ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-jwqp-28gf-p498 | HTTP authentication credentials potentially leaked to target websites | ### Impact
If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target.
This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects.
### Patches
Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials.
If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead.
### Workarounds
If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the [`w3lib.http.basic_auth_header`](https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header) function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth).
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/scrapy/scrapy/issues)
* [Email us](mailto:opensource@zyte.com)
| {'CVE-2021-41125'} | 2022-04-25T23:42:17Z | 2021-10-06T17:46:22Z | MODERATE | 5.7 | {'CWE-200', 'CWE-522'} | {'http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41125', 'https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498', 'https://github.com/advisories/GHSA-jwqp-28gf-p498', 'https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header', 'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html'} | null |
GHSA | GHSA-j42v-6wpm-r847 | Data races in thex | An issue was discovered in the thex crate through 2020-12-08 for Rust. Thex<T> allows cross-thread data races of non-Send types. | {'CVE-2020-35927'} | 2021-08-25T20:50:26Z | 2021-08-25T20:50:26Z | MODERATE | 5.5 | {'CWE-662'} | {'https://github.com/advisories/GHSA-j42v-6wpm-r847', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35927', 'https://rustsec.org/advisories/RUSTSEC-2020-0090.html'} | null |
GHSA | GHSA-pr9q-v585-qv2w | Improper Privilege Management in Open Web Analytics | Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter. | {'CVE-2022-24637'} | 2022-04-05T20:52:09Z | 2022-03-19T00:01:00Z | CRITICAL | 9.8 | {'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24637', 'https://github.com/advisories/GHSA-pr9q-v585-qv2w', 'https://devel0pment.de/?p=2494', 'https://github.com/Open-Web-Analytics/Open-Web-Analytics/releases/tag/1.7.4'} | null |
GHSA | GHSA-7423-5qfm-g648 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0916'} | 2021-03-29T21:00:09Z | 2021-03-29T21:00:09Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/advisories/GHSA-7423-5qfm-g648', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0916', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0916'} | null |
GHSA | GHSA-v94v-pxqp-5qgj | Cross-site Scripting in ShowDoc | The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting. | {'CVE-2022-0950'} | 2022-03-29T21:28:09Z | 2022-03-16T00:00:48Z | MODERATE | 5.4 | {'CWE-434', 'CWE-79'} | {'https://github.com/advisories/GHSA-v94v-pxqp-5qgj', 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950', 'https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc'} | null |
GHSA | GHSA-rqf8-8c89-mw29 | Cross-site Scripting in curly-bracket-parser | This affects all versions of package curly-bracket-parser.
When used as a template library, it does not properly sanitize the user input.
| {'CVE-2021-23416'} | 2021-08-31T21:14:25Z | 2021-08-10T16:08:16Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23416', 'https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js#23L31', 'https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js%23L31', 'https://github.com/advisories/GHSA-rqf8-8c89-mw29', 'https://snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106'} | null |
GHSA | GHSA-9frq-f867-hgqc | Directory Traversal in fast-http-cli | `fast-http-cli` is the command line interface for `fast-http`, a simple web server.
`fast-http-cli` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
Example Request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host: localhost
```
and server Response:
```
HTTP/1.1 200 OK
Date: Thu, 04 May 2017 23:59:18 GMT
Connection: keep-alive
Transfer-Encoding: chunked
{contents of /etc/passwd}
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16155'} | 2021-01-08T19:04:10Z | 2018-07-23T20:46:25Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/383', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/fast-http-cli', 'https://github.com/advisories/GHSA-9frq-f867-hgqc', 'https://nodesecurity.io/advisories/383', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16155'} | null |
GHSA | GHSA-jmgg-wx67-7qfv | Command Injection in Centreon | Centreon before 19.04.15 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page. | {'CVE-2020-13252'} | 2021-06-22T15:23:33Z | 2021-06-22T15:23:33Z | HIGH | 8.8 | {'CWE-78'} | {'https://github.com/centreon/centreon/pull/8467', 'https://github.com/advisories/GHSA-jmgg-wx67-7qfv', 'https://github.com/EnginDemirbilek/EnginDemirbilek.github.io/blob/master/centreon-19.10-rce.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13252', 'https://github.com/centreon/centreon/compare/19.04.13...19.04.15', 'https://engindemirbilek.github.io/centreon-19.10-rce'} | null |
GHSA | GHSA-xcvv-84j5-jw9h | Prototype Pollution in assign-deep | Versions of `assign-deep` before 0.4.7 are vulnerable to prototype pollution via merging functions.
## Recommendation
Update to version 0.4.7 or later. | {'CVE-2018-3720'} | 2021-01-08T00:07:35Z | 2018-07-26T15:12:31Z | LOW | 0 | {'CWE-471'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-3720', 'https://github.com/advisories/GHSA-xcvv-84j5-jw9h', 'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11', 'https://www.npmjs.com/advisories/579', 'https://hackerone.com/reports/310707'} | null |
GHSA | GHSA-c94v-8fff-73ph | Command Injection in @theia/messages | In Eclipse Theia versions up to and including 0.16.0, in the notification messages there is no HTML escaping, so Javascript code can run. | {'CVE-2021-28162'} | 2021-05-10T15:36:56Z | 2021-05-10T15:36:55Z | MODERATE | 6.1 | {'CWE-829'} | {'https://github.com/eclipse-theia/theia/issues/7283', 'https://github.com/eclipse-theia/theia/blob/master/CHANGELOG.md#v100---26032020', 'https://github.com/advisories/GHSA-c94v-8fff-73ph', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28162', 'https://github.com/eclipse-theia/theia/pull/7289'} | null |
GHSA | GHSA-x5f3-qmwj-4f84 | Authentication bypass by capture-replay in github.com/cosmos/ethermint | Cosmos Network Ethermint <= v0.4.0 is affected by a cross-chain transaction replay vulnerability in the EVM module. Since ethermint uses the same chainIDEpoch and signature schemes with ethereum for compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, which enables "cross-chain transaction replay" attack. | {'CVE-2021-25835'} | 2022-04-12T22:56:46Z | 2022-02-15T01:57:18Z | HIGH | 7.5 | {'CWE-294', 'CWE-295'} | {'https://github.com/cosmos/ethermint/pull/692', 'https://github.com/cosmos/ethermint/releases/tag/v0.4.1', 'https://github.com/cosmos/ethermint/issues/687', 'https://github.com/advisories/GHSA-x5f3-qmwj-4f84', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25835'} | null |
GHSA | GHSA-49vv-6q7q-w5cf | OS Command Injection in Strapi | The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function. | {'CVE-2019-19609'} | 2021-12-10T17:22:12Z | 2021-12-10T17:22:12Z | HIGH | 7.2 | {'CWE-20', 'CWE-78'} | {'https://github.com/strapi/strapi/pull/4636', 'https://bittherapy.net/post/strapi-framework-remote-code-execution/', 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19609', 'https://github.com/advisories/GHSA-49vv-6q7q-w5cf', 'http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html'} | null |
GHSA | GHSA-j8cx-j9j2-f29w | Insecure Storage of Sensitive Information in Microweber | Microweber prior to version 1.3 does not strip images of EXIF data, exposing information about users' locations, device hardware, and device software. | {'CVE-2022-0724'} | 2022-02-26T01:18:37Z | 2022-02-24T00:00:53Z | HIGH | 0 | {'CWE-922'} | {'https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062', 'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0724', 'https://github.com/advisories/GHSA-j8cx-j9j2-f29w'} | null |
GHSA | GHSA-76wm-422q-92mq | Code injection in RubyGems | An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. | {'CVE-2019-8324'} | 2021-08-17T13:42:06Z | 2019-06-20T16:06:11Z | HIGH | 8.8 | {'CWE-94'} | {'https://github.com/advisories/GHSA-76wm-422q-92mq', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8324', 'https://access.redhat.com/errata/RHSA-2019:1972', 'https://hackerone.com/reports/328571'} | null |
GHSA | GHSA-c7pp-g2v2-2766 | DOM-based XSS in gmail-js | Affected versions of `gmail-js` are vulnerable to cross-site scripting in the `tools.parse_response`, `helper.get.visible_emails_post`, and `helper.get.email_data_post` functions, which pass user input directly into the Function constructor.
## Recommendation
Update to version 0.6.5 or later. | {'CVE-2016-1000228'} | 2021-09-23T21:31:56Z | 2020-09-01T15:32:04Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/KartikTalwar/gmail.js/issues/281', 'https://www.npmjs.com/advisories/125', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000228', 'https://github.com/advisories/GHSA-c7pp-g2v2-2766', 'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'} | null |
GHSA | GHSA-5429-pjww-7675 | SQL Injection in Apache Kylin | Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions. | {'CVE-2021-36774'} | 2022-01-14T19:39:55Z | 2022-01-08T00:43:04Z | MODERATE | 0 | {'CWE-89', 'CWE-668'} | {'https://github.com/advisories/GHSA-5429-pjww-7675', 'https://lists.apache.org/thread/lchpcvoolc6w8zc6vo1wstk8zbfqv2ow', 'http://www.openwall.com/lists/oss-security/2022/01/06/5', 'https://github.com/apache/kylin/pull/1646', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36774'} | null |
GHSA | GHSA-ffq8-576r-v26g | High severity vulnerability that affects hpack | A HTTP/2 implementation built using any version of the Python HPACK library between v1.0.0 and v2.2.0 could be targeted for a denial of service attack, specifically a so-called "HPACK Bomb" attack. This attack occurs when an attacker inserts a header field that is exactly the size of the HPACK dynamic header table into the dynamic header table. The attacker can then send a header block that is simply repeated requests to expand that field in the dynamic table. This can lead to a gigantic compression ratio of 4,096 or better, meaning that 16kB of data can decompress to 64MB of data on the target machine. | {'CVE-2016-6581'} | 2021-09-10T18:12:06Z | 2019-07-05T21:11:05Z | HIGH | 7.5 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2016-6581', 'https://github.com/advisories/GHSA-ffq8-576r-v26g', 'https://python-hyper.org/hpack/en/latest/security/CVE-2016-6581.html', 'http://www.securityfocus.com/bid/92315'} | null |
GHSA | GHSA-m9w8-v359-9ffr | Moderate severity vulnerability that affects org.apache.activemq:activemq-client | TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. | {'CVE-2018-11775'} | 2021-09-15T18:49:02Z | 2018-10-19T16:42:27Z | HIGH | 7.4 | {'CWE-295'} | {'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11775', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securitytracker.com/id/1041618', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-m9w8-v359-9ffr', 'http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt', 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html', 'http://www.securityfocus.com/bid/105335', 'https://access.redhat.com/errata/RHSA-2019:3892'} | null |
GHSA | GHSA-f92j-qf46-p6vm | Reflected Cross-site Scripting in ACS Commons | ### Impact
ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly.
An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful.
### Patches
This issue has been resolved in v4.10.0
### Workarounds
No workaround exist.
### References
N/A
### For more information
If you have any questions or comments about this advisory open an issue in acs-aem-commons.
### Credit
This issue was discovered and reported by Christopher Whipp (Christopher.Whipp@servicesaustralia.gov.au). | {'CVE-2021-21028'} | 2021-02-12T18:04:29Z | 2021-02-02T15:46:52Z | HIGH | 0 | {'CWE-416', 'CWE-79'} | {'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6', 'https://helpx.adobe.com/security/products/acrobat/apsb21-09.html', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://github.com/advisories/GHSA-f92j-qf46-p6vm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21028'} | null |
GHSA | GHSA-qhxx-j73r-qpm2 | Uninitialized memory access in TensorFlow | ### Impact
Under certain cases, a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to [default initialize the quantized floating point types in Eigen](https://github.com/tensorflow/tensorflow/blob/f70160322a579144950dff1537dcbe3c7c09d6f5/third_party/eigen3/unsupported/Eigen/CXX11/src/FixedPoint/FixedPointTypes.h#L61-L104):
```cc
struct QUInt8 {
QUInt8() {}
// ...
uint8_t value;
};
struct QInt16 {
QInt16() {}
// ...
int16_t value;
};
struct QUInt16 {
QUInt16() {}
// ...
uint16_t value;
};
struct QInt32 {
QInt32() {}
// ...
int32_t value;
};
```
### Patches
We have patched the issue in GitHub commit [ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2](https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2020-26266'} | 2021-01-07T22:36:21Z | 2020-12-10T19:07:24Z | LOW | 4.4 | {'CWE-908'} | {'https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2', 'https://github.com/advisories/GHSA-qhxx-j73r-qpm2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26266', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qhxx-j73r-qpm2'} | null |
GHSA | GHSA-7hp2-xwpj-95jq | Nokogiri, dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) | dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the "<!DOCTYPE html" substring in a crafted HTML document. | {'CVE-2015-8806'} | 2022-04-26T18:31:54Z | 2018-09-17T21:53:42Z | HIGH | 7.5 | {'CWE-125'} | {'https://github.com/advisories/GHSA-7hp2-xwpj-95jq', 'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html', 'https://bugzilla.gnome.org/show_bug.cgi?id=749115', 'http://www.openwall.com/lists/oss-security/2016/02/03/5', 'https://www.debian.org/security/2016/dsa-3593', 'http://www.securityfocus.com/bid/82071', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8806', 'http://www.ubuntu.com/usn/USN-2994-1', 'https://security.gentoo.org/glsa/201701-37'} | null |
GHSA | GHSA-65m9-m259-7jqw | Improper Authorization in react-oauth-flow | All versions of `react-oauth-flow` fail to properly implement the OAuth protocol. The package stores secrets in the front-end code. Instead of using a public OAuth client, it uses a confidential client on the browser. This may allow attackers to compromise server credentials.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-10-04T21:06:14Z | 2020-09-03T15:49:29Z | CRITICAL | 0 | {'CWE-285'} | {'https://www.npmjs.com/advisories/1487', 'https://github.com/advisories/GHSA-65m9-m259-7jqw', 'https://github.com/ethereum/web3.js/issues/2739'} | null |
GHSA | GHSA-3q9x-w53p-jg53 | OS Command Injection in heroku-addonpool | heroku-addonpool through 0.1.15 is vulnerable to Command Injection. | {'CVE-2020-7634'} | 2021-12-09T19:52:03Z | 2021-12-09T19:52:03Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/nodef/heroku-addonpool/blob/master/index.js', 'https://github.com/advisories/GHSA-3q9x-w53p-jg53', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7634', 'https://snyk.io/vuln/SNYK-JS-HEROKUADDONPOOL-564428'} | null |
GHSA | GHSA-gr58-j5wh-m333 | Prototype Pollution in nis-utils | All versions of package nis-utils up to and including 0.6.10 are vulnerable to Prototype Pollution via the setValue function. | {'CVE-2020-7703'} | 2021-07-29T21:54:09Z | 2021-05-06T17:29:08Z | CRITICAL | 9.8 | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-NISUTILS-598799', 'https://github.com/advisories/GHSA-gr58-j5wh-m333', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7703'} | null |
GHSA | GHSA-4cpg-3vgw-4877 | Prototype pollution in Plist | Prototype pollution vulnerability via `.parse()` in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution. | {'CVE-2022-22912'} | 2022-03-26T00:39:16Z | 2022-02-18T00:00:33Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52', 'https://github.com/TooTallNate/plist.js/pull/118', 'https://github.com/TooTallNate/plist.js/issues/114', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22912', 'https://github.com/advisories/GHSA-4cpg-3vgw-4877'} | null |
GHSA | GHSA-9hx4-qm7h-x84j | Cross-site Scripting in Gogs | Cross-site scripting (XSS) vulnerability in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.8 allows remote attackers to inject arbitrary web script or HTML via the text parameter to api/v1/markdown. | {'CVE-2014-8683'} | 2021-06-29T18:32:53Z | 2021-06-29T18:32:53Z | MODERATE | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2014-8683', 'https://seclists.org/fulldisclosure/2014/Nov/31', 'https://www.securityfocus.com/archive/1/533996/100/0/threaded', 'https://github.com/advisories/GHSA-9hx4-qm7h-x84j', 'https://gogs.io/docs/intro/change_log.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98693', 'https://github.com/gogits/gogs/releases/tag/v0.5.8', 'https://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html', 'https://seclists.org/fulldisclosure/2014/Nov/34', 'https://github.com/gogits/gogs/commit/3abc41cccab2486012b46305827433ad6f5deade'} | null |
GHSA | GHSA-36r8-9qq7-mh43 | Malicious Package in we3b | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-04T19:09:45Z | 2020-09-03T17:02:40Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1415', 'https://github.com/advisories/GHSA-36r8-9qq7-mh43'} | null |
GHSA | GHSA-2hwx-mjrm-v3g8 | Denial of service attack via .well-known lookups | ### Impact
A malicious homeserver could redirect requests to their .well-known file to a large file. This can lead to a denial of service attack where homeservers will consume significantly more resources when requesting the .well-known file of a malicious homeserver.
This affects any server which accepts federation requests from untrusted servers.
### Patches
Issue is resolved by #8950. A bug not affecting the security aspects of this was fixed in #9108.
### Workarounds
The `federation_domain_whitelist` setting can be used to restrict the homeservers communicated with over federation. | {'CVE-2021-21274'} | 2022-04-19T19:02:47Z | 2021-03-01T19:34:54Z | MODERATE | 4.3 | {'CWE-400'} | {'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-2hwx-mjrm-v3g8', 'https://github.com/advisories/GHSA-2hwx-mjrm-v3g8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21274', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/pull/8950', 'https://github.com/matrix-org/synapse/releases/tag/v1.25.0'} | null |
GHSA | GHSA-mp28-rq7g-qx62 | Remote code execution in Apache TomEE | If Apache TomEE 8.0.0-M1 - 8.0.3, 7.1.0 - 7.1.3, 7.0.0-M1 - 7.0.8, 1.0.0 - 1.7.5 is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port 1099, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management interface, however the incomplete fix did not cover this edge case. | {'CVE-2020-13931'} | 2022-02-09T22:44:38Z | 2022-02-09T22:44:38Z | CRITICAL | 9.8 | {'CWE-306'} | {'https://lists.apache.org/thread.html/r7f98907165b355dc65f28a57f15103a06173ce03261115fa46d569b4@%3Cdev.tomee.apache.org%3E', 'https://github.com/advisories/GHSA-mp28-rq7g-qx62', 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe%40%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13931'} | null |
GHSA | GHSA-8w4h-3cm3-2pm2 | Out-of-bounds Read in atob | Versions of `atob` before 2.1.0 uninitialized Buffers when number is passed in input on Node.js 4.x and below.
## Recommendation
Update to version 2.1.0 or later. | {'CVE-2018-3745'} | 2021-01-08T20:56:48Z | 2018-10-09T00:56:26Z | MODERATE | 0 | {'CWE-125'} | {'https://hackerone.com/reports/321686', 'https://github.com/advisories/GHSA-8w4h-3cm3-2pm2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3745', 'https://www.npmjs.com/advisories/646'} | null |
GHSA | GHSA-qcjv-wfcg-mmpr | Critical severity vulnerability that affects org.apache.ignite:ignite-core | Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to GridClientJdkMarshaller deserialization endpoint. | {'CVE-2018-8018'} | 2021-09-16T19:56:18Z | 2018-10-16T20:53:54Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-8018', 'http://www.securityfocus.com/bid/104911', 'https://github.com/advisories/GHSA-qcjv-wfcg-mmpr', 'https://lists.apache.org/thread.html/e0fdf53114a321142ecfa5cfa17658090f0b4e1677de431e329b37ab@%3Cdev.ignite.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:3768'} | null |
GHSA | GHSA-mf3v-f2qq-pf9g | Insufficient Session Expiration in Sylius | ### Impact
The reset password token was not set to null after the password was changed. This is causing behaviour in which the same token can be used several times, so it can result in a leak of the existing token and an unauthorised password change.
### Patches
The issue is fixed in versions: 1.10.11, 1.11.2 and above
### Workarounds
You have to overwrite your `Sylius\Bundle\ApiBundle\CommandHandler\ResetPasswordHandler` class using this code:
```php
<?php
declare(strict_types=1);
namespace App\CommandHandler\Account;
use Sylius\Bundle\ApiBundle\Command\Account\ResetPassword;
use Sylius\Component\Core\Model\ShopUserInterface;
use Sylius\Component\Resource\Metadata\MetadataInterface;
use Sylius\Component\User\Repository\UserRepositoryInterface;
use Sylius\Component\User\Security\PasswordUpdaterInterface;
use Symfony\Component\Messenger\Handler\MessageHandlerInterface;
use Webmozart\Assert\Assert;
final class ResetPasswordHandler implements MessageHandlerInterface
{
private UserRepositoryInterface $userRepository;
private MetadataInterface $metadata;
private PasswordUpdaterInterface $passwordUpdater;
public function __construct(
UserRepositoryInterface $userRepository,
MetadataInterface $metadata,
PasswordUpdaterInterface $passwordUpdater
) {
$this->userRepository = $userRepository;
$this->metadata = $metadata;
$this->passwordUpdater = $passwordUpdater;
}
public function __invoke(ResetPassword $command): void
{
/** @var ShopUserInterface|null $user */
$user = $this->userRepository->findOneBy(['passwordResetToken' => $command->resetPasswordToken]);
Assert::notNull($user, 'No user found with reset token: ' . $command->resetPasswordToken);
$resetting = $this->metadata->getParameter('resetting');
$lifetime = new \DateInterval($resetting['token']['ttl']);
if (!$user->isPasswordRequestNonExpired($lifetime)) {
throw new \InvalidArgumentException('Password reset token has expired');
}
if ($command->resetPasswordToken !== $user->getPasswordResetToken()) {
throw new \InvalidArgumentException('Password reset token does not match.');
}
$user->setPlainPassword($command->newPassword);
$this->passwordUpdater->updatePassword($user);
$user->setPasswordResetToken(null);
}
}
```
And register it in container:
```yaml
App\CommandHandler\Account\ResetPasswordHandler:
arguments:
- '@sylius.repository.shop_user'
- !service
class: Sylius\Component\Resource\Metadata\MetadataInterface
factory: [ '@sylius.resource_registry', 'get' ]
arguments:
- 'sylius.shop_user'
- '@sylius.security.password_updater'
tags:
- { name: messenger.message_handler, bus: sylius.command_bus }
- { name: messenger.message_handler, bus: sylius_default.bus }
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues)
* Email us at [security@sylius.com](mailto:security@sylius.com)
| {'CVE-2022-24743'} | 2022-03-18T13:11:57Z | 2022-03-14T22:30:46Z | HIGH | 7.1 | {'CWE-613'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24743', 'https://github.com/advisories/GHSA-mf3v-f2qq-pf9g', 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-mf3v-f2qq-pf9g', 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2'} | null |
GHSA | GHSA-q7rv-6hp3-vh96 | Improper Input Validation in guzzlehttp/psr7 | ### Impact
In proper header parsing. An attacker could sneak in a new line character and pass untrusted values.
### Patches
The issue is patched in 1.8.4 and 2.1.1
### Workarounds
There are no known workarounds.
| {'CVE-2022-24775'} | 2022-03-29T21:58:29Z | 2022-03-25T19:26:33Z | HIGH | 7.5 | {'CWE-20'} | {'https://github.com/advisories/GHSA-q7rv-6hp3-vh96', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24775', 'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96', 'https://www.drupal.org/sa-core-2022-006', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc', 'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1'} | null |
GHSA | GHSA-2v78-j59h-fmpf | Heap overflow or corruption in safe-transmute | An issue was discovered in the safe-transmute crate before 0.10.1 for Rust. A constructor's arguments are in the wrong order, causing heap memory corruption. | {'CVE-2018-21000'} | 2021-08-25T20:43:23Z | 2021-08-25T20:43:23Z | CRITICAL | 9.8 | {'CWE-119'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-21000', 'https://rustsec.org/advisories/RUSTSEC-2018-0013.html', 'https://github.com/advisories/GHSA-2v78-j59h-fmpf', 'https://github.com/nabijaczleweli/safe-transmute-rs/pull/36'} | null |
GHSA | GHSA-h6w6-xmqv-7q78 | High severity vulnerability that affects activerecord | Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name. | {'CVE-2011-2930'} | 2021-09-14T15:35:28Z | 2017-10-24T18:33:38Z | HIGH | 0 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2011-2930', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://www.debian.org/security/2011/dsa-2301', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://github.com/advisories/GHSA-h6w6-xmqv-7q78', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://bugzilla.redhat.com/show_bug.cgi?id=731438', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain'} | null |
GHSA | GHSA-2x7h-96h5-rq84 | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins with the destination directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 contains a patch for this vulnerability. | {'CVE-2021-32841'} | 2022-02-08T19:44:46Z | 2022-02-01T16:22:57Z | MODERATE | 4 | {'CWE-22'} | {'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32841', 'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://github.com/advisories/GHSA-2x7h-96h5-rq84'} | null |
GHSA | GHSA-pvgf-mrr4-cw7r | Cross-Site Request Forgery in ForkCMS | Multiple cross-site request forgery (CSRF) vulnerabilities in the Admin Console in Fork before 5.8.3 allows remote attackers to perform unauthorized actions as administrator to (1) approve the mass of the user's comments, (2) restoring a deleted user, (3) installing or running modules, (4) resetting the analytics, (5) pinging the mailmotor api, (6) uploading things to the media library, (7) exporting locale. | {'CVE-2020-23960'} | 2021-05-06T18:53:09Z | 2021-05-06T18:53:09Z | HIGH | 8.8 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-23960', 'https://github.com/advisories/GHSA-pvgf-mrr4-cw7r', 'https://github.com/forkcms/forkcms/pull/3123', 'https://www.fork-cms.com/blog/detail/fork-5.8.3-released'} | null |
GHSA | GHSA-8mr5-h28g-36qx | Moderate severity vulnerability that affects org.apache.struts:struts2-core | When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33. | {'CVE-2017-9787'} | 2021-09-07T20:21:27Z | 2018-10-16T19:37:07Z | HIGH | 7.5 | null | {'https://github.com/advisories/GHSA-8mr5-h28g-36qx', 'http://www.securityfocus.com/bid/99562', 'https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d@%3Cannouncements.struts.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'http://www.securitytracker.com/id/1039115', 'https://lists.apache.org/thread.html/de3d325f0433cd3b42258b6a302c0d7a72b69eedc1480ed561d3b065@%3Cannouncements.struts.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20180706-0002/', 'http://struts.apache.org/docs/s2-049.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9787'} | null |
GHSA | GHSA-7r94-xv9v-63jw | A use of uninitialized value vulnerability in Tensorflow | ### Impact
TensorFlow's Grappler optimizer has a [use of unitialized variable](https://github.com/tensorflow/tensorflow/blob/3457a2b122e50b4d44ceaaed5a663d635e5c22df/tensorflow/core/grappler/optimizers/auto_parallel.cc#L155-L164):
```cc
const NodeDef* dequeue_node;
for (const auto& train_node : train_nodes) {
if (IsDequeueOp(*train_node)) {
dequeue_node = train_node;
break;
}
}
if (dequeue_node) {
...
}
```
If the `train_nodes` vector (obtained from the saved model that gets optimized) does not contain a `Dequeue` node, then `dequeue_node` is left unitialized.
### Patches
We have patched the issue in GitHub commit [68867bf01239d9e1048f98cbad185bf4761bedd3](https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Qian Feng from Baidu Security Team.
| {'CVE-2021-41225'} | 2021-11-10T18:44:11Z | 2021-11-10T18:44:11Z | MODERATE | 5.5 | {'CWE-908'} | {'https://github.com/advisories/GHSA-7r94-xv9v-63jw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41225', 'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw'} | null |
GHSA | GHSA-fxwv-953p-7qpf | Phusion Passenger allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header | agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header. | {'CVE-2015-7519'} | 2022-04-26T18:27:08Z | 2018-10-10T17:29:13Z | LOW | 3.7 | {'CWE-20'} | {'https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e', 'https://bugzilla.suse.com/show_bug.cgi?id=956281', 'https://blog.phusion.nl/2015/12/07/cve-2015-7519/', 'http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00024.html', 'https://puppet.com/security/cve/passenger-dec-2015-security-fixes', 'http://www.openwall.com/lists/oss-security/2015/12/07/2', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7519', 'http://www.openwall.com/lists/oss-security/2015/12/07/1', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00007.html', 'https://github.com/advisories/GHSA-fxwv-953p-7qpf'} | null |
GHSA | GHSA-8r6h-7x9g-xmw9 | Moderate severity vulnerability that affects will_paginate | Cross-site scripting (XSS) vulnerability in the will_paginate gem before 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via vectors involving generated pagination links. | {'CVE-2013-6459'} | 2021-09-07T20:30:58Z | 2017-10-24T18:33:36Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/mislav/will_paginate/releases/tag/v3.0.5', 'http://www.securityfocus.com/bid/64509', 'https://github.com/advisories/GHSA-8r6h-7x9g-xmw9', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6459', 'http://secunia.com/advisories/56180', 'https://access.redhat.com/errata/RHSA-2018:0336'} | null |
GHSA | GHSA-mg69-6j3m-jvgw | HTML Injection in marky-markdown | All versions of `marky-markdown` are vulnerable to HTML Injection. The package fails to sanitize `style` attributes in `img` tags of the markdown input. This may allow attackers to affect the size of images in the rendered HTML.
## Recommendation
This package is no longer maintained. Please upgrade to `@npmcorp/marky-markdown` | null | 2021-10-04T20:56:43Z | 2020-09-03T15:45:08Z | HIGH | 7.3 | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-JS-MARKYMARKDOWN-548871', 'https://github.com/npm/marky-markdown', 'https://github.com/advisories/GHSA-mg69-6j3m-jvgw', 'https://www.npmjs.com/advisories/1470'} | null |
GHSA | GHSA-p8ww-vv84-c2rm | Moderate severity vulnerability that affects com.orientechnologies:orientdb-studio | The JSONP endpoint in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict callback values, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted HTTP request. | {'CVE-2015-2912'} | 2021-09-16T16:14:55Z | 2018-10-18T17:41:13Z | HIGH | 8.8 | {'CWE-352'} | {'https://www.kb.cert.org/vuls/id/845332', 'https://github.com/advisories/GHSA-p8ww-vv84-c2rm', 'https://github.com/orientechnologies/orientdb/issues/4824', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2912'} | null |
GHSA | GHSA-4mq5-mj59-qq9c | Allocation of Resources Without Limits or Throttling in Apache Tika | In Apache Tika 1.19 to 1.21, a carefully crafted 2003ml or 2006ml file could consume all available SAXParsers in the pool and lead to very long hangs. Apache Tika users should upgrade to 1.22 or later. | {'CVE-2019-10093'} | 2021-05-05T22:55:28Z | 2019-08-06T01:43:38Z | MODERATE | 6.5 | {'CWE-770'} | {'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10093', 'https://lists.apache.org/thread.html/a5a44eff1b9eda3bc69d22943a1030c43d376380c75d3ab04d0c1a21@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190828-0004/', 'https://github.com/advisories/GHSA-4mq5-mj59-qq9c'} | null |
GHSA | GHSA-vq2r-5xvm-3hc3 | Segfault in `CTCBeamSearchDecoder` | ### Impact
Due to lack of validation in `tf.raw_ops.CTCBeamSearchDecoder`, an attacker can trigger denial of service via segmentation faults:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[18, 8, 0], dtype=tf.float32)
sequence_length = tf.constant([11, -43, -92, 11, -89, -83, -35, -100],
shape=[8], dtype=tf.int32)
beam_width = 10
top_paths = 3
merge_repeated = True
tf.raw_ops.CTCBeamSearchDecoder(
inputs=inputs, sequence_length=sequence_length, beam_width=beam_width,
top_paths=top_paths, merge_repeated=merge_repeated)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7/tensorflow/core/kernels/ctc_decoder_ops.cc#L68-L79) fails to detect cases when the input tensor is empty and proceeds to read data from a null buffer.
### Patches
We have patched the issue in GitHub commit [b1b323042264740c398140da32e93fb9c2c9f33e](https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29581'} | 2021-05-21T14:26:30Z | 2021-05-21T14:26:30Z | LOW | 2.5 | {'CWE-908'} | {'https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e', 'https://github.com/advisories/GHSA-vq2r-5xvm-3hc3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29581', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq2r-5xvm-3hc3'} | null |
GHSA | GHSA-hq5m-mqmx-fw6m | Privilege escalation via form generator | ### Impact
It is possible for untrusted users to gain administrator rights with the form generator.
Installations are only affected if there are untrusted back end users with access to the form generator.
### Patches
Update to Contao 4.4.56, 4.9.18 or 4.11.7.
### Workarounds
Disable the form generator or disable the login for untrusted back end users.
### References
https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose). | {'CVE-2021-37627'} | 2022-04-19T19:03:05Z | 2021-08-23T19:41:22Z | HIGH | 8 | {'CWE-269'} | {'https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m', 'https://github.com/advisories/GHSA-hq5m-mqmx-fw6m', 'https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37627'} | null |
GHSA | GHSA-c9g6-9335-x697 | Improper Input Validation in SocksJS-Node | Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20. | {'CVE-2020-7693'} | 2021-04-20T15:25:19Z | 2021-04-13T15:27:51Z | MODERATE | 5.3 | {'CWE-20'} | {'https://github.com/andsnw/sockjs-dos-py', 'https://www.npmjs.com/package/sockjs', 'https://github.com/advisories/GHSA-c9g6-9335-x697', 'https://github.com/sockjs/sockjs-node/issues/252', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448', 'https://github.com/sockjs/sockjs-node/pull/265', 'https://snyk.io/vuln/SNYK-JS-SOCKJS-575261', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7693', 'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16'} | null |
GHSA | GHSA-7qw5-pqhc-xm4g | Users with SCRIPT right can execute arbitrary code in XWiki | ### Impact
Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution.
### Patches
It has been patched in both version XWiki 12.2.1 and XWiki 11.10.5.
### Workarounds
The only workaround is to give SCRIPT right only to trusted users.
### References
https://jira.xwiki.org/browse/XWIKI-17141
https://jira.xwiki.org/browse/XWIKI-17266
It's been reported by the GitHub Security Lab under #GHSL-2020-046.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org) | {'CVE-2020-15171'} | 2021-11-19T15:29:44Z | 2020-09-10T19:19:27Z | LOW | 6.6 | {'CWE-94', 'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15171', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7qw5-pqhc-xm4g', 'https://github.com/advisories/GHSA-7qw5-pqhc-xm4g'} | null |
GHSA | GHSA-pg53-56cg-4m8q | Token verification bug in next-auth | ### Impact
Implementations using the **Prisma database adapter** with the **Email provider** **are impacted**.
Implementations using the Prisma database adapter that are not using the Email provider are not impacted.
Implementations using the default database adapter (TypeORM) with the Email provider are not impacted.
Implementations not using a database are not impacted.
### Patches
This issue is fixed in 3.3.0 and newer versions.
### Workarounds
Those not able to upgrade can alternatively disable the Email provider as a workaround.
### Description
The Prisma database adapter was checking the verification token but not the identifier (the email address associated with the token). This made it possible to use a valid token assigned to one user, to sign in as another user when using the Prima adapter in conjunction with the Email provider. The defect is specific to the community-supported Prisma database adapter in versions <3.3.0 and is not present in the default database adapter (TypeORM).
*Note: The current community-supported adapter was not developed by Prisma.*
The defect was a problem in the implementation of verification function the adapter and is not directly related to Prisma.
The flaw may exist in other third party database adapters that do not check both the identifier and token values.
The design of the database adapter API may be revised in future to help reduce the likelyhood of similar defects.
### Timeline
On Monday (2021-02-08) we were notified via responsible disclosure by Alessandro Angelino (@AlessandroA) of a flaw in the implementation of the Prisma database adapter included with NextAuth.js. A detailed write up and proof of concept were provided.
The following day (2021-02-09) we published a fix in v3.3.0 and confirmed through internal testing, and with Alessandro, that the issue was resolved in the new release and prompted users to upgrade.
On 2021-02-10 we received a CVE ID and published this advisory within a few hours of notification.
We would like to thank Alessandro for using responsible disclose to allow us to address the issue promptly and publish this advisory once an update was available that resolved the issue and Balázs Orbán (@balazsorban44) for facilitating a timely release of the fix. | {'CVE-2021-21310'} | 2022-04-19T19:02:47Z | 2021-02-11T21:36:24Z | LOW | 0 | {'CWE-290'} | {'https://github.com/advisories/GHSA-pg53-56cg-4m8q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21310', 'https://github.com/nextauthjs/next-auth/releases/tag/v3.3.0', 'https://www.npmjs.com/package/next-auth', 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pg53-56cg-4m8q'} | null |
GHSA | GHSA-qwh6-xwj4-9cjg | Remote code execution in net.mingsoft:ms-mcms | net.mingsoft:ms-mcms <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successful attacks of this vulnerability can result in takeover of MCMS. | {'CVE-2021-46384'} | 2022-03-17T21:36:18Z | 2022-03-05T00:00:41Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://gitee.com/mingSoft/MCMS/issues/I4QZ1O', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46384', 'https://github.com/advisories/GHSA-qwh6-xwj4-9cjg'} | null |
GHSA | GHSA-pwhf-39xg-4rxw | Script injection | ### Impact
A malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same origin as the Backstage app or other backend plugins, this may give access to sensitive data.
The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store.
### Patches
The vulnerability is patched in the `0.6.4` release of `@backstage/techdocs-common`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage) | {'CVE-2021-32660'} | 2021-06-21T22:43:31Z | 2021-06-04T19:09:35Z | MODERATE | 6.8 | {'CWE-434', 'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32660', 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c', 'https://github.com/backstage/backstage/security/advisories/GHSA-pwhf-39xg-4rxw', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/advisories/GHSA-pwhf-39xg-4rxw'} | null |
GHSA | GHSA-hxfw-jm98-v4mq | Divide By Zero in OpenCV. | An issue was discovered in OpenCV 4.1.0 (OpenCV-Python 4.1.0.25). There is a divide-by-zero error in cv::HOGDescriptor::getDescriptorSize in modules/objdetect/src/hog.cpp. | {'CVE-2019-15939'} | 2021-11-18T15:27:50Z | 2021-10-12T22:21:56Z | MODERATE | 5.9 | {'CWE-369'} | {'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15939', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/OpenCV/opencv/issues/15287', 'https://github.com/advisories/GHSA-hxfw-jm98-v4mq', 'https://github.com/opencv/opencv/pull/15382'} | null |
GHSA | GHSA-36fm-v9wv-56jf | Cross-site Scripting in OpenCart | OpenCart 3.0.3.2 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section. | {'CVE-2020-10596'} | 2021-05-06T18:54:04Z | 2021-05-06T18:54:04Z | LOW | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-36fm-v9wv-56jf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10596', 'https://github.com/opencart/opencart/issues/7810', 'http://packetstormsecurity.com/files/157908/OpenCart-3.0.3.2-Cross-Site-Scripting.html'} | null |
GHSA | GHSA-766v-7gjx-55hf | Malicious Package in js-shq3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-30T17:14:27Z | 2020-09-03T23:08:34Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-766v-7gjx-55hf', 'https://www.npmjs.com/advisories/1289'} | null |
GHSA | GHSA-qpvx-gpqm-g98j | Critical severity vulnerability that affects Auth0-WCF-Service-JWT | Auth0 Auth0-WCF-Service-JWT before 1.0.4 leaks the expected JWT signature in an error message when it cannot successfully validate the JWT signature. If this error message is presented to an attacker, they can forge an arbitrary JWT token that will be accepted by the vulnerable application. | {'CVE-2019-7644'} | 2021-09-16T20:03:33Z | 2019-04-18T14:28:03Z | CRITICAL | 9.8 | {'CWE-209'} | {'https://auth0.com/docs/security/bulletins/cve-2019-7644', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7644', 'https://github.com/advisories/GHSA-qpvx-gpqm-g98j'} | null |
GHSA | GHSA-wjfq-88q2-r34j | Unhandled exception when decoding form response JSON | ### Impact
When handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`.
An `InvalidArgumentException` is thrown by this function when it fails to fix an error found in the JSON, which is not caught by the caller. This leads to a server crash.
### Patches
56fe71d939c38fe14e18a31a673a9331bcc0e4ca
### Workarounds
A plugin may handle `DataPacketReceiveEvent`, capture `ModalFormResponsePacket` and run the provided JSON through `stupid_json_decode`.
Note that this requires copying the body of the function to a plugin, since the function is currently private.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null | 2022-04-19T19:03:21Z | 2022-01-21T23:02:14Z | HIGH | 7.5 | null | {'https://github.com/pmmp/PocketMine-MP/blob/4.0.7/changelogs/4.0.md#407', 'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wjfq-88q2-r34j', 'https://github.com/advisories/GHSA-wjfq-88q2-r34j'} | null |
GHSA | GHSA-rcjj-h6gh-jf3r | Information Disclosure in Apache Groovy | Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2. | {'CVE-2020-17521'} | 2022-04-22T18:24:10Z | 2020-12-09T19:03:03Z | MODERATE | 5.5 | {'CWE-379'} | {'https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/apache/groovy/commit/bcbe5c4c76db83736166530647c024ac1e47ef28', 'https://github.com/apache/groovy/pull/1425', 'https://security.netapp.com/advisory/ntap-20201218-0006/', 'https://lists.apache.org/thread.html/rea63a4666ba245d2892471307772a2d8ce0f0741f341d6576625c1b3@%3Cdev.atlas.apache.org%3E', 'https://groovy-lang.org/security.html#CVE-2020-17521', 'https://github.com/advisories/GHSA-rcjj-h6gh-jf3r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17521', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-3fhf-6939-qg8p | High severity vulnerability that affects rest-client | REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect. | {'CVE-2015-1820'} | 2021-08-31T21:01:32Z | 2018-08-13T20:47:22Z | HIGH | 9.8 | {'CWE-384'} | {'https://github.com/advisories/GHSA-3fhf-6939-qg8p', 'https://github.com/rest-client/rest-client/issues/369', 'http://www.securityfocus.com/bid/73295', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1820', 'https://bugzilla.redhat.com/show_bug.cgi?id=1205291', 'http://www.openwall.com/lists/oss-security/2015/03/24/3'} | null |
GHSA | GHSA-2rmp-fw5r-j5qv | Improper Authentication in InfluxDB | InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret). | {'CVE-2019-20933'} | 2021-05-18T18:22:05Z | 2021-05-18T18:22:05Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-20933', 'https://github.com/influxdata/influxdb/compare/v1.7.5...v1.7.6', 'https://github.com/ticarpi/jwt_tool/blob/a6ca3e0524a204b5add070bc6874cb4e7e5a9864/jwt_tool.py#L1368', 'https://www.debian.org/security/2021/dsa-4823', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00030.html', 'https://github.com/influxdata/influxdb/issues/12927', 'https://github.com/advisories/GHSA-2rmp-fw5r-j5qv', 'https://github.com/influxdata/influxdb/commit/761b557315ff9c1642cf3b0e5797cd3d983a24c0'} | null |
GHSA | GHSA-m45g-f45x-vv22 | Improper input validation in CNCF Cortex | The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list. | {'CVE-2021-31232'} | 2021-06-23T17:20:38Z | 2021-06-23T17:20:38Z | MODERATE | 5.5 | {'CWE-20'} | {'https://lists.cncf.io/g/cortex-users/message/50', 'https://github.com/advisories/GHSA-m45g-f45x-vv22', 'https://github.com/cortexproject/cortex/pull/4129/files', 'https://community.grafana.com/c/security-announcements', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31232', 'https://github.com/cortexproject/cortex'} | null |
GHSA | GHSA-p239-93f7-h6xf | Cross-Site Scripting in swagger-ui | Affected versions of `swagger-ui` contain a cross-site scripting vulnerability in the key names of a specific nested object in the JSON document.
## Proof of Concept
The vulnerable object structure is:
```
{
"definitions": {
"arbitraryVal": {
"properties": {
"<INJECTABLE_KEY_NAME>": "LoremIpsum"
}
}
}
}
```
Malicious JSON documents can be loaded in by providing a URL to them in the `url` query string parameter.
## Recommendation
Update to version 2.2.1 or later. | {'CVE-2016-5682'} | 2021-09-23T21:32:17Z | 2020-09-01T15:30:58Z | CRITICAL | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/126', 'https://community.rapid7.com/community/infosec/blog/2016/09/02/r7-2016-19-persistent-xss-via-unescaped-parameters-in-swagger-ui', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5682', 'https://github.com/advisories/GHSA-p239-93f7-h6xf', 'https://github.com/swagger-api/swagger-ui/issues/1865'} | null |
GHSA | GHSA-w6v7-w58j-pg5r | Improper Verification of Communication Channel in @theia/plugin-ext | In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage(). | {'CVE-2021-41038'} | 2021-11-15T17:40:51Z | 2021-11-15T17:40:51Z | MODERATE | 6.1 | {'CWE-940'} | {'https://github.com/eclipse-theia/theia/pull/10125', 'https://github.com/advisories/GHSA-w6v7-w58j-pg5r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41038', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924'} | null |
GHSA | GHSA-7r7m-5h27-29hp | Potential infinite loop in Pillow | An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load. | {'CVE-2021-28676'} | 2021-09-15T18:25:52Z | 2021-06-08T18:48:53Z | HIGH | 7.5 | {'CWE-835'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://github.com/python-pillow/Pillow/pull/5377', 'https://github.com/advisories/GHSA-7r7m-5h27-29hp', 'https://security.gentoo.org/glsa/202107-33', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28676', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28676-fix-fli-dos'} | null |
GHSA | GHSA-88g8-f5mf-f5rj | Improper Initialization in OpenZeppelin | In OpenZeppelin <=v4.4.0, initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call. Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible, breaking the expectation that there is a single execution. | {'CVE-2021-46320'} | 2022-02-11T22:47:19Z | 2022-02-05T00:00:31Z | HIGH | 7.5 | {'CWE-665'} | {'https://github.com/advisories/GHSA-88g8-f5mf-f5rj', 'https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.4.1', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46320', 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006'} | null |
GHSA | GHSA-q3j3-w37x-hq2q | Webcache Poisoning in symfony/http-kernel | Description
-----------
When a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the "trusted_headers" allowed list are ignored and protect you from "Cache poisoning" attacks.
In Symfony 5.2, we've added support for the `X-Forwarded-Prefix` header, but this header was accessible in sub-requests, even if it was not part of the "trusted_headers" allowed list. An attacker could leverage this opportunity to forge requests containing a `X-Forwarded-Prefix` HTTP header, leading to a web cache poisoning issue.
Resolution
----------
Symfony now ensures that the `X-Forwarded-Prefix` HTTP header is not forwarded to sub-requests when it is not trusted.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487) for branch 5.3.
Credits
-------
We would like to thank Soner Sayakci for reporting the issue and Jérémy Derussé for fixing the issue.
| {'CVE-2021-41267'} | 2022-04-19T19:03:15Z | 2021-11-24T20:04:25Z | MODERATE | 6.5 | {'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41267', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q', 'https://github.com/advisories/GHSA-q3j3-w37x-hq2q'} | null |
GHSA | GHSA-p8jx-x2vw-wm33 | High severity vulnerability that affects org.apache.storm:storm-core | In Apache Storm 0.10.0 through 0.10.2, 1.0.0 through 1.0.6, 1.1.0 through 1.1.2, and 1.2.0 through 1.2.1, an attacker with access to a secure storm cluster in some cases could execute arbitrary code as a different user. | {'CVE-2018-1331'} | 2021-09-16T16:13:16Z | 2018-10-17T19:48:06Z | HIGH | 8.8 | null | {'http://storm.apache.org/2018/06/04/storm122-released.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1331', 'https://github.com/advisories/GHSA-p8jx-x2vw-wm33', 'http://www.securityfocus.com/bid/104732', 'http://www.openwall.com/lists/oss-security/2018/07/10/4', 'http://www.securitytracker.com/id/1041273', 'http://storm.apache.org/2018/06/04/storm113-released.html'} | null |
GHSA | GHSA-qm57-vhq3-3fwf | Header injection possible in Django | In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers. | {'CVE-2021-32052'} | 2021-06-14T21:29:19Z | 2021-06-09T17:14:51Z | MODERATE | 6.1 | {'CWE-88', 'CWE-79'} | {'https://github.com/django/django/commit/e1e81aa1c4427411e3c68facdd761229ffea6f6f', 'https://www.djangoproject.com/weblog/2021/may/06/security-releases/', 'https://github.com/advisories/GHSA-qm57-vhq3-3fwf', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://security.netapp.com/advisory/ntap-20210611-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32052', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/', 'http://www.openwall.com/lists/oss-security/2021/05/06/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=1944801', 'https://groups.google.com/forum/#!forum/django-announce'} | null |
GHSA | GHSA-rj44-gpjc-29r7 | [thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values | ### Impact
Potential for arbitrary code execution in `#gpg`-tagged property values (only if `decrypt: true` option is enabled)
### Patches
[A fix](https://github.com/thi-ng/umbrella/commit/3e14765d6bfd8006742c9e7860bc7d58ae94dfa5) has already been released as v0.4.0
### Workarounds
By default, EGF parse functions do NOT attempt to decrypt values (since GPG is only available in non-browser env).
However, if GPG encrypted values are used/required:
1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\`) chars in the encrypted value string
2. Replace/remove them or skip parsing if present...
### References
https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7#advisory-comment-65261
### For more information
If you have any questions or comments about this advisory, please open an issue in the [thi.ng/umbrella repo](https://github.com/thi-ng/umbrella/issues), of which this package is part of. | {'CVE-2021-21412'} | 2022-04-19T19:02:52Z | 2021-04-06T17:22:41Z | MODERATE | 6.4 | {'CWE-78'} | {'https://github.com/advisories/GHSA-rj44-gpjc-29r7', 'https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7', 'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243', 'https://www.npmjs.com/package/@thi.ng/egf', 'https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21412'} | null |
GHSA | GHSA-rhm9-p9w5-fwm7 | Symmetrically encrypting large values can lead to integer overflow | cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. When certain sequences of `update()` calls with large values (multiple GBs) for symetric encryption or decryption occur, it's possible for an integer overflow to happen, leading to mishandling of buffers. This is patched in version 3.3.2 and newer.
| {'CVE-2020-36242'} | 2022-04-22T18:32:24Z | 2021-02-10T01:32:27Z | CRITICAL | 9.1 | {'CWE-787', 'CWE-190'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/pyca/cryptography/blob/master/CHANGELOG.rst', 'https://github.com/pyca/cryptography/security/advisories/GHSA-rhm9-p9w5-fwm7', 'https://github.com/pyca/cryptography/compare/3.3.1...3.3.2', 'https://github.com/advisories/GHSA-rhm9-p9w5-fwm7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7RGQLK4J5ZQFRLKCHVVG6BKZTUQMG7E/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36242', 'https://github.com/pyca/cryptography/commit/82b6ce28389f0a317bc55ba2091a74b346db7cae', 'https://github.com/pyca/cryptography/issues/5615'} | null |
GHSA | GHSA-wjx8-cgrm-hh8p | Unrestricted file uploads in Contao | ### Impact
A back end user with access to the form generator can upload arbitrary files and execute them on the server.
### Patches
Update to Contao 4.4.46 or 4.8.6.
### Workarounds
Configure your web server so it does not execute PHP files and other scripts in the Contao file upload directory.
### References
https://contao.org/en/security-advisories/unrestricted-file-uploads.html
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose). | {'CVE-2019-19745'} | 2021-08-19T16:10:15Z | 2019-12-17T22:53:10Z | HIGH | 8.8 | {'CWE-434'} | {'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19745.yaml', 'https://github.com/advisories/GHSA-wjx8-cgrm-hh8p', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19745', 'https://github.com/contao/contao/security/advisories/GHSA-wjx8-cgrm-hh8p', 'https://contao.org/en/news.html', 'https://contao.org/en/security-advisories/unrestricted-file-uploads.html'} | null |
GHSA | GHSA-92px-q4w8-hrr5 | Malicious Package in impala | Version 1.1.7 of `impala` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.1.7 of this module is found installed you will want to replace it with a version before or after 1.1.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | null | 2021-09-24T18:30:53Z | 2020-09-01T19:56:52Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/628', 'https://github.com/shenfw1987/impala', 'https://snyk.io/vuln/SNYK-JS-IMPALA-450989', 'https://github.com/advisories/GHSA-92px-q4w8-hrr5'} | null |
GHSA | GHSA-p4pj-mg4r-x6v4 | Denial of Service in uap-core | ## Impact
Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
## Patches
Please update uap-core to >= v0.11.0
Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes. | {'CVE-2021-21317'} | 2021-02-17T17:18:55Z | 2021-02-02T15:46:38Z | HIGH | 5.3 | {'CWE-400'} | {'https://www.npmjs.com/package/uap-core', 'https://github.com/advisories/GHSA-p4pj-mg4r-x6v4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21317', 'https://github.com/ua-parser/uap-core/security/advisories/GHSA-p4pj-mg4r-x6v4', 'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c'} | null |
GHSA | GHSA-qfc9-x7gv-27jr | Malicious Package in deasyncp | All versions of `deasyncp ` contain malicious code. The package shuts down the machine upon installation as a preinstall script.
## Recommendation
Remove the package from your environment. There is no further compromise. | null | 2021-09-30T20:03:52Z | 2020-09-03T18:12:36Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1073', 'https://github.com/advisories/GHSA-qfc9-x7gv-27jr'} | null |
GHSA | GHSA-2fw4-mgq9-39cx | Code Injection in oauth2-server | "oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also therefore wouldn't describe this as a "vulnerability" with the library per se.'" | {'CVE-2017-18924'} | 2021-04-22T15:53:45Z | 2021-04-22T15:53:45Z | HIGH | 7.5 | {'CWE-94'} | {'https://tools.ietf.org/html/draft-ietf-oauth-security-topics-15', 'https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467', 'https://github.com/oauthjs/node-oauth2-server/pull/452', 'https://github.com/oauthjs/node-oauth2-server/issues/637', 'https://github.com/advisories/GHSA-2fw4-mgq9-39cx', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18924', 'https://tools.ietf.org/html/rfc7636'} | null |
GHSA | GHSA-93xj-8mrv-444m | Regular Expression Denial of Service (REDoS) in httplib2 | ### Impact
A malicious server which responds with long series of `\xa0` characters in the `www-authenticate` header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server.
### Patches
Version 0.19.0 contains new implementation of auth headers parsing, using pyparsing library.
https://github.com/httplib2/httplib2/pull/182
### Workarounds
```py
import httplib2
httplib2.USE_WWW_AUTH_STRICT_PARSING = True
```
### Technical Details
The vulnerable regular expression is https://github.com/httplib2/httplib2/blob/595e248d0958c00e83cb28f136a2a54772772b50/python3/httplib2/__init__.py#L336-L338
The section before the equals sign contains multiple overlapping groups. Ignoring the optional part containing a comma, we have:
\s*[^ \t\r\n=]+\s*=
Since all three infinitely repeating groups accept the non-breaking space character `\xa0`, a long string of `\xa0` causes catastrophic backtracking.
The complexity is cubic, so doubling the length of the malicious string of `\xa0` makes processing take 8 times as long.
### Reproduction Steps
Run a malicious server which responds with
www-authenticate: x \xa0\xa0\xa0\xa0x
but with many more `\xa0` characters.
An example malicious python server is below:
```py
from http.server import BaseHTTPRequestHandler, HTTPServer
def make_header_value(n_spaces):
repeat = "\xa0" * n_spaces
return f"x {repeat}x"
class Handler(BaseHTTPRequestHandler):
def do_GET(self):
self.log_request(401)
self.send_response_only(401) # Don't bother sending Server and Date
n_spaces = (
int(self.path[1:]) # Can GET e.g. /100 to test shorter sequences
if len(self.path) > 1 else
65512 # Max header line length 65536
)
value = make_header_value(n_spaces)
self.send_header("www-authenticate", value) # This header can actually be sent multiple times
self.end_headers()
if __name__ == "__main__":
HTTPServer(("", 1337), Handler).serve_forever()
```
Connect to the server with httplib2:
```py
import httplib2
httplib2.Http(".cache").request("http://localhost:1337", "GET")
```
To benchmark performance with shorter strings, you can set the path to a number e.g. http://localhost:1337/1000
### References
Thanks to [Ben Caller](https://github.com/b-c-ds) ([Doyensec](https://doyensec.com)) for finding vulnerability and discrete notification.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [httplib2](https://github.com/httplib2/httplib2/issues/new)
* Email [current maintainer at 2021-01](mailto:temotor@gmail.com) | {'CVE-2021-21240'} | 2022-04-19T19:02:44Z | 2021-02-08T19:41:59Z | LOW | 0 | {'CWE-400'} | {'https://github.com/httplib2/httplib2/pull/182', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21240', 'https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m', 'https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc', 'https://github.com/advisories/GHSA-93xj-8mrv-444m', 'https://pypi.org/project/httplib2'} | null |
GHSA | GHSA-6r3c-8xf3-ggrr | Directory traversal outside of SENDFILE_ROOT in django-sendfile2 | django-sendfile2 currently relies on the backend to correctly limit file paths to `SENDFILE_ROOT`. This is not the case for the `simple` and `development` backends, it is also not necessarily the case for any of the other backends either (it's just an assumption that was made by the original author).
This will be fixed in 0.6.0 which is to be released the same day as this advisory is made public.
When upgrading, you will need to make sure `SENDFILE_ROOT` is set in your settings module if it wasn't already. | null | 2022-04-19T19:02:28Z | 2020-06-24T17:15:26Z | MODERATE | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-6r3c-8xf3-ggrr', 'https://github.com/moggers87/django-sendfile2/commit/f870c52398a55b9b5189932dd8caa24efb4bc1e1', 'https://github.com/moggers87/django-sendfile2/security/advisories/GHSA-6r3c-8xf3-ggrr'} | null |
GHSA | GHSA-426h-24vj-qwxf | Command Injection in npm-programmatic | All versions of `npm-programmatic ` are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `exec` call on the `install`, `uninstall` and `list` functions . This may allow attackers to execute arbitrary code in the system if the package name passed to the function is user-controlled.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | {'CVE-2020-7614'} | 2021-07-29T15:52:30Z | 2020-04-23T20:09:09Z | CRITICAL | 9.8 | {'CWE-20', 'CWE-78'} | {'https://github.com/advisories/GHSA-426h-24vj-qwxf', 'https://github.com/Manak/npm-programmatic/blob/master/index.js#L18', 'https://www.npmjs.com/advisories/1507', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7614', 'https://snyk.io/vuln/SNYK-JS-NPMPROGRAMMATIC-564115'} | null |
GHSA | GHSA-pfj7-2qfw-vwgm | Path traversal in translator module in NodeBB | ### Impact
Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory.
### Patches
The vulnerability has been patched as of v1.18.5.
### Workarounds
Cherry-pick commit hash `c8b2fc46dc698db687379106b3f01c71b80f495f` to receive this patch in lieu of a full upgrade.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@nodebb.org](mailto:security@nodebb.org)
| {'CVE-2021-43788'} | 2022-04-19T19:03:13Z | 2021-11-30T22:20:43Z | MODERATE | 5 | {'CWE-22'} | {'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-pfj7-2qfw-vwgm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43788', 'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/advisories/GHSA-pfj7-2qfw-vwgm'} | null |
GHSA | GHSA-qvp4-rpmr-xwrr | Possible bypass of token claim validation when OAuth2 Introspection caching is enabled | ### Impact
When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid.
### Patches
A patch will be released with `v0.38.12-beta.1`.
### Workarounds
Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist.
### Trace
The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes.
### Post-Mortem
The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process.
To avoid this from happening again we enabled codecov with a strict policy on the Ory Oathkeeper repository: Without an increase in code coverage the PR can not be merged.
To address this issue and any regressions we have added a test suite ensuring that the cache behaviour is correct in the different scenarios:
- Scope strategy is `none`, cache is enabled, and `requested_scope` is not empty -> cache will not be used;
- Scope strategy is `none`, cache is enabled, and `requested_scope` is empty -> cache will be used;
- Scope strategy is not `none`, cache is enabled, and `requested_scope` is not empty -> cache will be used;
as well as validating if `iss`, `aud`, `exp`, `token_use`, and scope are validated.
Additionally, we added [CodeQL scanning](https://github.com/ory/oathkeeper/commit/64ac7562669287d391cd72dfd43c5d71ff9f89a1) to the CI. | null | 2022-04-19T19:03:00Z | 2021-06-23T18:00:20Z | HIGH | 7.5 | {'CWE-863'} | {'https://github.com/advisories/GHSA-qvp4-rpmr-xwrr', 'https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr'} | null |
GHSA | GHSA-rc8h-3fv6-pxv8 | Denial of Service in hapi | Versions of `hapi` prior to 11.1.3 are affected by a denial of service vulnerability.
The vulnerability is triggered when certain input is passed into the If-Modified-Since or Last-Modified headers.
This causes an 'illegal access' exception to be raised, and instead of sending a HTTP 500 error back to the sender, hapi will continue to hold the socket open until timed out (default node timeout is 2 minutes).
## Recommendation
Update to v11.1.3 or later | {'CVE-2015-9241'} | 2021-01-08T01:58:05Z | 2018-06-07T19:43:15Z | HIGH | 0 | {'CWE-400'} | {'https://nodesecurity.io/advisories/64', 'https://github.com/jfhbrook/node-ecstatic/pull/179', 'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580', 'https://nodesecurity.io/advisories/63', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9241', 'https://github.com/advisories/GHSA-rc8h-3fv6-pxv8', 'https://www.npmjs.com/advisories/63'} | null |
GHSA | GHSA-fxwf-45c7-4ppr | Prototype pollution in object-hierarchy-access | Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2020-28270'} | 2022-01-07T16:07:29Z | 2021-10-12T16:40:58Z | CRITICAL | 9.8 | {'CWE-1321', 'CWE-915'} | {'https://github.com/advisories/GHSA-fxwf-45c7-4ppr', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270,', 'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28270'} | null |
GHSA | GHSA-c7pp-x73h-4m2v | Cross-Site Scripting in bootstrap-vue | Versions of `bootstrap-vue` prior to 2.0.0-rc.12 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization, components may be vulnerable to Cross-Site Scripting through the `options` variable. This may lead to the execution of malicious JavaScript on the user's browser.
## Recommendation
Upgrade to version 2.0.0-rc.12 or later. | null | 2021-09-27T15:43:20Z | 2020-09-02T15:53:46Z | HIGH | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/770', 'https://github.com/advisories/GHSA-c7pp-x73h-4m2v', 'https://github.com/bootstrap-vue/bootstrap-vue/issues/1974'} | null |
GHSA | GHSA-mx3r-w3pj-7wv7 | Command injection in wc-cmd | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | {'CVE-2020-28431'} | 2021-03-23T21:27:50Z | 2021-03-19T21:10:30Z | CRITICAL | 9.8 | {'CWE-77'} | {'https://github.com/advisories/GHSA-mx3r-w3pj-7wv7', 'https://snyk.io/vuln/SNYK-JS-WCCMD-1050423', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28431'} | null |
GHSA | GHSA-pxq7-4ppw-qp7f | Directory Traversal in serverzyy | Affected versions of `serverzyy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16135'} | 2021-01-14T15:39:44Z | 2020-09-01T18:19:36Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/431', 'https://nodesecurity.io/advisories/431', 'https://github.com/advisories/GHSA-pxq7-4ppw-qp7f', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16135', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverzyy'} | null |
GHSA | GHSA-jj47-x69x-mxrm | Buffer Overflow in yajl-ruby | yajl-ruby is a streaming JSON parsing and encoding library for Ruby (C bindings to yajl) based on the YAJL library.
The 1.x branch and the 2.x branch of [yajl](https://github.com/lloyd/yajl) contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs.
### Details
The [reallocation logic at yajl_buf.c#L64](https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64) may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk.
These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer.
Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption.
### Impact
We rate this as a moderate severity vulnerability which mostly impacts process availability as we believe exploitation for arbitrary code execution to be unlikely.
### Patches
Patched in yajl-ruby 1.4.2
### Workarounds
Avoid passing large inputs to YAJL
### References
https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [yajl-ruby](https://github.com/brianmario/yajl-ruby/issues)
| {'CVE-2022-24795'} | 2022-04-06T21:08:35Z | 2022-04-05T15:55:51Z | MODERATE | 5.9 | {'CWE-122', 'CWE-190'} | {'https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24795', 'https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6', 'https://github.com/advisories/GHSA-jj47-x69x-mxrm', 'https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64'} | null |
GHSA | GHSA-f7gc-6hcj-wc42 | Malicious Package in path-to-regxep | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T21:03:56Z | 2020-09-03T17:05:06Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1401', 'https://github.com/advisories/GHSA-f7gc-6hcj-wc42'} | null |
GHSA | GHSA-7cqx-92hp-x6wh | Heap buffer overflow in `MaxPool3DGradGrad` | ### Impact
The implementation of `tf.raw_ops.MaxPool3DGradGrad` is vulnerable to a heap buffer overflow:
```python
import tensorflow as tf
values = [0.01] * 11
orig_input = tf.constant(values, shape=[11, 1, 1, 1, 1], dtype=tf.float32)
orig_output = tf.constant([0.01], shape=[1, 1, 1, 1, 1], dtype=tf.float32)
grad = tf.constant([0.01], shape=[1, 1, 1, 1, 1], dtype=tf.float32)
ksize = [1, 1, 1, 1, 1]
strides = [1, 1, 1, 1, 1]
padding = "SAME"
tf.raw_ops.MaxPool3DGradGrad(
orig_input=orig_input, orig_output=orig_output, grad=grad, ksize=ksize,
strides=strides, padding=padding)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/596c05a159b6fbb9e39ca10b3f7753b7244fa1e9/tensorflow/core/kernels/pooling_ops_3d.cc#L694-L696) does not check that the initialization of `Pool3dParameters` completes successfully:
```cc
Pool3dParameters params{context, ksize_, stride_,
padding_, data_format_, tensor_in.shape()};
```
Since [the constructor](https://github.com/tensorflow/tensorflow/blob/596c05a159b6fbb9e39ca10b3f7753b7244fa1e9/tensorflow/core/kernels/pooling_ops_3d.cc#L48-L88) uses `OP_REQUIRES` to validate conditions, the first assertion that fails interrupts the initialization of `params`, making it contain invalid data. In turn, this might cause a heap buffer overflow, depending on default initialized values.
### Patches
We have patched the issue in GitHub commit [63c6a29d0f2d692b247f7bf81f8732d6442fad09](https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29576'} | 2022-04-26T18:10:15Z | 2021-05-21T14:26:16Z | LOW | 2.5 | {'CWE-119', 'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29576', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7cqx-92hp-x6wh', 'https://github.com/advisories/GHSA-7cqx-92hp-x6wh', 'https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09'} | null |
GHSA | GHSA-h236-g5gh-vq6c | Cross-site scripting in Froala Editor | Froala Editor before 3.0.6 allows XSS. | {'CVE-2019-19935'} | 2022-02-10T23:33:00Z | 2022-02-10T23:32:51Z | MODERATE | 6.1 | {'CWE-79'} | {'https://blog.compass-security.com/2020/07/yet-another-froala-0-day-xss/', 'https://snyk.io/vuln/npm:froala-editor', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19935', 'http://packetstormsecurity.com/files/158300/Froala-WYSIWYG-HTML-Editor-3.1.1-Cross-Site-Scripting.html', 'https://github.com/advisories/GHSA-h236-g5gh-vq6c', 'https://github.com/froala/wysiwyg-editor/compare/v3.0.5...v3.0.6', 'https://compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2020-004_DOM_XSS_in_Froala_WYSIWYG_HTML_Editor.txt'} | null |
GHSA | GHSA-9f52-hpvw-v96w | Improper Validation of Specified Quantity in Input in Eclipse Hono | In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter to fail with an out of memory exception. | {'CVE-2020-27217'} | 2022-02-10T20:22:06Z | 2022-02-10T20:22:06Z | HIGH | 7.5 | {'CWE-1284'} | {'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567068', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27217', 'https://github.com/advisories/GHSA-9f52-hpvw-v96w'} | null |
GHSA | GHSA-fqw7-8v6m-2f86 | Malicious Package in hulp | All versions of `hulp` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T21:54:48Z | 2020-09-02T21:37:39Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/905', 'https://github.com/advisories/GHSA-fqw7-8v6m-2f86'} | null |
GHSA | GHSA-27p5-7cw6-m45h | Server-Side Request Forgery in unoconv | The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion. | {'CVE-2019-17400'} | 2021-08-18T22:00:22Z | 2019-10-24T20:46:54Z | HIGH | 7.5 | {'CWE-918'} | {'https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/', 'https://github.com/advisories/GHSA-27p5-7cw6-m45h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17400', 'https://github.com/unoconv/unoconv/pull/510'} | null |
GHSA | GHSA-fmf5-j5j9-99pp | OS Command Injection in pulverizr | pulverizr through 0.7.0 allows execution of arbitrary commands. Within "lib/job.js", the variable "filename" can be controlled by the attacker. This function uses the variable "filename" to construct the argument of the exec call without any sanitization. In order to successfully exploit this vulnerability, an attacker will need to create a new file with the same name as the attack command. | {'CVE-2020-7604'} | 2021-07-28T20:51:45Z | 2021-05-07T16:20:44Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/advisories/GHSA-fmf5-j5j9-99pp', 'https://snyk.io/vuln/SNYK-JS-PULVERIZR-560122', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7604'} | null |
GHSA | GHSA-947x-pv47-pp3q | Cross-site scripting in pywb | Webrecorder pywb before 2.6.0 allows XSS because it does not ensure that Jinja2 templates are autoescaped. | {'CVE-2021-39286'} | 2021-09-02T17:16:18Z | 2021-09-02T17:16:18Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-39286', 'https://github.com/webrecorder/pywb/commit/f7bd84cdacdd665ff73ae8d09a202f60be2ebae9', 'https://github.com/webrecorder/pywb/compare/v-2.5.0...v-2.6.0', 'https://github.com/advisories/GHSA-947x-pv47-pp3q'} | null |
GHSA | GHSA-q8xj-8xg3-w432 | Moderate severity vulnerability that affects io.spray:spray-json_2.10, io.spray:spray-json_2.11, and io.spray:spray-json_2.12 | Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of many JSON object fields (with keys that have the same hash code). | {'CVE-2018-18854'} | 2021-09-16T19:41:26Z | 2018-11-09T17:41:35Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-18854', 'https://github.com/spray/spray-json/issues/277', 'https://github.com/advisories/GHSA-q8xj-8xg3-w432'} | null |
GHSA | GHSA-mfjm-vh54-3f96 | Cookie-setting is not restricted based on the public suffix list | ### Impact
Responses from domain names whose public domain name suffix contains 1 or more periods (e.g. responses from `example.co.uk`, given its public domain name suffix is `co.uk`) are able to set cookies that are included in requests to any other domain sharing the same domain name suffix.
### Patches
Upgrade to Scrapy 2.6.0, which restricts cookies with their domain set to any of those in the [public suffix list](https://publicsuffix.org/).
If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.6.0 is not an option, you may upgrade to Scrapy 1.8.2 instead.
### Workarounds
The only workaround for unpatched versions of Scrapy is to [disable cookies altogether](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#std-setting-COOKIES_ENABLED), or [limit target domains](https://docs.scrapy.org/en/latest/topics/spiders.html#scrapy.spiders.Spider.allowed_domains) to a subset that does not include domain names with one of the public domain suffixes affected (those with 1 or more periods).
### References
* https://publicsuffix.org/
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/scrapy/scrapy/issues)
* [Email us](mailto:opensource@zyte.com)
| null | 2022-03-02T14:52:47Z | 2022-03-01T22:13:28Z | MODERATE | 0 | null | {'https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a', 'https://github.com/advisories/GHSA-mfjm-vh54-3f96', 'https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96'} | null |
GHSA | GHSA-q43m-ffwr-rpcc | SSL Validation Defaults to False in electron-packager | Affected versions of `electron-packager` configure the generated application to disable SSL certificate verification by default.
This could allow an attacker with a privileged network position to launch a Man In The Middle (MITM) attack on the install process, intercepting the step where electron-packager downloads Electron for supported target platforms and architectures, and replacing the valid download with a tampered malicious one.
This only affects users using the electron-packager CLI. The strict-ssl option defaults to true for the node.js API.
## Recommendation
1. Update to version 7.0.0 or later.
2. Delete the `electron-download` cache folder, which is by default located at `~/.electron`. | {'CVE-2016-10534'} | 2021-01-08T18:18:08Z | 2019-02-18T23:58:24Z | LOW | 0 | {'CWE-295'} | {'https://github.com/electron-userland/electron-packager/issues/333', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10534', 'https://www.npmjs.com/advisories/104', 'https://github.com/advisories/GHSA-q43m-ffwr-rpcc', 'https://nodesecurity.io/advisories/104'} | null |
GHSA | GHSA-7q25-qrjw-6fg2 | Malicious package may avoid detection in python auditing | # Python Auditing Vulnerability
Demonstrates how a malicious package can insert a load-time poison pill to avoid detection by tools like Safety.
Tools that are designed to find vulnerable packages can not ever run in the same python environment that they are trying to protect.
## Usage
Install `safety`, `insecure-package`, and this package with pip in the same python environment. Order doesn&#39;t matter.
1. pip install safety
2. pip install insecure-package
3. pip install dist/malicious-0.1-py3-none-any.whl
Run the check
4. `safety check`
You should see both `Running my modified safety.check` and that `insecure-package` is not listed in the results!
## How it Works
Everything in Python is mutable. The trick is getting some code to run at interpreter load time in order to do some patching.
1. When you install this package, the `setup.py` settings installs a `malicious.pth` file to your `site-packages` directory.
2. The `malicious.pth` file gets loaded anytime Python starts, which in turn imports our `malicious` package.
3. The `malicious/__init__.py` patches the safety library with a custom function to avoid detection. | {'CVE-2020-5252'} | 2022-05-09T22:09:20Z | 2020-03-24T15:07:56Z | MODERATE | 5 | {'CWE-807'} | {'https://pyup.io/posts/patched-vulnerability/', 'https://github.com/pyupio/safety/security/advisories/GHSA-7q25-qrjw-6fg2', 'https://mulch.dev/blog/CVE-2020-5252-python-safety-vuln/', 'https://github.com/akoumjian/python-safety-vuln', 'https://github.com/advisories/GHSA-7q25-qrjw-6fg2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5252'} | null |
GHSA | GHSA-57cf-349j-352g | Out-of-bounds Read in npmconf | Versions of `npmconf` before 2.1.3 allocate and write to disk uninitialized memory contents when a typed number is passed as input on Node.js 4.x.
## Recommendation
Update to version 2.1.3 or later. Consider switching to another config storage mechanism, as npmconf is deprecated and should not be used. | null | 2021-08-04T21:14:25Z | 2019-06-12T16:37:00Z | MODERATE | 0 | {'CWE-125'} | {'https://github.com/advisories/GHSA-57cf-349j-352g', 'https://hackerone.com/reports/320269', 'https://nodesecurity.io/advisories/653', 'https://www.npmjs.com/advisories/653'} | null |
GHSA | GHSA-rjww-2x8v-m9v9 | Potential sensitive data exposure in applications using Vaadin 15 | Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController`
- https://vaadin.com/security/cve-2020-36319 | {'CVE-2020-36319'} | 2022-04-19T19:02:54Z | 2021-04-19T14:52:14Z | LOW | 3.1 | {'CWE-200'} | {'https://github.com/vaadin/flow/pull/8016', 'https://github.com/advisories/GHSA-rjww-2x8v-m9v9', 'https://vaadin.com/security/cve-2020-36319', 'https://github.com/vaadin/flow/security/advisories/GHSA-rjww-2x8v-m9v9', 'https://github.com/vaadin/flow/pull/8051', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36319'} | null |
GHSA | GHSA-vjvw-wcmw-pr26 | Insufficient Entropy in parsel | All versions of `parsel` use an insecure key derivation function. The package runs keys of arbitrary lengths through one round of SHA256 hashing for key stretching. This allows for the use of keys of insufficient entropy with inappropriate key stretching.
## Recommendation
The package is deprecated and will not be updated. Consider using an alternative package. | null | 2021-10-04T20:51:58Z | 2020-09-04T17:37:08Z | CRITICAL | 0 | {'CWE-331'} | {'https://www.npmjs.com/advisories/1462', 'https://github.com/advisories/GHSA-vjvw-wcmw-pr26'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.