ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-x7cr-6qr6-2hh6
Missing input validation can lead to command execution in composer
The Composer method `VcsDriver::getFileContent()` with user-controlled `$file` or `$identifier` arguments is susceptible to an argument injection vulnerability. It can be leveraged to gain arbitrary command execution if the Mercurial or the Git driver are used. This led to a vulnerability on Packagist.org and Private Packagist, i.e., using the composer.json `readme` field as a vector for injecting parameters into the `$file` argument for the Mercurial driver or via the `$identifier` argument for the Git and Mercurial drivers. Composer itself can be attacked through branch names by anyone controlling a Git or Mercurial repository, which is explicitly listed by URL in a project's composer.json. To the best of our knowledge, this was not actively exploited. The vulnerability has been patched on Packagist.org and Private Packagist within a day of the vulnerability report.
{'CVE-2022-24828'}
2022-04-26T18:00:17Z
2022-04-22T20:15:38Z
HIGH
8.3
{'CWE-94', 'CWE-20'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWT6LDSRY7SFMTDZWJ4MS2ZBXHL7VQEF/', 'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709', 'https://github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24828', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/advisories/GHSA-x7cr-6qr6-2hh6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/'}
null
GHSA
GHSA-9rjp-r58j-fxgq
Path traversal in elFinder.NetCore
This affects all versions of package elFinder.NetCore. The Path.Combine(...) method is used to create an absolute file path. Due to missing sanitation of the user input and a missing check of the generated path its possible to escape the Files directory via path traversal
{'CVE-2021-23428'}
2021-09-10T17:08:20Z
2021-09-02T22:05:26Z
HIGH
8.6
{'CWE-20', 'CWE-22'}
{'https://github.com/advisories/GHSA-9rjp-r58j-fxgq', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1313838', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L387', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23428', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L387', 'https://github.com/gordon-matt/elFinder.NetCore'}
null
GHSA
GHSA-95xm-g58g-3p88
Integer division by 0 in sparse reshaping
### Impact The implementation of `tf.raw_ops.SparseReshape` can be made to trigger an integral division by 0 exception: ```python import tensorflow as tf tf.raw_ops.SparseReshape( input_indices = np.ones((1,3)), input_shape = np.array([1,1,0]), new_shape = np.array([1,0])) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/reshape_util.cc#L176-L181) calls the reshaping functor whenever there is at least an index in the input but does not check that shape of the input or the target shape have both a non-zero number of elements. The [reshape functor](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/reshape_util.cc#L40-L78) blindly divides by the dimensions of the target shape. Hence, if this is not checked, code will result in a division by 0. ### Patches We have patched the issue in GitHub commit [4923de56ec94fff7770df259ab7f2288a74feb41](https://github.com/tensorflow/tensorflow/commit/4923de56ec94fff7770df259ab7f2288a74feb41). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1 as this is the other affected version. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37640'}
2021-08-25T14:44:02Z
2021-08-25T14:44:02Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/4923de56ec94fff7770df259ab7f2288a74feb41', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37640', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-95xm-g58g-3p88', 'https://github.com/advisories/GHSA-95xm-g58g-3p88'}
null
GHSA
GHSA-ppxc-pmx9-qjv9
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1195'}
2021-03-29T20:57:59Z
2021-03-29T20:57:59Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1195', 'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1195', 'https://github.com/advisories/GHSA-ppxc-pmx9-qjv9', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
GHSA
GHSA-xp82-jmw8-mjxp
Unrestricted Upload of File with Dangerous Type in ShowDoc
There is a Unrestricted Upload of File vulnerability in ShowDoc prior to version 2.10.4.
{'CVE-2022-1034'}
2022-03-30T20:49:29Z
2022-03-23T00:00:23Z
HIGH
7.2
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1034', 'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b', 'https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7', 'https://github.com/advisories/GHSA-xp82-jmw8-mjxp'}
null
GHSA
GHSA-jrg3-qq99-35g7
Deserialization of Untrusted Data in Jodd
Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set.
{'CVE-2018-21234'}
2022-04-26T17:59:30Z
2022-02-10T23:03:26Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-21234', 'https://lists.apache.org/thread.html/r965503b27d67a2d934e34fc1d088c9547d51d927c43b8b9bd9b7e695@%3Cissues.hive.apache.org%3E', 'https://github.com/advisories/GHSA-jrg3-qq99-35g7', 'https://lists.apache.org/thread.html/r157d01c96a2c10e7ceb3e005f42c52cfe87b11dd018935e1c4277433@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r729bc1e0f367fe8a857ac8a14641dba284ac4cf5131edf483022cf59@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r0bacc701ab7105500a0ab2769270d18f332cb379e6a62ec7553f3327@%3Cissues.hive.apache.org%3E', 'https://github.com/oblac/jodd/compare/v5.0.3...v5.0.4', 'https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16', 'https://lists.apache.org/thread.html/rf458683390d6650b26a2c8ba8ad396e038e520ad1cc3f3f1e20514d9@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rc85b650b4ad2c77d7c39c69824488e40dce6d0ebbb4204777d094375@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rd575d9877424a2d8776f5c2ff33bf3dc3382cd83f031d483f29c11ab@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rdbb99b43334b59d3d3478d360c87e3235ba22edb1de7d39019194347@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rdce006b282e56c5cc73cdf452c51c5097154d0503396d62f48abbeae@%3Cgitbox.hive.apache.org%3E', 'https://github.com/oblac/jodd/issues/628', 'https://lists.apache.org/thread.html/r317aec95c436848233047af7ecb3ce04ce446eb6031f981aef50df0d@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rc23200043872384e0fc48a4a4502f4c6b4b5ddc79ba4076414150d59@%3Cissues.hive.apache.org%3E'}
null
GHSA
GHSA-977j-xj7q-2jr9
Segmentation faultin TensorFlow when converting a Python string to `tf.float16`
### Impact Converting a string (from Python) to a `tf.float16` value results in a segmentation fault in eager mode as the format checks for this use case are only in the graph mode. This issue can lead to denial of service in inference/training where a malicious attacker can send a data point which contains a string instead of a `tf.float16` value. Similar effects can be obtained by manipulating saved models and checkpoints whereby replacing a scalar `tf.float16` value with a scalar string will trigger this issue due to automatic conversions. This can be easily reproduced by `tf.constant("hello", tf.float16)`, if eager execution is enabled. ### Patches We have patched the vulnerability in GitHub commit [5ac1b9](https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf). We are additionally releasing TensorFlow 1.15.1 and 2.0.1 with this vulnerability patched. TensorFlow 2.1.0 was released after we fixed the issue, thus it is not affected. We encourage users to switch to TensorFlow 1.15.1, 2.0.1 or 2.1.0. ### For more information Please consult [`SECURITY.md`](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2020-5215'}
2021-01-08T20:32:01Z
2020-01-28T21:32:29Z
HIGH
5
{'CWE-754'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5215', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.0.1', 'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-977j-xj7q-2jr9', 'https://github.com/tensorflow/tensorflow/releases/tag/v1.15.2', 'https://github.com/advisories/GHSA-977j-xj7q-2jr9'}
null
GHSA
GHSA-q22g-8fr4-qpj4
Regular Expression Denial of Service in remarkable
lib/common/html_re.js in remarkable 1.7.1 allows Regular Expression Denial of Service (ReDoS) via a CDATA section.
{'CVE-2019-12041'}
2021-08-04T21:37:20Z
2019-06-06T15:32:15Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12041', 'https://github.com/advisories/GHSA-q22g-8fr4-qpj4', 'https://snyk.io/vuln/SNYK-JS-REMARKABLE-174639', 'https://github.com/jonschlinkert/remarkable/issues/331'}
null
GHSA
GHSA-5gjg-jgh4-gppm
Websocket requests did not call AuthenticateMethod
### Impact Depending on implementation, a denial-of-service or privilege escalation vulnerability may occur in software that uses the `github.com/ecnepsnai/web` package with Web Sockets that have an AuthenticateMethod. The `AuthenticateMethod` is not called, and `UserData` will be nil in request methods. Attempts to read the `UserData` may result in a panic. This issue only affects web sockets where an `AuthenticateMethod` is supplied to the handle options. Users who do not use web sockets, or users who do not require authentication are not at risk. #### Example In the example below, one would expect that the `AuthenticateMethod` function would be called for each request to `/example` ```go handleOptions := web.HandleOptions{ AuthenticateMethod: func(request *http.Request) interface{} { // Assume there is logic here to check for an active sessions, look at cookies or headers, etc... var session Session{} // Example return session }, } server.Socket("/example", handle, handleOptions) ``` However, the method is not called, and therefor the `UserData` parameter of the request object in the handle will be nil, when it would have been expected to be the `session` object we returned. ### Patches Release v1.5.2 fixes this vulnerability. The authenticate method is now called for websocket requests. All users of the web package should update to v1.5.2 or later. ### Workarounds You may work around this issue by making the authenticate method a named function, then calling that function at the start of the handle method for the websocket. Reject connections when the return value of the method is nil.
null
2021-10-05T16:37:09Z
2021-06-23T17:26:30Z
MODERATE
0
{'CWE-304'}
{'https://github.com/ecnepsnai/web/security/advisories/GHSA-5gjg-jgh4-gppm', 'https://github.com/advisories/GHSA-5gjg-jgh4-gppm'}
null
GHSA
GHSA-pmg9-p9r2-6q87
ReDoS via long UserAgent header in ua-parser
Affected versions of `ua-parser` are vulnerable to regular expression denial of service when given a specially crafted `User-Agent` header. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different, functionally equivalent package such as [useragent](https://www.npmjs.com/package/useragent).
{'CVE-2017-16086'}
2021-01-08T18:20:34Z
2018-07-24T19:46:37Z
HIGH
0
{'CWE-400'}
{'https://www.npmjs.com/advisories/316', 'https://github.com/advisories/GHSA-pmg9-p9r2-6q87', 'https://nodesecurity.io/advisories/316', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16086'}
null
GHSA
GHSA-r478-c2pc-m7gx
DNS reply verification issue in dnslinb
The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query.
{'CVE-2022-22846'}
2022-01-19T19:58:20Z
2022-01-12T20:07:10Z
HIGH
7.5
null
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22846', 'https://github.com/paulc/dnslib/issues/30', 'https://github.com/paulc/dnslib/commit/76e8677699ed098387d502c57980f58da642aeba', 'https://github.com/advisories/GHSA-r478-c2pc-m7gx'}
null
GHSA
GHSA-g5m5-v5cp-5p7m
Directory Traversal in wintiwebdev
Affected versions of `wintiwebdev` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16181'}
2021-01-12T22:44:21Z
2020-09-01T18:50:16Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wintiwebdev', 'https://nodesecurity.io/advisories/458', 'https://github.com/advisories/GHSA-g5m5-v5cp-5p7m', 'https://www.npmjs.com/advisories/458', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16181'}
null
GHSA
GHSA-cf2x-rqc8-grfq
Regular expression deinal of service in express-validators
All versions of package express-validators are vulnerable to Regular Expression Denial of Service (ReDoS) when validating specifically-crafted invalid urls.
{'CVE-2020-7767'}
2021-05-10T19:16:27Z
2021-05-10T19:16:27Z
MODERATE
5.3
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7767', 'https://github.com/advisories/GHSA-cf2x-rqc8-grfq', 'https://snyk.io/vuln/SNYK-JS-EXPRESSVALIDATORS-1017404'}
null
GHSA
GHSA-v6fx-752r-ccp2
CSRF on PgHero gem
The PgHero gem through 2.6.0 for Ruby allows CSRF.
{'CVE-2020-16253'}
2021-09-23T18:37:56Z
2020-08-05T14:53:43Z
HIGH
8.1
{'CWE-352'}
{'https://github.com/ankane/pghero/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16253', 'https://rubygems.org/gems/pghero', 'https://github.com/ankane/pghero/issues/330', 'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9', 'https://github.com/advisories/GHSA-v6fx-752r-ccp2', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pghero/CVE-2020-16253.yml'}
null
GHSA
GHSA-j27j-4w6m-8fc4
Path Traversal in statics-server
All versions of `statics-server` are vulnerable to Path Traversal. The package fails to limit access to files outside of the served folder through symlinks. ## Recommendation No fix is currently available. Do not use `statics-server` in production or consider using an alternative module until a fix is made available.
{'CVE-2019-15596'}
2021-01-08T20:24:31Z
2020-03-31T17:02:12Z
MODERATE
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15596', 'https://www.npmjs.com/advisories/1303', 'https://hackerone.com/reports/695416', 'https://github.com/advisories/GHSA-j27j-4w6m-8fc4'}
null
GHSA
GHSA-gx96-vgf7-hwfg
In Apache PDFBox a carefully crafted PDF file can trigger an extremely long running computation
In Apache PDFBox 1.8.0 to 1.8.15 and 2.0.0RC1 to 2.0.11, a carefully crafted PDF file can trigger an extremely long running computation when parsing the page tree.
{'CVE-2018-11797'}
2022-04-27T14:23:39Z
2018-10-17T18:22:29Z
MODERATE
5.5
{'CWE-400'}
{'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HKVPTJWZGUB4MH4AAOWMRJHRDBYFHGJ/', 'https://lists.apache.org/thread.html/645574bc50b886d39c20b4065d51ccb1cd5d3a6b4750a22edbb565eb@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/a9760973a873522f4d4c0a99916ceb74f361d91006b663a0a418d34a@%3Cannounce.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPOGHJ5CVMUVCRQU7APBAN5IVZGZFDX/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11797', 'https://github.com/advisories/GHSA-gx96-vgf7-hwfg', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00008.html'}
null
GHSA
GHSA-7grw-6pjh-jpc9
Infinite Loop in Apache PDFBox
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
{'CVE-2021-31812'}
2022-04-26T18:08:25Z
2021-06-15T15:54:29Z
MODERATE
5.5
{'CWE-835', 'CWE-834'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-7grw-6pjh-jpc9', 'https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/06/12/1', 'https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e@%3Cusers.pdfbox.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/', 'https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31812', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/', 'https://lists.apache.org/thread.html/rf251f6c358087107f8c23473468b279d59d50a75db6b4768165c78d3@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-gcfc-mgg3-8j2c
Malicious Package in sdfjghlkfjdshlkjdhsfg
All versions of `sdfjghlkfjdshlkjdhsfg` contain malicious code. The package is essentially a worm that fetches all packages owned by the user, adds a script to self-replicate as a preinstall script and publishes a new version. ## Recommendation Remove the package from your environment and ensure all packages owned were not impacted.
null
2021-09-30T20:03:21Z
2020-09-03T18:11:29Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1072', 'https://github.com/advisories/GHSA-gcfc-mgg3-8j2c'}
null
GHSA
GHSA-4449-hg37-77v8
Command injection in total.js
There is a command injection vulnerability that affects the package total.js before version 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized.
{'CVE-2020-28494'}
2021-07-28T18:57:24Z
2021-02-05T20:43:27Z
HIGH
8.6
{'CWE-78'}
{'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28494', 'https://github.com/advisories/GHSA-4449-hg37-77v8', 'https://www.npmjs.com/package/total.js'}
null
GHSA
GHSA-qffw-8wg7-h665
Command injection in git-interface
A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.
{'CVE-2022-1440'}
2022-04-29T17:22:44Z
2022-04-23T00:03:01Z
CRITICAL
9.8
{'CWE-78'}
{'https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1', 'https://github.com/advisories/GHSA-qffw-8wg7-h665', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1440', 'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'}
null
GHSA
GHSA-686g-3xr3-x4x6
Information Exposure on Case Insensitive File Systems in serve
Versions of `serve` before 7.0.0 are vulnerable to information exposure, bypassing the ignore security control, but only on case insensitive file systems. ## Recommendation Update to version 7.0.0 or later.
{'CVE-2018-3809'}
2021-09-01T22:46:06Z
2018-07-18T18:33:15Z
MODERATE
5.3
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3809', 'https://github.com/advisories/GHSA-686g-3xr3-x4x6', 'https://www.npmjs.com/advisories/672', 'https://hackerone.com/reports/330650'}
null
GHSA
GHSA-h3rx-g5c9-8q4x
Prototype Pollution in bmoor
The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7736'}
2021-07-28T19:52:39Z
2021-05-10T18:37:26Z
HIGH
7.3
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7736', 'https://www.npmjs.com/package/bmoor', 'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5', 'https://github.com/advisories/GHSA-h3rx-g5c9-8q4x', 'https://snyk.io/vuln/SNYK-JS-BMOOR-598664'}
null
GHSA
GHSA-fvm3-cfvj-gxqq
High severity vulnerability that affects commons-fileupload:commons-fileupload
The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.
{'CVE-2016-3092'}
2021-07-19T15:57:49Z
2018-12-21T17:47:47Z
HIGH
7.5
{'CWE-20'}
{'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759', 'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html', 'http://tomcat.apache.org/security-7.html', 'http://www.ubuntu.com/usn/USN-3027-1', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'http://tomcat.apache.org/security-9.html', 'http://www.debian.org/security/2016/dsa-3614', 'https://access.redhat.com/errata/RHSA-2017:0455', 'http://rhn.redhat.com/errata/RHSA-2016-2072.html', 'http://www.securitytracker.com/id/1036427', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121', 'http://rhn.redhat.com/errata/RHSA-2016-2807.html', 'https://security.netapp.com/advisory/ntap-20190212-0001/', 'http://svn.apache.org/viewvc?view=revision&revision=1743722', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.ubuntu.com/usn/USN-3024-1', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3092', 'http://rhn.redhat.com/errata/RHSA-2016-2808.html', 'http://www.securitytracker.com/id/1037029', 'http://www.securitytracker.com/id/1036900', 'http://svn.apache.org/viewvc?view=revision&revision=1743480', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'http://rhn.redhat.com/errata/RHSA-2017-0457.html', 'https://github.com/advisories/GHSA-fvm3-cfvj-gxqq', 'http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html', 'http://www.debian.org/security/2016/dsa-3609', 'http://www.securitytracker.com/id/1039606', 'https://security.gentoo.org/glsa/201705-09', 'http://svn.apache.org/viewvc?view=revision&revision=1743742', 'http://svn.apache.org/viewvc?view=revision&revision=1743738', 'http://jvn.jp/en/jp/JVN89379547/index.html', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:0456', 'https://bugzilla.redhat.com/show_bug.cgi?id=1349468', 'http://rhn.redhat.com/errata/RHSA-2016-2069.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'http://tomcat.apache.org/security-8.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2016-2599.html', 'http://www.debian.org/security/2016/dsa-3611', 'http://rhn.redhat.com/errata/RHSA-2016-2070.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E', 'http://rhn.redhat.com/errata/RHSA-2016-2068.html', 'http://www.securityfocus.com/bid/91453', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840', 'http://rhn.redhat.com/errata/RHSA-2016-2071.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371'}
null
GHSA
GHSA-wfj5-2mqr-7jvv
Expression Language Injection in Netflix Conductor
Netflix Conductor uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code.
{'CVE-2020-9296'}
2022-02-10T23:06:57Z
2022-02-10T23:06:57Z
CRITICAL
9.8
{'CWE-917'}
{'https://github.com/advisories/GHSA-wfj5-2mqr-7jvv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9296', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-001.md'}
null
GHSA
GHSA-cq6h-w3mc-57f4
Information exposure via query strings in URL
### Impact Information exposure via query strings in URL ### Patches We recommend to update to the current version 6.3.4.1. You can get the update to 6.3.4.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-12-2020 ### Credits We would like to thank <a rel="noopener" href="https://www.vater-it.de/">Oliver Herrmann</a> for reporting this issue.
null
2020-12-21T18:01:16Z
2020-12-21T18:01:16Z
LOW
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-cq6h-w3mc-57f4', 'https://github.com/shopware/platform/security/advisories/GHSA-cq6h-w3mc-57f4'}
null
GHSA
GHSA-wxvm-fh75-mpgr
Critical severity vulnerability that affects dns-sync
Withdrawn, accidental duplicate publish. The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.
null
2021-12-02T22:57:37Z
2018-07-26T16:24:34Z
CRITICAL
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2014-9682', 'https://github.com/advisories/GHSA-wxvm-fh75-mpgr'}
null
GHSA
GHSA-5hpj-m323-cphm
Double free in through
An issue was discovered in the through crate through 2021-02-18 for Rust. There is a double free (in through and through_and) upon a panic of the map function.
{'CVE-2021-29940'}
2021-08-25T20:54:12Z
2021-08-25T20:54:12Z
CRITICAL
9.8
{'CWE-415'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0049.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29940', 'https://github.com/gretchenfrage/through/issues/1', 'https://github.com/advisories/GHSA-5hpj-m323-cphm'}
null
GHSA
GHSA-8vp7-j5cj-vvm2
Ability to expose data in Sylius by using an unintended serialisation group
### Impact ResourceBundle accepts and uses any serialisation groups to be passed via a HTTP header. This might lead to data exposure by using an unintended serialisation group - for example it could make Shop API use a more permissive group from Admin API. Anyone exposing an API with ResourceBundle's controller is affected. The vulnerable versions are: `<1.3 || >=1.3.0 <=1.3.12 || >=1.4.0 <=1.4.5 || >=1.5.0 <=1.5.0 || >=1.6.0 <=1.6.2`. ### Patches The patch is provided for ResourceBundle 1.3.13, 1.4.6, 1.5.1 and 1.6.3, but not for any versions below 1.3. After it is applied, It allows to choose only the groups that are defined in `serialization_groups` or `allowed_serialization_groups` route definition. Any group not defined in those will not be used. This behaviour might be a BC break for those using custom groups via the HTTP header, please adjust `allowed_serialization_groups` accordingly. ### Workarounds Service `sylius.resource_controller.request_configuration_factory` can be overridden with an implementation copied from `\Sylius\Bundle\ResourceBundle\Controller\RequestConfigurationFactory` where the part that handles custom serialisation groups is deleted.
{'CVE-2020-5220'}
2021-01-08T20:32:45Z
2020-01-31T18:00:43Z
MODERATE
4.4
{'CWE-444'}
{'https://github.com/advisories/GHSA-8vp7-j5cj-vvm2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5220', 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-8vp7-j5cj-vvm2', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/resource-bundle/CVE-2020-5220.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/sylius/CVE-2020-5220.yaml'}
null
GHSA
GHSA-24m3-w8g9-jwpq
Information disclosure of source code in SimpleSAMLphp
### Background The module controller in `SimpleSAML\Module` that processes requests for pages hosted by modules, has code to identify paths ending with `.php` and process those as PHP code. If no other suitable way of handling the given path exists it presents the file to the browser. ### Description The check to identify paths ending with `.php` does not account for uppercase letters. If someone requests a path ending with e.g. `.PHP` and the server is serving the code from a case-insensitive file system, such as on Windows, the processing of the PHP code does not occur, and the source code is instead presented to the browser. ### Affected versions SimpleSAMLphp versions **1.18.5 and older**. ### Impact An attacker may use this issue to gain access to the source code in third-party modules that is meant to be private, or even sensitive. However, the attack surface is considered small, as the attack will only work when SimpleSAMLphp serves such content from a file system that is not case-sensitive, such as on Windows. ### Resolution Upgrade the SimpleSAMLphp installation to version **1.18.6**. ### Credit This vulnerability was discovered and reported by Sławek Naczyński.
{'CVE-2020-5301'}
2022-04-19T19:02:25Z
2020-04-22T20:59:44Z
LOW
3
{'CWE-200', 'CWE-178'}
{'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e', 'https://github.com/advisories/GHSA-24m3-w8g9-jwpq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5301', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-24m3-w8g9-jwpq'}
null
GHSA
GHSA-grc3-8q8m-4j7c
Improper privilege handling in Apache Accumulo
Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties.
{'CVE-2020-17533'}
2022-02-09T22:37:59Z
2022-02-09T22:37:59Z
HIGH
8.1
{'CWE-280', 'CWE-732'}
{'https://github.com/advisories/GHSA-grc3-8q8m-4j7c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17533', 'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/29/1', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed@%3Cannounce.apache.org%3E'}
null
GHSA
GHSA-cwqq-w8c3-r2jw
Uncontrolled Resource Consumption in MetadataExtractor
MetadataExtractor 2.1.0 allows stack consumption.
{'CVE-2019-14262'}
2021-08-17T21:57:18Z
2019-08-23T00:04:56Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-cwqq-w8c3-r2jw', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14262', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/drewnoakes/metadata-extractor-dotnet/pull/190'}
null
GHSA
GHSA-xc47-3rch-cv57
Improper Access Control in snipe-it
Users with no system permissions are able to see and create personal access tokens
{'CVE-2022-0178'}
2022-01-26T20:24:23Z
2022-01-26T20:24:23Z
MODERATE
5.4
{'CWE-284'}
{'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0178', 'https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368', 'https://github.com/advisories/GHSA-xc47-3rch-cv57'}
null
GHSA
GHSA-v2jv-33gh-xx29
Command Injection in ps-visitor
This affects all versions up to and including version 0.0.2 of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23374'}
2021-05-07T16:06:23Z
2021-05-07T16:06:23Z
CRITICAL
9.8
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23374', 'https://github.com/advisories/GHSA-v2jv-33gh-xx29', 'https://snyk.io/vuln/SNYK-JS-PSVISITOR-1078544', 'https://github.com/WisdomKwan/ps-visitor/blob/cdfc934a8e4af95aa0473f4b2a4bd091d09faf2f/index.js%23L404'}
null
GHSA
GHSA-45hx-wfhj-473x
Arbitrary code execution in H2 Console
H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392.
{'CVE-2022-23221'}
2022-04-22T15:35:17Z
2022-01-21T23:07:39Z
CRITICAL
9.8
{'CWE-94'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23221', 'https://twitter.com/d0nkey_man/status/1483824727936450564', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html', 'http://seclists.org/fulldisclosure/2022/Jan/39', 'https://github.com/h2database/h2database/releases/tag/version-2.1.210', 'https://www.debian.org/security/2022/dsa-5076', 'http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html', 'https://github.com/h2database/h2database/security/advisories', 'https://github.com/advisories/GHSA-45hx-wfhj-473x'}
null
GHSA
GHSA-83x4-9cwr-5487
Improper Authorization in Keycloak
A incorrect authorization flaw was found in Keycloak 12.0.0, the flaw allows an attacker with any existing user account to create new default user accounts via the administrative REST API even where new user registration is disabled.
{'CVE-2021-4133'}
2022-04-22T15:34:29Z
2022-01-06T18:32:58Z
HIGH
8.8
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4133', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/keycloak/keycloak/issues/9247', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487', 'https://bugzilla.redhat.com/show_bug.cgi?id=2033602', 'https://github.com/advisories/GHSA-83x4-9cwr-5487'}
null
GHSA
GHSA-qvm7-23cj-437v
Remote Code Execution in Apache Dubbo
Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some other places. Fixed in Apache Dubbo 2.7.13
{'CVE-2021-36161'}
2021-09-20T20:15:45Z
2021-09-10T17:54:37Z
CRITICAL
9.8
{'CWE-134'}
{'https://github.com/advisories/GHSA-qvm7-23cj-437v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36161', 'https://lists.apache.org/thread.html/r40212261fd5d638074b65f22ac73eebe93ace310c79d4cfcca4863da%40%3Cdev.dubbo.apache.org%3E'}
null
GHSA
GHSA-hgc3-hp6x-wpgx
Antilles Dependency Confusion Vulnerability
### Potential Impact: Remote code execution. ### Scope of Impact: Open-source project specific. ### Summary Description: A dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package listed in requirements.txt not existing in the public package index (PyPi). MITRE classifies this weakness as an Uncontrolled Search Path Element (CWE-427) in which a private package dependency may be replaced by an unauthorized package of the same name published to a well-known public repository such as PyPi. The configuration has been updated to only install components built by Antilles, removing all other public package indexes. Additionally, the antilles-tools dependency has been published to PyPi. ### Mitigation Strategy for Customers (what you should do to protect yourself): Remove previous versions of Antilles as a precautionary measure and Update to version 1.0.1 or later. ### Acknowledgement: The Antilles team thanks Kotko Vladyslav for reporting this issue. ### References: https://github.com/lenovo/Antilles/commit/c7b9c5740908b343aceefe69733d9972e64df0b9
{'CVE-2021-3840'}
2021-11-17T21:17:30Z
2021-11-03T17:36:22Z
HIGH
8.8
{'CWE-427'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3840', 'https://github.com/lenovo/Antilles/commit/c7b9c5740908b343aceefe69733d9972e64df0b9', 'https://github.com/lenovo/Antilles/security/advisories/GHSA-hgc3-hp6x-wpgx', 'https://github.com/advisories/GHSA-hgc3-hp6x-wpgx'}
null
GHSA
GHSA-976r-qfjj-c24w
Command injection via Celery broker in Apache Airflow
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.
{'CVE-2020-11981'}
2022-03-21T22:48:38Z
2020-07-27T16:57:33Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11981', 'https://github.com/advisories/GHSA-976r-qfjj-c24w', 'https://issues.apache.org/jira/browse/AIRFLOW-6351', 'https://github.com/apache/airflow/commit/afa4b11fddfdbadb048f742cf66d5c21c675a5c8', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}
null
GHSA
GHSA-qcj7-g2j5-g7r3
In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification
In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
{'CVE-2016-1000342'}
2022-04-27T13:28:11Z
2018-10-17T16:24:12Z
HIGH
7.5
{'CWE-347'}
{'https://github.com/advisories/GHSA-qcj7-g2j5-g7r3', 'https://usn.ubuntu.com/3727-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000342', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927'}
null
GHSA
GHSA-7733-hjv6-4h47
Cross-Site Scripting in ternary conditional operator
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0) > * CWE-79 --- :information_source: &nbsp;This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020 --- ### Problem It has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following. ``` {showFullName ? fullName : defaultValue} ``` ### Solution Update to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases: * TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5) * TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1) ### Credits Thanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue. ### References * [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013)
{'CVE-2020-15241'}
2022-04-19T19:02:36Z
2020-10-08T19:55:53Z
MODERATE
4.7
{'CWE-601', 'CWE-79'}
{'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15241', 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47', 'https://typo3.org/security/advisory/typo3-core-sa-2019-013', 'https://github.com/advisories/GHSA-7733-hjv6-4h47'}
null
GHSA
GHSA-jx8f-cpx7-fv47
Allocation of Resources Without Limits or Throttling in nvflare
### Impact NVIDIA FLARE contains a vulnerability in Admin Interface, where an un-authorized attacker can cause Allocation of Resources Without Limits or Throttling, which may lead to cause system unavailable All versions before 2.0.16 are affected. ### Patches The patch will be included in nvflare==2.0.16. ### Workarounds The changes in commits https://github.com/NVIDIA/NVFlare/commit/93588b3a0dff9bd4568983071b74d8b420de3a6e and https://github.com/NVIDIA/NVFlare/commit/93588b3a0dff9bd4568983071b74d8b420de3a6e can be applied to any version of the NVIDIA FLARE without any adverse effect. ### Additional information Issue Found on: 2022.3.3 Issue Found by: Oliver Sellwood (@Nintorac)
{'CVE-2022-21822'}
2022-03-29T21:16:38Z
2022-03-18T23:18:43Z
HIGH
7.5
{'CWE-770'}
{'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-jx8f-cpx7-fv47', 'https://github.com/advisories/GHSA-jx8f-cpx7-fv47', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21822'}
null
GHSA
GHSA-vpgc-7h78-gx8f
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2020-09-04T18:05:14Z
2020-09-04T18:05:14Z
LOW
0
null
{'https://www.npmjs.com/package/personnummer', 'https://github.com/advisories/GHSA-vpgc-7h78-gx8f', 'https://github.com/personnummer/js/security/advisories/GHSA-vpgc-7h78-gx8f'}
null
GHSA
GHSA-6vqp-h455-42mr
Uncontrolled Memory Allocation in Apache PDFBox
A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions.
{'CVE-2021-27906'}
2022-04-22T18:27:47Z
2021-05-13T22:30:13Z
MODERATE
5.5
{'CWE-789'}
{'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f', 'https://lists.apache.org/thread.html/r64982b768c8a2220b07aaf813bd099a9863de0d13eb212fd4efe208f@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd%40%3Cusers.pdfbox.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-5112', 'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E', 'https://github.com/advisories/GHSA-6vqp-h455-42mr', 'https://lists.apache.org/thread.html/rdf78aef4793362e778e21e34328b0456e302bde4b7e74f229df0ee04@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/', 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/', 'http://www.openwall.com/lists/oss-security/2021/03/19/10', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27906', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/', 'https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E'}
null
GHSA
GHSA-72m5-fvvv-55m6
Observable Differences in Behavior to Error Inputs in Bouncy Castle
In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.
{'CVE-2020-26939'}
2021-05-26T13:31:25Z
2021-04-22T16:16:49Z
MODERATE
5.3
{'CWE-203'}
{'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00007.html', 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E', 'https://github.com/bcgit/bc-java/wiki/CVE-2020-26939', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26939', 'https://security.netapp.com/advisory/ntap-20201202-0005/', 'https://github.com/advisories/GHSA-72m5-fvvv-55m6'}
null
GHSA
GHSA-722q-3g9x-vp8q
Downloads Resources over HTTP in tomita-parser
Affected versions of `tomita-parser` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita-parser`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10666'}
2021-01-08T19:19:20Z
2019-02-18T23:54:41Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/261', 'https://github.com/advisories/GHSA-722q-3g9x-vp8q', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10666', 'https://www.npmjs.com/advisories/261'}
null
GHSA
GHSA-7q36-4xx7-xcxf
Untrusted data can lead to DoS attack due to hash collisions and stack overflow in MessagePack
### Impact When this library is used to deserialize messagepack data from an untrusted source, there is a risk of a denial of service attack by either of two vectors: 1. hash collisions - leading to large CPU consumption disproportionate to the size of the data being deserialized. 1. stack overflow - leading to the deserializing process crashing. ### Patches The following steps are required to mitigate this risk. 1. Upgrade to a version of the library where a fix is available 1. Add code to your application to put MessagePack into the defensive `UntrustedData` mode. 1. Identify all MessagePack extensions that implement `IMessagePackFormatter&lt;T&gt;` implementations that do not ship with the MessagePack library to include the security mitigations. This includes those acquired from 3rd party packages and classes included directly into your project. Any AOT formatters generated with the MPC tool must be regenerated with the patched version of mpc. 1. Review your messagepack-serializable data structures for hash-based collections that use custom or unusual types for the hashed key. See below for details on handling such situations. Review the `MessagePackSecurity` class to tweak any settings as necessary to strike the right balance between performance, functionality, and security. Specialized `IEqualityComparer&lt;T&gt;` implementations provide the hash collision resistance. Each type of hashed key may require a specialized implementation of its own. The patched MessagePack library includes many such implementations for primitive types commonly used as keys in hash-based collections. If your data structures use custom types as keys in these hash-based collections, putting MessagePack in `UntrustedData` mode may lead the deserializer to throw an exception because no safe `IEqualityComparer&lt;T&gt;` is available for your custom `T` type. You can provide your own safe implementation by deriving from the `MessagePackSecurity` class and overriding the `GetHashCollisionResistantEqualityComparer&lt;T&gt;()` method to return your own custom implementation when `T` matches your type, and fallback to `return base.GetHashCollisionResistantEqualityComparer&lt;T&gt;();` for types you do not have custom implementations for. Unrelated to this advisory, but as general security guidance, you should also avoid the Typeless serializer/formatters/resolvers for untrusted data as that opens the door for the untrusted data to potentially deserialize unanticipated types that can compromise security. #### MessagePack 1.x users 1. Upgrade to any 1.9.x version. 1. When deserializing untrusted data, put MessagePack into a more secure mode with: ```cs MessagePackSecurity.Active = MessagePackSecurity.UntrustedData; ``` In MessagePack v1.x this is a static property and thus the security level is shared by the entire process or AppDomain. Use MessagePack v2.1 or later for better control over the security level for your particular use. 1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `MessagePackSecurity` class. Review any custom-written `IMessagePackFormatter&lt;T&gt;` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required. In particular, a formatter that deserializes an object (as opposed to a primitive value) should wrap the deserialization in a `using (MessagePackSecurity.DepthStep())` block. For example: ```cs public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options) { if (reader.TryReadNil()) { return default; } else { using (MessagePackSecurity.DepthStep()) // STACK OVERFLOW MITIGATION { MyObject o = new MyObject(); // deserialize members of the object here. return o; } } } ``` If your custom formatter creates hash-based collections (e.g. `Dictionary&lt;K, V&gt;` or `HashSet&lt;T&gt;`) where the hashed key comes from the messagepack data, always instantiate your collection using `MessagePackSecurity.Active.GetEqualityComparer&lt;T&gt;()` as the equality comparer: ```cs var collection = new HashSet&lt;T&gt;(MessagePackSecurity.Active.GetEqualityComparer&lt;T&gt;()); ``` This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm. Learn more about [best security practices when reading untrusted data with MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security). #### MessagePack 2.x users 1. Upgrade to any 2.1.x or later version. 1. When deserializing untrusted data, put MessagePack into a more secure mode by configuring your `MessagePackSerializerOptions.Security` property: ```cs var options = MessagePackSerializerOptions.Standard .WithSecurity(MessagePackSecurity.UntrustedData); // Pass the options explicitly for the greatest control. T object = MessagePackSerializer.Deserialize&lt;T&gt;(data, options); // Or set the security level as the default. MessagePackSerializer.DefaultOptions = options; ``` 1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `Security` member on the `MessagePackSerializerOptions` parameter. Review any custom-written `IMessagePackFormatter&lt;T&gt;` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required. In particular, a formatter that deserializes an object (as opposed to a primitive value) should call `options.Security.DepthStep(ref reader);` before deserializing the object&#39;s members, and be sure to revert the depth step with `reader.Depth--;` before exiting the method. For example: ```cs public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options) { if (reader.TryReadNil()) { return default; } else { options.Security.DepthStep(ref reader); // STACK OVERFLOW MITIGATION, line 1 try { MyObject o = new MyObject(); // deserialize members of the object here. return o; } finally { reader.Depth--; // STACK OVERFLOW MITIGATION, line 2 } } } ``` If your custom formatter creates hash-based collections (e.g. `Dictionary&lt;K, V&gt;` or `HashSet&lt;T&gt;`) where the hashed key comes from the messagepack data, always instantiate your collection using `options.Security.GetEqualityComparer&lt;TKey&gt;()` as the equality comparer: ```cs var collection = new HashSet&lt;T&gt;(options.Security.GetEqualityComparer&lt;T&gt;()); ``` This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm. Learn more about [best security practices when reading untrusted data with MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security). ### Workarounds The security vulnerabilities are in the formatters. Avoiding the built-in formatters entirely in favor of reading messagepack primitive data directly or relying on carefully written custom formatters can provide a workaround. MessagePack v1.x users may utilize the `MessagePackBinary` static class directly to read the data they expect. MessagePack v2.x users may utilize the `MessagePackReader` struct directly to read the data they expect. ### References Learn more about best security practices when reading untrusted data with [MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security) or [MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security). ### For more information If you have any questions or comments about this advisory: * Open an issue in [MessagePack-CSharp](https://github.com/neuecc/MessagePack-CSharp/issues/new/choose) * [Email us](mailto:andrewarnott@gmail.com)
{'CVE-2020-5234'}
2021-04-06T17:54:57Z
2020-01-31T17:59:20Z
MODERATE
4.8
{'CWE-121'}
{'https://github.com/advisories/GHSA-7q36-4xx7-xcxf', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/aspnet/Announcements/issues/405', 'https://github.com/neuecc/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5234', 'https://github.com/neuecc/MessagePack-CSharp/issues/810', 'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02'}
null
GHSA
GHSA-327x-39hh-65wf
Out of bounds write in arenavec
An issue was discovered in the arenavec crate through 0.1.1. A drop of uninitialized memory can sometimes occur upon a panic in T::default().
{'CVE-2021-29930'}
2021-08-25T20:55:09Z
2021-08-25T20:55:09Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29930', 'https://github.com/ibabushkin/arenavec/issues/1', 'https://github.com/advisories/GHSA-327x-39hh-65wf', 'https://rustsec.org/advisories/RUSTSEC-2021-0040.html'}
null
GHSA
GHSA-h6xw-mghq-7523
Unsafe parsing in SWHKD
SWHKD 1.1.5 allows unsafe parsing via the -c option. An information leak might occur but there is a simple denial of service (memory exhaustion) upon an attempt to parse a large or infinite file (such as a block or character device).
{'CVE-2022-27819'}
2022-04-15T16:14:51Z
2022-04-08T00:00:24Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/waycrate/swhkd/releases/tag/1.1.7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27819', 'https://github.com/advisories/GHSA-h6xw-mghq-7523', 'https://github.com/waycrate/swhkd/releases', 'https://github.com/waycrate/swhkd/commit/b4e6dc76f4845ab03104187a42ac6d1bbc1e0021', 'http://www.openwall.com/lists/oss-security/2022/04/14/1'}
null
GHSA
GHSA-q2cv-94xm-qvg4
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3921'}
2021-11-17T21:12:32Z
2021-11-15T23:18:00Z
MODERATE
5.4
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3921', 'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684', 'https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5', 'https://github.com/advisories/GHSA-q2cv-94xm-qvg4'}
null
GHSA
GHSA-r6jx-9g48-2r5r
Arbitrary code execution due to YAML deserialization
### Impact TensorFlow and Keras can be tricked to perform arbitrary code execution when deserializing a Keras model from YAML format. ```python from tensorflow.keras import models payload = ''' !!python/object/new:type args: ['z', !!python/tuple [], {'extend': !!python/name:exec }] listitems: "__import__('os').system('cat /etc/passwd')" ''' models.model_from_yaml(payload) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/python/keras/saving/model_config.py#L66-L104) uses `yaml.unsafe_load` which can perform arbitrary code execution on the input. ### Patches Given that YAML format support requires a significant amount of work, we have removed it for now. We have patched the issue in GitHub commit [23d6383eb6c14084a8fc3bdf164043b974818012](https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Arjun Shibu.
{'CVE-2021-37678'}
2022-03-23T22:52:07Z
2021-08-25T14:41:12Z
CRITICAL
9.3
{'CWE-502'}
{'https://github.com/advisories/GHSA-r6jx-9g48-2r5r', 'https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37678', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r'}
null
GHSA
GHSA-6p3c-v8vc-c244
The `total_size` function for partial read the length of any `FixVec` is incorrect in molecule.
An issue was discovered in the molecule crate before 0.7.2 for Rust. A FixVec partial read has an incorrect result.
{'CVE-2021-45697'}
2022-01-07T17:57:27Z
2022-01-06T22:10:34Z
CRITICAL
9.8
null
{'https://github.com/advisories/GHSA-6p3c-v8vc-c244', 'https://rustsec.org/advisories/RUSTSEC-2021-0103.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45697', 'https://github.com/nervosnetwork/molecule/pull/49', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/molecule/RUSTSEC-2021-0103.md'}
null
GHSA
GHSA-m2fp-c79h-rr79
Malicious Package in tensorplow
All versions of `tensorplow` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:56:29Z
2020-09-02T21:42:56Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-m2fp-c79h-rr79', 'https://www.npmjs.com/advisories/910'}
null
GHSA
GHSA-m9fq-c9hp-59g7
Cross-site Scripting in yourls
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edit dialog.
{'CVE-2021-3785'}
2021-09-24T13:08:50Z
2021-09-20T20:42:52Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff', 'https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3785', 'https://github.com/advisories/GHSA-m9fq-c9hp-59g7'}
null
GHSA
GHSA-3hj2-hh36-hv9v
Data race in va-ts
An issue was discovered in the va-ts crate before 0.0.4 for Rust. Because Demuxer<T> omits a required T: Send bound, a data race and memory corruption can occur.
{'CVE-2020-36220'}
2021-08-25T20:51:56Z
2021-08-25T20:51:56Z
MODERATE
5.9
{'CWE-667', 'CWE-662', 'CWE-787'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0114.html', 'https://github.com/advisories/GHSA-3hj2-hh36-hv9v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36220', 'https://github.com/video-audio/va-ts/issues/4'}
null
GHSA
GHSA-66vw-v2x9-hw75
Podman publishes a malicious image to public registries
Podman is a tool for managing OCI containers and pods. A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
{'CVE-2022-1227'}
2022-05-03T06:15:17Z
2022-04-30T00:00:35Z
HIGH
0
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=2070368', 'https://github.com/advisories/GHSA-66vw-v2x9-hw75', 'https://github.com/containers/podman/issues/10941', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1227'}
null
GHSA
GHSA-3rj3-qp2j-4fj2
Cross-Site Request Forgery in Jenkins P4 Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified Perforce server using attacker-specified username and password.
{'CVE-2021-21655'}
2022-03-21T20:40:45Z
2022-03-18T17:53:10Z
HIGH
7.1
{'CWE-352'}
{'https://github.com/advisories/GHSA-3rj3-qp2j-4fj2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21655', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'}
null
GHSA
GHSA-4m9r-5gqp-7j82
High severity vulnerability that affects org.dspace:dspace-xmlui
The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI.
{'CVE-2016-10726'}
2021-06-11T14:37:58Z
2018-10-19T16:52:06Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10726', 'https://github.com/DSpace/DSpace/releases/tag/dspace-5.5', 'https://wiki.duraspace.org/display/DSDOC5x/Release+Notes', 'https://github.com/advisories/GHSA-4m9r-5gqp-7j82', 'https://jira.duraspace.org/browse/DS-3094'}
null
GHSA
GHSA-3qrq-r688-vvh4
Multiple valid tokens for password reset in Shopware
### Impact Multiple tokens for password reset could be requested. All tokens could be used to change the password. This makes it possible for an attacker to take over the victims account if s/he gains access to the victims email account and finds unused password reset token in the emails within the time frame of two hours. ### Patches We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-9 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
{'CVE-2022-24892'}
2022-04-29T20:31:05Z
2022-04-28T21:02:17Z
MODERATE
6.4
{'CWE-640'}
{'https://github.com/advisories/GHSA-3qrq-r688-vvh4', 'https://github.com/shopware/shopware/security/advisories/GHSA-3qrq-r688-vvh4', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022', 'https://www.shopware.com/en/changelog-sw5/#5-7-9'}
null
GHSA
GHSA-h5jv-4p7w-64jg
Uncontrolled Resource Consumption in Django
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
{'CVE-2019-14233'}
2021-05-10T21:18:12Z
2019-08-06T01:43:33Z
HIGH
2.8
{'CWE-400'}
{'https://github.com/advisories/GHSA-h5jv-4p7w-64jg', 'https://security.gentoo.org/glsa/202004-17', 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://www.debian.org/security/2019/dsa-4498', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14233', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs', 'https://seclists.org/bugtraq/2019/Aug/15', 'https://security.netapp.com/advisory/ntap-20190828-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}
null
GHSA
GHSA-wqwf-x5cj-rg56
Arbitrary Command Injection
In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection.
{'CVE-2018-1002101'}
2022-04-20T20:56:14Z
2022-02-15T01:57:18Z
MODERATE
7.1
{'CWE-78'}
{'https://github.com/kubernetes/kubernetes/pull/65751', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002101', 'http://www.securityfocus.com/bid/106238', 'https://github.com/advisories/GHSA-wqwf-x5cj-rg56', 'https://github.com/kubernetes/kubernetes/commit/d65039c56ce4de5f2efdc38aa1284eeb95f89169', 'https://security.netapp.com/advisory/ntap-20190416-0008/', 'https://github.com/kubernetes/kubernetes/issues/65750'}
null
GHSA
GHSA-73m2-3pwg-5fgc
Catastrophic backtracking in regex allows Denial of Service in Waitress
### Impact When waitress receives a header that contains invalid characters it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and blocking any other interactions. This would allow an attacker to send a single request with an invalid header and take the service offline. Invalid header example: ``` Bad-header: xxxxxxxxxxxxxxx\x10 ``` Increasing the number of `x`'s in the header will increase the amount of time Waitress spends in the regular expression engine. This issue was introduced in version 1.4.2 when the regular expression was updated to attempt to match the behaviour required by errata associated with RFC7230. ### Patches The regular expression that is used to validate incoming headers has been updated in version 1.4.3, it is recommended that people upgrade to the new version of Waitress as soon as possible. ### Workarounds If you have deployed a reverse proxy in front of Waitress it may already be rejecting requests that include invalid headers. ### Thanks The Pylons Project would like to thank [Fil Zembowicz](https://github.com/fzembow) for reaching out and disclosing this vulnerability! ### References Catastrophic backtracking explained: https://www.regular-expressions.info/catastrophic.html ### For more information If you have any questions or comments about this advisory: - open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) - email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)
{'CVE-2020-5236'}
2022-03-24T19:27:20Z
2020-02-04T03:07:31Z
CRITICAL
5.7
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5236', 'https://github.com/Pylons/waitress/security/advisories/GHSA-73m2-3pwg-5fgc', 'https://github.com/advisories/GHSA-73m2-3pwg-5fgc', 'https://github.com/Pylons/waitress/commit/6e46f9e3f014d64dd7d1e258eaf626e39870ee1f'}
null
GHSA
GHSA-wx5j-54mm-rqqq
HTTP request smuggling in io.netty:netty-codec-http
### Impact Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore and so not do the validation itself.
{'CVE-2021-43797'}
2022-04-22T15:40:01Z
2021-12-09T19:09:17Z
MODERATE
6.5
{'CWE-444'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-wx5j-54mm-rqqq', 'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323', 'https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43797', 'https://security.netapp.com/advisory/ntap-20220107-0003/', 'https://github.com/netty/netty/pull/11891'}
null
GHSA
GHSA-xw7v-qrhc-jjg2
Access Control vulnerability in Dolibarr
An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.
{'CVE-2021-37517'}
2022-04-18T22:21:51Z
2022-04-01T00:00:41Z
HIGH
7.5
{'CWE-863'}
{'https://github.com/advisories/GHSA-xw7v-qrhc-jjg2', 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517', 'https://github.com/Dolibarr/dolibarr/releases/tag/14.0.1'}
null
GHSA
GHSA-22mf-97vh-x8rw
TODO
** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed because "the cache directory is not under control of the attacker in any common configuration."
{'CVE-2019-12760'}
2021-12-03T14:35:57Z
2019-06-13T16:12:57Z
HIGH
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12760', 'https://github.com/advisories/GHSA-22mf-97vh-x8rw', 'https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7'}
null
GHSA
GHSA-qwqc-28w3-fww6
Message Signature Bypass in openpgp
Versions of `openpgp` prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type `text`. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as `standalone` or `timestamp`). For example, an attacker that captures a `standalone` signature packet from a victim can construct arbitrary signed messages that would be verified correctly. ## Recommendation Upgrade to version 4.2.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
{'CVE-2019-9153'}
2021-08-17T22:06:13Z
2019-08-23T21:42:20Z
HIGH
7.5
{'CWE-347'}
{'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1', 'https://github.com/advisories/GHSA-qwqc-28w3-fww6', 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc', 'https://github.com/openpgpjs/openpgpjs/pull/816', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.npmjs.com/advisories/1160', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460248', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9153', 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}
null
GHSA
GHSA-r8h9-hq9c-2p5c
High severity vulnerability that affects com.github.shyiko.ktlint:ktlint-core
Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTTP connection to the artifact servers. This vulnerability appears to have been fixed in 0.30.0 and later; after commit 5e547b287d6c260d328a2cb658dbe6b7a7ff2261.
{'CVE-2019-1010260'}
2021-09-17T14:43:24Z
2019-04-08T15:18:54Z
HIGH
8.1
{'CWE-319'}
{'https://github.com/shyiko/ktlint/pull/332', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010260', 'https://github.com/advisories/GHSA-r8h9-hq9c-2p5c'}
null
GHSA
GHSA-5pv7-hx9m-8jh3
Missing permission checks in Jenkins Publish Over FTP Plugin
Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials.
{'CVE-2022-29051'}
2022-05-05T15:29:48Z
2022-04-13T00:00:16Z
MODERATE
4.3
{'CWE-862'}
{'https://github.com/advisories/GHSA-5pv7-hx9m-8jh3', 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29051'}
null
GHSA
GHSA-g8jc-mm3c-cwhj
Malicious Package in reques
All versions of `reques` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:08:00Z
2020-09-02T20:31:06Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/863', 'https://github.com/advisories/GHSA-g8jc-mm3c-cwhj'}
null
GHSA
GHSA-76mp-659p-rw65
Users registered with email verification can self re-activate their disabled accounts
### Impact A user disabled on a wiki using email verification for registration can re-activate himself by using the activation link provided for his registration. ### Patches The problem has been patched in the following versions of XWiki: 11.10.13, 12.6.7, 12.10.2, 13.0. ### Workarounds It's possible to workaround the issue by resetting the `validkey` property of the disabled XWiki users. This can be done by editing the user profile with object editor. ### References https://jira.xwiki.org/browse/XWIKI-17942 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org) * Email us at [Security mailing-list](mailto:security@xwiki.org)
{'CVE-2021-32620'}
2021-06-08T17:00:19Z
2021-05-18T18:36:21Z
HIGH
8.8
{'CWE-285'}
{'https://github.com/xwiki/xwiki-platform/commit/f9a677408ffb06f309be46ef9d8df1915d9099a4', 'https://jira.xwiki.org/browse/XWIKI-17942', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32620', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-76mp-659p-rw65', 'https://github.com/advisories/GHSA-76mp-659p-rw65'}
null
GHSA
GHSA-r32x-jhw5-g48p
Cross-Site Scripting in eco
All versions of `eco` are vulnerable to Cross-Site Scripting (XSS). The package's default `__escape` implementation fails to escape single quotes, which may allow attackers to execute arbitrary JavaScript on the victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-28T21:17:48Z
2020-09-03T17:08:20Z
HIGH
0
{'CWE-79'}
{'https://github.com/sstephenson/eco/pull/67', 'https://www.npmjs.com/advisories/1024', 'https://github.com/advisories/GHSA-r32x-jhw5-g48p'}
null
GHSA
GHSA-m6ch-gg5f-wxx3
HTTP Proxy header vulnerability
PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.
{'CVE-2016-5385'}
2022-04-07T14:00:21Z
2022-04-07T13:59:22Z
HIGH
8.1
null
{'http://rhn.redhat.com/errata/RHSA-2016-1610.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297', 'http://rhn.redhat.com/errata/RHSA-2016-1611.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/', 'https://httpoxy.org/', 'http://rhn.redhat.com/errata/RHSA-2016-1609.html', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5385', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us', 'http://www.debian.org/security/2016/dsa-3631', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/', 'http://www.securityfocus.com/bid/91821', 'https://www.drupal.org/SA-CORE-2016-003', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1353794', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/', 'http://rhn.redhat.com/errata/RHSA-2016-1613.html', 'https://security.gentoo.org/glsa/201611-22', 'https://github.com/advisories/GHSA-m6ch-gg5f-wxx3', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149', 'https://github.com/guzzle/guzzle/releases/tag/6.2.1', 'http://rhn.redhat.com/errata/RHSA-2016-1612.html', 'http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html', 'http://www.kb.cert.org/vuls/id/797896', 'http://www.securitytracker.com/id/1036335'}
null
GHSA
GHSA-qwwg-gc55-qqrv
Out-of-bounds Write in Chakra
Chakra Scripting Engine Memory Corruption Vulnerability
{'CVE-2020-17131'}
2021-04-13T15:54:40Z
2021-04-13T15:54:40Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17131', 'https://github.com/chakra-core/ChakraCore/pull/6531', 'https://github.com/chakra-core/ChakraCore/wiki/Roadmap#v11124', 'https://github.com/advisories/GHSA-qwwg-gc55-qqrv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17131'}
null
GHSA
GHSA-mm7r-265w-jv6f
Server-Side Request Forgery in @uppy/companion
Versions of `@uppy/companion` prior to 1.9.3 are vulnerable to Server-Side Request Forgery (SSRF). The `get` route passes the user-controlled variable `req.body.url` to a GET request without sanitizing the value. This allows attackers to inject arbitrary URLs and make GET requests on behalf of the server. ## Recommendation Upgrade to version 1.9.3 or later.
{'CVE-2020-8135'}
2021-10-04T21:09:41Z
2020-09-03T15:51:19Z
HIGH
0
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8135', 'https://github.com/advisories/GHSA-mm7r-265w-jv6f', 'https://www.npmjs.com/advisories/1501', 'https://hackerone.com/reports/786956'}
null
GHSA
GHSA-6qmf-fj6m-686c
Open Redirect in Flask-Security-Too
### Impact Flask-Security allows redirects after many successful views (e.g. /login) by honoring the ?next query param. There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL. This check utilizes Pythons urlsplit library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\github.com will pass FS's relative URL check however many browsers will gladly convert this to http://github.com. Thus an attacker could send such a link to an unwitting user, using a legitimate site and have it redirect to whatever site they want. This is considered a low severity due to the fact that if Werkzeug by default ALWAYS ensures that the Location header is absolute - thus making this attack vector mute. It is possible for application writers to modify this default behavior by setting the 'autocorrect_location_header=False` which would then open up their application to this attack. ### Patches No patches as this time ### Workarounds If using Werkzeug, make sure to use the default Location header setting. If you can't - then use@app.after_request and write your own validation of the Location header if it is set. ### References No. ### For more information If you have any questions or comments about this advisory follow: https://github.com/Flask-Middleware/flask-security/issues/486 Thanks to Claroty (2021-0141) and @snoopysecurity for providing details and proof of concept.
{'CVE-2021-32618'}
2022-01-10T21:34:03Z
2021-05-17T20:51:27Z
LOW
3.1
{'CWE-601'}
{'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c', 'https://github.com/Flask-Middleware/flask-security/issues/486', 'https://github.com/advisories/GHSA-6qmf-fj6m-686c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32618'}
null
GHSA
GHSA-3h8m-483j-7xxm
Heap out of bounds read in `RequantizationRange`
### Impact The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs: ```python import tensorflow as tf input = tf.constant([1], shape=[1], dtype=tf.qint32) input_max = tf.constant([], dtype=tf.float32) input_min = tf.constant([], dtype=tf.float32) tf.raw_ops.RequantizationRange(input=input, input_min=input_min, input_max=input_max) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/ac328eaa3870491ababc147822cd04e91a790643/tensorflow/core/kernels/requantization_range_op.cc#L49-L50) assumes that the `input_min` and `input_max` tensors have at least one element, as it accesses the first element in two arrays: ```cc const float input_min_float = ctx->input(1).flat<float>()(0); const float input_max_float = ctx->input(2).flat<float>()(0); ``` If the tensors are empty, `.flat<T>()` is an empty object, backed by an empty array. Hence, accesing even the 0th element is a read outside the bounds. ### Patches We have patched the issue in GitHub commit [ef0c008ee84bad91ec6725ddc42091e19a30cf0e](https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29569'}
2021-05-21T14:25:22Z
2021-05-21T14:25:22Z
LOW
2.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-3h8m-483j-7xxm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29569', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3h8m-483j-7xxm', 'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'}
null
GHSA
GHSA-crvj-3gj9-gm2p
High severity vulnerability that affects qs
Withdrawn, accidental duplicate publish. The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array.
null
2021-12-03T14:26:01Z
2018-10-09T00:44:29Z
HIGH
0
null
{'https://github.com/advisories/GHSA-crvj-3gj9-gm2p', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7191'}
null
GHSA
GHSA-4vr9-8cjf-vf9c
Async-h1 request smuggling possible with long unread bodies
### Impact This vulnerability affects any webserver that uses async-h1 behind a reverse proxy, including all such Tide applications. If the server does not read the body of a request which is longer than some buffer length, async-h1 will attempt to read a subsequent request from the body content starting at that offset into the body. One way to exploit this vulnerability would be for an adversary to craft a request such that the body contains a request that would not be noticed by a reverse proxy, allowing it to forge forwarded/x-forwarded headers. If an application trusted the authenticity of these headers, it could be misled by the smuggled request. Another potential concern with this vulnerability is that if a reverse proxy is sending multiple http clients' requests along the same keep-alive connection, it would be possible for the smuggled request to specify a long content and capture another user's request in its body. This content could be captured in a post request to an endpoint that allows the content to be subsequently retrieved by the adversary. ### Patches This has been addressed in async-h1 2.3.0 and previous versions have been yanked. ### Workarounds none ### References https://github.com/http-rs/async-h1/releases/tag/v2.3.0 ### For more information If you have any questions or comments about this advisory: * Open an issue in [async-h1](https://github.com/http-rs/async-h1) * Contact a core team member on [zulip](https://http-rs.zulip-chat.com) or [discord](https://discord.gg/x2gKzst)
{'CVE-2020-26281'}
2021-10-12T16:00:37Z
2021-10-12T16:00:37Z
MODERATE
6.8
{'CWE-444'}
{'https://github.com/http-rs/async-h1/security/advisories/GHSA-4vr9-8cjf-vf9c', 'https://github.com/advisories/GHSA-4vr9-8cjf-vf9c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26281', 'https://github.com/http-rs/async-h1/releases/tag/v2.3.0'}
null
GHSA
GHSA-4hrm-m67v-5cxr
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21346](https://x-stream.github.io/CVE-2021-21346.html). ### Credits wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21346'}
2022-04-19T19:02:48Z
2021-03-22T23:28:49Z
MODERATE
6.1
{'CWE-434', 'CWE-502'}
{'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://github.com/advisories/GHSA-4hrm-m67v-5cxr', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://x-stream.github.io/CVE-2021-21346.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21346', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-4q4x-67hx-5mpg
Failure to properly verify ed25519 signatures in libp2p-core
An issue was discovered in the libp2p-core crate before 0.8.1 for Rust. Attackers can spoof ed25519 signatures.
{'CVE-2019-15545'}
2021-08-25T20:44:08Z
2021-08-25T20:44:08Z
HIGH
7.5
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15545', 'https://github.com/advisories/GHSA-4q4x-67hx-5mpg', 'https://rustsec.org/advisories/RUSTSEC-2019-0004.html'}
null
GHSA
GHSA-vgvf-9jh3-fg75
Moderate severity vulnerability that affects io.swagger:swagger-codegen and io.swagger:swagger-parser
A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
{'CVE-2017-1000207'}
2021-09-20T21:46:19Z
2018-10-19T16:46:30Z
HIGH
8.8
{'CWE-502'}
{'https://github.com/advisories/GHSA-vgvf-9jh3-fg75', 'https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208', 'https://github.com/swagger-api/swagger-parser/pull/481', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000207'}
null
GHSA
GHSA-rc5r-697f-28x6
XSS injection in the Grid component of Sylius
Grid component of Sylius omits HTML input sanitisation while rendering object implementing __toString() method through the string field type.
{'CVE-2019-12186'}
2021-08-23T15:13:39Z
2020-04-15T21:07:59Z
MODERATE
4.8
{'CWE-79'}
{'https://sylius.com/blog/cve-2019-12186/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12186', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/grid/CVE-2019-12186.yaml', 'https://github.com/advisories/GHSA-rc5r-697f-28x6'}
null
GHSA
GHSA-3vcg-8p79-jpcv
Improper Restriction of XML External Entity Reference in svglib
The svglib package through 0.9.3 for Python allows XXE attacks via an svg2rlg call.
{'CVE-2020-10799'}
2021-05-06T18:52:01Z
2021-05-06T18:52:01Z
HIGH
9.8
{'CWE-611'}
{'https://github.com/advisories/GHSA-3vcg-8p79-jpcv', 'https://github.com/deeplook/svglib/issues/229', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10799'}
null
GHSA
GHSA-8cw6-5qvp-q3wj
Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the user's view of the Spark UI. While some browsers like recent versions of Chrome and Safari are able to block this type of attack, current versions of Firefox (and possibly others) do not.
{'CVE-2018-8024'}
2021-09-07T17:25:08Z
2019-03-14T15:40:57Z
MODERATE
5.4
{'CWE-200'}
{'https://github.com/advisories/GHSA-8cw6-5qvp-q3wj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8024', 'https://lists.apache.org/thread.html/5f241d2cda21cbcb3b63e46e474cf5f50cce66927f08399f4fab0aba@%3Cdev.spark.apache.org%3E', 'https://spark.apache.org/security.html#CVE-2018-8024'}
null
GHSA
GHSA-xjqg-9jvg-fgx2
High severity vulnerability that affects nokogiri
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 (as used in nokogiri before 1.6.7.1) does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
{'CVE-2015-5312'}
2021-09-21T22:35:12Z
2018-08-21T19:03:04Z
HIGH
0
null
{'https://support.apple.com/HT206167', 'http://rhn.redhat.com/errata/RHSA-2015-2550.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html', 'https://support.apple.com/HT206169', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5312', 'https://github.com/advisories/GHSA-xjqg-9jvg-fgx2', 'http://rhn.redhat.com/errata/RHSA-2015-2549.html', 'http://www.ubuntu.com/usn/USN-2834-1', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172', 'https://support.apple.com/HT206168', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html', 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html', 'http://marc.info/?l=bugtraq&m=145382616617563&w=2', 'https://bugzilla.redhat.com/show_bug.cgi?id=1276693', 'http://www.securityfocus.com/bid/79536', 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html', 'https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e', 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html', 'https://security.gentoo.org/glsa/201701-37', 'https://support.apple.com/HT206166', 'http://www.securitytracker.com/id/1034243', 'http://rhn.redhat.com/errata/RHSA-2016-1089.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html', 'http://xmlsoft.org/news.html', 'http://www.debian.org/security/2015/dsa-3430'}
null
GHSA
GHSA-mcg6-h362-cmq5
Improper Authorization in cobbler
### Impact If PAM is correctly configured and a user account is set to expired, the expired user-account is still able to successfully log into Cobbler in all places (Web UI, CLI & XMLRPC-API). The same applies to user accounts with passwords set to be expired. ### Patches There is a patch for the latest Cobbler `3.3.2` available, however a backport will be done for `3.2.x`. ### Workarounds - Delete expired accounts which are able to access Cobbler via PAM. - Use `chage -l <username>` to lock the account. If the account has SSH-Keys attached then remove them completely. ### References - Originally discovered by @ysf at https://www.huntr.dev/bounties/c458b868-63df-414e-af10-47e3745caa1d/ ### How to test if my Cobbler instance is affected? The following `pytest` test assumes that your PAM setup is correct. In case the added user is not able to login, this test does not make sense to be executed. ```python def test_pam_login_with_expired_user(): # Arrange # create pam testuser test_username = "expired_user" test_password = "password" test_api = CobblerAPI() subprocess_1 = subprocess.run( ["perl", "-e", "'print crypt(\"%s\", \"%s\")'" % (test_username, test_password)], stdout=subprocess.PIPE ) subprocess.run(["useradd", "-p", subprocess_1.stdout, test_username]) # change user to be expired subprocess.run(["chage", "-E0", test_username]) # Act result = pam.authenticate(test_api, test_username, test_password) # Assert - login should fail assert not result ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Cobbler repository](https://github.com/cobbler/cobbler/issues/new/choose) * Ask in the [Gitter/Matrix Chat](https://gitter.im/cobbler/community) * Email us at [cobbler.project@gmail.com](mailto:cobbler.project@gmail.com)
{'CVE-2022-0860'}
2022-04-01T20:11:34Z
2022-03-11T20:52:04Z
HIGH
8.2
{'CWE-863', 'CWE-285'}
{'https://github.com/cobbler/cobbler/security/advisories/GHSA-mcg6-h362-cmq5', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYWYHWVVRUSPCV5SWBOSAMQJQLTSBTKY/', 'https://github.com/cobbler/cobbler/commit/9044aa990a94752fa5bd5a24051adde099280bfa', 'https://huntr.dev/bounties/c458b868-63df-414e-af10-47e3745caa1d', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4KCNZYBQC2FM5SEEDRQZO4LRZ4ZECMG/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYSHMF6MEIITFAG7EJ3IQKVUN7MDV2XM/', 'https://github.com/advisories/GHSA-mcg6-h362-cmq5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0860'}
null
GHSA
GHSA-6w87-g839-9wv7
Helm OCI credentials leaked into Argo CD logs
### Impact When Argo CD was connected to a Helm OCI repository with authentication enabled, the credentials used for accessing the remote repository were logged. Anyone with access to the pod logs - either via access with appropriate permissions to the Kubernetes control plane or a third party log management system where the logs from Argo CD were aggregated - could have potentially obtained the credentials to the Helm OCI repository. If you are using Helm OCI repositories with Argo CD, it is strongly recommended to upgrade Argo CD to the latest patch version and to change the credentials used to access the repositories. ### Patches A patch for this vulnerability is available with the v1.8.7 and v1.7.14 releases of Argo CD. ### Workarounds No workaround available ### References N/A ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel `#argo-cd` ### Credits This vulnerability was found and reported by a third-party who wishes to stay anonymous. We want to thank this third-party for disclosing this vulnerability to us in a responsible manner.
null
2021-10-05T16:35:57Z
2021-05-21T14:31:28Z
MODERATE
6.6
{'CWE-532'}
{'https://github.com/advisories/GHSA-6w87-g839-9wv7', 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-6w87-g839-9wv7'}
null
GHSA
GHSA-mfwh-5m23-j46w
Environment Variable Injection in GitHub Actions
### Impact The `@actions/core` npm module `addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. ### Patches The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new [Environment File Syntax](https://github.com/actions/toolkit/blob/main/docs/commands.md#environment-files). Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution. ### Workarounds None, it is strongly suggested that you upgrade as soon as possible. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Actions Toolkit](https://github.com/actions/toolkit/issues)
{'CVE-2020-15228'}
2021-11-19T15:12:00Z
2020-10-01T17:16:20Z
LOW
3.5
{'CWE-20', 'CWE-77'}
{'https://github.com/actions/toolkit/security/advisories/GHSA-mfwh-5m23-j46w', 'https://github.com/advisories/GHSA-mfwh-5m23-j46w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15228', 'http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html'}
null
GHSA
GHSA-8489-44mv-ggj8
Improper Input Validation and Injection in Apache Log4j2
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to an attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2. # Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. This issue does not impact default configurations of Log4j2 and requires an attacker to have control over the Log4j2 configuration, which reduces the likelihood of being exploited.
{'CVE-2021-44832'}
2022-04-22T15:39:59Z
2022-01-04T16:14:20Z
MODERATE
6.6
{'CWE-74', 'CWE-20'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC/', 'https://security.netapp.com/advisory/ntap-20220104-0001/', 'https://issues.apache.org/jira/browse/LOG4J2-3293', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd', 'https://github.com/advisories/GHSA-8489-44mv-ggj8', 'http://www.openwall.com/lists/oss-security/2021/12/28/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44832'}
null
GHSA
GHSA-vvfh-mvjv-w38q
Malicious Package in babel-loadre
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:17:43Z
2020-09-04T15:28:19Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1349', 'https://github.com/advisories/GHSA-vvfh-mvjv-w38q'}
null
GHSA
GHSA-vjw7-6gfq-6wf5
Path Traversal in Eclipse Vert
In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working directory.
{'CVE-2019-17640'}
2022-02-10T20:28:57Z
2022-02-10T20:28:57Z
CRITICAL
9.8
{'CWE-23', 'CWE-22'}
{'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://mvnrepository.com/artifact/io.vertx/vertx-web', 'https://lists.apache.org/thread.html/r8d863b148efe778ce5f8f961d0cafeda399e681d3f0656233b4c5511@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r591f6932560c8c46cee87415afed92924a982189fea7f7c9096f8e33@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8383b5e7344a8b872e430ad72241b84b83e9701d275c602cfe34a941@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rfd0ebf8387cfd0b959d1e218797e709793cce51a5ea2f84d0976f47d@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-vjw7-6gfq-6wf5', 'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17640'}
null
GHSA
GHSA-6vfw-74wr-3chh
Cross-site Scripting in Crater Invoice
Crater invoice prior to version 6.0.0 has a cross-site scripting vulnerability.
{'CVE-2022-0372'}
2022-02-10T22:25:39Z
2022-01-28T00:03:42Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0372', 'https://github.com/advisories/GHSA-6vfw-74wr-3chh', 'https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1', 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d', 'https://github.com/crater-invoice/crater/pull/681'}
null
GHSA
GHSA-hwr7-8gxx-fj5p
Null pointer dereference in `RaggedTensorToTensor`
### Impact Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior: ```python import tensorflow as tf tf.raw_ops.RaggedTensorToTensor( shape=1, values=10, default_value=21, row_partition_tensors=tf.constant([0,0,0,0]), row_partition_types=[]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L328) accesses the first element of a user supplied list of values without validating that the provided list is not empty. ### Patches We have patched the issue in GitHub commit [301ae88b331d37a2a16159b65b255f4f9eb39314](https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37638'}
2021-08-25T14:44:09Z
2021-08-25T14:44:09Z
HIGH
7.7
{'CWE-476'}
{'https://github.com/advisories/GHSA-hwr7-8gxx-fj5p', 'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37638', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p'}
null
GHSA
GHSA-9378-f4v7-jgm4
Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils
Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release.
{'CVE-2021-41616'}
2021-10-08T21:29:34Z
2021-10-04T20:12:30Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41616', 'https://lists.apache.org/thread.html/r3d7a8303a820144f5e2d1fd0b067e18d419421b58346b53b58d3fa72%40%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-9378-f4v7-jgm4'}
null
GHSA
GHSA-8p5q-j9m2-g8wr
Withdrawn: Arbitrary code execution in lodash
# Withdrawn GitHub has chosen to publish this CVE as a withdrawn advisory due to it not being a security issue. See [this issue](https://github.com/lodash/lodash/issues/5261) for more details. # CVE description "** DISPUTED ** A command injection vulnerability in Lodash 4.17.21 allows attackers to achieve arbitrary code execution via the template function. This is a different parameter, method, and version than CVE-2021-23337. NOTE: the vendor's position is that it's the developer's responsibility to ensure that a template does not evaluate code that originates from untrusted input.
{'CVE-2021-41720'}
2021-12-03T20:37:45Z
2021-12-03T20:37:32Z
LOW
9.8
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23337', 'https://github.com/lodash/lodash/issues/5261', 'https://github.com/advisories/GHSA-8p5q-j9m2-g8wr', 'https://web.archive.org/web/20211004200531/https:/github.com/lodash/lodash/issues/5261', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41720'}
null
GHSA
GHSA-xrrg-wfwc-c7r3
Malicious Package in bictoin-ops
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:37:49Z
2020-09-04T15:33:52Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1354', 'https://github.com/advisories/GHSA-xrrg-wfwc-c7r3'}
null
GHSA
GHSA-vh59-v9r5-4mh4
Cross-site scripting in jspdf
It's possible to inject JavaScript code via the html method.
{'CVE-2020-7690'}
2021-05-17T21:01:32Z
2021-05-17T21:01:32Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7690', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575258', 'https://snyk.io/vuln/SNYK-JS-JSPDF-575256', 'https://github.com/MrRio/jsPDF/issues/2795', 'https://github.com/advisories/GHSA-vh59-v9r5-4mh4', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575260', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575259', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575257'}
null
GHSA
GHSA-jf8x-wg7f-p3w8
Malicious Package in cage-js
All versions of `cage-js` contains malicious code. The malware downloads and runs a script from a remote server as a postinstall script. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:05:29Z
2020-09-03T18:22:33Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1085', 'https://github.com/advisories/GHSA-jf8x-wg7f-p3w8'}
null
GHSA
GHSA-h8pj-cxx2-jfg2
Improper Input Validation in httpx
Encode OSS httpx <=1.0.0.beta0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`.
{'CVE-2021-41945'}
2022-04-29T22:55:39Z
2022-04-29T00:00:25Z
MODERATE
0
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41945', 'https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571', 'https://github.com/encode/httpx/pull/2185', 'https://github.com/advisories/GHSA-h8pj-cxx2-jfg2', 'https://github.com/encode/httpx/issues/2184', 'https://github.com/encode/httpx/discussions/1831'}
null
GHSA
GHSA-84fq-6626-w5fg
CORS Token Disclosure in crumb
When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes as this user. A configuration and scenario where this would occur is unlikely, as most configurations will set CORS globally (where crumb is not used), or not at all. ## Recommendation Update to version 3.0.0 or greater.
{'CVE-2014-7193'}
2021-07-19T21:45:56Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-284'}
{'https://github.com/advisories/GHSA-84fq-6626-w5fg', 'https://nodesecurity.io/advisories/crumb_cors_token_disclosure', 'https://www.npmjs.com/advisories/4', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7193', 'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}
null
GHSA
GHSA-q8gv-q7wr-9jf8
Segfault in Tensorflow
### Impact In eager mode, TensorFlow does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/session_ops.cc#L45 In the above snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code immediately dereferences this, we get a segmentation fault. ### Patches We have patched the issue in 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1 and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15204'}
2021-08-26T15:17:13Z
2020-09-25T18:28:41Z
MODERATE
5.3
{'CWE-476'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8gv-q7wr-9jf8', 'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1', 'https://github.com/advisories/GHSA-q8gv-q7wr-9jf8', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15204'}
null