ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-x7cr-6qr6-2hh6 | Missing input validation can lead to command execution in composer | The Composer method `VcsDriver::getFileContent()` with user-controlled `$file` or `$identifier` arguments is susceptible to an argument injection vulnerability. It can be leveraged to gain arbitrary command execution if the Mercurial or the Git driver are used.
This led to a vulnerability on Packagist.org and Private Packagist, i.e., using the composer.json `readme` field as a vector for injecting parameters into the `$file` argument for the Mercurial driver or via the `$identifier` argument for the Git and Mercurial drivers.
Composer itself can be attacked through branch names by anyone controlling a Git or Mercurial repository, which is explicitly listed by URL in a project's composer.json.
To the best of our knowledge, this was not actively exploited. The vulnerability has been patched on Packagist.org and Private Packagist within a day of the vulnerability report. | {'CVE-2022-24828'} | 2022-04-26T18:00:17Z | 2022-04-22T20:15:38Z | HIGH | 8.3 | {'CWE-94', 'CWE-20'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWT6LDSRY7SFMTDZWJ4MS2ZBXHL7VQEF/', 'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709', 'https://github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24828', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/advisories/GHSA-x7cr-6qr6-2hh6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/'} | null |
GHSA | GHSA-9rjp-r58j-fxgq | Path traversal in elFinder.NetCore | This affects all versions of package elFinder.NetCore. The Path.Combine(...) method is used to create an absolute file path. Due to missing sanitation of the user input and a missing check of the generated path its possible to escape the Files directory via path traversal | {'CVE-2021-23428'} | 2021-09-10T17:08:20Z | 2021-09-02T22:05:26Z | HIGH | 8.6 | {'CWE-20', 'CWE-22'} | {'https://github.com/advisories/GHSA-9rjp-r58j-fxgq', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1313838', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L387', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23428', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L387', 'https://github.com/gordon-matt/elFinder.NetCore'} | null |
GHSA | GHSA-95xm-g58g-3p88 | Integer division by 0 in sparse reshaping | ### Impact
The implementation of `tf.raw_ops.SparseReshape` can be made to trigger an integral division by 0 exception:
```python
import tensorflow as tf
tf.raw_ops.SparseReshape(
input_indices = np.ones((1,3)),
input_shape = np.array([1,1,0]),
new_shape = np.array([1,0]))
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/reshape_util.cc#L176-L181) calls the reshaping functor whenever there is at least an index in the input but does not check that shape of the input or the target shape have both a non-zero number of elements.
The [reshape functor](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/reshape_util.cc#L40-L78) blindly divides by the dimensions of the target shape. Hence, if this is not checked, code will result in a division by 0.
### Patches
We have patched the issue in GitHub commit [4923de56ec94fff7770df259ab7f2288a74feb41](https://github.com/tensorflow/tensorflow/commit/4923de56ec94fff7770df259ab7f2288a74feb41).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1 as this is the other affected version.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37640'} | 2021-08-25T14:44:02Z | 2021-08-25T14:44:02Z | MODERATE | 5.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/4923de56ec94fff7770df259ab7f2288a74feb41', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37640', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-95xm-g58g-3p88', 'https://github.com/advisories/GHSA-95xm-g58g-3p88'} | null |
GHSA | GHSA-ppxc-pmx9-qjv9 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1195'} | 2021-03-29T20:57:59Z | 2021-03-29T20:57:59Z | HIGH | 7.5 | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1195', 'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1195', 'https://github.com/advisories/GHSA-ppxc-pmx9-qjv9', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null |
GHSA | GHSA-xp82-jmw8-mjxp | Unrestricted Upload of File with Dangerous Type in ShowDoc | There is a Unrestricted Upload of File vulnerability in ShowDoc prior to version 2.10.4. | {'CVE-2022-1034'} | 2022-03-30T20:49:29Z | 2022-03-23T00:00:23Z | HIGH | 7.2 | {'CWE-434'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-1034', 'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b', 'https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7', 'https://github.com/advisories/GHSA-xp82-jmw8-mjxp'} | null |
GHSA | GHSA-jrg3-qq99-35g7 | Deserialization of Untrusted Data in Jodd | Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set. | {'CVE-2018-21234'} | 2022-04-26T17:59:30Z | 2022-02-10T23:03:26Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-21234', 'https://lists.apache.org/thread.html/r965503b27d67a2d934e34fc1d088c9547d51d927c43b8b9bd9b7e695@%3Cissues.hive.apache.org%3E', 'https://github.com/advisories/GHSA-jrg3-qq99-35g7', 'https://lists.apache.org/thread.html/r157d01c96a2c10e7ceb3e005f42c52cfe87b11dd018935e1c4277433@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r729bc1e0f367fe8a857ac8a14641dba284ac4cf5131edf483022cf59@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r0bacc701ab7105500a0ab2769270d18f332cb379e6a62ec7553f3327@%3Cissues.hive.apache.org%3E', 'https://github.com/oblac/jodd/compare/v5.0.3...v5.0.4', 'https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16', 'https://lists.apache.org/thread.html/rf458683390d6650b26a2c8ba8ad396e038e520ad1cc3f3f1e20514d9@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rc85b650b4ad2c77d7c39c69824488e40dce6d0ebbb4204777d094375@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rd575d9877424a2d8776f5c2ff33bf3dc3382cd83f031d483f29c11ab@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rdbb99b43334b59d3d3478d360c87e3235ba22edb1de7d39019194347@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rdce006b282e56c5cc73cdf452c51c5097154d0503396d62f48abbeae@%3Cgitbox.hive.apache.org%3E', 'https://github.com/oblac/jodd/issues/628', 'https://lists.apache.org/thread.html/r317aec95c436848233047af7ecb3ce04ce446eb6031f981aef50df0d@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rc23200043872384e0fc48a4a4502f4c6b4b5ddc79ba4076414150d59@%3Cissues.hive.apache.org%3E'} | null |
GHSA | GHSA-977j-xj7q-2jr9 | Segmentation faultin TensorFlow when converting a Python string to `tf.float16` | ### Impact
Converting a string (from Python) to a `tf.float16` value results in a segmentation fault in eager mode as the format checks for this use case are only in the graph mode.
This issue can lead to denial of service in inference/training where a malicious attacker can send a data point which contains a string instead of a `tf.float16` value.
Similar effects can be obtained by manipulating saved models and checkpoints whereby replacing a scalar `tf.float16` value with a scalar string will trigger this issue due to automatic conversions.
This can be easily reproduced by `tf.constant("hello", tf.float16)`, if eager execution is enabled.
### Patches
We have patched the vulnerability in GitHub commit [5ac1b9](https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf).
We are additionally releasing TensorFlow 1.15.1 and 2.0.1 with this vulnerability patched.
TensorFlow 2.1.0 was released after we fixed the issue, thus it is not affected.
We encourage users to switch to TensorFlow 1.15.1, 2.0.1 or 2.1.0.
### For more information
Please consult [`SECURITY.md`](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2020-5215'} | 2021-01-08T20:32:01Z | 2020-01-28T21:32:29Z | HIGH | 5 | {'CWE-754'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5215', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.0.1', 'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-977j-xj7q-2jr9', 'https://github.com/tensorflow/tensorflow/releases/tag/v1.15.2', 'https://github.com/advisories/GHSA-977j-xj7q-2jr9'} | null |
GHSA | GHSA-q22g-8fr4-qpj4 | Regular Expression Denial of Service in remarkable | lib/common/html_re.js in remarkable 1.7.1 allows Regular Expression Denial of Service (ReDoS) via a CDATA section. | {'CVE-2019-12041'} | 2021-08-04T21:37:20Z | 2019-06-06T15:32:15Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-12041', 'https://github.com/advisories/GHSA-q22g-8fr4-qpj4', 'https://snyk.io/vuln/SNYK-JS-REMARKABLE-174639', 'https://github.com/jonschlinkert/remarkable/issues/331'} | null |
GHSA | GHSA-5gjg-jgh4-gppm | Websocket requests did not call AuthenticateMethod | ### Impact
Depending on implementation, a denial-of-service or privilege escalation vulnerability may occur in software that uses the `github.com/ecnepsnai/web` package with Web Sockets that have an AuthenticateMethod.
The `AuthenticateMethod` is not called, and `UserData` will be nil in request methods. Attempts to read the `UserData` may result in a panic.
This issue only affects web sockets where an `AuthenticateMethod` is supplied to the handle options. Users who do not use web sockets, or users who do not require authentication are not at risk.
#### Example
In the example below, one would expect that the `AuthenticateMethod` function would be called for each request to `/example`
```go
handleOptions := web.HandleOptions{
AuthenticateMethod: func(request *http.Request) interface{} {
// Assume there is logic here to check for an active sessions, look at cookies or headers, etc...
var session Session{} // Example
return session
},
}
server.Socket("/example", handle, handleOptions)
```
However, the method is not called, and therefor the `UserData` parameter of the request object in the handle will be nil, when it would have been expected to be the `session` object we returned.
### Patches
Release v1.5.2 fixes this vulnerability. The authenticate method is now called for websocket requests.
All users of the web package should update to v1.5.2 or later.
### Workarounds
You may work around this issue by making the authenticate method a named function, then calling that function at the start of the handle method for the websocket. Reject connections when the return value of the method is nil. | null | 2021-10-05T16:37:09Z | 2021-06-23T17:26:30Z | MODERATE | 0 | {'CWE-304'} | {'https://github.com/ecnepsnai/web/security/advisories/GHSA-5gjg-jgh4-gppm', 'https://github.com/advisories/GHSA-5gjg-jgh4-gppm'} | null |
GHSA | GHSA-pmg9-p9r2-6q87 | ReDoS via long UserAgent header in ua-parser | Affected versions of `ua-parser` are vulnerable to regular expression denial of service when given a specially crafted `User-Agent` header.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different, functionally equivalent package such as [useragent](https://www.npmjs.com/package/useragent). | {'CVE-2017-16086'} | 2021-01-08T18:20:34Z | 2018-07-24T19:46:37Z | HIGH | 0 | {'CWE-400'} | {'https://www.npmjs.com/advisories/316', 'https://github.com/advisories/GHSA-pmg9-p9r2-6q87', 'https://nodesecurity.io/advisories/316', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16086'} | null |
GHSA | GHSA-r478-c2pc-m7gx | DNS reply verification issue in dnslinb | The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query. | {'CVE-2022-22846'} | 2022-01-19T19:58:20Z | 2022-01-12T20:07:10Z | HIGH | 7.5 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2022-22846', 'https://github.com/paulc/dnslib/issues/30', 'https://github.com/paulc/dnslib/commit/76e8677699ed098387d502c57980f58da642aeba', 'https://github.com/advisories/GHSA-r478-c2pc-m7gx'} | null |
GHSA | GHSA-g5m5-v5cp-5p7m | Directory Traversal in wintiwebdev | Affected versions of `wintiwebdev` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16181'} | 2021-01-12T22:44:21Z | 2020-09-01T18:50:16Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wintiwebdev', 'https://nodesecurity.io/advisories/458', 'https://github.com/advisories/GHSA-g5m5-v5cp-5p7m', 'https://www.npmjs.com/advisories/458', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16181'} | null |
GHSA | GHSA-cf2x-rqc8-grfq | Regular expression deinal of service in express-validators | All versions of package express-validators are vulnerable to Regular Expression Denial of Service (ReDoS) when validating specifically-crafted invalid urls. | {'CVE-2020-7767'} | 2021-05-10T19:16:27Z | 2021-05-10T19:16:27Z | MODERATE | 5.3 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7767', 'https://github.com/advisories/GHSA-cf2x-rqc8-grfq', 'https://snyk.io/vuln/SNYK-JS-EXPRESSVALIDATORS-1017404'} | null |
GHSA | GHSA-v6fx-752r-ccp2 | CSRF on PgHero gem | The PgHero gem through 2.6.0 for Ruby allows CSRF. | {'CVE-2020-16253'} | 2021-09-23T18:37:56Z | 2020-08-05T14:53:43Z | HIGH | 8.1 | {'CWE-352'} | {'https://github.com/ankane/pghero/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16253', 'https://rubygems.org/gems/pghero', 'https://github.com/ankane/pghero/issues/330', 'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9', 'https://github.com/advisories/GHSA-v6fx-752r-ccp2', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pghero/CVE-2020-16253.yml'} | null |
GHSA | GHSA-j27j-4w6m-8fc4 | Path Traversal in statics-server | All versions of `statics-server` are vulnerable to Path Traversal. The package fails to limit access to files outside of the served folder through symlinks.
## Recommendation
No fix is currently available. Do not use `statics-server` in production or consider using an alternative module until a fix is made available. | {'CVE-2019-15596'} | 2021-01-08T20:24:31Z | 2020-03-31T17:02:12Z | MODERATE | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-15596', 'https://www.npmjs.com/advisories/1303', 'https://hackerone.com/reports/695416', 'https://github.com/advisories/GHSA-j27j-4w6m-8fc4'} | null |
GHSA | GHSA-gx96-vgf7-hwfg | In Apache PDFBox a carefully crafted PDF file can trigger an extremely long running computation | In Apache PDFBox 1.8.0 to 1.8.15 and 2.0.0RC1 to 2.0.11, a carefully crafted PDF file can trigger an extremely long running computation when parsing the page tree. | {'CVE-2018-11797'} | 2022-04-27T14:23:39Z | 2018-10-17T18:22:29Z | MODERATE | 5.5 | {'CWE-400'} | {'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HKVPTJWZGUB4MH4AAOWMRJHRDBYFHGJ/', 'https://lists.apache.org/thread.html/645574bc50b886d39c20b4065d51ccb1cd5d3a6b4750a22edbb565eb@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/a9760973a873522f4d4c0a99916ceb74f361d91006b663a0a418d34a@%3Cannounce.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPOGHJ5CVMUVCRQU7APBAN5IVZGZFDX/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11797', 'https://github.com/advisories/GHSA-gx96-vgf7-hwfg', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00008.html'} | null |
GHSA | GHSA-7grw-6pjh-jpc9 | Infinite Loop in Apache PDFBox | In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions. | {'CVE-2021-31812'} | 2022-04-26T18:08:25Z | 2021-06-15T15:54:29Z | MODERATE | 5.5 | {'CWE-835', 'CWE-834'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-7grw-6pjh-jpc9', 'https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/06/12/1', 'https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e@%3Cusers.pdfbox.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/', 'https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31812', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/', 'https://lists.apache.org/thread.html/rf251f6c358087107f8c23473468b279d59d50a75db6b4768165c78d3@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-gcfc-mgg3-8j2c | Malicious Package in sdfjghlkfjdshlkjdhsfg | All versions of `sdfjghlkfjdshlkjdhsfg` contain malicious code. The package is essentially a worm that fetches all packages owned by the user, adds a script to self-replicate as a preinstall script and publishes a new version.
## Recommendation
Remove the package from your environment and ensure all packages owned were not impacted. | null | 2021-09-30T20:03:21Z | 2020-09-03T18:11:29Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1072', 'https://github.com/advisories/GHSA-gcfc-mgg3-8j2c'} | null |
GHSA | GHSA-4449-hg37-77v8 | Command injection in total.js | There is a command injection vulnerability that affects the package total.js before version 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized. | {'CVE-2020-28494'} | 2021-07-28T18:57:24Z | 2021-02-05T20:43:27Z | HIGH | 8.6 | {'CWE-78'} | {'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28494', 'https://github.com/advisories/GHSA-4449-hg37-77v8', 'https://www.npmjs.com/package/total.js'} | null |
GHSA | GHSA-qffw-8wg7-h665 | Command injection in git-interface | A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker. | {'CVE-2022-1440'} | 2022-04-29T17:22:44Z | 2022-04-23T00:03:01Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1', 'https://github.com/advisories/GHSA-qffw-8wg7-h665', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1440', 'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'} | null |
GHSA | GHSA-686g-3xr3-x4x6 | Information Exposure on Case Insensitive File Systems in serve | Versions of `serve` before 7.0.0 are vulnerable to information exposure, bypassing the ignore security control, but only on case insensitive file systems.
## Recommendation
Update to version 7.0.0 or later. | {'CVE-2018-3809'} | 2021-09-01T22:46:06Z | 2018-07-18T18:33:15Z | MODERATE | 5.3 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-3809', 'https://github.com/advisories/GHSA-686g-3xr3-x4x6', 'https://www.npmjs.com/advisories/672', 'https://hackerone.com/reports/330650'} | null |
GHSA | GHSA-h3rx-g5c9-8q4x | Prototype Pollution in bmoor | The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function. | {'CVE-2020-7736'} | 2021-07-28T19:52:39Z | 2021-05-10T18:37:26Z | HIGH | 7.3 | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7736', 'https://www.npmjs.com/package/bmoor', 'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5', 'https://github.com/advisories/GHSA-h3rx-g5c9-8q4x', 'https://snyk.io/vuln/SNYK-JS-BMOOR-598664'} | null |
GHSA | GHSA-fvm3-cfvj-gxqq | High severity vulnerability that affects commons-fileupload:commons-fileupload | The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string. | {'CVE-2016-3092'} | 2021-07-19T15:57:49Z | 2018-12-21T17:47:47Z | HIGH | 7.5 | {'CWE-20'} | {'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759', 'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html', 'http://tomcat.apache.org/security-7.html', 'http://www.ubuntu.com/usn/USN-3027-1', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'http://tomcat.apache.org/security-9.html', 'http://www.debian.org/security/2016/dsa-3614', 'https://access.redhat.com/errata/RHSA-2017:0455', 'http://rhn.redhat.com/errata/RHSA-2016-2072.html', 'http://www.securitytracker.com/id/1036427', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121', 'http://rhn.redhat.com/errata/RHSA-2016-2807.html', 'https://security.netapp.com/advisory/ntap-20190212-0001/', 'http://svn.apache.org/viewvc?view=revision&revision=1743722', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.ubuntu.com/usn/USN-3024-1', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3092', 'http://rhn.redhat.com/errata/RHSA-2016-2808.html', 'http://www.securitytracker.com/id/1037029', 'http://www.securitytracker.com/id/1036900', 'http://svn.apache.org/viewvc?view=revision&revision=1743480', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'http://rhn.redhat.com/errata/RHSA-2017-0457.html', 'https://github.com/advisories/GHSA-fvm3-cfvj-gxqq', 'http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html', 'http://www.debian.org/security/2016/dsa-3609', 'http://www.securitytracker.com/id/1039606', 'https://security.gentoo.org/glsa/201705-09', 'http://svn.apache.org/viewvc?view=revision&revision=1743742', 'http://svn.apache.org/viewvc?view=revision&revision=1743738', 'http://jvn.jp/en/jp/JVN89379547/index.html', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:0456', 'https://bugzilla.redhat.com/show_bug.cgi?id=1349468', 'http://rhn.redhat.com/errata/RHSA-2016-2069.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'http://tomcat.apache.org/security-8.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2016-2599.html', 'http://www.debian.org/security/2016/dsa-3611', 'http://rhn.redhat.com/errata/RHSA-2016-2070.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E', 'http://rhn.redhat.com/errata/RHSA-2016-2068.html', 'http://www.securityfocus.com/bid/91453', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840', 'http://rhn.redhat.com/errata/RHSA-2016-2071.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371'} | null |
GHSA | GHSA-wfj5-2mqr-7jvv | Expression Language Injection in Netflix Conductor | Netflix Conductor uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code. | {'CVE-2020-9296'} | 2022-02-10T23:06:57Z | 2022-02-10T23:06:57Z | CRITICAL | 9.8 | {'CWE-917'} | {'https://github.com/advisories/GHSA-wfj5-2mqr-7jvv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9296', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-001.md'} | null |
GHSA | GHSA-cq6h-w3mc-57f4 | Information exposure via query strings in URL | ### Impact
Information exposure via query strings in URL
### Patches
We recommend to update to the current version 6.3.4.1. You can get the update to 6.3.4.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin:
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-12-2020
### Credits
We would like to thank <a rel="noopener" href="https://www.vater-it.de/">Oliver Herrmann</a> for reporting this issue. | null | 2020-12-21T18:01:16Z | 2020-12-21T18:01:16Z | LOW | 0 | {'CWE-200'} | {'https://github.com/advisories/GHSA-cq6h-w3mc-57f4', 'https://github.com/shopware/platform/security/advisories/GHSA-cq6h-w3mc-57f4'} | null |
GHSA | GHSA-wxvm-fh75-mpgr | Critical severity vulnerability that affects dns-sync | Withdrawn, accidental duplicate publish.
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function. | null | 2021-12-02T22:57:37Z | 2018-07-26T16:24:34Z | CRITICAL | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2014-9682', 'https://github.com/advisories/GHSA-wxvm-fh75-mpgr'} | null |
GHSA | GHSA-5hpj-m323-cphm | Double free in through | An issue was discovered in the through crate through 2021-02-18 for Rust. There is a double free (in through and through_and) upon a panic of the map function. | {'CVE-2021-29940'} | 2021-08-25T20:54:12Z | 2021-08-25T20:54:12Z | CRITICAL | 9.8 | {'CWE-415'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0049.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29940', 'https://github.com/gretchenfrage/through/issues/1', 'https://github.com/advisories/GHSA-5hpj-m323-cphm'} | null |
GHSA | GHSA-8vp7-j5cj-vvm2 | Ability to expose data in Sylius by using an unintended serialisation group | ### Impact
ResourceBundle accepts and uses any serialisation groups to be passed via a HTTP header. This might lead to data exposure by using an unintended serialisation group - for example it could make Shop API use a more permissive group from Admin API.
Anyone exposing an API with ResourceBundle's controller is affected. The vulnerable versions are: `<1.3 || >=1.3.0 <=1.3.12 || >=1.4.0 <=1.4.5 || >=1.5.0 <=1.5.0 || >=1.6.0 <=1.6.2`.
### Patches
The patch is provided for ResourceBundle 1.3.13, 1.4.6, 1.5.1 and 1.6.3, but not for any versions below 1.3.
After it is applied, It allows to choose only the groups that are defined in `serialization_groups` or `allowed_serialization_groups` route definition. Any group not defined in those will not be used.
This behaviour might be a BC break for those using custom groups via the HTTP header, please adjust `allowed_serialization_groups` accordingly.
### Workarounds
Service `sylius.resource_controller.request_configuration_factory` can be overridden with an implementation copied from `\Sylius\Bundle\ResourceBundle\Controller\RequestConfigurationFactory` where the part that handles custom serialisation groups is deleted. | {'CVE-2020-5220'} | 2021-01-08T20:32:45Z | 2020-01-31T18:00:43Z | MODERATE | 4.4 | {'CWE-444'} | {'https://github.com/advisories/GHSA-8vp7-j5cj-vvm2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5220', 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-8vp7-j5cj-vvm2', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/resource-bundle/CVE-2020-5220.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/sylius/CVE-2020-5220.yaml'} | null |
GHSA | GHSA-24m3-w8g9-jwpq | Information disclosure of source code in SimpleSAMLphp | ### Background
The module controller in `SimpleSAML\Module` that processes requests for pages
hosted by modules, has code to identify paths ending with `.php` and process
those as PHP code. If no other suitable way of handling the given path exists it
presents the file to the browser.
### Description
The check to identify paths ending with `.php` does not account for uppercase
letters. If someone requests a path ending with e.g. `.PHP` and the server is
serving the code from a case-insensitive file system, such as on Windows, the
processing of the PHP code does not occur, and the source code is instead
presented to the browser.
### Affected versions
SimpleSAMLphp versions **1.18.5 and older**.
### Impact
An attacker may use this issue to gain access to the source code in third-party
modules that is meant to be private, or even sensitive. However, the attack
surface is considered small, as the attack will only work when SimpleSAMLphp
serves such content from a file system that is not case-sensitive, such as on
Windows.
### Resolution
Upgrade the SimpleSAMLphp installation to version **1.18.6**.
### Credit
This vulnerability was discovered and reported by Sławek Naczyński. | {'CVE-2020-5301'} | 2022-04-19T19:02:25Z | 2020-04-22T20:59:44Z | LOW | 3 | {'CWE-200', 'CWE-178'} | {'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e', 'https://github.com/advisories/GHSA-24m3-w8g9-jwpq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5301', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-24m3-w8g9-jwpq'} | null |
GHSA | GHSA-grc3-8q8m-4j7c | Improper privilege handling in Apache Accumulo | Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties. | {'CVE-2020-17533'} | 2022-02-09T22:37:59Z | 2022-02-09T22:37:59Z | HIGH | 8.1 | {'CWE-280', 'CWE-732'} | {'https://github.com/advisories/GHSA-grc3-8q8m-4j7c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17533', 'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/29/1', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed@%3Cannounce.apache.org%3E'} | null |
GHSA | GHSA-cwqq-w8c3-r2jw | Uncontrolled Resource Consumption in MetadataExtractor | MetadataExtractor 2.1.0 allows stack consumption. | {'CVE-2019-14262'} | 2021-08-17T21:57:18Z | 2019-08-23T00:04:56Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/advisories/GHSA-cwqq-w8c3-r2jw', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14262', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/drewnoakes/metadata-extractor-dotnet/pull/190'} | null |
GHSA | GHSA-xc47-3rch-cv57 | Improper Access Control in snipe-it | Users with no system permissions are able to see and create personal access tokens | {'CVE-2022-0178'} | 2022-01-26T20:24:23Z | 2022-01-26T20:24:23Z | MODERATE | 5.4 | {'CWE-284'} | {'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0178', 'https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368', 'https://github.com/advisories/GHSA-xc47-3rch-cv57'} | null |
GHSA | GHSA-v2jv-33gh-xx29 | Command Injection in ps-visitor | This affects all versions up to and including version 0.0.2 of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. | {'CVE-2021-23374'} | 2021-05-07T16:06:23Z | 2021-05-07T16:06:23Z | CRITICAL | 9.8 | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23374', 'https://github.com/advisories/GHSA-v2jv-33gh-xx29', 'https://snyk.io/vuln/SNYK-JS-PSVISITOR-1078544', 'https://github.com/WisdomKwan/ps-visitor/blob/cdfc934a8e4af95aa0473f4b2a4bd091d09faf2f/index.js%23L404'} | null |
GHSA | GHSA-45hx-wfhj-473x | Arbitrary code execution in H2 Console | H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392. | {'CVE-2022-23221'} | 2022-04-22T15:35:17Z | 2022-01-21T23:07:39Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23221', 'https://twitter.com/d0nkey_man/status/1483824727936450564', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html', 'http://seclists.org/fulldisclosure/2022/Jan/39', 'https://github.com/h2database/h2database/releases/tag/version-2.1.210', 'https://www.debian.org/security/2022/dsa-5076', 'http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html', 'https://github.com/h2database/h2database/security/advisories', 'https://github.com/advisories/GHSA-45hx-wfhj-473x'} | null |
GHSA | GHSA-83x4-9cwr-5487 | Improper Authorization in Keycloak | A incorrect authorization flaw was found in Keycloak 12.0.0, the flaw allows an attacker with any existing user account to create new default user accounts via the administrative REST API even where new user registration is disabled. | {'CVE-2021-4133'} | 2022-04-22T15:34:29Z | 2022-01-06T18:32:58Z | HIGH | 8.8 | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4133', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/keycloak/keycloak/issues/9247', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487', 'https://bugzilla.redhat.com/show_bug.cgi?id=2033602', 'https://github.com/advisories/GHSA-83x4-9cwr-5487'} | null |
GHSA | GHSA-qvm7-23cj-437v | Remote Code Execution in Apache Dubbo | Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some other places. Fixed in Apache Dubbo 2.7.13 | {'CVE-2021-36161'} | 2021-09-20T20:15:45Z | 2021-09-10T17:54:37Z | CRITICAL | 9.8 | {'CWE-134'} | {'https://github.com/advisories/GHSA-qvm7-23cj-437v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36161', 'https://lists.apache.org/thread.html/r40212261fd5d638074b65f22ac73eebe93ace310c79d4cfcca4863da%40%3Cdev.dubbo.apache.org%3E'} | null |
GHSA | GHSA-hgc3-hp6x-wpgx | Antilles Dependency Confusion Vulnerability | ### Potential Impact:
Remote code execution.
### Scope of Impact:
Open-source project specific.
### Summary Description:
A dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package listed in requirements.txt not existing in the public package index (PyPi).
MITRE classifies this weakness as an Uncontrolled Search Path Element (CWE-427) in which a private package dependency may be replaced by an unauthorized package of the same name published to a well-known public repository such as PyPi.
The configuration has been updated to only install components built by Antilles, removing all other public package indexes. Additionally, the antilles-tools dependency has been published to PyPi.
### Mitigation Strategy for Customers (what you should do to protect yourself):
Remove previous versions of Antilles as a precautionary measure and Update to version 1.0.1 or later.
### Acknowledgement:
The Antilles team thanks Kotko Vladyslav for reporting this issue.
### References:
https://github.com/lenovo/Antilles/commit/c7b9c5740908b343aceefe69733d9972e64df0b9
| {'CVE-2021-3840'} | 2021-11-17T21:17:30Z | 2021-11-03T17:36:22Z | HIGH | 8.8 | {'CWE-427'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3840', 'https://github.com/lenovo/Antilles/commit/c7b9c5740908b343aceefe69733d9972e64df0b9', 'https://github.com/lenovo/Antilles/security/advisories/GHSA-hgc3-hp6x-wpgx', 'https://github.com/advisories/GHSA-hgc3-hp6x-wpgx'} | null |
GHSA | GHSA-976r-qfjj-c24w | Command injection via Celery broker in Apache Airflow | An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands. | {'CVE-2020-11981'} | 2022-03-21T22:48:38Z | 2020-07-27T16:57:33Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11981', 'https://github.com/advisories/GHSA-976r-qfjj-c24w', 'https://issues.apache.org/jira/browse/AIRFLOW-6351', 'https://github.com/apache/airflow/commit/afa4b11fddfdbadb048f742cf66d5c21c675a5c8', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'} | null |
GHSA | GHSA-qcj7-g2j5-g7r3 | In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification | In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. | {'CVE-2016-1000342'} | 2022-04-27T13:28:11Z | 2018-10-17T16:24:12Z | HIGH | 7.5 | {'CWE-347'} | {'https://github.com/advisories/GHSA-qcj7-g2j5-g7r3', 'https://usn.ubuntu.com/3727-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000342', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927'} | null |
GHSA | GHSA-7733-hjv6-4h47 | Cross-Site Scripting in ternary conditional operator | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0)
> * CWE-79
---
:information_source: This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020
---
### Problem
It has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following.
```
{showFullName ? fullName : defaultValue}
```
### Solution
Update to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described.
Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases:
* TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5)
* TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1)
### Credits
Thanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue.
### References
* [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013) | {'CVE-2020-15241'} | 2022-04-19T19:02:36Z | 2020-10-08T19:55:53Z | MODERATE | 4.7 | {'CWE-601', 'CWE-79'} | {'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15241', 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47', 'https://typo3.org/security/advisory/typo3-core-sa-2019-013', 'https://github.com/advisories/GHSA-7733-hjv6-4h47'} | null |
GHSA | GHSA-jx8f-cpx7-fv47 | Allocation of Resources Without Limits or Throttling in nvflare | ### Impact
NVIDIA FLARE contains a vulnerability in Admin Interface, where an un-authorized attacker can cause Allocation of Resources Without Limits or Throttling, which may lead to cause system unavailable
All versions before 2.0.16 are affected.
### Patches
The patch will be included in nvflare==2.0.16.
### Workarounds
The changes in commits https://github.com/NVIDIA/NVFlare/commit/93588b3a0dff9bd4568983071b74d8b420de3a6e and https://github.com/NVIDIA/NVFlare/commit/93588b3a0dff9bd4568983071b74d8b420de3a6e can be applied to any version of the NVIDIA FLARE without any adverse effect.
### Additional information
Issue Found on: 2022.3.3
Issue Found by: Oliver Sellwood (@Nintorac) | {'CVE-2022-21822'} | 2022-03-29T21:16:38Z | 2022-03-18T23:18:43Z | HIGH | 7.5 | {'CWE-770'} | {'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-jx8f-cpx7-fv47', 'https://github.com/advisories/GHSA-jx8f-cpx7-fv47', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21822'} | null |
GHSA | GHSA-vpgc-7h78-gx8f | Validation bypass vulnerability | Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev)
### Credits
Niklas Sköldmark (Medborgarskolan) | null | 2020-09-04T18:05:14Z | 2020-09-04T18:05:14Z | LOW | 0 | null | {'https://www.npmjs.com/package/personnummer', 'https://github.com/advisories/GHSA-vpgc-7h78-gx8f', 'https://github.com/personnummer/js/security/advisories/GHSA-vpgc-7h78-gx8f'} | null |
GHSA | GHSA-6vqp-h455-42mr | Uncontrolled Memory Allocation in Apache PDFBox | A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions. | {'CVE-2021-27906'} | 2022-04-22T18:27:47Z | 2021-05-13T22:30:13Z | MODERATE | 5.5 | {'CWE-789'} | {'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f', 'https://lists.apache.org/thread.html/r64982b768c8a2220b07aaf813bd099a9863de0d13eb212fd4efe208f@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd%40%3Cusers.pdfbox.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-5112', 'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E', 'https://github.com/advisories/GHSA-6vqp-h455-42mr', 'https://lists.apache.org/thread.html/rdf78aef4793362e778e21e34328b0456e302bde4b7e74f229df0ee04@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/', 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/', 'http://www.openwall.com/lists/oss-security/2021/03/19/10', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27906', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/', 'https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E'} | null |
GHSA | GHSA-72m5-fvvv-55m6 | Observable Differences in Behavior to Error Inputs in Bouncy Castle | In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption. | {'CVE-2020-26939'} | 2021-05-26T13:31:25Z | 2021-04-22T16:16:49Z | MODERATE | 5.3 | {'CWE-203'} | {'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00007.html', 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E', 'https://github.com/bcgit/bc-java/wiki/CVE-2020-26939', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26939', 'https://security.netapp.com/advisory/ntap-20201202-0005/', 'https://github.com/advisories/GHSA-72m5-fvvv-55m6'} | null |
GHSA | GHSA-722q-3g9x-vp8q | Downloads Resources over HTTP in tomita-parser | Affected versions of `tomita-parser` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita-parser`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2015.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10666'} | 2021-01-08T19:19:20Z | 2019-02-18T23:54:41Z | HIGH | 0 | {'CWE-311'} | {'https://nodesecurity.io/advisories/261', 'https://github.com/advisories/GHSA-722q-3g9x-vp8q', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10666', 'https://www.npmjs.com/advisories/261'} | null |
GHSA | GHSA-7q36-4xx7-xcxf | Untrusted data can lead to DoS attack due to hash collisions and stack overflow in MessagePack | ### Impact
When this library is used to deserialize messagepack data from an untrusted source, there is a risk of a denial of service attack by either of two vectors:
1. hash collisions - leading to large CPU consumption disproportionate to the size of the data being deserialized.
1. stack overflow - leading to the deserializing process crashing.
### Patches
The following steps are required to mitigate this risk.
1. Upgrade to a version of the library where a fix is available
1. Add code to your application to put MessagePack into the defensive `UntrustedData` mode.
1. Identify all MessagePack extensions that implement `IMessagePackFormatter<T>` implementations that do not ship with the MessagePack library to include the security mitigations. This includes those acquired from 3rd party packages and classes included directly into your project. Any AOT formatters generated with the MPC tool must be regenerated with the patched version of mpc.
1. Review your messagepack-serializable data structures for hash-based collections that use custom or unusual types for the hashed key. See below for details on handling such situations.
Review the `MessagePackSecurity` class to tweak any settings as necessary to strike the right balance between performance, functionality, and security.
Specialized `IEqualityComparer<T>` implementations provide the hash collision resistance.
Each type of hashed key may require a specialized implementation of its own.
The patched MessagePack library includes many such implementations for primitive types commonly used as keys in hash-based collections.
If your data structures use custom types as keys in these hash-based collections,
putting MessagePack in `UntrustedData` mode may lead the deserializer to throw an exception
because no safe `IEqualityComparer<T>` is available for your custom `T` type.
You can provide your own safe implementation by deriving from the `MessagePackSecurity` class
and overriding the `GetHashCollisionResistantEqualityComparer<T>()` method to return your own
custom implementation when `T` matches your type, and fallback to `return base.GetHashCollisionResistantEqualityComparer<T>();` for types you do not have custom implementations for.
Unrelated to this advisory, but as general security guidance, you should also avoid the Typeless serializer/formatters/resolvers for untrusted data as that opens the door for the untrusted data to potentially deserialize unanticipated types that can compromise security.
#### MessagePack 1.x users
1. Upgrade to any 1.9.x version.
1. When deserializing untrusted data, put MessagePack into a more secure mode with:
```cs
MessagePackSecurity.Active = MessagePackSecurity.UntrustedData;
```
In MessagePack v1.x this is a static property and thus the security level is shared by the entire process or AppDomain.
Use MessagePack v2.1 or later for better control over the security level for your particular use.
1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `MessagePackSecurity` class.
Review any custom-written `IMessagePackFormatter<T>` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required.
In particular, a formatter that deserializes an object (as opposed to a primitive value) should wrap the deserialization in a `using (MessagePackSecurity.DepthStep())` block. For example:
```cs
public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options)
{
if (reader.TryReadNil())
{
return default;
}
else
{
using (MessagePackSecurity.DepthStep()) // STACK OVERFLOW MITIGATION
{
MyObject o = new MyObject();
// deserialize members of the object here.
return o;
}
}
}
```
If your custom formatter creates hash-based collections (e.g. `Dictionary<K, V>` or `HashSet<T>`) where the hashed key comes from the messagepack data, always instantiate your collection using `MessagePackSecurity.Active.GetEqualityComparer<T>()` as the equality comparer:
```cs
var collection = new HashSet<T>(MessagePackSecurity.Active.GetEqualityComparer<T>());
```
This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm.
Learn more about [best security practices when reading untrusted data with MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security).
#### MessagePack 2.x users
1. Upgrade to any 2.1.x or later version.
1. When deserializing untrusted data, put MessagePack into a more secure mode by configuring your `MessagePackSerializerOptions.Security` property:
```cs
var options = MessagePackSerializerOptions.Standard
.WithSecurity(MessagePackSecurity.UntrustedData);
// Pass the options explicitly for the greatest control.
T object = MessagePackSerializer.Deserialize<T>(data, options);
// Or set the security level as the default.
MessagePackSerializer.DefaultOptions = options;
```
1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `Security` member on the `MessagePackSerializerOptions` parameter.
Review any custom-written `IMessagePackFormatter<T>` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required.
In particular, a formatter that deserializes an object (as opposed to a primitive value) should call `options.Security.DepthStep(ref reader);` before deserializing the object's members, and be sure to revert the depth step with `reader.Depth--;` before exiting the method. For example:
```cs
public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options)
{
if (reader.TryReadNil())
{
return default;
}
else
{
options.Security.DepthStep(ref reader); // STACK OVERFLOW MITIGATION, line 1
try
{
MyObject o = new MyObject();
// deserialize members of the object here.
return o;
}
finally
{
reader.Depth--; // STACK OVERFLOW MITIGATION, line 2
}
}
}
```
If your custom formatter creates hash-based collections (e.g. `Dictionary<K, V>` or `HashSet<T>`) where the hashed key comes from the messagepack data, always instantiate your collection using `options.Security.GetEqualityComparer<TKey>()` as the equality comparer:
```cs
var collection = new HashSet<T>(options.Security.GetEqualityComparer<T>());
```
This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm.
Learn more about [best security practices when reading untrusted data with MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security).
### Workarounds
The security vulnerabilities are in the formatters.
Avoiding the built-in formatters entirely in favor of reading messagepack primitive data directly
or relying on carefully written custom formatters can provide a workaround.
MessagePack v1.x users may utilize the `MessagePackBinary` static class directly to read the data they expect.
MessagePack v2.x users may utilize the `MessagePackReader` struct directly to read the data they expect.
### References
Learn more about best security practices when reading untrusted data with [MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security) or [MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [MessagePack-CSharp](https://github.com/neuecc/MessagePack-CSharp/issues/new/choose)
* [Email us](mailto:andrewarnott@gmail.com) | {'CVE-2020-5234'} | 2021-04-06T17:54:57Z | 2020-01-31T17:59:20Z | MODERATE | 4.8 | {'CWE-121'} | {'https://github.com/advisories/GHSA-7q36-4xx7-xcxf', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/aspnet/Announcements/issues/405', 'https://github.com/neuecc/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5234', 'https://github.com/neuecc/MessagePack-CSharp/issues/810', 'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02'} | null |
GHSA | GHSA-327x-39hh-65wf | Out of bounds write in arenavec | An issue was discovered in the arenavec crate through 0.1.1. A drop of uninitialized memory can sometimes occur upon a panic in T::default(). | {'CVE-2021-29930'} | 2021-08-25T20:55:09Z | 2021-08-25T20:55:09Z | HIGH | 7.5 | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29930', 'https://github.com/ibabushkin/arenavec/issues/1', 'https://github.com/advisories/GHSA-327x-39hh-65wf', 'https://rustsec.org/advisories/RUSTSEC-2021-0040.html'} | null |
GHSA | GHSA-h6xw-mghq-7523 | Unsafe parsing in SWHKD | SWHKD 1.1.5 allows unsafe parsing via the -c option. An information leak might occur but there is a simple denial of service (memory exhaustion) upon an attempt to parse a large or infinite file (such as a block or character device). | {'CVE-2022-27819'} | 2022-04-15T16:14:51Z | 2022-04-08T00:00:24Z | MODERATE | 5.3 | {'CWE-400'} | {'https://github.com/waycrate/swhkd/releases/tag/1.1.7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27819', 'https://github.com/advisories/GHSA-h6xw-mghq-7523', 'https://github.com/waycrate/swhkd/releases', 'https://github.com/waycrate/swhkd/commit/b4e6dc76f4845ab03104187a42ac6d1bbc1e0021', 'http://www.openwall.com/lists/oss-security/2022/04/14/1'} | null |
GHSA | GHSA-q2cv-94xm-qvg4 | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3921'} | 2021-11-17T21:12:32Z | 2021-11-15T23:18:00Z | MODERATE | 5.4 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3921', 'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684', 'https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5', 'https://github.com/advisories/GHSA-q2cv-94xm-qvg4'} | null |
GHSA | GHSA-r6jx-9g48-2r5r | Arbitrary code execution due to YAML deserialization | ### Impact
TensorFlow and Keras can be tricked to perform arbitrary code execution when deserializing a Keras model from YAML format.
```python
from tensorflow.keras import models
payload = '''
!!python/object/new:type
args: ['z', !!python/tuple [], {'extend': !!python/name:exec }]
listitems: "__import__('os').system('cat /etc/passwd')"
'''
models.model_from_yaml(payload)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/python/keras/saving/model_config.py#L66-L104) uses `yaml.unsafe_load` which can perform arbitrary code execution on the input.
### Patches
Given that YAML format support requires a significant amount of work, we have removed it for now.
We have patched the issue in GitHub commit [23d6383eb6c14084a8fc3bdf164043b974818012](https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Arjun Shibu. | {'CVE-2021-37678'} | 2022-03-23T22:52:07Z | 2021-08-25T14:41:12Z | CRITICAL | 9.3 | {'CWE-502'} | {'https://github.com/advisories/GHSA-r6jx-9g48-2r5r', 'https://github.com/tensorflow/tensorflow/commit/23d6383eb6c14084a8fc3bdf164043b974818012', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37678', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r'} | null |
GHSA | GHSA-6p3c-v8vc-c244 | The `total_size` function for partial read the length of any `FixVec` is incorrect in molecule. | An issue was discovered in the molecule crate before 0.7.2 for Rust. A FixVec partial read has an incorrect result. | {'CVE-2021-45697'} | 2022-01-07T17:57:27Z | 2022-01-06T22:10:34Z | CRITICAL | 9.8 | null | {'https://github.com/advisories/GHSA-6p3c-v8vc-c244', 'https://rustsec.org/advisories/RUSTSEC-2021-0103.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45697', 'https://github.com/nervosnetwork/molecule/pull/49', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/molecule/RUSTSEC-2021-0103.md'} | null |
GHSA | GHSA-m2fp-c79h-rr79 | Malicious Package in tensorplow | All versions of `tensorplow` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T21:56:29Z | 2020-09-02T21:42:56Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-m2fp-c79h-rr79', 'https://www.npmjs.com/advisories/910'} | null |
GHSA | GHSA-m9fq-c9hp-59g7 | Cross-site Scripting in yourls | yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edit dialog. | {'CVE-2021-3785'} | 2021-09-24T13:08:50Z | 2021-09-20T20:42:52Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff', 'https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3785', 'https://github.com/advisories/GHSA-m9fq-c9hp-59g7'} | null |
GHSA | GHSA-3hj2-hh36-hv9v | Data race in va-ts | An issue was discovered in the va-ts crate before 0.0.4 for Rust. Because Demuxer<T> omits a required T: Send bound, a data race and memory corruption can occur. | {'CVE-2020-36220'} | 2021-08-25T20:51:56Z | 2021-08-25T20:51:56Z | MODERATE | 5.9 | {'CWE-667', 'CWE-662', 'CWE-787'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0114.html', 'https://github.com/advisories/GHSA-3hj2-hh36-hv9v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36220', 'https://github.com/video-audio/va-ts/issues/4'} | null |
GHSA | GHSA-66vw-v2x9-hw75 | Podman publishes a malicious image to public registries | Podman is a tool for managing OCI containers and pods. A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service. | {'CVE-2022-1227'} | 2022-05-03T06:15:17Z | 2022-04-30T00:00:35Z | HIGH | 0 | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=2070368', 'https://github.com/advisories/GHSA-66vw-v2x9-hw75', 'https://github.com/containers/podman/issues/10941', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1227'} | null |
GHSA | GHSA-3rj3-qp2j-4fj2 | Cross-Site Request Forgery in Jenkins P4 Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified Perforce server using attacker-specified username and password. | {'CVE-2021-21655'} | 2022-03-21T20:40:45Z | 2022-03-18T17:53:10Z | HIGH | 7.1 | {'CWE-352'} | {'https://github.com/advisories/GHSA-3rj3-qp2j-4fj2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21655', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'} | null |
GHSA | GHSA-4m9r-5gqp-7j82 | High severity vulnerability that affects org.dspace:dspace-xmlui | The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI. | {'CVE-2016-10726'} | 2021-06-11T14:37:58Z | 2018-10-19T16:52:06Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10726', 'https://github.com/DSpace/DSpace/releases/tag/dspace-5.5', 'https://wiki.duraspace.org/display/DSDOC5x/Release+Notes', 'https://github.com/advisories/GHSA-4m9r-5gqp-7j82', 'https://jira.duraspace.org/browse/DS-3094'} | null |
GHSA | GHSA-3qrq-r688-vvh4 | Multiple valid tokens for password reset in Shopware | ### Impact
Multiple tokens for password reset could be requested. All tokens could be used to change the password.
This makes it possible for an attacker to take over the victims account if s/he gains access to the victims email account and finds unused password reset token in the emails within the time frame of two hours.
### Patches
We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022 | {'CVE-2022-24892'} | 2022-04-29T20:31:05Z | 2022-04-28T21:02:17Z | MODERATE | 6.4 | {'CWE-640'} | {'https://github.com/advisories/GHSA-3qrq-r688-vvh4', 'https://github.com/shopware/shopware/security/advisories/GHSA-3qrq-r688-vvh4', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022', 'https://www.shopware.com/en/changelog-sw5/#5-7-9'} | null |
GHSA | GHSA-h5jv-4p7w-64jg | Uncontrolled Resource Consumption in Django | An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities. | {'CVE-2019-14233'} | 2021-05-10T21:18:12Z | 2019-08-06T01:43:33Z | HIGH | 2.8 | {'CWE-400'} | {'https://github.com/advisories/GHSA-h5jv-4p7w-64jg', 'https://security.gentoo.org/glsa/202004-17', 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://www.debian.org/security/2019/dsa-4498', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14233', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs', 'https://seclists.org/bugtraq/2019/Aug/15', 'https://security.netapp.com/advisory/ntap-20190828-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'} | null |
GHSA | GHSA-wqwf-x5cj-rg56 | Arbitrary Command Injection | In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection. | {'CVE-2018-1002101'} | 2022-04-20T20:56:14Z | 2022-02-15T01:57:18Z | MODERATE | 7.1 | {'CWE-78'} | {'https://github.com/kubernetes/kubernetes/pull/65751', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002101', 'http://www.securityfocus.com/bid/106238', 'https://github.com/advisories/GHSA-wqwf-x5cj-rg56', 'https://github.com/kubernetes/kubernetes/commit/d65039c56ce4de5f2efdc38aa1284eeb95f89169', 'https://security.netapp.com/advisory/ntap-20190416-0008/', 'https://github.com/kubernetes/kubernetes/issues/65750'} | null |
GHSA | GHSA-73m2-3pwg-5fgc | Catastrophic backtracking in regex allows Denial of Service in Waitress | ### Impact
When waitress receives a header that contains invalid characters it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and blocking any other interactions.
This would allow an attacker to send a single request with an invalid header and take the service offline.
Invalid header example:
```
Bad-header: xxxxxxxxxxxxxxx\x10
```
Increasing the number of `x`'s in the header will increase the amount of time Waitress spends in the regular expression engine.
This issue was introduced in version 1.4.2 when the regular expression was updated to attempt to match the behaviour required by errata associated with RFC7230.
### Patches
The regular expression that is used to validate incoming headers has been updated in version 1.4.3, it is recommended that people upgrade to the new version of Waitress as soon as possible.
### Workarounds
If you have deployed a reverse proxy in front of Waitress it may already be rejecting requests that include invalid headers.
### Thanks
The Pylons Project would like to thank [Fil Zembowicz](https://github.com/fzembow) for reaching out and disclosing this vulnerability!
### References
Catastrophic backtracking explained: https://www.regular-expressions.info/catastrophic.html
### For more information
If you have any questions or comments about this advisory:
- open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
- email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related) | {'CVE-2020-5236'} | 2022-03-24T19:27:20Z | 2020-02-04T03:07:31Z | CRITICAL | 5.7 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5236', 'https://github.com/Pylons/waitress/security/advisories/GHSA-73m2-3pwg-5fgc', 'https://github.com/advisories/GHSA-73m2-3pwg-5fgc', 'https://github.com/Pylons/waitress/commit/6e46f9e3f014d64dd7d1e258eaf626e39870ee1f'} | null |
GHSA | GHSA-wx5j-54mm-rqqq | HTTP request smuggling in io.netty:netty-codec-http | ### Impact
Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling.
Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore and so not do the validation itself.
| {'CVE-2021-43797'} | 2022-04-22T15:40:01Z | 2021-12-09T19:09:17Z | MODERATE | 6.5 | {'CWE-444'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-wx5j-54mm-rqqq', 'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323', 'https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43797', 'https://security.netapp.com/advisory/ntap-20220107-0003/', 'https://github.com/netty/netty/pull/11891'} | null |
GHSA | GHSA-xw7v-qrhc-jjg2 | Access Control vulnerability in Dolibarr | An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service. | {'CVE-2021-37517'} | 2022-04-18T22:21:51Z | 2022-04-01T00:00:41Z | HIGH | 7.5 | {'CWE-863'} | {'https://github.com/advisories/GHSA-xw7v-qrhc-jjg2', 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517', 'https://github.com/Dolibarr/dolibarr/releases/tag/14.0.1'} | null |
GHSA | GHSA-22mf-97vh-x8rw | TODO | ** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed because "the cache directory is not under control of the attacker in any common configuration." | {'CVE-2019-12760'} | 2021-12-03T14:35:57Z | 2019-06-13T16:12:57Z | HIGH | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2019-12760', 'https://github.com/advisories/GHSA-22mf-97vh-x8rw', 'https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7'} | null |
GHSA | GHSA-qwqc-28w3-fww6 | Message Signature Bypass in openpgp | Versions of `openpgp` prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type `text`. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as `standalone` or `timestamp`). For example, an attacker that captures a `standalone` signature packet from a victim can construct arbitrary signed messages that would be verified correctly.
## Recommendation
Upgrade to version 4.2.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0 | {'CVE-2019-9153'} | 2021-08-17T22:06:13Z | 2019-08-23T21:42:20Z | HIGH | 7.5 | {'CWE-347'} | {'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1', 'https://github.com/advisories/GHSA-qwqc-28w3-fww6', 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc', 'https://github.com/openpgpjs/openpgpjs/pull/816', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.npmjs.com/advisories/1160', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460248', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9153', 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'} | null |
GHSA | GHSA-r8h9-hq9c-2p5c | High severity vulnerability that affects com.github.shyiko.ktlint:ktlint-core | Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTTP connection to the artifact servers. This vulnerability appears to have been fixed in 0.30.0 and later; after commit 5e547b287d6c260d328a2cb658dbe6b7a7ff2261. | {'CVE-2019-1010260'} | 2021-09-17T14:43:24Z | 2019-04-08T15:18:54Z | HIGH | 8.1 | {'CWE-319'} | {'https://github.com/shyiko/ktlint/pull/332', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010260', 'https://github.com/advisories/GHSA-r8h9-hq9c-2p5c'} | null |
GHSA | GHSA-5pv7-hx9m-8jh3 | Missing permission checks in Jenkins Publish Over FTP Plugin | Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials. | {'CVE-2022-29051'} | 2022-05-05T15:29:48Z | 2022-04-13T00:00:16Z | MODERATE | 4.3 | {'CWE-862'} | {'https://github.com/advisories/GHSA-5pv7-hx9m-8jh3', 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29051'} | null |
GHSA | GHSA-g8jc-mm3c-cwhj | Malicious Package in reques | All versions of `reques` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:08:00Z | 2020-09-02T20:31:06Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/863', 'https://github.com/advisories/GHSA-g8jc-mm3c-cwhj'} | null |
GHSA | GHSA-76mp-659p-rw65 | Users registered with email verification can self re-activate their disabled accounts | ### Impact
A user disabled on a wiki using email verification for registration can re-activate himself by using the activation link provided for his registration.
### Patches
The problem has been patched in the following versions of XWiki: 11.10.13, 12.6.7, 12.10.2, 13.0.
### Workarounds
It's possible to workaround the issue by resetting the `validkey` property of the disabled XWiki users. This can be done by editing the user profile with object editor.
### References
https://jira.xwiki.org/browse/XWIKI-17942
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](http://jira.xwiki.org)
* Email us at [Security mailing-list](mailto:security@xwiki.org)
| {'CVE-2021-32620'} | 2021-06-08T17:00:19Z | 2021-05-18T18:36:21Z | HIGH | 8.8 | {'CWE-285'} | {'https://github.com/xwiki/xwiki-platform/commit/f9a677408ffb06f309be46ef9d8df1915d9099a4', 'https://jira.xwiki.org/browse/XWIKI-17942', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32620', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-76mp-659p-rw65', 'https://github.com/advisories/GHSA-76mp-659p-rw65'} | null |
GHSA | GHSA-r32x-jhw5-g48p | Cross-Site Scripting in eco | All versions of `eco` are vulnerable to Cross-Site Scripting (XSS). The package's default `__escape` implementation fails to escape single quotes, which may allow attackers to execute arbitrary JavaScript on the victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-09-28T21:17:48Z | 2020-09-03T17:08:20Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/sstephenson/eco/pull/67', 'https://www.npmjs.com/advisories/1024', 'https://github.com/advisories/GHSA-r32x-jhw5-g48p'} | null |
GHSA | GHSA-m6ch-gg5f-wxx3 | HTTP Proxy header vulnerability | PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue. | {'CVE-2016-5385'} | 2022-04-07T14:00:21Z | 2022-04-07T13:59:22Z | HIGH | 8.1 | null | {'http://rhn.redhat.com/errata/RHSA-2016-1610.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297', 'http://rhn.redhat.com/errata/RHSA-2016-1611.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/', 'https://httpoxy.org/', 'http://rhn.redhat.com/errata/RHSA-2016-1609.html', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5385', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us', 'http://www.debian.org/security/2016/dsa-3631', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/', 'http://www.securityfocus.com/bid/91821', 'https://www.drupal.org/SA-CORE-2016-003', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1353794', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2016-5385.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/', 'http://rhn.redhat.com/errata/RHSA-2016-1613.html', 'https://security.gentoo.org/glsa/201611-22', 'https://github.com/advisories/GHSA-m6ch-gg5f-wxx3', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149', 'https://github.com/guzzle/guzzle/releases/tag/6.2.1', 'http://rhn.redhat.com/errata/RHSA-2016-1612.html', 'http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html', 'http://www.kb.cert.org/vuls/id/797896', 'http://www.securitytracker.com/id/1036335'} | null |
GHSA | GHSA-qwwg-gc55-qqrv | Out-of-bounds Write in Chakra | Chakra Scripting Engine Memory Corruption Vulnerability | {'CVE-2020-17131'} | 2021-04-13T15:54:40Z | 2021-04-13T15:54:40Z | HIGH | 7.5 | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17131', 'https://github.com/chakra-core/ChakraCore/pull/6531', 'https://github.com/chakra-core/ChakraCore/wiki/Roadmap#v11124', 'https://github.com/advisories/GHSA-qwwg-gc55-qqrv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17131'} | null |
GHSA | GHSA-mm7r-265w-jv6f | Server-Side Request Forgery in @uppy/companion | Versions of `@uppy/companion` prior to 1.9.3 are vulnerable to Server-Side Request Forgery (SSRF). The `get` route passes the user-controlled variable `req.body.url` to a GET request without sanitizing the value. This allows attackers to inject arbitrary URLs and make GET requests on behalf of the server.
## Recommendation
Upgrade to version 1.9.3 or later. | {'CVE-2020-8135'} | 2021-10-04T21:09:41Z | 2020-09-03T15:51:19Z | HIGH | 0 | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8135', 'https://github.com/advisories/GHSA-mm7r-265w-jv6f', 'https://www.npmjs.com/advisories/1501', 'https://hackerone.com/reports/786956'} | null |
GHSA | GHSA-6qmf-fj6m-686c | Open Redirect in Flask-Security-Too | ### Impact
Flask-Security allows redirects after many successful views (e.g. /login) by honoring the ?next query param. There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL.
This check utilizes Pythons urlsplit library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\github.com
will pass FS's relative URL check however many browsers will gladly convert this to http://github.com. Thus an attacker could send such a link to an unwitting user, using a legitimate site and have it redirect to whatever site they want.
This is considered a low severity due to the fact that if Werkzeug by default ALWAYS ensures that the Location header is absolute - thus making this attack vector mute. It is possible for application writers to modify this default behavior by setting the 'autocorrect_location_header=False` which would then open up their application to this attack.
### Patches
No patches as this time
### Workarounds
If using Werkzeug, make sure to use the default Location header setting. If you can't - then use@app.after_request and write your own validation of the Location header if it is set.
### References
No.
### For more information
If you have any questions or comments about this advisory follow: https://github.com/Flask-Middleware/flask-security/issues/486
Thanks to Claroty (2021-0141) and @snoopysecurity for providing details and proof of concept.
| {'CVE-2021-32618'} | 2022-01-10T21:34:03Z | 2021-05-17T20:51:27Z | LOW | 3.1 | {'CWE-601'} | {'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c', 'https://github.com/Flask-Middleware/flask-security/issues/486', 'https://github.com/advisories/GHSA-6qmf-fj6m-686c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32618'} | null |
GHSA | GHSA-3h8m-483j-7xxm | Heap out of bounds read in `RequantizationRange` | ### Impact
The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs:
```python
import tensorflow as tf
input = tf.constant([1], shape=[1], dtype=tf.qint32)
input_max = tf.constant([], dtype=tf.float32)
input_min = tf.constant([], dtype=tf.float32)
tf.raw_ops.RequantizationRange(input=input, input_min=input_min, input_max=input_max)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/ac328eaa3870491ababc147822cd04e91a790643/tensorflow/core/kernels/requantization_range_op.cc#L49-L50) assumes that the `input_min` and `input_max` tensors have at least one element, as it accesses the first element in two arrays:
```cc
const float input_min_float = ctx->input(1).flat<float>()(0);
const float input_max_float = ctx->input(2).flat<float>()(0);
```
If the tensors are empty, `.flat<T>()` is an empty object, backed by an empty array. Hence, accesing even the 0th element is a read outside the bounds.
### Patches
We have patched the issue in GitHub commit [ef0c008ee84bad91ec6725ddc42091e19a30cf0e](https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29569'} | 2021-05-21T14:25:22Z | 2021-05-21T14:25:22Z | LOW | 2.5 | {'CWE-125'} | {'https://github.com/advisories/GHSA-3h8m-483j-7xxm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29569', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3h8m-483j-7xxm', 'https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e'} | null |
GHSA | GHSA-crvj-3gj9-gm2p | High severity vulnerability that affects qs | Withdrawn, accidental duplicate publish.
The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array. | null | 2021-12-03T14:26:01Z | 2018-10-09T00:44:29Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-crvj-3gj9-gm2p', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7191'} | null |
GHSA | GHSA-4vr9-8cjf-vf9c | Async-h1 request smuggling possible with long unread bodies | ### Impact
This vulnerability affects any webserver that uses async-h1 behind a reverse proxy, including all such Tide applications.
If the server does not read the body of a request which is longer than some buffer length, async-h1 will attempt to read a subsequent request from the body content starting at that offset into the body.
One way to exploit this vulnerability would be for an adversary to craft a request such that the body contains a request that would not be noticed by a reverse proxy, allowing it to forge forwarded/x-forwarded headers. If an application trusted the authenticity of these headers, it could be misled by the smuggled request.
Another potential concern with this vulnerability is that if a reverse proxy is sending multiple http clients' requests along the same keep-alive connection, it would be possible for the smuggled request to specify a long content and capture another user's request in its body. This content could be captured in a post request to an endpoint that allows the content to be subsequently retrieved by the adversary.
### Patches
This has been addressed in async-h1 2.3.0 and previous versions have been yanked.
### Workarounds
none
### References
https://github.com/http-rs/async-h1/releases/tag/v2.3.0
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [async-h1](https://github.com/http-rs/async-h1)
* Contact a core team member on [zulip](https://http-rs.zulip-chat.com) or [discord](https://discord.gg/x2gKzst) | {'CVE-2020-26281'} | 2021-10-12T16:00:37Z | 2021-10-12T16:00:37Z | MODERATE | 6.8 | {'CWE-444'} | {'https://github.com/http-rs/async-h1/security/advisories/GHSA-4vr9-8cjf-vf9c', 'https://github.com/advisories/GHSA-4vr9-8cjf-vf9c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26281', 'https://github.com/http-rs/async-h1/releases/tag/v2.3.0'} | null |
GHSA | GHSA-4hrm-m67v-5cxr | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21346](https://x-stream.github.io/CVE-2021-21346.html).
### Credits
wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2021-21346'} | 2022-04-19T19:02:48Z | 2021-03-22T23:28:49Z | MODERATE | 6.1 | {'CWE-434', 'CWE-502'} | {'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://github.com/advisories/GHSA-4hrm-m67v-5cxr', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://x-stream.github.io/CVE-2021-21346.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21346', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-4q4x-67hx-5mpg | Failure to properly verify ed25519 signatures in libp2p-core | An issue was discovered in the libp2p-core crate before 0.8.1 for Rust. Attackers can spoof ed25519 signatures. | {'CVE-2019-15545'} | 2021-08-25T20:44:08Z | 2021-08-25T20:44:08Z | HIGH | 7.5 | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-15545', 'https://github.com/advisories/GHSA-4q4x-67hx-5mpg', 'https://rustsec.org/advisories/RUSTSEC-2019-0004.html'} | null |
GHSA | GHSA-vgvf-9jh3-fg75 | Moderate severity vulnerability that affects io.swagger:swagger-codegen and io.swagger:swagger-parser | A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification. | {'CVE-2017-1000207'} | 2021-09-20T21:46:19Z | 2018-10-19T16:46:30Z | HIGH | 8.8 | {'CWE-502'} | {'https://github.com/advisories/GHSA-vgvf-9jh3-fg75', 'https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208', 'https://github.com/swagger-api/swagger-parser/pull/481', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000207'} | null |
GHSA | GHSA-rc5r-697f-28x6 | XSS injection in the Grid component of Sylius | Grid component of Sylius omits HTML input sanitisation while rendering object implementing __toString() method through the string field type. | {'CVE-2019-12186'} | 2021-08-23T15:13:39Z | 2020-04-15T21:07:59Z | MODERATE | 4.8 | {'CWE-79'} | {'https://sylius.com/blog/cve-2019-12186/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12186', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/grid/CVE-2019-12186.yaml', 'https://github.com/advisories/GHSA-rc5r-697f-28x6'} | null |
GHSA | GHSA-3vcg-8p79-jpcv | Improper Restriction of XML External Entity Reference in svglib | The svglib package through 0.9.3 for Python allows XXE attacks via an svg2rlg call. | {'CVE-2020-10799'} | 2021-05-06T18:52:01Z | 2021-05-06T18:52:01Z | HIGH | 9.8 | {'CWE-611'} | {'https://github.com/advisories/GHSA-3vcg-8p79-jpcv', 'https://github.com/deeplook/svglib/issues/229', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10799'} | null |
GHSA | GHSA-8cw6-5qvp-q3wj | Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 | In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the user's view of the Spark UI. While some browsers like recent versions of Chrome and Safari are able to block this type of attack, current versions of Firefox (and possibly others) do not. | {'CVE-2018-8024'} | 2021-09-07T17:25:08Z | 2019-03-14T15:40:57Z | MODERATE | 5.4 | {'CWE-200'} | {'https://github.com/advisories/GHSA-8cw6-5qvp-q3wj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8024', 'https://lists.apache.org/thread.html/5f241d2cda21cbcb3b63e46e474cf5f50cce66927f08399f4fab0aba@%3Cdev.spark.apache.org%3E', 'https://spark.apache.org/security.html#CVE-2018-8024'} | null |
GHSA | GHSA-xjqg-9jvg-fgx2 | High severity vulnerability that affects nokogiri | The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 (as used in nokogiri before 1.6.7.1) does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660. | {'CVE-2015-5312'} | 2021-09-21T22:35:12Z | 2018-08-21T19:03:04Z | HIGH | 0 | null | {'https://support.apple.com/HT206167', 'http://rhn.redhat.com/errata/RHSA-2015-2550.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html', 'https://support.apple.com/HT206169', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5312', 'https://github.com/advisories/GHSA-xjqg-9jvg-fgx2', 'http://rhn.redhat.com/errata/RHSA-2015-2549.html', 'http://www.ubuntu.com/usn/USN-2834-1', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172', 'https://support.apple.com/HT206168', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html', 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html', 'http://marc.info/?l=bugtraq&m=145382616617563&w=2', 'https://bugzilla.redhat.com/show_bug.cgi?id=1276693', 'http://www.securityfocus.com/bid/79536', 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html', 'https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e', 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html', 'https://security.gentoo.org/glsa/201701-37', 'https://support.apple.com/HT206166', 'http://www.securitytracker.com/id/1034243', 'http://rhn.redhat.com/errata/RHSA-2016-1089.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html', 'http://xmlsoft.org/news.html', 'http://www.debian.org/security/2015/dsa-3430'} | null |
GHSA | GHSA-mcg6-h362-cmq5 | Improper Authorization in cobbler | ### Impact
If PAM is correctly configured and a user account is set to expired, the expired user-account is still able to successfully log into Cobbler in all places (Web UI, CLI & XMLRPC-API).
The same applies to user accounts with passwords set to be expired.
### Patches
There is a patch for the latest Cobbler `3.3.2` available, however a backport will be done for `3.2.x`.
### Workarounds
- Delete expired accounts which are able to access Cobbler via PAM.
- Use `chage -l <username>` to lock the account. If the account has SSH-Keys attached then remove them completely.
### References
- Originally discovered by @ysf at https://www.huntr.dev/bounties/c458b868-63df-414e-af10-47e3745caa1d/
### How to test if my Cobbler instance is affected?
The following `pytest` test assumes that your PAM setup is correct. In case the added user is not able to login, this test does not make sense to be executed.
```python
def test_pam_login_with_expired_user():
# Arrange
# create pam testuser
test_username = "expired_user"
test_password = "password"
test_api = CobblerAPI()
subprocess_1 = subprocess.run(
["perl", "-e", "'print crypt(\"%s\", \"%s\")'" % (test_username, test_password)],
stdout=subprocess.PIPE
)
subprocess.run(["useradd", "-p", subprocess_1.stdout, test_username])
# change user to be expired
subprocess.run(["chage", "-E0", test_username])
# Act
result = pam.authenticate(test_api, test_username, test_password)
# Assert - login should fail
assert not result
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Cobbler repository](https://github.com/cobbler/cobbler/issues/new/choose)
* Ask in the [Gitter/Matrix Chat](https://gitter.im/cobbler/community)
* Email us at [cobbler.project@gmail.com](mailto:cobbler.project@gmail.com)
| {'CVE-2022-0860'} | 2022-04-01T20:11:34Z | 2022-03-11T20:52:04Z | HIGH | 8.2 | {'CWE-863', 'CWE-285'} | {'https://github.com/cobbler/cobbler/security/advisories/GHSA-mcg6-h362-cmq5', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYWYHWVVRUSPCV5SWBOSAMQJQLTSBTKY/', 'https://github.com/cobbler/cobbler/commit/9044aa990a94752fa5bd5a24051adde099280bfa', 'https://huntr.dev/bounties/c458b868-63df-414e-af10-47e3745caa1d', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4KCNZYBQC2FM5SEEDRQZO4LRZ4ZECMG/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYSHMF6MEIITFAG7EJ3IQKVUN7MDV2XM/', 'https://github.com/advisories/GHSA-mcg6-h362-cmq5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0860'} | null |
GHSA | GHSA-6w87-g839-9wv7 | Helm OCI credentials leaked into Argo CD logs | ### Impact
When Argo CD was connected to a Helm OCI repository with authentication enabled, the credentials used for accessing the remote repository were logged.
Anyone with access to the pod logs - either via access with appropriate permissions to the Kubernetes control plane or a third party log management system where the logs from Argo CD were aggregated - could have potentially obtained the credentials to the Helm OCI repository.
If you are using Helm OCI repositories with Argo CD, it is strongly recommended to upgrade Argo CD to the latest patch version and to change the credentials used to access the repositories.
### Patches
A patch for this vulnerability is available with the v1.8.7 and v1.7.14 releases of Argo CD.
### Workarounds
No workaround available
### References
N/A
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel `#argo-cd`
### Credits
This vulnerability was found and reported by a third-party who wishes to stay anonymous. We want to thank this third-party for disclosing this vulnerability to us in a responsible manner. | null | 2021-10-05T16:35:57Z | 2021-05-21T14:31:28Z | MODERATE | 6.6 | {'CWE-532'} | {'https://github.com/advisories/GHSA-6w87-g839-9wv7', 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-6w87-g839-9wv7'} | null |
GHSA | GHSA-mfwh-5m23-j46w | Environment Variable Injection in GitHub Actions | ### Impact
The `@actions/core` npm module `addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author.
### Patches
The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new [Environment File Syntax](https://github.com/actions/toolkit/blob/main/docs/commands.md#environment-files). Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution.
### Workarounds
None, it is strongly suggested that you upgrade as soon as possible.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Actions Toolkit](https://github.com/actions/toolkit/issues) | {'CVE-2020-15228'} | 2021-11-19T15:12:00Z | 2020-10-01T17:16:20Z | LOW | 3.5 | {'CWE-20', 'CWE-77'} | {'https://github.com/actions/toolkit/security/advisories/GHSA-mfwh-5m23-j46w', 'https://github.com/advisories/GHSA-mfwh-5m23-j46w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15228', 'http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html'} | null |
GHSA | GHSA-8489-44mv-ggj8 | Improper Input Validation and Injection in Apache Log4j2 | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to an attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
# Affected packages
Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.
This issue does not impact default configurations of Log4j2 and requires an attacker to have control over the Log4j2 configuration, which reduces the likelihood of being exploited. | {'CVE-2021-44832'} | 2022-04-22T15:39:59Z | 2022-01-04T16:14:20Z | MODERATE | 6.6 | {'CWE-74', 'CWE-20'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC/', 'https://security.netapp.com/advisory/ntap-20220104-0001/', 'https://issues.apache.org/jira/browse/LOG4J2-3293', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd', 'https://github.com/advisories/GHSA-8489-44mv-ggj8', 'http://www.openwall.com/lists/oss-security/2021/12/28/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44832'} | null |
GHSA | GHSA-vvfh-mvjv-w38q | Malicious Package in babel-loadre | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:17:43Z | 2020-09-04T15:28:19Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1349', 'https://github.com/advisories/GHSA-vvfh-mvjv-w38q'} | null |
GHSA | GHSA-vjw7-6gfq-6wf5 | Path Traversal in Eclipse Vert | In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working directory. | {'CVE-2019-17640'} | 2022-02-10T20:28:57Z | 2022-02-10T20:28:57Z | CRITICAL | 9.8 | {'CWE-23', 'CWE-22'} | {'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://mvnrepository.com/artifact/io.vertx/vertx-web', 'https://lists.apache.org/thread.html/r8d863b148efe778ce5f8f961d0cafeda399e681d3f0656233b4c5511@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r591f6932560c8c46cee87415afed92924a982189fea7f7c9096f8e33@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8383b5e7344a8b872e430ad72241b84b83e9701d275c602cfe34a941@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rfd0ebf8387cfd0b959d1e218797e709793cce51a5ea2f84d0976f47d@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-vjw7-6gfq-6wf5', 'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17640'} | null |
GHSA | GHSA-6vfw-74wr-3chh | Cross-site Scripting in Crater Invoice | Crater invoice prior to version 6.0.0 has a cross-site scripting vulnerability. | {'CVE-2022-0372'} | 2022-02-10T22:25:39Z | 2022-01-28T00:03:42Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0372', 'https://github.com/advisories/GHSA-6vfw-74wr-3chh', 'https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1', 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d', 'https://github.com/crater-invoice/crater/pull/681'} | null |
GHSA | GHSA-hwr7-8gxx-fj5p | Null pointer dereference in `RaggedTensorToTensor` | ### Impact
Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior:
```python
import tensorflow as tf
tf.raw_ops.RaggedTensorToTensor(
shape=1,
values=10,
default_value=21,
row_partition_tensors=tf.constant([0,0,0,0]),
row_partition_types=[])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L328) accesses the first element of a user supplied list of values without validating that the provided list is not empty.
### Patches
We have patched the issue in GitHub commit [301ae88b331d37a2a16159b65b255f4f9eb39314](https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37638'} | 2021-08-25T14:44:09Z | 2021-08-25T14:44:09Z | HIGH | 7.7 | {'CWE-476'} | {'https://github.com/advisories/GHSA-hwr7-8gxx-fj5p', 'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37638', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p'} | null |
GHSA | GHSA-9378-f4v7-jgm4 | Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils | Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release. | {'CVE-2021-41616'} | 2021-10-08T21:29:34Z | 2021-10-04T20:12:30Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41616', 'https://lists.apache.org/thread.html/r3d7a8303a820144f5e2d1fd0b067e18d419421b58346b53b58d3fa72%40%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-9378-f4v7-jgm4'} | null |
GHSA | GHSA-8p5q-j9m2-g8wr | Withdrawn: Arbitrary code execution in lodash | # Withdrawn
GitHub has chosen to publish this CVE as a withdrawn advisory due to it not being a security issue. See [this issue](https://github.com/lodash/lodash/issues/5261) for more details.
# CVE description
"** DISPUTED ** A command injection vulnerability in Lodash 4.17.21 allows attackers to achieve arbitrary code execution via the template function. This is a different parameter, method, and version than CVE-2021-23337. NOTE: the vendor's position is that it's the developer's responsibility to ensure that a template does not evaluate code that originates from untrusted input. | {'CVE-2021-41720'} | 2021-12-03T20:37:45Z | 2021-12-03T20:37:32Z | LOW | 9.8 | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23337', 'https://github.com/lodash/lodash/issues/5261', 'https://github.com/advisories/GHSA-8p5q-j9m2-g8wr', 'https://web.archive.org/web/20211004200531/https:/github.com/lodash/lodash/issues/5261', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41720'} | null |
GHSA | GHSA-xrrg-wfwc-c7r3 | Malicious Package in bictoin-ops | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:37:49Z | 2020-09-04T15:33:52Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1354', 'https://github.com/advisories/GHSA-xrrg-wfwc-c7r3'} | null |
GHSA | GHSA-vh59-v9r5-4mh4 | Cross-site scripting in jspdf | It's possible to inject JavaScript code via the html method. | {'CVE-2020-7690'} | 2021-05-17T21:01:32Z | 2021-05-17T21:01:32Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7690', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575258', 'https://snyk.io/vuln/SNYK-JS-JSPDF-575256', 'https://github.com/MrRio/jsPDF/issues/2795', 'https://github.com/advisories/GHSA-vh59-v9r5-4mh4', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575260', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575259', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575257'} | null |
GHSA | GHSA-jf8x-wg7f-p3w8 | Malicious Package in cage-js | All versions of `cage-js` contains malicious code. The malware downloads and runs a script from a remote server as a postinstall script.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T20:05:29Z | 2020-09-03T18:22:33Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1085', 'https://github.com/advisories/GHSA-jf8x-wg7f-p3w8'} | null |
GHSA | GHSA-h8pj-cxx2-jfg2 | Improper Input Validation in httpx | Encode OSS httpx <=1.0.0.beta0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`. | {'CVE-2021-41945'} | 2022-04-29T22:55:39Z | 2022-04-29T00:00:25Z | MODERATE | 0 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41945', 'https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571', 'https://github.com/encode/httpx/pull/2185', 'https://github.com/advisories/GHSA-h8pj-cxx2-jfg2', 'https://github.com/encode/httpx/issues/2184', 'https://github.com/encode/httpx/discussions/1831'} | null |
GHSA | GHSA-84fq-6626-w5fg | CORS Token Disclosure in crumb | When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes as this user.
A configuration and scenario where this would occur is unlikely, as most configurations will set CORS globally (where crumb is not used), or not at all.
## Recommendation
Update to version 3.0.0 or greater. | {'CVE-2014-7193'} | 2021-07-19T21:45:56Z | 2017-10-24T18:33:36Z | MODERATE | 0 | {'CWE-284'} | {'https://github.com/advisories/GHSA-84fq-6626-w5fg', 'https://nodesecurity.io/advisories/crumb_cors_token_disclosure', 'https://www.npmjs.com/advisories/4', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7193', 'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'} | null |
GHSA | GHSA-q8gv-q7wr-9jf8 | Segfault in Tensorflow | ### Impact
In eager mode, TensorFlow does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/session_ops.cc#L45
In the above snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code immediately dereferences this, we get a segmentation fault.
### Patches
We have patched the issue in 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1 and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2020-15204'} | 2021-08-26T15:17:13Z | 2020-09-25T18:28:41Z | MODERATE | 5.3 | {'CWE-476'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8gv-q7wr-9jf8', 'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1', 'https://github.com/advisories/GHSA-q8gv-q7wr-9jf8', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15204'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.