ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-jwqp-28gf-p498
HTTP authentication credentials potentially leaked to target websites
### Impact If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. ### Patches Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. ### Workarounds If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the [`w3lib.http.basic_auth_header`](https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header) function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy/scrapy/issues) * [Email us](mailto:opensource@zyte.com)
{'CVE-2021-41125'}
2022-04-25T23:42:17Z
2021-10-06T17:46:22Z
MODERATE
5.7
{'CWE-200', 'CWE-522'}
{'http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41125', 'https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498', 'https://github.com/advisories/GHSA-jwqp-28gf-p498', 'https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header', 'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html'}
null
GHSA
GHSA-j42v-6wpm-r847
Data races in thex
An issue was discovered in the thex crate through 2020-12-08 for Rust. Thex<T> allows cross-thread data races of non-Send types.
{'CVE-2020-35927'}
2021-08-25T20:50:26Z
2021-08-25T20:50:26Z
MODERATE
5.5
{'CWE-662'}
{'https://github.com/advisories/GHSA-j42v-6wpm-r847', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35927', 'https://rustsec.org/advisories/RUSTSEC-2020-0090.html'}
null
GHSA
GHSA-pr9q-v585-qv2w
Improper Privilege Management in Open Web Analytics
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
{'CVE-2022-24637'}
2022-04-05T20:52:09Z
2022-03-19T00:01:00Z
CRITICAL
9.8
{'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24637', 'https://github.com/advisories/GHSA-pr9q-v585-qv2w', 'https://devel0pment.de/?p=2494', 'https://github.com/Open-Web-Analytics/Open-Web-Analytics/releases/tag/1.7.4'}
null
GHSA
GHSA-7423-5qfm-g648
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0916'}
2021-03-29T21:00:09Z
2021-03-29T21:00:09Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/advisories/GHSA-7423-5qfm-g648', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0916', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0916'}
null
GHSA
GHSA-v94v-pxqp-5qgj
Cross-site Scripting in ShowDoc
The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting.
{'CVE-2022-0950'}
2022-03-29T21:28:09Z
2022-03-16T00:00:48Z
MODERATE
5.4
{'CWE-434', 'CWE-79'}
{'https://github.com/advisories/GHSA-v94v-pxqp-5qgj', 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950', 'https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc'}
null
GHSA
GHSA-rqf8-8c89-mw29
Cross-site Scripting in curly-bracket-parser
This affects all versions of package curly-bracket-parser. When used as a template library, it does not properly sanitize the user input.
{'CVE-2021-23416'}
2021-08-31T21:14:25Z
2021-08-10T16:08:16Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23416', 'https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js#23L31', 'https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js%23L31', 'https://github.com/advisories/GHSA-rqf8-8c89-mw29', 'https://snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106'}
null
GHSA
GHSA-9frq-f867-hgqc
Directory Traversal in fast-http-cli
`fast-http-cli` is the command line interface for `fast-http`, a simple web server. `fast-http-cli` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Example Request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host: localhost ``` and server Response: ``` HTTP/1.1 200 OK Date: Thu, 04 May 2017 23:59:18 GMT Connection: keep-alive Transfer-Encoding: chunked {contents of /etc/passwd} ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16155'}
2021-01-08T19:04:10Z
2018-07-23T20:46:25Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/383', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/fast-http-cli', 'https://github.com/advisories/GHSA-9frq-f867-hgqc', 'https://nodesecurity.io/advisories/383', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16155'}
null
GHSA
GHSA-jmgg-wx67-7qfv
Command Injection in Centreon
Centreon before 19.04.15 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page.
{'CVE-2020-13252'}
2021-06-22T15:23:33Z
2021-06-22T15:23:33Z
HIGH
8.8
{'CWE-78'}
{'https://github.com/centreon/centreon/pull/8467', 'https://github.com/advisories/GHSA-jmgg-wx67-7qfv', 'https://github.com/EnginDemirbilek/EnginDemirbilek.github.io/blob/master/centreon-19.10-rce.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13252', 'https://github.com/centreon/centreon/compare/19.04.13...19.04.15', 'https://engindemirbilek.github.io/centreon-19.10-rce'}
null
GHSA
GHSA-xcvv-84j5-jw9h
Prototype Pollution in assign-deep
Versions of `assign-deep` before 0.4.7 are vulnerable to prototype pollution via merging functions. ## Recommendation Update to version 0.4.7 or later.
{'CVE-2018-3720'}
2021-01-08T00:07:35Z
2018-07-26T15:12:31Z
LOW
0
{'CWE-471'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3720', 'https://github.com/advisories/GHSA-xcvv-84j5-jw9h', 'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11', 'https://www.npmjs.com/advisories/579', 'https://hackerone.com/reports/310707'}
null
GHSA
GHSA-c94v-8fff-73ph
Command Injection in @theia/messages
In Eclipse Theia versions up to and including 0.16.0, in the notification messages there is no HTML escaping, so Javascript code can run.
{'CVE-2021-28162'}
2021-05-10T15:36:56Z
2021-05-10T15:36:55Z
MODERATE
6.1
{'CWE-829'}
{'https://github.com/eclipse-theia/theia/issues/7283', 'https://github.com/eclipse-theia/theia/blob/master/CHANGELOG.md#v100---26032020', 'https://github.com/advisories/GHSA-c94v-8fff-73ph', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28162', 'https://github.com/eclipse-theia/theia/pull/7289'}
null
GHSA
GHSA-x5f3-qmwj-4f84
Authentication bypass by capture-replay in github.com/cosmos/ethermint
Cosmos Network Ethermint <= v0.4.0 is affected by a cross-chain transaction replay vulnerability in the EVM module. Since ethermint uses the same chainIDEpoch and signature schemes with ethereum for compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, which enables "cross-chain transaction replay" attack.
{'CVE-2021-25835'}
2022-04-12T22:56:46Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-294', 'CWE-295'}
{'https://github.com/cosmos/ethermint/pull/692', 'https://github.com/cosmos/ethermint/releases/tag/v0.4.1', 'https://github.com/cosmos/ethermint/issues/687', 'https://github.com/advisories/GHSA-x5f3-qmwj-4f84', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25835'}
null
GHSA
GHSA-49vv-6q7q-w5cf
OS Command Injection in Strapi
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
{'CVE-2019-19609'}
2021-12-10T17:22:12Z
2021-12-10T17:22:12Z
HIGH
7.2
{'CWE-20', 'CWE-78'}
{'https://github.com/strapi/strapi/pull/4636', 'https://bittherapy.net/post/strapi-framework-remote-code-execution/', 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19609', 'https://github.com/advisories/GHSA-49vv-6q7q-w5cf', 'http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html'}
null
GHSA
GHSA-j8cx-j9j2-f29w
Insecure Storage of Sensitive Information in Microweber
Microweber prior to version 1.3 does not strip images of EXIF data, exposing information about users' locations, device hardware, and device software.
{'CVE-2022-0724'}
2022-02-26T01:18:37Z
2022-02-24T00:00:53Z
HIGH
0
{'CWE-922'}
{'https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062', 'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0724', 'https://github.com/advisories/GHSA-j8cx-j9j2-f29w'}
null
GHSA
GHSA-76wm-422q-92mq
Code injection in RubyGems
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.
{'CVE-2019-8324'}
2021-08-17T13:42:06Z
2019-06-20T16:06:11Z
HIGH
8.8
{'CWE-94'}
{'https://github.com/advisories/GHSA-76wm-422q-92mq', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8324', 'https://access.redhat.com/errata/RHSA-2019:1972', 'https://hackerone.com/reports/328571'}
null
GHSA
GHSA-c7pp-g2v2-2766
DOM-based XSS in gmail-js
Affected versions of `gmail-js` are vulnerable to cross-site scripting in the `tools.parse_response`, `helper.get.visible_emails_post`, and `helper.get.email_data_post` functions, which pass user input directly into the Function constructor. ## Recommendation Update to version 0.6.5 or later.
{'CVE-2016-1000228'}
2021-09-23T21:31:56Z
2020-09-01T15:32:04Z
HIGH
0
{'CWE-79'}
{'https://github.com/KartikTalwar/gmail.js/issues/281', 'https://www.npmjs.com/advisories/125', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000228', 'https://github.com/advisories/GHSA-c7pp-g2v2-2766', 'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'}
null
GHSA
GHSA-5429-pjww-7675
SQL Injection in Apache Kylin
Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions.
{'CVE-2021-36774'}
2022-01-14T19:39:55Z
2022-01-08T00:43:04Z
MODERATE
0
{'CWE-89', 'CWE-668'}
{'https://github.com/advisories/GHSA-5429-pjww-7675', 'https://lists.apache.org/thread/lchpcvoolc6w8zc6vo1wstk8zbfqv2ow', 'http://www.openwall.com/lists/oss-security/2022/01/06/5', 'https://github.com/apache/kylin/pull/1646', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36774'}
null
GHSA
GHSA-ffq8-576r-v26g
High severity vulnerability that affects hpack
A HTTP/2 implementation built using any version of the Python HPACK library between v1.0.0 and v2.2.0 could be targeted for a denial of service attack, specifically a so-called "HPACK Bomb" attack. This attack occurs when an attacker inserts a header field that is exactly the size of the HPACK dynamic header table into the dynamic header table. The attacker can then send a header block that is simply repeated requests to expand that field in the dynamic table. This can lead to a gigantic compression ratio of 4,096 or better, meaning that 16kB of data can decompress to 64MB of data on the target machine.
{'CVE-2016-6581'}
2021-09-10T18:12:06Z
2019-07-05T21:11:05Z
HIGH
7.5
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-6581', 'https://github.com/advisories/GHSA-ffq8-576r-v26g', 'https://python-hyper.org/hpack/en/latest/security/CVE-2016-6581.html', 'http://www.securityfocus.com/bid/92315'}
null
GHSA
GHSA-m9w8-v359-9ffr
Moderate severity vulnerability that affects org.apache.activemq:activemq-client
TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.
{'CVE-2018-11775'}
2021-09-15T18:49:02Z
2018-10-19T16:42:27Z
HIGH
7.4
{'CWE-295'}
{'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11775', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securitytracker.com/id/1041618', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-m9w8-v359-9ffr', 'http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt', 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html', 'http://www.securityfocus.com/bid/105335', 'https://access.redhat.com/errata/RHSA-2019:3892'}
null
GHSA
GHSA-f92j-qf46-p6vm
Reflected Cross-site Scripting in ACS Commons
### Impact ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful. ### Patches This issue has been resolved in v4.10.0 ### Workarounds No workaround exist. ### References N/A ### For more information If you have any questions or comments about this advisory open an issue in acs-aem-commons. ### Credit This issue was discovered and reported by Christopher Whipp (Christopher.Whipp@servicesaustralia.gov.au).
{'CVE-2021-21028'}
2021-02-12T18:04:29Z
2021-02-02T15:46:52Z
HIGH
0
{'CWE-416', 'CWE-79'}
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6', 'https://helpx.adobe.com/security/products/acrobat/apsb21-09.html', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://github.com/advisories/GHSA-f92j-qf46-p6vm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21028'}
null
GHSA
GHSA-qhxx-j73r-qpm2
Uninitialized memory access in TensorFlow
### Impact Under certain cases, a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to [default initialize the quantized floating point types in Eigen](https://github.com/tensorflow/tensorflow/blob/f70160322a579144950dff1537dcbe3c7c09d6f5/third_party/eigen3/unsupported/Eigen/CXX11/src/FixedPoint/FixedPointTypes.h#L61-L104): ```cc struct QUInt8 { QUInt8() {} // ... uint8_t value; }; struct QInt16 { QInt16() {} // ... int16_t value; }; struct QUInt16 { QUInt16() {} // ... uint16_t value; }; struct QInt32 { QInt32() {} // ... int32_t value; }; ``` ### Patches We have patched the issue in GitHub commit [ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2](https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2020-26266'}
2021-01-07T22:36:21Z
2020-12-10T19:07:24Z
LOW
4.4
{'CWE-908'}
{'https://github.com/tensorflow/tensorflow/commit/ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2', 'https://github.com/advisories/GHSA-qhxx-j73r-qpm2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26266', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qhxx-j73r-qpm2'}
null
GHSA
GHSA-7hp2-xwpj-95jq
Nokogiri, dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash)
dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the "<!DOCTYPE html" substring in a crafted HTML document.
{'CVE-2015-8806'}
2022-04-26T18:31:54Z
2018-09-17T21:53:42Z
HIGH
7.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-7hp2-xwpj-95jq', 'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html', 'https://bugzilla.gnome.org/show_bug.cgi?id=749115', 'http://www.openwall.com/lists/oss-security/2016/02/03/5', 'https://www.debian.org/security/2016/dsa-3593', 'http://www.securityfocus.com/bid/82071', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8806', 'http://www.ubuntu.com/usn/USN-2994-1', 'https://security.gentoo.org/glsa/201701-37'}
null
GHSA
GHSA-65m9-m259-7jqw
Improper Authorization in react-oauth-flow
All versions of `react-oauth-flow` fail to properly implement the OAuth protocol. The package stores secrets in the front-end code. Instead of using a public OAuth client, it uses a confidential client on the browser. This may allow attackers to compromise server credentials. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-10-04T21:06:14Z
2020-09-03T15:49:29Z
CRITICAL
0
{'CWE-285'}
{'https://www.npmjs.com/advisories/1487', 'https://github.com/advisories/GHSA-65m9-m259-7jqw', 'https://github.com/ethereum/web3.js/issues/2739'}
null
GHSA
GHSA-3q9x-w53p-jg53
OS Command Injection in heroku-addonpool
heroku-addonpool through 0.1.15 is vulnerable to Command Injection.
{'CVE-2020-7634'}
2021-12-09T19:52:03Z
2021-12-09T19:52:03Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/nodef/heroku-addonpool/blob/master/index.js', 'https://github.com/advisories/GHSA-3q9x-w53p-jg53', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7634', 'https://snyk.io/vuln/SNYK-JS-HEROKUADDONPOOL-564428'}
null
GHSA
GHSA-gr58-j5wh-m333
Prototype Pollution in nis-utils
All versions of package nis-utils up to and including 0.6.10 are vulnerable to Prototype Pollution via the setValue function.
{'CVE-2020-7703'}
2021-07-29T21:54:09Z
2021-05-06T17:29:08Z
CRITICAL
9.8
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-NISUTILS-598799', 'https://github.com/advisories/GHSA-gr58-j5wh-m333', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7703'}
null
GHSA
GHSA-4cpg-3vgw-4877
Prototype pollution in Plist
Prototype pollution vulnerability via `.parse()` in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
{'CVE-2022-22912'}
2022-03-26T00:39:16Z
2022-02-18T00:00:33Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52', 'https://github.com/TooTallNate/plist.js/pull/118', 'https://github.com/TooTallNate/plist.js/issues/114', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22912', 'https://github.com/advisories/GHSA-4cpg-3vgw-4877'}
null
GHSA
GHSA-9hx4-qm7h-x84j
Cross-site Scripting in Gogs
Cross-site scripting (XSS) vulnerability in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.8 allows remote attackers to inject arbitrary web script or HTML via the text parameter to api/v1/markdown.
{'CVE-2014-8683'}
2021-06-29T18:32:53Z
2021-06-29T18:32:53Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-8683', 'https://seclists.org/fulldisclosure/2014/Nov/31', 'https://www.securityfocus.com/archive/1/533996/100/0/threaded', 'https://github.com/advisories/GHSA-9hx4-qm7h-x84j', 'https://gogs.io/docs/intro/change_log.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98693', 'https://github.com/gogits/gogs/releases/tag/v0.5.8', 'https://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html', 'https://seclists.org/fulldisclosure/2014/Nov/34', 'https://github.com/gogits/gogs/commit/3abc41cccab2486012b46305827433ad6f5deade'}
null
GHSA
GHSA-36r8-9qq7-mh43
Malicious Package in we3b
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T19:09:45Z
2020-09-03T17:02:40Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1415', 'https://github.com/advisories/GHSA-36r8-9qq7-mh43'}
null
GHSA
GHSA-2hwx-mjrm-v3g8
Denial of service attack via .well-known lookups
### Impact A malicious homeserver could redirect requests to their .well-known file to a large file. This can lead to a denial of service attack where homeservers will consume significantly more resources when requesting the .well-known file of a malicious homeserver. This affects any server which accepts federation requests from untrusted servers. ### Patches Issue is resolved by #8950. A bug not affecting the security aspects of this was fixed in #9108. ### Workarounds The `federation_domain_whitelist` setting can be used to restrict the homeservers communicated with over federation.
{'CVE-2021-21274'}
2022-04-19T19:02:47Z
2021-03-01T19:34:54Z
MODERATE
4.3
{'CWE-400'}
{'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-2hwx-mjrm-v3g8', 'https://github.com/advisories/GHSA-2hwx-mjrm-v3g8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21274', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/pull/8950', 'https://github.com/matrix-org/synapse/releases/tag/v1.25.0'}
null
GHSA
GHSA-mp28-rq7g-qx62
Remote code execution in Apache TomEE
If Apache TomEE 8.0.0-M1 - 8.0.3, 7.1.0 - 7.1.3, 7.0.0-M1 - 7.0.8, 1.0.0 - 1.7.5 is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port 1099, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management interface, however the incomplete fix did not cover this edge case.
{'CVE-2020-13931'}
2022-02-09T22:44:38Z
2022-02-09T22:44:38Z
CRITICAL
9.8
{'CWE-306'}
{'https://lists.apache.org/thread.html/r7f98907165b355dc65f28a57f15103a06173ce03261115fa46d569b4@%3Cdev.tomee.apache.org%3E', 'https://github.com/advisories/GHSA-mp28-rq7g-qx62', 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe%40%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13931'}
null
GHSA
GHSA-8w4h-3cm3-2pm2
Out-of-bounds Read in atob
Versions of `atob` before 2.1.0 uninitialized Buffers when number is passed in input on Node.js 4.x and below. ## Recommendation Update to version 2.1.0 or later.
{'CVE-2018-3745'}
2021-01-08T20:56:48Z
2018-10-09T00:56:26Z
MODERATE
0
{'CWE-125'}
{'https://hackerone.com/reports/321686', 'https://github.com/advisories/GHSA-8w4h-3cm3-2pm2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3745', 'https://www.npmjs.com/advisories/646'}
null
GHSA
GHSA-qcjv-wfcg-mmpr
Critical severity vulnerability that affects org.apache.ignite:ignite-core
Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to GridClientJdkMarshaller deserialization endpoint.
{'CVE-2018-8018'}
2021-09-16T19:56:18Z
2018-10-16T20:53:54Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-8018', 'http://www.securityfocus.com/bid/104911', 'https://github.com/advisories/GHSA-qcjv-wfcg-mmpr', 'https://lists.apache.org/thread.html/e0fdf53114a321142ecfa5cfa17658090f0b4e1677de431e329b37ab@%3Cdev.ignite.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:3768'}
null
GHSA
GHSA-mf3v-f2qq-pf9g
Insufficient Session Expiration in Sylius
### Impact The reset password token was not set to null after the password was changed. This is causing behaviour in which the same token can be used several times, so it can result in a leak of the existing token and an unauthorised password change. ### Patches The issue is fixed in versions: 1.10.11, 1.11.2 and above ### Workarounds You have to overwrite your `Sylius\Bundle\ApiBundle\CommandHandler\ResetPasswordHandler` class using this code: ```php <?php declare(strict_types=1); namespace App\CommandHandler\Account; use Sylius\Bundle\ApiBundle\Command\Account\ResetPassword; use Sylius\Component\Core\Model\ShopUserInterface; use Sylius\Component\Resource\Metadata\MetadataInterface; use Sylius\Component\User\Repository\UserRepositoryInterface; use Sylius\Component\User\Security\PasswordUpdaterInterface; use Symfony\Component\Messenger\Handler\MessageHandlerInterface; use Webmozart\Assert\Assert; final class ResetPasswordHandler implements MessageHandlerInterface { private UserRepositoryInterface $userRepository; private MetadataInterface $metadata; private PasswordUpdaterInterface $passwordUpdater; public function __construct( UserRepositoryInterface $userRepository, MetadataInterface $metadata, PasswordUpdaterInterface $passwordUpdater ) { $this->userRepository = $userRepository; $this->metadata = $metadata; $this->passwordUpdater = $passwordUpdater; } public function __invoke(ResetPassword $command): void { /** @var ShopUserInterface|null $user */ $user = $this->userRepository->findOneBy(['passwordResetToken' => $command->resetPasswordToken]); Assert::notNull($user, 'No user found with reset token: ' . $command->resetPasswordToken); $resetting = $this->metadata->getParameter('resetting'); $lifetime = new \DateInterval($resetting['token']['ttl']); if (!$user->isPasswordRequestNonExpired($lifetime)) { throw new \InvalidArgumentException('Password reset token has expired'); } if ($command->resetPasswordToken !== $user->getPasswordResetToken()) { throw new \InvalidArgumentException('Password reset token does not match.'); } $user->setPlainPassword($command->newPassword); $this->passwordUpdater->updatePassword($user); $user->setPasswordResetToken(null); } } ``` And register it in container: ```yaml App\CommandHandler\Account\ResetPasswordHandler: arguments: - '@sylius.repository.shop_user' - !service class: Sylius\Component\Resource\Metadata\MetadataInterface factory: [ '@sylius.resource_registry', 'get' ] arguments: - 'sylius.shop_user' - '@sylius.security.password_updater' tags: - { name: messenger.message_handler, bus: sylius.command_bus } - { name: messenger.message_handler, bus: sylius_default.bus } ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues) * Email us at [security@sylius.com](mailto:security@sylius.com)
{'CVE-2022-24743'}
2022-03-18T13:11:57Z
2022-03-14T22:30:46Z
HIGH
7.1
{'CWE-613'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24743', 'https://github.com/advisories/GHSA-mf3v-f2qq-pf9g', 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-mf3v-f2qq-pf9g', 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2'}
null
GHSA
GHSA-q7rv-6hp3-vh96
Improper Input Validation in guzzlehttp/psr7
### Impact In proper header parsing. An attacker could sneak in a new line character and pass untrusted values. ### Patches The issue is patched in 1.8.4 and 2.1.1 ### Workarounds There are no known workarounds.
{'CVE-2022-24775'}
2022-03-29T21:58:29Z
2022-03-25T19:26:33Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-q7rv-6hp3-vh96', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24775', 'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96', 'https://www.drupal.org/sa-core-2022-006', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc', 'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1'}
null
GHSA
GHSA-2v78-j59h-fmpf
Heap overflow or corruption in safe-transmute
An issue was discovered in the safe-transmute crate before 0.10.1 for Rust. A constructor's arguments are in the wrong order, causing heap memory corruption.
{'CVE-2018-21000'}
2021-08-25T20:43:23Z
2021-08-25T20:43:23Z
CRITICAL
9.8
{'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-21000', 'https://rustsec.org/advisories/RUSTSEC-2018-0013.html', 'https://github.com/advisories/GHSA-2v78-j59h-fmpf', 'https://github.com/nabijaczleweli/safe-transmute-rs/pull/36'}
null
GHSA
GHSA-h6w6-xmqv-7q78
High severity vulnerability that affects activerecord
Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name.
{'CVE-2011-2930'}
2021-09-14T15:35:28Z
2017-10-24T18:33:38Z
HIGH
0
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2011-2930', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://www.debian.org/security/2011/dsa-2301', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://github.com/advisories/GHSA-h6w6-xmqv-7q78', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://bugzilla.redhat.com/show_bug.cgi?id=731438', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain'}
null
GHSA
GHSA-2x7h-96h5-rq84
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins with the destination directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 contains a patch for this vulnerability.
{'CVE-2021-32841'}
2022-02-08T19:44:46Z
2022-02-01T16:22:57Z
MODERATE
4
{'CWE-22'}
{'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32841', 'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://github.com/advisories/GHSA-2x7h-96h5-rq84'}
null
GHSA
GHSA-pvgf-mrr4-cw7r
Cross-Site Request Forgery in ForkCMS
Multiple cross-site request forgery (CSRF) vulnerabilities in the Admin Console in Fork before 5.8.3 allows remote attackers to perform unauthorized actions as administrator to (1) approve the mass of the user's comments, (2) restoring a deleted user, (3) installing or running modules, (4) resetting the analytics, (5) pinging the mailmotor api, (6) uploading things to the media library, (7) exporting locale.
{'CVE-2020-23960'}
2021-05-06T18:53:09Z
2021-05-06T18:53:09Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-23960', 'https://github.com/advisories/GHSA-pvgf-mrr4-cw7r', 'https://github.com/forkcms/forkcms/pull/3123', 'https://www.fork-cms.com/blog/detail/fork-5.8.3-released'}
null
GHSA
GHSA-8mr5-h28g-36qx
Moderate severity vulnerability that affects org.apache.struts:struts2-core
When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33.
{'CVE-2017-9787'}
2021-09-07T20:21:27Z
2018-10-16T19:37:07Z
HIGH
7.5
null
{'https://github.com/advisories/GHSA-8mr5-h28g-36qx', 'http://www.securityfocus.com/bid/99562', 'https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d@%3Cannouncements.struts.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'http://www.securitytracker.com/id/1039115', 'https://lists.apache.org/thread.html/de3d325f0433cd3b42258b6a302c0d7a72b69eedc1480ed561d3b065@%3Cannouncements.struts.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20180706-0002/', 'http://struts.apache.org/docs/s2-049.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9787'}
null
GHSA
GHSA-7r94-xv9v-63jw
A use of uninitialized value vulnerability in Tensorflow
### Impact TensorFlow's Grappler optimizer has a [use of unitialized variable](https://github.com/tensorflow/tensorflow/blob/3457a2b122e50b4d44ceaaed5a663d635e5c22df/tensorflow/core/grappler/optimizers/auto_parallel.cc#L155-L164): ```cc const NodeDef* dequeue_node; for (const auto& train_node : train_nodes) { if (IsDequeueOp(*train_node)) { dequeue_node = train_node; break; } } if (dequeue_node) { ... } ``` If the `train_nodes` vector (obtained from the saved model that gets optimized) does not contain a `Dequeue` node, then `dequeue_node` is left unitialized. ### Patches We have patched the issue in GitHub commit [68867bf01239d9e1048f98cbad185bf4761bedd3](https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Qian Feng from Baidu Security Team.
{'CVE-2021-41225'}
2021-11-10T18:44:11Z
2021-11-10T18:44:11Z
MODERATE
5.5
{'CWE-908'}
{'https://github.com/advisories/GHSA-7r94-xv9v-63jw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41225', 'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw'}
null
GHSA
GHSA-fxwv-953p-7qpf
Phusion Passenger allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header
agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.
{'CVE-2015-7519'}
2022-04-26T18:27:08Z
2018-10-10T17:29:13Z
LOW
3.7
{'CWE-20'}
{'https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e', 'https://bugzilla.suse.com/show_bug.cgi?id=956281', 'https://blog.phusion.nl/2015/12/07/cve-2015-7519/', 'http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00024.html', 'https://puppet.com/security/cve/passenger-dec-2015-security-fixes', 'http://www.openwall.com/lists/oss-security/2015/12/07/2', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7519', 'http://www.openwall.com/lists/oss-security/2015/12/07/1', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00007.html', 'https://github.com/advisories/GHSA-fxwv-953p-7qpf'}
null
GHSA
GHSA-8r6h-7x9g-xmw9
Moderate severity vulnerability that affects will_paginate
Cross-site scripting (XSS) vulnerability in the will_paginate gem before 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via vectors involving generated pagination links.
{'CVE-2013-6459'}
2021-09-07T20:30:58Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-79'}
{'https://github.com/mislav/will_paginate/releases/tag/v3.0.5', 'http://www.securityfocus.com/bid/64509', 'https://github.com/advisories/GHSA-8r6h-7x9g-xmw9', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6459', 'http://secunia.com/advisories/56180', 'https://access.redhat.com/errata/RHSA-2018:0336'}
null
GHSA
GHSA-mg69-6j3m-jvgw
HTML Injection in marky-markdown
All versions of `marky-markdown` are vulnerable to HTML Injection. The package fails to sanitize `style` attributes in `img` tags of the markdown input. This may allow attackers to affect the size of images in the rendered HTML. ## Recommendation This package is no longer maintained. Please upgrade to `@npmcorp/marky-markdown`
null
2021-10-04T20:56:43Z
2020-09-03T15:45:08Z
HIGH
7.3
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-MARKYMARKDOWN-548871', 'https://github.com/npm/marky-markdown', 'https://github.com/advisories/GHSA-mg69-6j3m-jvgw', 'https://www.npmjs.com/advisories/1470'}
null
GHSA
GHSA-p8ww-vv84-c2rm
Moderate severity vulnerability that affects com.orientechnologies:orientdb-studio
The JSONP endpoint in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict callback values, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted HTTP request.
{'CVE-2015-2912'}
2021-09-16T16:14:55Z
2018-10-18T17:41:13Z
HIGH
8.8
{'CWE-352'}
{'https://www.kb.cert.org/vuls/id/845332', 'https://github.com/advisories/GHSA-p8ww-vv84-c2rm', 'https://github.com/orientechnologies/orientdb/issues/4824', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2912'}
null
GHSA
GHSA-4mq5-mj59-qq9c
Allocation of Resources Without Limits or Throttling in Apache Tika
In Apache Tika 1.19 to 1.21, a carefully crafted 2003ml or 2006ml file could consume all available SAXParsers in the pool and lead to very long hangs. Apache Tika users should upgrade to 1.22 or later.
{'CVE-2019-10093'}
2021-05-05T22:55:28Z
2019-08-06T01:43:38Z
MODERATE
6.5
{'CWE-770'}
{'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10093', 'https://lists.apache.org/thread.html/a5a44eff1b9eda3bc69d22943a1030c43d376380c75d3ab04d0c1a21@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190828-0004/', 'https://github.com/advisories/GHSA-4mq5-mj59-qq9c'}
null
GHSA
GHSA-vq2r-5xvm-3hc3
Segfault in `CTCBeamSearchDecoder`
### Impact Due to lack of validation in `tf.raw_ops.CTCBeamSearchDecoder`, an attacker can trigger denial of service via segmentation faults: ```python import tensorflow as tf inputs = tf.constant([], shape=[18, 8, 0], dtype=tf.float32) sequence_length = tf.constant([11, -43, -92, 11, -89, -83, -35, -100], shape=[8], dtype=tf.int32) beam_width = 10 top_paths = 3 merge_repeated = True tf.raw_ops.CTCBeamSearchDecoder( inputs=inputs, sequence_length=sequence_length, beam_width=beam_width, top_paths=top_paths, merge_repeated=merge_repeated) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7/tensorflow/core/kernels/ctc_decoder_ops.cc#L68-L79) fails to detect cases when the input tensor is empty and proceeds to read data from a null buffer. ### Patches We have patched the issue in GitHub commit [b1b323042264740c398140da32e93fb9c2c9f33e](https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29581'}
2021-05-21T14:26:30Z
2021-05-21T14:26:30Z
LOW
2.5
{'CWE-908'}
{'https://github.com/tensorflow/tensorflow/commit/b1b323042264740c398140da32e93fb9c2c9f33e', 'https://github.com/advisories/GHSA-vq2r-5xvm-3hc3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29581', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq2r-5xvm-3hc3'}
null
GHSA
GHSA-hq5m-mqmx-fw6m
Privilege escalation via form generator
### Impact It is possible for untrusted users to gain administrator rights with the form generator. Installations are only affected if there are untrusted back end users with access to the form generator. ### Patches Update to Contao 4.4.56, 4.9.18 or 4.11.7. ### Workarounds Disable the form generator or disable the login for untrusted back end users. ### References https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
{'CVE-2021-37627'}
2022-04-19T19:03:05Z
2021-08-23T19:41:22Z
HIGH
8
{'CWE-269'}
{'https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m', 'https://github.com/advisories/GHSA-hq5m-mqmx-fw6m', 'https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37627'}
null
GHSA
GHSA-c9g6-9335-x697
Improper Input Validation in SocksJS-Node
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
{'CVE-2020-7693'}
2021-04-20T15:25:19Z
2021-04-13T15:27:51Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/andsnw/sockjs-dos-py', 'https://www.npmjs.com/package/sockjs', 'https://github.com/advisories/GHSA-c9g6-9335-x697', 'https://github.com/sockjs/sockjs-node/issues/252', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448', 'https://github.com/sockjs/sockjs-node/pull/265', 'https://snyk.io/vuln/SNYK-JS-SOCKJS-575261', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7693', 'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16'}
null
GHSA
GHSA-7qw5-pqhc-xm4g
Users with SCRIPT right can execute arbitrary code in XWiki
### Impact Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. ### Patches It has been patched in both version XWiki 12.2.1 and XWiki 11.10.5. ### Workarounds The only workaround is to give SCRIPT right only to trusted users. ### References https://jira.xwiki.org/browse/XWIKI-17141 https://jira.xwiki.org/browse/XWIKI-17266 It's been reported by the GitHub Security Lab under #GHSL-2020-046. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
{'CVE-2020-15171'}
2021-11-19T15:29:44Z
2020-09-10T19:19:27Z
LOW
6.6
{'CWE-94', 'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15171', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7qw5-pqhc-xm4g', 'https://github.com/advisories/GHSA-7qw5-pqhc-xm4g'}
null
GHSA
GHSA-pg53-56cg-4m8q
Token verification bug in next-auth
### Impact Implementations using the **Prisma database adapter** with the **Email provider** **are impacted**. Implementations using the Prisma database adapter that are not using the Email provider are not impacted. Implementations using the default database adapter (TypeORM) with the Email provider are not impacted. Implementations not using a database are not impacted. ### Patches This issue is fixed in 3.3.0 and newer versions. ### Workarounds Those not able to upgrade can alternatively disable the Email provider as a workaround. ### Description The Prisma database adapter was checking the verification token but not the identifier (the email address associated with the token). This made it possible to use a valid token assigned to one user, to sign in as another user when using the Prima adapter in conjunction with the Email provider. The defect is specific to the community-supported Prisma database adapter in versions <3.3.0 and is not present in the default database adapter (TypeORM). *Note: The current community-supported adapter was not developed by Prisma.* The defect was a problem in the implementation of verification function the adapter and is not directly related to Prisma. The flaw may exist in other third party database adapters that do not check both the identifier and token values. The design of the database adapter API may be revised in future to help reduce the likelyhood of similar defects. ### Timeline On Monday (2021-02-08) we were notified via responsible disclosure by Alessandro Angelino (@AlessandroA) of a flaw in the implementation of the Prisma database adapter included with NextAuth.js. A detailed write up and proof of concept were provided. The following day (2021-02-09) we published a fix in v3.3.0 and confirmed through internal testing, and with Alessandro, that the issue was resolved in the new release and prompted users to upgrade. On 2021-02-10 we received a CVE ID and published this advisory within a few hours of notification. We would like to thank Alessandro for using responsible disclose to allow us to address the issue promptly and publish this advisory once an update was available that resolved the issue and Balázs Orbán (@balazsorban44) for facilitating a timely release of the fix.
{'CVE-2021-21310'}
2022-04-19T19:02:47Z
2021-02-11T21:36:24Z
LOW
0
{'CWE-290'}
{'https://github.com/advisories/GHSA-pg53-56cg-4m8q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21310', 'https://github.com/nextauthjs/next-auth/releases/tag/v3.3.0', 'https://www.npmjs.com/package/next-auth', 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pg53-56cg-4m8q'}
null
GHSA
GHSA-qwh6-xwj4-9cjg
Remote code execution in net.mingsoft:ms-mcms
net.mingsoft:ms-mcms <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successful attacks of this vulnerability can result in takeover of MCMS.
{'CVE-2021-46384'}
2022-03-17T21:36:18Z
2022-03-05T00:00:41Z
CRITICAL
9.8
{'CWE-287'}
{'https://gitee.com/mingSoft/MCMS/issues/I4QZ1O', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46384', 'https://github.com/advisories/GHSA-qwh6-xwj4-9cjg'}
null
GHSA
GHSA-pwhf-39xg-4rxw
Script injection
### Impact A malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same origin as the Backstage app or other backend plugins, this may give access to sensitive data. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. ### Patches The vulnerability is patched in the `0.6.4` release of `@backstage/techdocs-common`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
{'CVE-2021-32660'}
2021-06-21T22:43:31Z
2021-06-04T19:09:35Z
MODERATE
6.8
{'CWE-434', 'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32660', 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c', 'https://github.com/backstage/backstage/security/advisories/GHSA-pwhf-39xg-4rxw', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/advisories/GHSA-pwhf-39xg-4rxw'}
null
GHSA
GHSA-hxfw-jm98-v4mq
Divide By Zero in OpenCV.
An issue was discovered in OpenCV 4.1.0 (OpenCV-Python 4.1.0.25). There is a divide-by-zero error in cv::HOGDescriptor::getDescriptorSize in modules/objdetect/src/hog.cpp.
{'CVE-2019-15939'}
2021-11-18T15:27:50Z
2021-10-12T22:21:56Z
MODERATE
5.9
{'CWE-369'}
{'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15939', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/OpenCV/opencv/issues/15287', 'https://github.com/advisories/GHSA-hxfw-jm98-v4mq', 'https://github.com/opencv/opencv/pull/15382'}
null
GHSA
GHSA-36fm-v9wv-56jf
Cross-site Scripting in OpenCart
OpenCart 3.0.3.2 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section.
{'CVE-2020-10596'}
2021-05-06T18:54:04Z
2021-05-06T18:54:04Z
LOW
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-36fm-v9wv-56jf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10596', 'https://github.com/opencart/opencart/issues/7810', 'http://packetstormsecurity.com/files/157908/OpenCart-3.0.3.2-Cross-Site-Scripting.html'}
null
GHSA
GHSA-766v-7gjx-55hf
Malicious Package in js-shq3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:14:27Z
2020-09-03T23:08:34Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-766v-7gjx-55hf', 'https://www.npmjs.com/advisories/1289'}
null
GHSA
GHSA-qpvx-gpqm-g98j
Critical severity vulnerability that affects Auth0-WCF-Service-JWT
Auth0 Auth0-WCF-Service-JWT before 1.0.4 leaks the expected JWT signature in an error message when it cannot successfully validate the JWT signature. If this error message is presented to an attacker, they can forge an arbitrary JWT token that will be accepted by the vulnerable application.
{'CVE-2019-7644'}
2021-09-16T20:03:33Z
2019-04-18T14:28:03Z
CRITICAL
9.8
{'CWE-209'}
{'https://auth0.com/docs/security/bulletins/cve-2019-7644', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7644', 'https://github.com/advisories/GHSA-qpvx-gpqm-g98j'}
null
GHSA
GHSA-wjfq-88q2-r34j
Unhandled exception when decoding form response JSON
### Impact When handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`. An `InvalidArgumentException` is thrown by this function when it fails to fix an error found in the JSON, which is not caught by the caller. This leads to a server crash. ### Patches 56fe71d939c38fe14e18a31a673a9331bcc0e4ca ### Workarounds A plugin may handle `DataPacketReceiveEvent`, capture `ModalFormResponsePacket` and run the provided JSON through `stupid_json_decode`. Note that this requires copying the body of the function to a plugin, since the function is currently private. ### For more information If you have any questions or comments about this advisory: * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-04-19T19:03:21Z
2022-01-21T23:02:14Z
HIGH
7.5
null
{'https://github.com/pmmp/PocketMine-MP/blob/4.0.7/changelogs/4.0.md#407', 'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wjfq-88q2-r34j', 'https://github.com/advisories/GHSA-wjfq-88q2-r34j'}
null
GHSA
GHSA-rcjj-h6gh-jf3r
Information Disclosure in Apache Groovy
Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.
{'CVE-2020-17521'}
2022-04-22T18:24:10Z
2020-12-09T19:03:03Z
MODERATE
5.5
{'CWE-379'}
{'https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/apache/groovy/commit/bcbe5c4c76db83736166530647c024ac1e47ef28', 'https://github.com/apache/groovy/pull/1425', 'https://security.netapp.com/advisory/ntap-20201218-0006/', 'https://lists.apache.org/thread.html/rea63a4666ba245d2892471307772a2d8ce0f0741f341d6576625c1b3@%3Cdev.atlas.apache.org%3E', 'https://groovy-lang.org/security.html#CVE-2020-17521', 'https://github.com/advisories/GHSA-rcjj-h6gh-jf3r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17521', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-3fhf-6939-qg8p
High severity vulnerability that affects rest-client
REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
{'CVE-2015-1820'}
2021-08-31T21:01:32Z
2018-08-13T20:47:22Z
HIGH
9.8
{'CWE-384'}
{'https://github.com/advisories/GHSA-3fhf-6939-qg8p', 'https://github.com/rest-client/rest-client/issues/369', 'http://www.securityfocus.com/bid/73295', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1820', 'https://bugzilla.redhat.com/show_bug.cgi?id=1205291', 'http://www.openwall.com/lists/oss-security/2015/03/24/3'}
null
GHSA
GHSA-2rmp-fw5r-j5qv
Improper Authentication in InfluxDB
InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).
{'CVE-2019-20933'}
2021-05-18T18:22:05Z
2021-05-18T18:22:05Z
CRITICAL
9.8
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-20933', 'https://github.com/influxdata/influxdb/compare/v1.7.5...v1.7.6', 'https://github.com/ticarpi/jwt_tool/blob/a6ca3e0524a204b5add070bc6874cb4e7e5a9864/jwt_tool.py#L1368', 'https://www.debian.org/security/2021/dsa-4823', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00030.html', 'https://github.com/influxdata/influxdb/issues/12927', 'https://github.com/advisories/GHSA-2rmp-fw5r-j5qv', 'https://github.com/influxdata/influxdb/commit/761b557315ff9c1642cf3b0e5797cd3d983a24c0'}
null
GHSA
GHSA-m45g-f45x-vv22
Improper input validation in CNCF Cortex
The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.
{'CVE-2021-31232'}
2021-06-23T17:20:38Z
2021-06-23T17:20:38Z
MODERATE
5.5
{'CWE-20'}
{'https://lists.cncf.io/g/cortex-users/message/50', 'https://github.com/advisories/GHSA-m45g-f45x-vv22', 'https://github.com/cortexproject/cortex/pull/4129/files', 'https://community.grafana.com/c/security-announcements', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31232', 'https://github.com/cortexproject/cortex'}
null
GHSA
GHSA-p239-93f7-h6xf
Cross-Site Scripting in swagger-ui
Affected versions of `swagger-ui` contain a cross-site scripting vulnerability in the key names of a specific nested object in the JSON document. ## Proof of Concept The vulnerable object structure is: ``` { "definitions": { "arbitraryVal": { "properties": { "<INJECTABLE_KEY_NAME>": "LoremIpsum" } } } } ``` Malicious JSON documents can be loaded in by providing a URL to them in the `url` query string parameter. ## Recommendation Update to version 2.2.1 or later.
{'CVE-2016-5682'}
2021-09-23T21:32:17Z
2020-09-01T15:30:58Z
CRITICAL
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/126', 'https://community.rapid7.com/community/infosec/blog/2016/09/02/r7-2016-19-persistent-xss-via-unescaped-parameters-in-swagger-ui', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5682', 'https://github.com/advisories/GHSA-p239-93f7-h6xf', 'https://github.com/swagger-api/swagger-ui/issues/1865'}
null
GHSA
GHSA-w6v7-w58j-pg5r
Improper Verification of Communication Channel in @theia/plugin-ext
In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage().
{'CVE-2021-41038'}
2021-11-15T17:40:51Z
2021-11-15T17:40:51Z
MODERATE
6.1
{'CWE-940'}
{'https://github.com/eclipse-theia/theia/pull/10125', 'https://github.com/advisories/GHSA-w6v7-w58j-pg5r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41038', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924'}
null
GHSA
GHSA-7r7m-5h27-29hp
Potential infinite loop in Pillow
An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load.
{'CVE-2021-28676'}
2021-09-15T18:25:52Z
2021-06-08T18:48:53Z
HIGH
7.5
{'CWE-835'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://github.com/python-pillow/Pillow/pull/5377', 'https://github.com/advisories/GHSA-7r7m-5h27-29hp', 'https://security.gentoo.org/glsa/202107-33', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28676', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28676-fix-fli-dos'}
null
GHSA
GHSA-88g8-f5mf-f5rj
Improper Initialization in OpenZeppelin
In OpenZeppelin <=v4.4.0, initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call. Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible, breaking the expectation that there is a single execution.
{'CVE-2021-46320'}
2022-02-11T22:47:19Z
2022-02-05T00:00:31Z
HIGH
7.5
{'CWE-665'}
{'https://github.com/advisories/GHSA-88g8-f5mf-f5rj', 'https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.4.1', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46320', 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006'}
null
GHSA
GHSA-q3j3-w37x-hq2q
Webcache Poisoning in symfony/http-kernel
Description ----------- When a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the "trusted_headers" allowed list are ignored and protect you from "Cache poisoning" attacks. In Symfony 5.2, we've added support for the `X-Forwarded-Prefix` header, but this header was accessible in sub-requests, even if it was not part of the "trusted_headers" allowed list. An attacker could leverage this opportunity to forge requests containing a `X-Forwarded-Prefix` HTTP header, leading to a web cache poisoning issue. Resolution ---------- Symfony now ensures that the `X-Forwarded-Prefix` HTTP header is not forwarded to sub-requests when it is not trusted. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487) for branch 5.3. Credits ------- We would like to thank Soner Sayakci for reporting the issue and Jérémy Derussé for fixing the issue.
{'CVE-2021-41267'}
2022-04-19T19:03:15Z
2021-11-24T20:04:25Z
MODERATE
6.5
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41267', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q', 'https://github.com/advisories/GHSA-q3j3-w37x-hq2q'}
null
GHSA
GHSA-p8jx-x2vw-wm33
High severity vulnerability that affects org.apache.storm:storm-core
In Apache Storm 0.10.0 through 0.10.2, 1.0.0 through 1.0.6, 1.1.0 through 1.1.2, and 1.2.0 through 1.2.1, an attacker with access to a secure storm cluster in some cases could execute arbitrary code as a different user.
{'CVE-2018-1331'}
2021-09-16T16:13:16Z
2018-10-17T19:48:06Z
HIGH
8.8
null
{'http://storm.apache.org/2018/06/04/storm122-released.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1331', 'https://github.com/advisories/GHSA-p8jx-x2vw-wm33', 'http://www.securityfocus.com/bid/104732', 'http://www.openwall.com/lists/oss-security/2018/07/10/4', 'http://www.securitytracker.com/id/1041273', 'http://storm.apache.org/2018/06/04/storm113-released.html'}
null
GHSA
GHSA-qm57-vhq3-3fwf
Header injection possible in Django
In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.
{'CVE-2021-32052'}
2021-06-14T21:29:19Z
2021-06-09T17:14:51Z
MODERATE
6.1
{'CWE-88', 'CWE-79'}
{'https://github.com/django/django/commit/e1e81aa1c4427411e3c68facdd761229ffea6f6f', 'https://www.djangoproject.com/weblog/2021/may/06/security-releases/', 'https://github.com/advisories/GHSA-qm57-vhq3-3fwf', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://security.netapp.com/advisory/ntap-20210611-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32052', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/', 'http://www.openwall.com/lists/oss-security/2021/05/06/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=1944801', 'https://groups.google.com/forum/#!forum/django-announce'}
null
GHSA
GHSA-rj44-gpjc-29r7
[thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values
### Impact Potential for arbitrary code execution in `#gpg`-tagged property values (only if `decrypt: true` option is enabled) ### Patches [A fix](https://github.com/thi-ng/umbrella/commit/3e14765d6bfd8006742c9e7860bc7d58ae94dfa5) has already been released as v0.4.0 ### Workarounds By default, EGF parse functions do NOT attempt to decrypt values (since GPG is only available in non-browser env). However, if GPG encrypted values are used/required: 1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\`) chars in the encrypted value string 2. Replace/remove them or skip parsing if present... ### References https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7#advisory-comment-65261 ### For more information If you have any questions or comments about this advisory, please open an issue in the [thi.ng/umbrella repo](https://github.com/thi-ng/umbrella/issues), of which this package is part of.
{'CVE-2021-21412'}
2022-04-19T19:02:52Z
2021-04-06T17:22:41Z
MODERATE
6.4
{'CWE-78'}
{'https://github.com/advisories/GHSA-rj44-gpjc-29r7', 'https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7', 'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243', 'https://www.npmjs.com/package/@thi.ng/egf', 'https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21412'}
null
GHSA
GHSA-rhm9-p9w5-fwm7
Symmetrically encrypting large values can lead to integer overflow
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. When certain sequences of `update()` calls with large values (multiple GBs) for symetric encryption or decryption occur, it's possible for an integer overflow to happen, leading to mishandling of buffers. This is patched in version 3.3.2 and newer.
{'CVE-2020-36242'}
2022-04-22T18:32:24Z
2021-02-10T01:32:27Z
CRITICAL
9.1
{'CWE-787', 'CWE-190'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/pyca/cryptography/blob/master/CHANGELOG.rst', 'https://github.com/pyca/cryptography/security/advisories/GHSA-rhm9-p9w5-fwm7', 'https://github.com/pyca/cryptography/compare/3.3.1...3.3.2', 'https://github.com/advisories/GHSA-rhm9-p9w5-fwm7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7RGQLK4J5ZQFRLKCHVVG6BKZTUQMG7E/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36242', 'https://github.com/pyca/cryptography/commit/82b6ce28389f0a317bc55ba2091a74b346db7cae', 'https://github.com/pyca/cryptography/issues/5615'}
null
GHSA
GHSA-wjx8-cgrm-hh8p
Unrestricted file uploads in Contao
### Impact A back end user with access to the form generator can upload arbitrary files and execute them on the server. ### Patches Update to Contao 4.4.46 or 4.8.6. ### Workarounds Configure your web server so it does not execute PHP files and other scripts in the Contao file upload directory. ### References https://contao.org/en/security-advisories/unrestricted-file-uploads.html ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
{'CVE-2019-19745'}
2021-08-19T16:10:15Z
2019-12-17T22:53:10Z
HIGH
8.8
{'CWE-434'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19745.yaml', 'https://github.com/advisories/GHSA-wjx8-cgrm-hh8p', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19745', 'https://github.com/contao/contao/security/advisories/GHSA-wjx8-cgrm-hh8p', 'https://contao.org/en/news.html', 'https://contao.org/en/security-advisories/unrestricted-file-uploads.html'}
null
GHSA
GHSA-92px-q4w8-hrr5
Malicious Package in impala
Version 1.1.7 of `impala` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.1.7 of this module is found installed you will want to replace it with a version before or after 1.1.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T18:30:53Z
2020-09-01T19:56:52Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/628', 'https://github.com/shenfw1987/impala', 'https://snyk.io/vuln/SNYK-JS-IMPALA-450989', 'https://github.com/advisories/GHSA-92px-q4w8-hrr5'}
null
GHSA
GHSA-p4pj-mg4r-x6v4
Denial of Service in uap-core
## Impact Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. ## Patches Please update uap-core to >= v0.11.0 Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.
{'CVE-2021-21317'}
2021-02-17T17:18:55Z
2021-02-02T15:46:38Z
HIGH
5.3
{'CWE-400'}
{'https://www.npmjs.com/package/uap-core', 'https://github.com/advisories/GHSA-p4pj-mg4r-x6v4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21317', 'https://github.com/ua-parser/uap-core/security/advisories/GHSA-p4pj-mg4r-x6v4', 'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c'}
null
GHSA
GHSA-qfc9-x7gv-27jr
Malicious Package in deasyncp
All versions of `deasyncp ` contain malicious code. The package shuts down the machine upon installation as a preinstall script. ## Recommendation Remove the package from your environment. There is no further compromise.
null
2021-09-30T20:03:52Z
2020-09-03T18:12:36Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1073', 'https://github.com/advisories/GHSA-qfc9-x7gv-27jr'}
null
GHSA
GHSA-2fw4-mgq9-39cx
Code Injection in oauth2-server
"oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also therefore wouldn't describe this as a "vulnerability" with the library per se.'"
{'CVE-2017-18924'}
2021-04-22T15:53:45Z
2021-04-22T15:53:45Z
HIGH
7.5
{'CWE-94'}
{'https://tools.ietf.org/html/draft-ietf-oauth-security-topics-15', 'https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467', 'https://github.com/oauthjs/node-oauth2-server/pull/452', 'https://github.com/oauthjs/node-oauth2-server/issues/637', 'https://github.com/advisories/GHSA-2fw4-mgq9-39cx', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18924', 'https://tools.ietf.org/html/rfc7636'}
null
GHSA
GHSA-93xj-8mrv-444m
Regular Expression Denial of Service (REDoS) in httplib2
### Impact A malicious server which responds with long series of `\xa0` characters in the `www-authenticate` header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. ### Patches Version 0.19.0 contains new implementation of auth headers parsing, using pyparsing library. https://github.com/httplib2/httplib2/pull/182 ### Workarounds ```py import httplib2 httplib2.USE_WWW_AUTH_STRICT_PARSING = True ``` ### Technical Details The vulnerable regular expression is https://github.com/httplib2/httplib2/blob/595e248d0958c00e83cb28f136a2a54772772b50/python3/httplib2/__init__.py#L336-L338 The section before the equals sign contains multiple overlapping groups. Ignoring the optional part containing a comma, we have: \s*[^ \t\r\n=]+\s*= Since all three infinitely repeating groups accept the non-breaking space character `\xa0`, a long string of `\xa0` causes catastrophic backtracking. The complexity is cubic, so doubling the length of the malicious string of `\xa0` makes processing take 8 times as long. ### Reproduction Steps Run a malicious server which responds with www-authenticate: x \xa0\xa0\xa0\xa0x but with many more `\xa0` characters. An example malicious python server is below: ```py from http.server import BaseHTTPRequestHandler, HTTPServer def make_header_value(n_spaces): repeat = "\xa0" * n_spaces return f"x {repeat}x" class Handler(BaseHTTPRequestHandler): def do_GET(self): self.log_request(401) self.send_response_only(401) # Don't bother sending Server and Date n_spaces = ( int(self.path[1:]) # Can GET e.g. /100 to test shorter sequences if len(self.path) > 1 else 65512 # Max header line length 65536 ) value = make_header_value(n_spaces) self.send_header("www-authenticate", value) # This header can actually be sent multiple times self.end_headers() if __name__ == "__main__": HTTPServer(("", 1337), Handler).serve_forever() ``` Connect to the server with httplib2: ```py import httplib2 httplib2.Http(".cache").request("http://localhost:1337", "GET") ``` To benchmark performance with shorter strings, you can set the path to a number e.g. http://localhost:1337/1000 ### References Thanks to [Ben Caller](https://github.com/b-c-ds) ([Doyensec](https://doyensec.com)) for finding vulnerability and discrete notification. ### For more information If you have any questions or comments about this advisory: * Open an issue in [httplib2](https://github.com/httplib2/httplib2/issues/new) * Email [current maintainer at 2021-01](mailto:temotor@gmail.com)
{'CVE-2021-21240'}
2022-04-19T19:02:44Z
2021-02-08T19:41:59Z
LOW
0
{'CWE-400'}
{'https://github.com/httplib2/httplib2/pull/182', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21240', 'https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m', 'https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc', 'https://github.com/advisories/GHSA-93xj-8mrv-444m', 'https://pypi.org/project/httplib2'}
null
GHSA
GHSA-6r3c-8xf3-ggrr
Directory traversal outside of SENDFILE_ROOT in django-sendfile2
django-sendfile2 currently relies on the backend to correctly limit file paths to `SENDFILE_ROOT`. This is not the case for the `simple` and `development` backends, it is also not necessarily the case for any of the other backends either (it's just an assumption that was made by the original author). This will be fixed in 0.6.0 which is to be released the same day as this advisory is made public. When upgrading, you will need to make sure `SENDFILE_ROOT` is set in your settings module if it wasn't already.
null
2022-04-19T19:02:28Z
2020-06-24T17:15:26Z
MODERATE
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-6r3c-8xf3-ggrr', 'https://github.com/moggers87/django-sendfile2/commit/f870c52398a55b9b5189932dd8caa24efb4bc1e1', 'https://github.com/moggers87/django-sendfile2/security/advisories/GHSA-6r3c-8xf3-ggrr'}
null
GHSA
GHSA-426h-24vj-qwxf
Command Injection in npm-programmatic
All versions of `npm-programmatic ` are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `exec` call on the `install`, `uninstall` and `list` functions . This may allow attackers to execute arbitrary code in the system if the package name passed to the function is user-controlled. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2020-7614'}
2021-07-29T15:52:30Z
2020-04-23T20:09:09Z
CRITICAL
9.8
{'CWE-20', 'CWE-78'}
{'https://github.com/advisories/GHSA-426h-24vj-qwxf', 'https://github.com/Manak/npm-programmatic/blob/master/index.js#L18', 'https://www.npmjs.com/advisories/1507', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7614', 'https://snyk.io/vuln/SNYK-JS-NPMPROGRAMMATIC-564115'}
null
GHSA
GHSA-pfj7-2qfw-vwgm
Path traversal in translator module in NodeBB
### Impact Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory. ### Patches The vulnerability has been patched as of v1.18.5. ### Workarounds Cherry-pick commit hash `c8b2fc46dc698db687379106b3f01c71b80f495f` to receive this patch in lieu of a full upgrade. ### For more information If you have any questions or comments about this advisory: * Email us at [security@nodebb.org](mailto:security@nodebb.org)
{'CVE-2021-43788'}
2022-04-19T19:03:13Z
2021-11-30T22:20:43Z
MODERATE
5
{'CWE-22'}
{'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-pfj7-2qfw-vwgm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43788', 'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/advisories/GHSA-pfj7-2qfw-vwgm'}
null
GHSA
GHSA-qvp4-rpmr-xwrr
Possible bypass of token claim validation when OAuth2 Introspection caching is enabled
### Impact When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. ### Patches A patch will be released with `v0.38.12-beta.1`. ### Workarounds Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. ### Trace The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. ### Post-Mortem The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process. To avoid this from happening again we enabled codecov with a strict policy on the Ory Oathkeeper repository: Without an increase in code coverage the PR can not be merged. To address this issue and any regressions we have added a test suite ensuring that the cache behaviour is correct in the different scenarios: - Scope strategy is `none`, cache is enabled, and `requested_scope` is not empty -> cache will not be used; - Scope strategy is `none`, cache is enabled, and `requested_scope` is empty -> cache will be used; - Scope strategy is not `none`, cache is enabled, and `requested_scope` is not empty -> cache will be used; as well as validating if `iss`, `aud`, `exp`, `token_use`, and scope are validated. Additionally, we added [CodeQL scanning](https://github.com/ory/oathkeeper/commit/64ac7562669287d391cd72dfd43c5d71ff9f89a1) to the CI.
null
2022-04-19T19:03:00Z
2021-06-23T18:00:20Z
HIGH
7.5
{'CWE-863'}
{'https://github.com/advisories/GHSA-qvp4-rpmr-xwrr', 'https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr'}
null
GHSA
GHSA-rc8h-3fv6-pxv8
Denial of Service in hapi
Versions of `hapi` prior to 11.1.3 are affected by a denial of service vulnerability. The vulnerability is triggered when certain input is passed into the If-Modified-Since or Last-Modified headers. This causes an 'illegal access' exception to be raised, and instead of sending a HTTP 500 error back to the sender, hapi will continue to hold the socket open until timed out (default node timeout is 2 minutes). ## Recommendation Update to v11.1.3 or later
{'CVE-2015-9241'}
2021-01-08T01:58:05Z
2018-06-07T19:43:15Z
HIGH
0
{'CWE-400'}
{'https://nodesecurity.io/advisories/64', 'https://github.com/jfhbrook/node-ecstatic/pull/179', 'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580', 'https://nodesecurity.io/advisories/63', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9241', 'https://github.com/advisories/GHSA-rc8h-3fv6-pxv8', 'https://www.npmjs.com/advisories/63'}
null
GHSA
GHSA-fxwf-45c7-4ppr
Prototype pollution in object-hierarchy-access
Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28270'}
2022-01-07T16:07:29Z
2021-10-12T16:40:58Z
CRITICAL
9.8
{'CWE-1321', 'CWE-915'}
{'https://github.com/advisories/GHSA-fxwf-45c7-4ppr', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270,', 'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28270'}
null
GHSA
GHSA-c7pp-x73h-4m2v
Cross-Site Scripting in bootstrap-vue
Versions of `bootstrap-vue` prior to 2.0.0-rc.12 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization, components may be vulnerable to Cross-Site Scripting through the `options` variable. This may lead to the execution of malicious JavaScript on the user's browser. ## Recommendation Upgrade to version 2.0.0-rc.12 or later.
null
2021-09-27T15:43:20Z
2020-09-02T15:53:46Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/770', 'https://github.com/advisories/GHSA-c7pp-x73h-4m2v', 'https://github.com/bootstrap-vue/bootstrap-vue/issues/1974'}
null
GHSA
GHSA-mx3r-w3pj-7wv7
Command injection in wc-cmd
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
{'CVE-2020-28431'}
2021-03-23T21:27:50Z
2021-03-19T21:10:30Z
CRITICAL
9.8
{'CWE-77'}
{'https://github.com/advisories/GHSA-mx3r-w3pj-7wv7', 'https://snyk.io/vuln/SNYK-JS-WCCMD-1050423', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28431'}
null
GHSA
GHSA-pxq7-4ppw-qp7f
Directory Traversal in serverzyy
Affected versions of `serverzyy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16135'}
2021-01-14T15:39:44Z
2020-09-01T18:19:36Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/431', 'https://nodesecurity.io/advisories/431', 'https://github.com/advisories/GHSA-pxq7-4ppw-qp7f', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16135', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverzyy'}
null
GHSA
GHSA-jj47-x69x-mxrm
Buffer Overflow in yajl-ruby
yajl-ruby is a streaming JSON parsing and encoding library for Ruby (C bindings to yajl) based on the YAJL library. The 1.x branch and the 2.x branch of [yajl](https://github.com/lloyd/yajl) contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. ### Details The [reallocation logic at yajl_buf.c#L64](https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64) may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. ### Impact We rate this as a moderate severity vulnerability which mostly impacts process availability as we believe exploitation for arbitrary code execution to be unlikely. ### Patches Patched in yajl-ruby 1.4.2 ### Workarounds Avoid passing large inputs to YAJL ### References https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64 ### For more information If you have any questions or comments about this advisory: * Open an issue in [yajl-ruby](https://github.com/brianmario/yajl-ruby/issues)
{'CVE-2022-24795'}
2022-04-06T21:08:35Z
2022-04-05T15:55:51Z
MODERATE
5.9
{'CWE-122', 'CWE-190'}
{'https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24795', 'https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6', 'https://github.com/advisories/GHSA-jj47-x69x-mxrm', 'https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64'}
null
GHSA
GHSA-f7gc-6hcj-wc42
Malicious Package in path-to-regxep
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:03:56Z
2020-09-03T17:05:06Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1401', 'https://github.com/advisories/GHSA-f7gc-6hcj-wc42'}
null
GHSA
GHSA-7cqx-92hp-x6wh
Heap buffer overflow in `MaxPool3DGradGrad`
### Impact The implementation of `tf.raw_ops.MaxPool3DGradGrad` is vulnerable to a heap buffer overflow: ```python import tensorflow as tf values = [0.01] * 11 orig_input = tf.constant(values, shape=[11, 1, 1, 1, 1], dtype=tf.float32) orig_output = tf.constant([0.01], shape=[1, 1, 1, 1, 1], dtype=tf.float32) grad = tf.constant([0.01], shape=[1, 1, 1, 1, 1], dtype=tf.float32) ksize = [1, 1, 1, 1, 1] strides = [1, 1, 1, 1, 1] padding = "SAME" tf.raw_ops.MaxPool3DGradGrad( orig_input=orig_input, orig_output=orig_output, grad=grad, ksize=ksize, strides=strides, padding=padding) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/596c05a159b6fbb9e39ca10b3f7753b7244fa1e9/tensorflow/core/kernels/pooling_ops_3d.cc#L694-L696) does not check that the initialization of `Pool3dParameters` completes successfully: ```cc Pool3dParameters params{context, ksize_, stride_, padding_, data_format_, tensor_in.shape()}; ``` Since [the constructor](https://github.com/tensorflow/tensorflow/blob/596c05a159b6fbb9e39ca10b3f7753b7244fa1e9/tensorflow/core/kernels/pooling_ops_3d.cc#L48-L88) uses `OP_REQUIRES` to validate conditions, the first assertion that fails interrupts the initialization of `params`, making it contain invalid data. In turn, this might cause a heap buffer overflow, depending on default initialized values. ### Patches We have patched the issue in GitHub commit [63c6a29d0f2d692b247f7bf81f8732d6442fad09](https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29576'}
2022-04-26T18:10:15Z
2021-05-21T14:26:16Z
LOW
2.5
{'CWE-119', 'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29576', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7cqx-92hp-x6wh', 'https://github.com/advisories/GHSA-7cqx-92hp-x6wh', 'https://github.com/tensorflow/tensorflow/commit/63c6a29d0f2d692b247f7bf81f8732d6442fad09'}
null
GHSA
GHSA-h236-g5gh-vq6c
Cross-site scripting in Froala Editor
Froala Editor before 3.0.6 allows XSS.
{'CVE-2019-19935'}
2022-02-10T23:33:00Z
2022-02-10T23:32:51Z
MODERATE
6.1
{'CWE-79'}
{'https://blog.compass-security.com/2020/07/yet-another-froala-0-day-xss/', 'https://snyk.io/vuln/npm:froala-editor', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19935', 'http://packetstormsecurity.com/files/158300/Froala-WYSIWYG-HTML-Editor-3.1.1-Cross-Site-Scripting.html', 'https://github.com/advisories/GHSA-h236-g5gh-vq6c', 'https://github.com/froala/wysiwyg-editor/compare/v3.0.5...v3.0.6', 'https://compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2020-004_DOM_XSS_in_Froala_WYSIWYG_HTML_Editor.txt'}
null
GHSA
GHSA-9f52-hpvw-v96w
Improper Validation of Specified Quantity in Input in Eclipse Hono
In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter to fail with an out of memory exception.
{'CVE-2020-27217'}
2022-02-10T20:22:06Z
2022-02-10T20:22:06Z
HIGH
7.5
{'CWE-1284'}
{'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567068', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27217', 'https://github.com/advisories/GHSA-9f52-hpvw-v96w'}
null
GHSA
GHSA-fqw7-8v6m-2f86
Malicious Package in hulp
All versions of `hulp` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:54:48Z
2020-09-02T21:37:39Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/905', 'https://github.com/advisories/GHSA-fqw7-8v6m-2f86'}
null
GHSA
GHSA-27p5-7cw6-m45h
Server-Side Request Forgery in unoconv
The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion.
{'CVE-2019-17400'}
2021-08-18T22:00:22Z
2019-10-24T20:46:54Z
HIGH
7.5
{'CWE-918'}
{'https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/', 'https://github.com/advisories/GHSA-27p5-7cw6-m45h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17400', 'https://github.com/unoconv/unoconv/pull/510'}
null
GHSA
GHSA-fmf5-j5j9-99pp
OS Command Injection in pulverizr
pulverizr through 0.7.0 allows execution of arbitrary commands. Within &quot;lib/job.js&quot;, the variable &quot;filename&quot; can be controlled by the attacker. This function uses the variable &quot;filename&quot; to construct the argument of the exec call without any sanitization. In order to successfully exploit this vulnerability, an attacker will need to create a new file with the same name as the attack command.
{'CVE-2020-7604'}
2021-07-28T20:51:45Z
2021-05-07T16:20:44Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-fmf5-j5j9-99pp', 'https://snyk.io/vuln/SNYK-JS-PULVERIZR-560122', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7604'}
null
GHSA
GHSA-947x-pv47-pp3q
Cross-site scripting in pywb
Webrecorder pywb before 2.6.0 allows XSS because it does not ensure that Jinja2 templates are autoescaped.
{'CVE-2021-39286'}
2021-09-02T17:16:18Z
2021-09-02T17:16:18Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39286', 'https://github.com/webrecorder/pywb/commit/f7bd84cdacdd665ff73ae8d09a202f60be2ebae9', 'https://github.com/webrecorder/pywb/compare/v-2.5.0...v-2.6.0', 'https://github.com/advisories/GHSA-947x-pv47-pp3q'}
null
GHSA
GHSA-q8xj-8xg3-w432
Moderate severity vulnerability that affects io.spray:spray-json_2.10, io.spray:spray-json_2.11, and io.spray:spray-json_2.12
Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of many JSON object fields (with keys that have the same hash code).
{'CVE-2018-18854'}
2021-09-16T19:41:26Z
2018-11-09T17:41:35Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-18854', 'https://github.com/spray/spray-json/issues/277', 'https://github.com/advisories/GHSA-q8xj-8xg3-w432'}
null
GHSA
GHSA-mfjm-vh54-3f96
Cookie-setting is not restricted based on the public suffix list
### Impact Responses from domain names whose public domain name suffix contains 1 or more periods (e.g. responses from `example.co.uk`, given its public domain name suffix is `co.uk`) are able to set cookies that are included in requests to any other domain sharing the same domain name suffix. ### Patches Upgrade to Scrapy 2.6.0, which restricts cookies with their domain set to any of those in the [public suffix list](https://publicsuffix.org/). If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.6.0 is not an option, you may upgrade to Scrapy 1.8.2 instead. ### Workarounds The only workaround for unpatched versions of Scrapy is to [disable cookies altogether](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#std-setting-COOKIES_ENABLED), or [limit target domains](https://docs.scrapy.org/en/latest/topics/spiders.html#scrapy.spiders.Spider.allowed_domains) to a subset that does not include domain names with one of the public domain suffixes affected (those with 1 or more periods). ### References * https://publicsuffix.org/ ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy/scrapy/issues) * [Email us](mailto:opensource@zyte.com)
null
2022-03-02T14:52:47Z
2022-03-01T22:13:28Z
MODERATE
0
null
{'https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a', 'https://github.com/advisories/GHSA-mfjm-vh54-3f96', 'https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96'}
null
GHSA
GHSA-q43m-ffwr-rpcc
SSL Validation Defaults to False in electron-packager
Affected versions of `electron-packager` configure the generated application to disable SSL certificate verification by default. This could allow an attacker with a privileged network position to launch a Man In The Middle (MITM) attack on the install process, intercepting the step where electron-packager downloads Electron for supported target platforms and architectures, and replacing the valid download with a tampered malicious one. This only affects users using the electron-packager CLI. The strict-ssl option defaults to true for the node.js API. ## Recommendation 1. Update to version 7.0.0 or later. 2. Delete the `electron-download` cache folder, which is by default located at `~/.electron`.
{'CVE-2016-10534'}
2021-01-08T18:18:08Z
2019-02-18T23:58:24Z
LOW
0
{'CWE-295'}
{'https://github.com/electron-userland/electron-packager/issues/333', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10534', 'https://www.npmjs.com/advisories/104', 'https://github.com/advisories/GHSA-q43m-ffwr-rpcc', 'https://nodesecurity.io/advisories/104'}
null
GHSA
GHSA-7q25-qrjw-6fg2
Malicious package may avoid detection in python auditing
# Python Auditing Vulnerability Demonstrates how a malicious package can insert a load-time poison pill to avoid detection by tools like Safety. Tools that are designed to find vulnerable packages can not ever run in the same python environment that they are trying to protect. ## Usage Install `safety`, `insecure-package`, and this package with pip in the same python environment. Order doesn&amp;#39;t matter. 1. pip install safety 2. pip install insecure-package 3. pip install dist/malicious-0.1-py3-none-any.whl Run the check 4. `safety check` You should see both `Running my modified safety.check` and that `insecure-package` is not listed in the results! ## How it Works Everything in Python is mutable. The trick is getting some code to run at interpreter load time in order to do some patching. 1. When you install this package, the `setup.py` settings installs a `malicious.pth` file to your `site-packages` directory. 2. The `malicious.pth` file gets loaded anytime Python starts, which in turn imports our `malicious` package. 3. The `malicious/__init__.py` patches the safety library with a custom function to avoid detection.
{'CVE-2020-5252'}
2022-05-09T22:09:20Z
2020-03-24T15:07:56Z
MODERATE
5
{'CWE-807'}
{'https://pyup.io/posts/patched-vulnerability/', 'https://github.com/pyupio/safety/security/advisories/GHSA-7q25-qrjw-6fg2', 'https://mulch.dev/blog/CVE-2020-5252-python-safety-vuln/', 'https://github.com/akoumjian/python-safety-vuln', 'https://github.com/advisories/GHSA-7q25-qrjw-6fg2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5252'}
null
GHSA
GHSA-57cf-349j-352g
Out-of-bounds Read in npmconf
Versions of `npmconf` before 2.1.3 allocate and write to disk uninitialized memory contents when a typed number is passed as input on Node.js 4.x. ## Recommendation Update to version 2.1.3 or later. Consider switching to another config storage mechanism, as npmconf is deprecated and should not be used.
null
2021-08-04T21:14:25Z
2019-06-12T16:37:00Z
MODERATE
0
{'CWE-125'}
{'https://github.com/advisories/GHSA-57cf-349j-352g', 'https://hackerone.com/reports/320269', 'https://nodesecurity.io/advisories/653', 'https://www.npmjs.com/advisories/653'}
null
GHSA
GHSA-rjww-2x8v-m9v9
Potential sensitive data exposure in applications using Vaadin 15
Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController` - https://vaadin.com/security/cve-2020-36319
{'CVE-2020-36319'}
2022-04-19T19:02:54Z
2021-04-19T14:52:14Z
LOW
3.1
{'CWE-200'}
{'https://github.com/vaadin/flow/pull/8016', 'https://github.com/advisories/GHSA-rjww-2x8v-m9v9', 'https://vaadin.com/security/cve-2020-36319', 'https://github.com/vaadin/flow/security/advisories/GHSA-rjww-2x8v-m9v9', 'https://github.com/vaadin/flow/pull/8051', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36319'}
null
GHSA
GHSA-vjvw-wcmw-pr26
Insufficient Entropy in parsel
All versions of `parsel` use an insecure key derivation function. The package runs keys of arbitrary lengths through one round of SHA256 hashing for key stretching. This allows for the use of keys of insufficient entropy with inappropriate key stretching. ## Recommendation The package is deprecated and will not be updated. Consider using an alternative package.
null
2021-10-04T20:51:58Z
2020-09-04T17:37:08Z
CRITICAL
0
{'CWE-331'}
{'https://www.npmjs.com/advisories/1462', 'https://github.com/advisories/GHSA-vjvw-wcmw-pr26'}
null