ECDH for encryption. 2. A JWT containing the public key `clientPub` corresponding to this key is signed by Microsoft servers with the [Mojang root public key](https://github.com/pmmp/PocketMine-MP/blob/stable/src/network/mcpe/auth/ProcessLoginTask.php#L42) `mojangPub`. 3. The server verifies that the token was issued by Microsoft servers by verifying the JWT signature with `mojangPub`. ## Why this is a problem However, this only ensures that the token was issued by Microsoft. It does _not_ ensure that the client actually possesses the private key corresponding to the public key in the token. In a login replay attack, the attacker sends a login captured from another session. This login is valid because it is verifiable by `mojangPub`; however, without encryption, the server doesn't know that the client actually possesses `clientPriv`, and the authenticity of the client cannot be verified. ## How encryption prevents the attack 1. The server calculates a shared secret for encryption using ECDH of `serverPriv` and `clientPub`. 2. It then signs a return token using `serverPriv` and sends this to the client, along with `serverPub`. 3. The client then verifies the JWT using `serverPub`, and calculates the same shared secret as the server using `clientPriv` and `serverPub`. If the client does not possess `clientPriv` (i.e. because it replayed a stolen login), then the session cannot proceed once encryption is enabled, since the client cannot calculate the shared secret needed to decrypt the server packets and encrypt its own packets. **Since PM3 does not implement protocol encryption, this means that ALL versions of PM3 are affected by this login stealing attack.** ## How does the attacker capture a login in the first place? The typical way to do this would be to trick a player into joining a server controlled by the attacker. This would allow the attacker to grab the login from the connection and store it for future use. ## Are the logins valid forever? No. All the JWTs have expiry dates after which they cannot be used. These expiry dates are typically 2-3 days after the token was issued by XBOX servers. PocketMine-MP 3.x does verify these expiry dates, so the use-by dates of these attacks are limited. </details> # Patches This problem has been fixed in all 4.x versions by implementing Minecraft protocol encryption. ~This has not yet been addressed on 3.x, but since this vulnerability is already public knowledge, the advisory has been released early to make sure people are aware of it and the mitigation steps they can take.~ Update 2022-01-22: This has been fixed on 3.x by d28be4eaf24a890f7ef110a51181a3d806a6acca. # Workarounds - Use a proxy that supports encryption such as [gophertunnel](https://github.com/Sandertv/gophertunnel) between your server and players. Make sure that the server only accepts connections from the proxy. If the proxy is on the same machine as the server, you can use `server-ip=127.0.0.1` to ensure that only the proxy can create connections for you. The following things may help mitigate the problem: - Verify that the `LoginPacket` `serverAddress` field is the same as the server's exposed domain name. For example: https://github.com/JustTalDevelops/AntiLoginForger **WARNING: THIS DOES NOT SOLVE THE ROOT ISSUE. YOU WILL REMAIN VULNERABLE UNLESS YOU UPGRADE.** # For more information If you have any questions or comments about this advisory: * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-01-24T22:08:05Z
2022-01-21T23:02:15Z
MODERATE
4.7
null
{'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-h79x-98r2-g6qc', 'https://github.com/advisories/GHSA-h79x-98r2-g6qc', 'https://github.com/pmmp/PocketMine-MP/issues/4580'}
null
GHSA
GHSA-57wx-m983-2f88
Incomplete validation in boosted trees code
### Impact The [code for boosted trees in TensorFlow](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc) is still missing validation. As a result, attackers can trigger denial of service (via dereferencing `nullptr`s or via `CHECK`-failures) as well as abuse undefined behavior (binding references to `nullptr`s). An attacker can also read and write from heap buffers, depending on the API that gets used and the arguments that are passed to the call. **Note**: Given that the boosted trees implementation in TensorFlow is unmaintained, it is recommend to no longer use these APIs. Instead, please use the downstream [TensorFlow Decision Forests](https://github.com/tensorflow/decision-forests) project which is newer and supports more features. We will deprecate TensorFlow's boosted trees APIs in subsequent releases. ### Patches We have patched the issue in GitHub commit [5c8c9a8bfe750f9743d0c859bae112060b216f5c](https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41208'}
2021-11-10T19:37:56Z
2021-11-10T19:37:56Z
CRITICAL
9.3
{'CWE-476', 'CWE-824'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41208', 'https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88', 'https://github.com/advisories/GHSA-57wx-m983-2f88'}
null
GHSA
GHSA-rcvx-rmvf-mxch
Cross-site Scripting in Eclipse Hawkbit
In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client.
{'CVE-2020-27219'}
2022-02-09T22:19:44Z
2022-02-09T22:19:44Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-27219', 'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=570289', 'https://github.com/eclipse/hawkbit/issues/1067', 'https://github.com/advisories/GHSA-rcvx-rmvf-mxch'}
null
GHSA
GHSA-qwp9-52h8-xgg8
Prototype pollution in JointJS
The package jointjs before 3.3.0 are vulnerable to Prototype Pollution via util.setByPath (https://resources.jointjs.com/docs/jointjs/v3.2/joint.htmlutil.setByPath). The path used the access the object's key and set the value is not properly sanitized, leading to a Prototype Pollution.
{'CVE-2020-28480'}
2021-01-20T21:21:16Z
2021-01-20T21:21:16Z
HIGH
0
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444', 'https://github.com/advisories/GHSA-qwp9-52h8-xgg8', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036', 'https://github.com/clientIO/joint/blob/master/src/util/util.mjs%23L150', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28480', 'https://github.com/clientIO/joint/pull/1406', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037'}
null
GHSA
GHSA-jphg-qwrw-7w9g
Unsafe object creation in json RubyGem
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269/GHSA-x457-cw4h-hq5f, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.
{'CVE-2020-10663'}
2021-09-23T13:55:55Z
2020-07-27T18:08:21Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2020-10663.yml', 'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html', 'https://github.com/advisories/GHSA-jphg-qwrw-7w9g', 'https://github.com/flori/json/blob/master/CHANGES.md#2019-12-11-230', 'https://support.apple.com/kb/HT211931', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/', 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10663', 'https://security.netapp.com/advisory/ntap-20210129-0003/', 'https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/', 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/', 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html', 'https://www.debian.org/security/2020/dsa-4721', 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E', 'http://seclists.org/fulldisclosure/2020/Dec/32'}
null
GHSA
GHSA-gfjr-xqhm-qvv3
Malicious Package in aysnc
All versions of `aysnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:01:13Z
2020-09-02T20:16:09Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-gfjr-xqhm-qvv3', 'https://www.npmjs.com/advisories/848'}
null
GHSA
GHSA-cgc7-mwp4-3ccx
Cross-site Scripting in Joplin
An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.
{'CVE-2020-15930'}
2021-05-07T16:29:05Z
2021-05-07T16:29:05Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/laurent22/joplin/releases/tag/v1.1.4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15930', 'https://github.com/advisories/GHSA-cgc7-mwp4-3ccx', 'http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html', 'https://github.com/laurent22/joplin/issues/3552'}
null
GHSA
GHSA-x55w-vjjp-222r
Inefficient Regular Expression in inflect
inflect is customizable inflections for nodejs. inflect is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3820'}
2022-05-05T13:49:05Z
2021-09-29T17:12:19Z
MODERATE
5.3
{'CWE-400', 'CWE-697', 'CWE-1333'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3820', 'https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b', 'https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a', 'https://github.com/advisories/GHSA-x55w-vjjp-222r'}
null
GHSA
GHSA-q34h-97wf-8r8j
vault-cli contains possible RCE when reading user-defined data
### Impact _What kind of vulnerability is it? Who is impacted?_ vault-cli features the ability for rendering templated values (as explained in the [documentation](https://github.com/peopledoc/vault-cli/blob/2.2.1/docs/howto/templated_secrets.rst)). When a secret starts with the prefix `!template!`, vault-cli interprets the rest of the contents of the secret as a Jinja2 template. Jinja2 is a powerful templating engine and it's not designed to safely render arbitrary templates. An attacker controlling a jinja2 template rendered on a machine can trigger arbitrary code, making this a Remote Code Execution (RCE) risk. If the content of the vault can be completely trusted, then this is not a problem. Otherwise, if your threat model includes cases where an attacker can manipulate a secret value read from the vault using vault-cli, then this vulnerability may impact you. This does not impact `vault` itself, except for the fact that the attacker, having an RCE on the machine that executes `vault-cli`, may abuse the token that `vault-cli` uses, to read, write or delete other data from the vault. ### Patches _Has the problem been patched? What versions should users upgrade to?_ In 3.0.0, the code related to interpreting vault templated secrets has been removed entirely. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Using the environment variable `VAULT_CLI_RENDER=false` or the flag `--no-render` (placed between `vault-cli` and the subcommand, e.g. `vault-cli --no-render get-all`) or adding `render: false` to the vault-cli configuration yaml file disables rendering and removes the vulnerability. Using the python library, you can use: `vault_cli.get_client(render=False)` when creating your client to get a client that will not render templated secrets and thus operates securely. ### References _Are there any links users can visit to find out more?_ Here's an article explaining how jinja2 templates might be exploited to have side effects: https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [the vault-cli repo](https://github.com/peopledoc/vault-cli/issues/new)
{'CVE-2021-43837'}
2022-04-19T19:03:18Z
2021-12-16T21:02:12Z
HIGH
8.4
{'CWE-74'}
{'https://github.com/peopledoc/vault-cli/releases/tag/3.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43837', 'https://github.com/peopledoc/vault-cli/security/advisories/GHSA-q34h-97wf-8r8j', 'https://github.com/advisories/GHSA-q34h-97wf-8r8j', 'https://github.com/peopledoc/vault-cli/pull/198', 'https://github.com/peopledoc/vault-cli/commit/3ba3955887fd6b7d4d646c8b260f21cebf5db852', 'https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/'}
null
GHSA
GHSA-w5rh-j4g3-jr29
Missing Authorization in Jenkins S3 publisher Plugin
Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain the list of configured profiles.
{'CVE-2021-21651'}
2021-06-16T17:29:17Z
2021-06-16T17:29:17Z
MODERATE
4.3
{'CWE-862'}
{'https://github.com/advisories/GHSA-w5rh-j4g3-jr29', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2201', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21651'}
null
GHSA
GHSA-4v6p-cxf9-98rf
Allocation of Resources Without Limits or Throttling in metadata-extractor
When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library.
{'CVE-2022-24614'}
2022-03-08T21:10:21Z
2022-02-25T00:01:05Z
MODERATE
5.5
{'CWE-770'}
{'https://github.com/drewnoakes/metadata-extractor/issues/561', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24614', 'https://github.com/advisories/GHSA-4v6p-cxf9-98rf'}
null
GHSA
GHSA-3mf3-2gv9-h39j
Uninitialized buffer use in marc
An issue was discovered in the marc crate before 2.0.0 for Rust. A user-provided Read implementation can gain access to the old contents of newly allocated memory, violating soundness.
{'CVE-2021-26308'}
2021-08-25T20:53:14Z
2021-08-25T20:53:14Z
HIGH
7.5
{'CWE-908'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0014.html', 'https://github.com/blackbeam/rust-marc/issues/7', 'https://github.com/advisories/GHSA-3mf3-2gv9-h39j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26308'}
null
GHSA
GHSA-6j89-jhpr-849f
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1308, CVE-2019-1335, CVE-2019-1366.
{'CVE-2019-1307'}
2021-03-29T20:55:46Z
2021-03-29T20:55:46Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1307', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1307', 'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b', 'https://github.com/advisories/GHSA-6j89-jhpr-849f'}
null
GHSA
GHSA-vqqv-v9m2-48p2
Critical severity vulnerability that affects bootstrap-sass
Arbitrary code execution (via backdoor code) was discovered in bootstrap-sass 3.2.0.3, when downloaded from rubygems.org. An unauthenticated attacker can craft the ___cfduid cookie value with base64 arbitrary code to be executed via eval(), which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the __cfduid cookie that is legitimately used by Cloudflare.
{'CVE-2019-10842'}
2021-09-20T22:15:49Z
2019-04-04T16:28:47Z
CRITICAL
9.8
{'CWE-94'}
{'https://snyk.io/blog/malicious-remote-code-execution-backdoor-discovered-in-the-popular-bootstrap-sass-ruby-gem/', 'https://github.com/twbs/bootstrap-sass/issues/1195', 'https://snyk.io/vuln/SNYK-RUBY-BOOTSTRAPSASS-174093', 'https://github.com/advisories/GHSA-vqqv-v9m2-48p2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10842', 'http://dgb.github.io/2019/04/05/bootstrap-sass-backdoor.html'}
null
GHSA
GHSA-395w-qhqr-9fr6
Path Traversal in Apache Flink
A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
{'CVE-2020-17519'}
2021-03-05T21:37:59Z
2021-01-06T20:01:34Z
MODERATE
0
{'CWE-552', 'CWE-22'}
{'https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-395w-qhqr-9fr6', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/01/05/2', 'https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r2fc60b30557e4a537c2a6293023049bd1c49fd92b518309aa85a0398@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1@%3Cissues.flink.apache.org%3E', 'http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html', 'https://lists.apache.org/thread.html/r229167538863518738e02f4c1c5a8bb34c1d45dadcc97adf6676b0c1@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17519', 'https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/ra8c96bf3ccb4e491f9ce87ba35f134b4449beb2a38d1ce28fd89001f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d@%3Cissues.flink.apache.org%3E'}
null
GHSA
GHSA-59qg-grp7-5r73
Weave Net clusters susceptible to MitM attacks via IPv6 rogue router advertisements
### Impact An attacker able to run a process as root in a container is able to respond to DNS requests from the host and thereby insert themselves as a fake service. In a cluster with an IPv4 internal network, if IPv6 is not totally disabled on the host (via ipv6.disable=1 on the kernel cmdline), it will be either unconfigured or configured on some interfaces, but it’s pretty likely that ipv6 forwarding is disabled, ie /proc/sys/net/ipv6/conf//forwarding == 0. Also by default, /proc/sys/net/ipv6/conf//accept_ra == 1. The combination of these 2 sysctls means that the host accepts router advertisements and configure the IPv6 stack using them. By sending “rogue” router advertisements, an attacker can reconfigure the host to redirect part or all of the IPv6 traffic of the host to the attacker controlled container. Even if there was no IPv6 traffic before, if the DNS returns A (IPv4) and AAAA (IPv6) records, many HTTP libraries will try to connect via IPv6 first then fallback to IPv4, giving an opportunity to the attacker to respond. If by chance you also have on the host a vulnerability like last year’s RCE in apt (CVE-2019-3462), you can now escalate to the host. ### Patches Weave Net version 2.6.3 (to be released soon) will disable the accept_ra option on the veth devices that it creates. ### Workarounds Users should not run containers with CAP_NET_RAW capability. This has been the advice from Weave Net for years. https://www.weave.works/docs/net/latest/kubernetes/kube-addon/#-securing-the-setup ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Weave Net repo](https://github.com/weaveworks/weave/issues/new) * Join the <a href="https://slack.weave.works/" target="_blank">Weave Users Slack</a>.
{'CVE-2020-11091'}
2021-05-27T19:00:08Z
2021-05-27T19:00:08Z
MODERATE
5.8
{'CWE-350'}
{'https://github.com/weaveworks/weave/security/advisories/GHSA-59qg-grp7-5r73', 'https://github.com/weaveworks/weave/commit/15f21f1899060f7716c70a8555a084e836f39a60', 'https://github.com/advisories/GHSA-59qg-grp7-5r73', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11091'}
null
GHSA
GHSA-5vj8-3v2h-h38v
Remote Code Execution in next
Versions of `next` prior to 5.1.0 are vulnerable to Remote Code Execution. The `/path:` route fails to properly sanitize input and passes it to a `require()` call. This allows attackers to execute JavaScript code on the server. Note that prior version 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions. ## Recommendation Upgrade to version 5.1.0.
null
2022-04-28T19:57:45Z
2020-09-04T18:04:08Z
HIGH
0
{'CWE-20'}
{'https://www.npmjs.com/advisories/1538', 'https://github.com/advisories/GHSA-5vj8-3v2h-h38v'}
null
GHSA
GHSA-g694-m8vq-gv9h
URL Confusion When Scheme Not Supplied in medialize/uri.js
When parsing a URL without a scheme and with excessive slashes, like ///www.example.com, URI.js will parse the hostname as null and the path as /www.example.com. Such behaviour is different from that exhibited by browsers, which will parse ///www.example.com as http://www.example.com instead. For example, the following will cause a redirect to http://www.example.com:
{'CVE-2022-1233'}
2022-04-15T02:53:33Z
2022-04-05T00:00:17Z
MODERATE
6.5
{'CWE-601', 'CWE-115'}
{'https://github.com/advisories/GHSA-g694-m8vq-gv9h', 'https://huntr.dev/bounties/228d5548-1109-49f8-8aee-91038e88371c', 'https://github.com/medialize/uri.js/commit/88805fd3da03bd7a5e60947adb49d182011f1277', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1233'}
null
GHSA
GHSA-9r7h-6639-v5mw
Cross-Site Scripting in bootstrap-select
Versions of `bootstrap-select` prior to 1.13.6 are vulnerable to Cross-Site Scripting (XSS). The package does not escape `title` values on `<option>` tags. This may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 1.13.6 or later.
null
2021-10-04T21:12:36Z
2020-09-03T15:54:00Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-9r7h-6639-v5mw', 'https://www.npmjs.com/advisories/1522', 'https://github.com/dimpu/ngx-md/issues/129', 'https://github.com/snapappointments/bootstrap-select/issues/2199'}
null
GHSA
GHSA-h3m2-h22h-695r
Malicious Package in ali-contributor
All versions of `ali-contributor` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T17:49:52Z
2020-09-03T17:29:31Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1045', 'https://github.com/advisories/GHSA-h3m2-h22h-695r'}
null
GHSA
GHSA-6wp2-fw3v-mfmc
Memory corruption in array-tools
An issue was discovered in the array-tools crate before 0.3.2 for Rust. Affected versions of this crate don't guard against panics, so that partially uninitialized buffer is dropped when user-provided `T::clone()` panics in `FixedCapacityDequeLike<T, A>::clone()`. This causes memory corruption.
{'CVE-2020-36452'}
2021-08-25T20:57:19Z
2021-08-25T20:57:19Z
CRITICAL
9.8
{'CWE-909', 'CWE-908'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/array-tools/RUSTSEC-2020-0132.md', 'https://github.com/L117/array-tools/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2020-0132.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36452', 'https://github.com/advisories/GHSA-6wp2-fw3v-mfmc'}
null
GHSA
GHSA-w65j-g6c7-g3m4
Multiple memory safety issues in actix-web
Affected versions contain multiple memory safety issues, such as: - Unsoundly coercing immutable references to mutable references - Unsoundly extending lifetimes of strings - Adding the `Send` marker trait to objects that cannot be safely sent between threads This may result in a variety of memory corruption scenarios, most likely use-after-free. A signficant refactoring effort has been conducted to resolve these issues.
null
2021-08-25T20:42:50Z
2021-08-25T20:42:50Z
MODERATE
0
{'CWE-362'}
{'https://github.com/advisories/GHSA-w65j-g6c7-g3m4', 'https://github.com/actix/actix-web/issues/289', 'https://rustsec.org/advisories/RUSTSEC-2018-0019'}
null
GHSA
GHSA-hj48-42vr-x3v9
Regular Expression Denial of Service in path-parse
Affected versions of npm package `path-parse` are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
{'CVE-2021-23343'}
2021-08-10T15:34:57Z
2021-08-10T15:33:47Z
MODERATE
5.3
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028', 'https://github.com/jbgutierrez/path-parse/issues/8', 'https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067', 'https://github.com/advisories/GHSA-hj48-42vr-x3v9', 'https://github.com/jbgutierrez/path-parse/pull/10', 'https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23343'}
null
GHSA
GHSA-7xcv-wvr7-4h6p
Malicious npm package: an0n-chat-lib
The npm `an0n-chat-lib` package has been identified as malicious and removed from the npm package registry. ## Remediation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-01-29T18:12:19Z
2021-01-29T18:12:19Z
CRITICAL
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-7xcv-wvr7-4h6p', 'https://www.npmjs.com/advisories/1598', 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755'}
null
GHSA
GHSA-q485-j897-qc27
Moderate severity vulnerability that affects com.mchange:c3p0
c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.
{'CVE-2018-20433'}
2021-09-16T19:29:38Z
2019-01-07T19:14:34Z
CRITICAL
9.8
{'CWE-611'}
{'https://lists.debian.org/debian-lts-announce/2018/12/msg00021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20433', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/', 'https://github.com/advisories/GHSA-q485-j897-qc27', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/', 'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b'}
null
GHSA
GHSA-h26f-j4mv-84g7
Malicious Package in asycn
All versions of `asycn` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:00:38Z
2020-09-02T18:39:43Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/846', 'https://github.com/advisories/GHSA-h26f-j4mv-84g7'}
null
GHSA
GHSA-v4qh-6367-4cx2
Server-Side Request Forgery (SSRF) in Apache Olingo
Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker.
{'CVE-2020-1925'}
2021-08-19T16:54:37Z
2020-02-04T22:38:38Z
HIGH
7.5
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1925', 'https://mail-archives.apache.org/mod_mbox/olingo-user/202001.mbox/%3CCAGSZ4d6HwpF2woOrZJg_d0SkHytXJaCtAWXa3ZtBn33WG0YFvw%40mail.gmail.com%3E', 'https://github.com/advisories/GHSA-v4qh-6367-4cx2'}
null
GHSA
GHSA-69wp-xwm7-69wm
Exposure of Resource to Wrong Sphere in ThinkPHP Framework
ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php.
{'CVE-2022-25481'}
2022-04-05T20:52:39Z
2022-03-22T00:00:43Z
HIGH
7.5
{'CWE-668'}
{'https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md', 'https://github.com/advisories/GHSA-69wp-xwm7-69wm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25481'}
null
GHSA
GHSA-4mp3-385r-v63f
Denial of service attack due to invalid JSON
### Impact A denial of service attack against Matrix clients can be exploited by sending an event including invalid JSON data to Synapse. Synapse would relay the data to clients which could crash or hang. Impact is long-lasting if the event is made part of the room state. ### Patches At a minimum #8106 and #8291 must be applied. #7372 and #8124 include additional checks. ### Workarounds There are no known workarounds. ### Upgrading notes If an invalid event is accepted by an earlier Synapse it can become part of the room state and will not be fixed by upgrading Synapse. Redacting the invalid event should avoid clients receiving the invalid event.
{'CVE-2020-26890'}
2022-04-19T19:02:38Z
2020-11-24T22:58:58Z
HIGH
0
{'CWE-20'}
{'https://github.com/matrix-org/synapse/security/advisories/GHSA-4mp3-385r-v63f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7YXMMYQP46PYL664JQUXCA3LPBJU7DQ/', 'https://github.com/advisories/GHSA-4mp3-385r-v63f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U34DPP4ZLOEDUY2ZCWOHQPU5GA5LYNUQ/', 'https://pypi.org/project/matrix-synapse/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26890'}
null
GHSA
GHSA-7jgj-8wvc-jh57
.NET Core Information Disclosure
An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.
{'CVE-2018-8292'}
2021-04-21T19:16:06Z
2021-04-21T19:16:06Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/dotnet/announcements/issues/88', 'http://www.securityfocus.com/bid/105548', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8292', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8292', 'https://access.redhat.com/errata/RHSA-2018:2902', 'https://github.com/advisories/GHSA-7jgj-8wvc-jh57'}
null
GHSA
GHSA-fx46-whrj-73v5
Bypassing Sanitization using DOM clobbering in html-janitor
All versions of `html-janitor` are vulnerable to cross-site scripting (XSS). Arbitrary HTML can pass the sanitization process, which can be unexpected and dangerous (XSS) in case user-controlled input is passed to the clean function." ## Recommendation Upgrade to version 2.0.4 or later.
{'CVE-2017-0928'}
2021-09-21T17:04:18Z
2018-07-24T20:06:17Z
HIGH
0
{'CWE-642', 'CWE-547'}
{'https://github.com/advisories/GHSA-fx46-whrj-73v5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0928', 'https://hackerone.com/reports/308158', 'https://github.com/guardian/html-janitor/issues/35', 'https://www.npmjs.com/advisories/569'}
null
GHSA
GHSA-h5q8-5697-9p9h
Cross-Site Request Forgery in express-cart
The express-cart package through 1.1.10 for Node.js allows CSRF.
{'CVE-2020-22403'}
2021-09-10T17:11:55Z
2021-08-30T17:22:15Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/advisories/GHSA-h5q8-5697-9p9h', 'https://www.npmjs.com/package/express-cart', 'https://nvd.nist.gov/vuln/detail/CVE-2020-22403', 'https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb', 'https://hackerone.com/reports/395944', 'https://security.netapp.com/advisory/ntap-20210909-0004/'}
null
GHSA
GHSA-f6mq-5m25-4r72
Improper Validation of Specified Type of Input
Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshalling Go objects into BSON. A malicious user could use a Go object with specific string to potentially inject additional fields into marshalled documents. This issue affects all MongoDB GO Drivers up to (and including) 1.5.0.
{'CVE-2021-20329'}
2021-06-24T13:04:10Z
2021-06-15T16:08:16Z
MODERATE
6.8
{'CWE-20', 'CWE-1287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20329', 'https://github.com/advisories/GHSA-f6mq-5m25-4r72', 'https://github.com/mongodb/mongo-go-driver/releases/tag/v1.5.1'}
null
GHSA
GHSA-2r5h-gh4x-8hp9
Resources Downloaded over Insecure Protocol in igniteui
Affected versions of `igniteui` download Javascript and CSS resources over an unencrypted HTTP connection. An attacker with a privileged network position can intercept and view or modify any content sent or recieved over an unencrypted HTTP connection. ## Recommendation The `igniteui` package has been deprecated by the package author and now exists under [`ignite-ui`](https://preview.npmjs.com/package/ignite-ui), which should be used in place of this package.
{'CVE-2016-10552'}
2021-01-08T20:06:38Z
2019-02-18T23:40:14Z
LOW
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10552', 'https://github.com/advisories/GHSA-2r5h-gh4x-8hp9', 'https://nodesecurity.io/advisories/116', 'https://www.npmjs.com/advisories/116'}
null
GHSA
GHSA-6v39-p2xq-g5c3
Missing authentication in ShenYu
User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
{'CVE-2022-23944'}
2022-02-02T16:16:06Z
2022-01-28T22:13:44Z
CRITICAL
9.1
{'CWE-862', 'CWE-306'}
{'https://lists.apache.org/thread/dbrjnnlrf80dr0f92k5r2ysfvf1kr67y', 'http://www.openwall.com/lists/oss-security/2022/01/25/15', 'http://www.openwall.com/lists/oss-security/2022/01/25/5', 'https://github.com/advisories/GHSA-6v39-p2xq-g5c3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23944', 'http://www.openwall.com/lists/oss-security/2022/01/26/2'}
null
GHSA
GHSA-p7qp-3fh7-pv4p
Malicious Package in buffur-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:27:38Z
2020-09-03T22:24:04Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-p7qp-3fh7-pv4p', 'https://www.npmjs.com/advisories/1262'}
null
GHSA
GHSA-728c-42pc-fwxg
Unrestricted Upload of File with Dangerous Type in Crater
Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.
{'CVE-2022-0242'}
2022-01-21T23:54:50Z
2022-01-21T23:54:50Z
HIGH
7.2
{'CWE-434'}
{'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0242', 'https://github.com/advisories/GHSA-728c-42pc-fwxg', 'https://huntr.dev/bounties/19f3e5f7-b419-44b1-9c37-7e4404cbec94'}
null
GHSA
GHSA-2xw5-3767-qxvm
Malicious Package in ng-ui-library
Version 1.0.987 of `ng-ui-library` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2021-09-30T22:07:45Z
2020-09-11T21:21:20Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/940', 'https://github.com/advisories/GHSA-2xw5-3767-qxvm'}
null
GHSA
GHSA-qp49-3pvw-x4m5
sinatra does not validate expanded path matches
Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files.
{'CVE-2022-29970'}
2022-05-03T20:59:52Z
2022-05-03T00:00:43Z
MODERATE
0
{'CWE-426'}
{'https://github.com/sinatra/sinatra/pull/1683/commits/462c3ca1db53ed3cfc394cf5948e9c948ad1c10e', 'https://github.com/advisories/GHSA-qp49-3pvw-x4m5', 'https://github.com/skylightio/skylight-ruby/pull/294', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29970'}
null
GHSA
GHSA-8cpw-73f2-w58m
Cross-Site Scripting in selectize-plugin-a11y
Versions of `selectize-plugin-a11y ` prior to 1.1.0 are vulnerable to Cross-Site Scripting. The `accessibility.liveRegion.speak` function does not sanitize the `msg` variable before rendering it as HTML. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 1.1.0 or later.
{'CVE-2019-15482'}
2021-08-17T22:13:01Z
2019-08-27T17:38:33Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/SLMNBJ/selectize-plugin-a11y/pull/9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15482', 'https://www.npmjs.com/package/selectize-plugin-a11y/v/1.1.0', 'https://github.com/advisories/GHSA-8cpw-73f2-w58m', 'https://www.npmjs.com/advisories/1145'}
null
GHSA
GHSA-57gr-jvqr-3hwm
Incorrect access control in typo3_forum
The typo3_forum extension before 1.2.1 for TYPO3 has Incorrect Access Control.
{'CVE-2020-15513'}
2021-09-23T17:35:17Z
2020-07-29T18:07:38Z
MODERATE
5.3
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15513', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-010', 'https://github.com/advisories/GHSA-57gr-jvqr-3hwm'}
null
GHSA
GHSA-w973-2qcc-p78x
User Impersonation in converse.js
Versions of `converse.js` prior to 1.0.7 for 1.x or 2.0.5 for 2.x are vulnerable to User Impersonation. The package provides an incorrect implementation of [XEP-0280: Message Carbons](https://xmpp.org/extensions/xep-0280.html) that allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. ## Recommendation If you're using `converse.js` 1.x, upgrade to 1.0.7 or later. If you're using `converse.js` 2.x, upgrade to 2.0.5 or later.
{'CVE-2017-5858'}
2021-09-28T16:56:36Z
2020-09-11T21:19:09Z
MODERATE
5.9
{'CWE-346', 'CWE-20'}
{'https://rt-solutions.de/wp-content/uploads/2017/02/CVE-2017-5589_xmpp_carbons.pdf', 'https://github.com/advisories/GHSA-w973-2qcc-p78x', 'https://www.npmjs.com/advisories/974', 'http://openwall.com/lists/oss-security/2017/02/09/29', 'https://snyk.io/vuln/SNYK-JS-CONVERSEJS-449664', 'http://www.securityfocus.com/bid/96183', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5858', 'https://www.openwall.com/lists/oss-security/2017/02/09/29', 'https://rt-solutions.de/en/2017/02/CVE-2017-5589_xmpp_carbons/', 'https://github.com/jcbrand/converse.js/commit/42f249cabbbf5c026398e6d3b350f6f9536ea572'}
null
GHSA
GHSA-hxmg-hm46-cf62
Remote code execution in mongo-express
mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769.
{'CVE-2020-24391'}
2021-04-13T15:41:01Z
2021-04-13T15:41:01Z
HIGH
0
{'CWE-20'}
{'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a', 'https://github.com/advisories/GHSA-hxmg-hm46-cf62', 'https://github.com/mongodb-js/query-parser/issues/16', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24391'}
null
GHSA
GHSA-rv62-4pmj-xw6h
Moderate severity vulnerability that affects jupyterhub and notebook
An Open Redirect vulnerability for all browsers in Jupyter Notebook before 5.7.8 and some browsers (Chrome, Firefox) in JupyterHub before 0.9.6 allows crafted links to the login page, which will redirect to a malicious site after successful login. Servers running on a base_url prefix are not affected.
{'CVE-2019-10255'}
2021-09-17T20:42:44Z
2019-04-02T15:46:54Z
MODERATE
6.1
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10255', 'https://github.com/jupyter/notebook/commit/70fe9f0ddb3023162ece21fbb77d5564306b913b', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMDPJBVXOVO6LYGAT46VZNHH6JKSCURO/', 'https://github.com/jupyter/notebook/compare/05aa4b2...16cf97c', 'https://github.com/advisories/GHSA-rv62-4pmj-xw6h', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UP5RLEES2JBBNSNLBR65XM6PCD4EMF7D/', 'https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4', 'https://github.com/jupyter/notebook/commit/d65328d4841892b412aef9015165db1eb029a8ed', 'https://github.com/jupyter/notebook/commit/08c4c898182edbe97aadef1815cce50448f975cb'}
null
GHSA
GHSA-w4wq-rvmq-77x7
Cross-site scripting in anchorme
All versions of package anchorme are vulnerable to Cross-site Scripting (XSS) via the main functionality.
{'CVE-2021-23411'}
2021-08-02T22:48:27Z
2021-07-26T21:23:58Z
MODERATE
5.4
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1320695', 'https://snyk.io/vuln/SNYK-JS-ANCHORME-1311008', 'https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts%23L81', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23411', 'https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts#23L81', 'https://github.com/advisories/GHSA-w4wq-rvmq-77x7'}
null
GHSA
GHSA-j5mg-fpq8-vvxv
Directory Traversal in commentapp.stetsonwood
Affected versions of `commentapp.stetsonwood` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16143'}
2021-01-08T21:04:24Z
2018-07-23T20:48:14Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/470', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16143', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/commentapp.stetsonwood', 'https://github.com/advisories/GHSA-j5mg-fpq8-vvxv', 'https://www.npmjs.com/advisories/470'}
null
GHSA
GHSA-hwhh-2fwm-cfgw
Doorkeeper is vulnerable to stored XSS and code execution
Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.
{'CVE-2018-1000088'}
2022-04-26T17:36:13Z
2018-03-13T20:44:48Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/rubysec/ruby-advisory-db/pull/328/files', 'https://github.com/advisories/GHSA-hwhh-2fwm-cfgw', 'https://github.com/doorkeeper-gem/doorkeeper/issues/969', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000088', 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.3.0', 'https://github.com/doorkeeper-gem/doorkeeper/pull/970'}
null
GHSA
GHSA-w3hj-wr2q-x83g
Discovery uses the same AES/GCM Nonce throughout the session
Discovery uses the same AES/GCM Nonce throughout the session though it should be generated on per message basis which can lead to the leaking of the session key. As the actual ENR record is signed with a different key it is not possible for an attacker to alter the ENR record. Note that the node private key is not compromised, only the session key generated to communicate with an individual peer. From [discovery spec](https://github.com/ethereum/devp2p/blob/f97b8a5b8e9589d3355ebbd9d4a58d5d1644bdf7/discv5/discv5-theory.md#session-cache): > The number of messages which can be encrypted with a certain session key is limited because encryption of each message requires a unique nonce for AES-GCM. In addition to the keys, the session cache must also keep track of the count of outgoing messages to ensure the uniqueness of nonce values. Since the wire protocol uses 96 bit AES-GCM nonces, it is strongly recommended to generate them by encoding the current outgoing message count into the first 32 bits of the nonce and filling the remaining 64 bits with random data generated by a cryptographically secure random number generator.
null
2022-04-19T19:02:52Z
2021-04-06T17:22:17Z
LOW
0
{'CWE-323'}
{'https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g', 'https://github.com/advisories/GHSA-w3hj-wr2q-x83g'}
null
GHSA
GHSA-gf2c-93hm-r9j5
Cross-site Scripting in kimai2
kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) in deleting invoice templates. This vulnerability is capable of tricking admin user to delete invoice templates.
{'CVE-2021-3963'}
2021-11-23T18:16:43Z
2021-11-23T18:16:43Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514', 'https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8', 'https://github.com/advisories/GHSA-gf2c-93hm-r9j5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3963'}
null
GHSA
GHSA-6gc6-m364-85ww
Log injection in SimpleSAMLphp
### Background SimpleSAMLphp has a logging functionality that allows system administrators to keep track of the activity, errors, and statistics. Additionally, it allows users to report errors, shall they happen. An error report contains a report identifier, which is logged once submitted. ### Description The `www/erroreport.php` script, which receives error reports and sends them via email to the system administrator, didn't properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID. When configured to use the `file` logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the `reportID` parameter received in a request sent to `www/errorreport.php` was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content. ### Affected versions SimpleSAMLphp versions up to **1.18.3**. ### Impact An attacker may use this issue to inject logs messages into a SimpleSAMLphp log file, trying to trick or confuse system administrators. However, the attack surface is considered small, as the attack will only work with the `file` logging handler, which opens the log file in _append-only_ mode. This means an attacker cannot edit or remove existing log messages, and even if non-ascii characters are written to the log, the file will always be readable with a simple text editor. ### Resolution Upgrade the SimpleSAMLphp installation to version **1.18.4**. ### Credit This vulnerability was discovered and reported by Frederic Vleminckx on January 23, 2020.
{'CVE-2020-5225'}
2021-01-08T20:33:07Z
2020-01-24T21:26:13Z
LOW
4.4
{'CWE-532'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5225', 'https://github.com/advisories/GHSA-6gc6-m364-85ww', 'https://simplesamlphp.org/security/202001-02', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-6gc6-m364-85ww'}
null
GHSA
GHSA-h76r-vgf3-j6w5
Auth bypass and account takeover in October CMS
### Impact An attacker can exploit this vulnerability to bypass authentication using a specially crafted persist cookie. - To exploit this vulnerability, an attacker must obtain a Laravel’s secret key for cookie encryption and signing. - Due to the logic of how this mechanism works, a targeted user account must be logged in while the attacker is exploiting the vulnerability. - Authorization via persist cookie not shown in access logs. ### Patches - Issue has been patched in Build 472 and v1.1.5 - [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) ### Workarounds Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade. [**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here. ### Recommendations We recommend the following steps to make sure your server stays secure: - Keep server OS and system software up to date. - Keep October CMS software up to date. - Use a multi-factor authentication plugin. - Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area. - Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities. ### References Bugs found as part of Solar Security CMS Research. Credits to: • Andrey Basarygin • Andrey Guzei • Mikhail Khramenkov • Alexander Sidukov • Maxim Teplykh ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
{'CVE-2021-29487'}
2022-01-20T15:39:15Z
2021-08-30T16:13:50Z
HIGH
7.4
{'CWE-287'}
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/october/security/advisories/GHSA-h76r-vgf3-j6w5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29487', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://github.com/advisories/GHSA-h76r-vgf3-j6w5'}
null
GHSA
GHSA-jj53-8fmw-f2w2
Adding a private/unlisted room to a community exposes room metadata in an unauthorised manner.
### Impact Unauthorised users can access the name, avatar, topic and number of members of a room if they know the ID of the room. This vulnerability is limited to homeservers where: - the vulnerable homeserver is in the room; and - untrusted users are permitted to create groups (communities). By default, only homeserver administrators can create groups. However, homeserver administrators can already access this information in the database or using the admin API. As a result, only homeservers where the configuration setting `enable_group_creation` has been set to `true` are impacted. ### Patches Server administrators should upgrade to 1.41.1 or higher. ### Workarounds Server administrators can set `enable_group_creation` to `false` in their homeserver configuration (this is the default value) to prevent creation of groups by non-administrators. Administrators that are using a reverse proxy could, with partial loss of group functionality, block the following endpoints: * `/_matrix/client/r0/groups/{group_id}/rooms` * `/_matrix/client/unstable/groups/{group_id}/rooms` ### References n/a ### For more information If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
{'CVE-2021-39163'}
2022-04-19T19:03:11Z
2021-09-01T18:25:44Z
LOW
3.1
{'CWE-200'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/', 'https://github.com/matrix-org/synapse/commit/cb35df940a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39163', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jj53-8fmw-f2w2', 'https://github.com/advisories/GHSA-jj53-8fmw-f2w2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/', 'https://github.com/matrix-org/synapse/releases/tag/v1.41.1'}
null
GHSA
GHSA-xcrg-29h7-h4cj
XXE in PHPSpreadsheet due to encoding issue
securityScan() in PHPOffice PhpSpreadsheet through 1.5.0 allows a bypass of protection mechanisms for XXE via UTF-7 encoding in a .xlsx file
{'CVE-2018-19277'}
2022-04-19T20:14:25Z
2019-11-20T01:38:52Z
HIGH
8.8
{'CWE-91'}
{'https://github.com/PHPOffice/PhpSpreadsheet/issues/771', 'https://github.com/advisories/GHSA-xcrg-29h7-h4cj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19277', 'https://www.bishopfox.com/news/2018/11/phpoffice-versions/', 'https://github.com/MewesK/TwigSpreadsheetBundle/issues/18', 'https://www.drupal.org/sa-contrib-2021-043'}
null
GHSA
GHSA-pffw-p2q5-w6vh
Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-builder and org.apache.jspwiki:jspwiki-war
A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details.
{'CVE-2019-0225'}
2021-06-10T21:56:00Z
2019-04-08T16:23:36Z
HIGH
7.5
{'CWE-22'}
{'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/6251c06cb11e0b495066be73856592dbd7ed712487ef283d10972831@%3Cdev.jspwiki.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0225', 'https://github.com/advisories/GHSA-pffw-p2q5-w6vh', 'https://lists.apache.org/thread.html/03ddbcb1d6322e04734e65805a147a32bcfdb71b8fc5821fb046ba8d@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/03/26/2', 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/4f19fdbd8b9c4caf6137a459d723f4ec60379b033ed69277eb4e0af9@%3Cuser.jspwiki.apache.org%3E', 'http://www.securityfocus.com/bid/107627', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225'}
null
GHSA
GHSA-gc58-v8h3-x2gr
Incorrect Default Permissions in Apache Tomcat
A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1.
{'CVE-2020-8022'}
2022-02-09T23:05:38Z
2022-02-09T23:01:49Z
HIGH
7.8
{'CWE-276'}
{'https://lists.apache.org/thread.html/ra87ec20a0f4b226c81c7eed27e5d7433ccdc41e61a8da408a45f0fa1@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r393d4f431683e99c839b4aed68f720b8583bca6c35cd84adccaa02be@%3Cjava-dev.axis.apache.org%3E', 'https://github.com/advisories/GHSA-gc58-v8h3-x2gr', 'https://lists.apache.org/thread.html/rf50d02409e5732c4ee37f19a193af171251a25a652599ce3c2bc69e7@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r5be80ba868a11a1f64e4922399f171b8619bca4bc2039f79cf913928@%3Cjava-dev.axis.apache.org%3E', 'https://bugzilla.suse.com/show_bug.cgi?id=1172405', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00066.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8022'}
null
GHSA
GHSA-m6q2-9pfm-2wvr
Malicious Package in wallet-address-vaildator
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T15:56:06Z
2020-09-03T17:02:49Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-m6q2-9pfm-2wvr', 'https://www.npmjs.com/advisories/1412'}
null