ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-xxq4-3742-3h28 | Generation of Error Message Containing Sensitive Information in microweber | microweber version 1.2.10 and prior may generate an error message containing sensitive information. | {'CVE-2022-0504'} | 2022-02-10T22:12:48Z | 2022-02-09T00:00:31Z | MODERATE | 6.5 | {'CWE-209'} | {'https://github.com/advisories/GHSA-xxq4-3742-3h28', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0504', 'https://huntr.dev/bounties/285ff8a0-a273-4d62-ba01-3e4b4e18467b', 'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'} | null |
GHSA | GHSA-h6qv-f5gf-8gcf | Missing Authorization in Jenkins P4 plugin | Jenkins P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password. | {'CVE-2021-21654'} | 2021-06-16T17:29:35Z | 2021-06-16T17:29:35Z | MODERATE | 4.3 | {'CWE-862'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21654', 'https://github.com/advisories/GHSA-h6qv-f5gf-8gcf', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'} | null |
GHSA | GHSA-v899-28g4-qmh8 | XML External Entity vulnerability in Easy-XML | The parseXML function in Easy-XML 0.5.0 was discovered to have a XML External Entity (XXE) vulnerability which allows for an attacker to expose sensitive data or perform a denial of service (DOS) via a crafted external entity entered into the XML content as input. | {'CVE-2020-26705'} | 2022-03-21T22:23:04Z | 2021-11-01T19:19:54Z | CRITICAL | 9.1 | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26705', 'https://github.com/darkfoxprime/python-easy_xml/issues/1', 'https://github.com/advisories/GHSA-v899-28g4-qmh8'} | null |
GHSA | GHSA-p3hc-fv2j-rp68 | Prototype Pollution in swiper | Versions of the package swiper before 6.5.1 are susceptible to prototype pollution. | {'CVE-2021-23370'} | 2021-05-10T15:36:30Z | 2021-05-10T15:36:30Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBNOLIMITS4WEB-1244697', 'https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696', 'https://github.com/advisories/GHSA-p3hc-fv2j-rp68', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1244699', 'https://snyk.io/vuln/SNYK-JS-SWIPER-1088062', 'https://github.com/nolimits4web/Swiper/commit/ec358deab79a8cd2529465f07a0ead5dbcc264ad', 'https://github.com/nolimits4web/swiper/blob/master/CHANGELOG.md#651-2021-03-29', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23370', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698'} | null |
GHSA | GHSA-44cg-qcpr-fwjh | Cross site scripting in francoisjacquet/rosariosis | A Cross Site Scripting (XSS) vulnerabilty exits in RosarioSIS before 7.6.1 via the xss_clean function in classes/Security.php, which allows remote malicious users to inject arbitrary JaveScript of HTML.An example of affected components are all Markdown input fields. | {'CVE-2021-44565'} | 2022-03-04T21:38:29Z | 2022-02-25T00:01:07Z | MODERATE | 5.4 | {'CWE-79'} | {'https://gitlab.com/francoisjacquet/rosariosis/-/issues/307', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/0f5d1f1d193bc6b711d1644f172579d498ec1636', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44565', 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761', 'https://github.com/advisories/GHSA-44cg-qcpr-fwjh'} | null |
GHSA | GHSA-mr7p-25v2-35wr | Path Traversal in nltk | NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction. | {'CVE-2019-14751'} | 2021-08-17T22:10:30Z | 2019-08-23T21:53:51Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/mssalvatore/CVE-2019-14751_PoC', 'https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QI4IJGLZQ5S7C5LNRNROHAO2P526XE3D/', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00054.html', 'https://github.com/advisories/GHSA-mr7p-25v2-35wr', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00001.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14751', 'https://github.com/nltk/nltk/commit/f59d7ed8df2e0e957f7f247fe218032abdbe9a10', 'https://github.com/nltk/nltk/blob/3.4.5/ChangeLog', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGZSSEJH7RHH3RBUEVWWYT75QU67J7SE/'} | null |
GHSA | GHSA-r5fx-8r73-v86c | Cross-Site Scripting in angular | Versions of `angular` prior to 1.5.0-beta.1 are vulnerable to Cross-Site Scripting. The package fails to sanitize `xlink:href` attributes, which may allow attackers to execute arbitrary JavaScript in a victim's browser if the value is user-controlled.
## Recommendation
Upgrade to version 1.5.0-beta.1 or later. | {'CVE-2019-14863'} | 2021-08-19T17:14:00Z | 2020-02-14T23:08:49Z | MODERATE | 6.1 | {'CWE-79'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14863', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14863', 'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a', 'https://snyk.io/vuln/npm:angular:20150807', 'https://www.npmjs.com/advisories/1453', 'https://github.com/advisories/GHSA-r5fx-8r73-v86c', 'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82', 'https://github.com/angular/angular.js/pull/12524'} | null |
GHSA | GHSA-7mqr-2v3q-v2wm | Ignored errors on token revokation in github.com/ory/fosite | ### Impact
The `TokenRevocationHandler` ignores errors coming from the storage. This can lead to unexpected 200 status codes indicating successful revocation while the token is still valid. Whether an attacker can use this for her advantage depends on the ability to trigger errors in the store.
### References
[RFC 7009](https://tools.ietf.org/html/rfc7009#section-2.2.1) states that a 503 HTTP code must be returned when the server has a problem. | {'CVE-2020-15223'} | 2022-04-19T19:02:34Z | 2021-05-24T16:57:39Z | HIGH | 8 | {'CWE-755'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15223', 'https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319', 'https://tools.ietf.org/html/rfc7009#section-2.2.1', 'https://github.com/ory/fosite/security/advisories/GHSA-7mqr-2v3q-v2wm', 'https://github.com/advisories/GHSA-7mqr-2v3q-v2wm'} | null |
GHSA | GHSA-6m8p-x4qw-gh5j | Insufficient Session Expiration in OpenStack Keystone | An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access. | {'CVE-2020-12690'} | 2021-07-14T19:43:23Z | 2021-06-09T17:34:09Z | HIGH | 8.8 | {'CWE-613'} | {'https://www.openwall.com/lists/oss-security/2020/05/06/6', 'https://github.com/advisories/GHSA-6m8p-x4qw-gh5j', 'https://usn.ubuntu.com/4480-1/', 'https://security.openstack.org/ossa/OSSA-2020-005.html', 'https://bugs.launchpad.net/keystone/+bug/1873290', 'http://www.openwall.com/lists/oss-security/2020/05/07/3', 'https://lists.apache.org/thread.html/re4ffc55cd2f1b55a26e07c83b3c22c3fe4bae6054d000a57fb48d8c2@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12690'} | null |
GHSA | GHSA-468q-v4jj-485h | Inefficient Regular Expression Complexity in taro | taro is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3804'} | 2021-09-20T20:09:59Z | 2021-09-20T20:09:59Z | HIGH | 7.5 | {'CWE-1333'} | {'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5', 'https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3804', 'https://github.com/advisories/GHSA-468q-v4jj-485h'} | null |
GHSA | GHSA-rjmf-p882-645m | Improper Certificate Validation | A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering client-side field level encryption (CSFLE) ineffective. This issue was discovered during internal testing and affects mongodb-client-encryption module version 1.2.0, which was available from 2021-Jan-29 and deprecated in the NPM Registry on 2021-Feb-04. This vulnerability does not impact driver traffic payloads with CSFLE-supported key services from applications residing inside the AWS, GCP, and Azure nework fabrics due to compensating controls in these environments. This issue does not impact driver workloads that don’t use Field Level Encryption. | {'CVE-2021-20327'} | 2021-04-12T18:51:17Z | 2021-04-12T18:51:17Z | MODERATE | 6.8 | {'CWE-295'} | {'https://github.com/advisories/GHSA-rjmf-p882-645m', 'https://jira.mongodb.org/browse/NODE-3125', 'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b', 'https://www.npmjs.com/advisories/1660', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20327'} | null |
GHSA | GHSA-862g-9h5m-m3qv | coreos-installer < 0.10.0 writes world-readable Ignition config to installed system | ### Impact
On systems installed with coreos-installer before 0.10.0, the user-provided Ignition config was written to `/boot/ignition/config.ign` with world-readable permissions, granting unprivileged users access to any secrets included in the config.
Default configurations of Fedora CoreOS and RHEL CoreOS do not include any unprivileged user accounts. In addition, instances launched from a cloud image, and systems provisioned with the `ignition.config.url` kernel argument, do not use the `config.ign` file and are unaffected.
### Patches
coreos-installer 0.10.0 and later [writes](https://github.com/coreos/coreos-installer/pull/571) the Ignition config with restricted permissions.
### Workarounds
On Fedora CoreOS systems installed from version 34.20210711.3.0 (stable), 34.20210711.2.0 (testing), 34.20210711.1.1 (next) and later, the `/boot/ignition` directory and its contents are removed after provisioning is complete. All Fedora CoreOS systems that have updated to these versions or later have automatically removed the `/boot/ignition` directory and no action is required.
On other systems, `/boot/ignition/config.ign` can be removed manually, as it is not used after provisioning is complete:
```
sudo mount -o remount,rw /boot
sudo rm -rf /boot/ignition
```
### References
For more information, see https://github.com/coreos/fedora-coreos-tracker/issues/889.
### For more information
If you have any questions or comments about this advisory, [open an issue in coreos-installer](https://github.com/coreos/coreos-installer/issues/new/choose) or email the CoreOS [development mailing list](https://lists.fedoraproject.org/archives/list/coreos@lists.fedoraproject.org/). | {'CVE-2021-3917'} | 2022-04-19T19:03:13Z | 2021-11-08T18:01:13Z | LOW | 0 | null | {'https://github.com/advisories/GHSA-862g-9h5m-m3qv', 'https://github.com/coreos/coreos-installer/security/advisories/GHSA-862g-9h5m-m3qv', 'https://github.com/coreos/coreos-installer/commit/2a36405339c87b16ed6c76e91ad5b76638fbdb0c', 'https://github.com/coreos/coreos-installer/releases/tag/v0.10.0'} | null |
GHSA | GHSA-m6vm-8g8v-xfjh | Out-of-bounds Write in OpenCV | An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV 4.1.0 (corresponds with OpenCV-Python 4.1.0.25). A specially crafted XML file can cause a buffer overflow, resulting in multiple heap corruptions and potential code execution. An attacker can provide a specially crafted file to trigger this vulnerability. | {'CVE-2019-5063'} | 2022-04-20T19:15:09Z | 2021-10-12T22:23:13Z | HIGH | 8.8 | {'CWE-787'} | {'https://github.com/advisories/GHSA-m6vm-8g8v-xfjh', 'https://github.com/opencv/opencv-python/releases/tag/25', 'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5063', 'https://github.com/opencv/opencv/issues/16951', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-g8j6-m4p7-5rfq | High severity vulnerability that affects DotNetNuke.Core | DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources. | {'CVE-2017-0929'} | 2021-09-10T20:29:40Z | 2018-10-16T17:18:12Z | HIGH | 7.5 | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-0929', 'https://github.com/advisories/GHSA-g8j6-m4p7-5rfq', 'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3'} | null |
GHSA | GHSA-3rhm-67j6-42jq | Moderate severity vulnerability that affects com.jason-goodwin:authentikat-jwt_2.12 | A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests. | {'CVE-2017-18239'} | 2021-08-31T21:23:38Z | 2018-11-09T17:50:40Z | CRITICAL | 9.8 | null | {'https://github.com/jasongoodwin/authentikat-jwt/issues/12', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18239', 'https://github.com/advisories/GHSA-3rhm-67j6-42jq', 'https://github.com/jasongoodwin/authentikat-jwt/pull/36', 'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0'} | null |
GHSA | GHSA-rh4p-g7x6-8pqg | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1092, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1062'} | 2021-03-29T20:59:09Z | 2021-03-29T20:59:09Z | HIGH | 7.5 | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1062', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8', 'https://github.com/advisories/GHSA-rh4p-g7x6-8pqg', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1062'} | null |
GHSA | GHSA-4cj8-g9cp-v5wr | High severity vulnerability that affects blueimp-file-upload | Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0 | {'CVE-2018-9206'} | 2021-09-01T14:43:45Z | 2018-10-22T18:53:56Z | CRITICAL | 9.8 | {'CWE-434'} | {'https://www.exploit-db.com/exploits/45790/', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.securityfocus.com/bid/105679', 'http://www.securityfocus.com/bid/106629', 'https://nvd.nist.gov/vuln/detail/CVE-2018-9206', 'http://www.vapidlabs.com/advisory.php?v=204', 'https://www.exploit-db.com/exploits/46182/', 'https://github.com/advisories/GHSA-4cj8-g9cp-v5wr', 'https://wpvulndb.com/vulnerabilities/9136'} | null |
GHSA | GHSA-x3mh-jvjw-3xwx | Infinite loop in `BN_mod_sqrt()` reachable when parsing certificates | The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc). | {'CVE-2022-0778'} | 2022-05-03T20:40:35Z | 2022-03-16T00:00:45Z | HIGH | 7.5 | {'CWE-835'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65', 'https://rustsec.org/advisories/RUSTSEC-2022-0014.html', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html', 'https://www.debian.org/security/2022/dsa-5103', 'https://www.tenable.com/security/tns-2022-09', 'https://security.netapp.com/advisory/ntap-20220321-0002/', 'https://www.tenable.com/security/tns-2022-06', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/', 'https://www.tenable.com/security/tns-2022-07', 'https://github.com/advisories/GHSA-x3mh-jvjw-3xwx', 'https://www.openssl.org/news/secadv/20220315.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0778', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83', 'https://www.tenable.com/security/tns-2022-08', 'https://security.netapp.com/advisory/ntap-20220429-0005/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/'} | null |
GHSA | GHSA-wpfr-6297-9v57 | User object created with invalid provider data in GoTrue | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Under certain circumstances a valid user object would have been created with invalid provider metadata.
This vulnerability affects everyone running an instance of GoTrue as a service. We advise you to update especially if you are using the provider metadata from the user object to secure other resources.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
A patch is available with the release of version [1.0.1 on Github](https://github.com/netlify/gotrue/releases/tag/v1.0.1).
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
If you don't rely on the provider metadata in the user object, you might not be affected. We still strongly recommend upgrading.
### References
_Are there any links users can visit to find out more?_
This problem was initially found and reported by the team at Supabase: https://github.com/supabase/gotrue/security/advisories/GHSA-5hvv-9cqv-894r. We want to thank them for the cooperation around this report.
In contrast to their advisory, we decided to set the severity to "Moderate" since the provider metadata is not an inherent security feature of this GoTrue codebase or the Netlify ecosystem.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@netlify.com](mailto:security@netlify.com)
| null | 2022-02-11T21:52:12Z | 2022-02-09T22:29:01Z | MODERATE | 0 | null | {'https://github.com/netlify/gotrue/pull/313', 'https://github.com/advisories/GHSA-wpfr-6297-9v57', 'https://github.com/netlify/gotrue/releases/tag/v1.0.1', 'https://github.com/netlify/gotrue/commit/4d8a3b39fe485a5f83c70617d594be01130c5b83', 'https://github.com/netlify/gotrue/security/advisories/GHSA-wpfr-6297-9v57'} | null |
GHSA | GHSA-656c-6cxf-hvcv | Deserialization of Untrusted Data in Flask-Caching | Flask-Cache adds easy cache support to Flask. The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. | {'CVE-2021-33026'} | 2022-05-05T13:53:57Z | 2021-06-18T18:33:40Z | CRITICAL | 9.8 | {'CWE-502', 'CWE-269'} | {'https://github.com/sh4nks/flask-caching/pull/209', 'https://github.com/advisories/GHSA-656c-6cxf-hvcv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33026'} | null |
GHSA | GHSA-3c33-3465-fhx2 | Exposure of Resource to Wrong Sphere in LibreNMS | An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php. | {'CVE-2020-15877'} | 2021-09-08T17:27:17Z | 2021-09-08T17:27:16Z | HIGH | 8.8 | {'CWE-668'} | {'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c', 'https://shielder.it/blog', 'https://github.com/advisories/GHSA-3c33-3465-fhx2', 'https://github.com/librenms/librenms/compare/1.65...1.65.1', 'https://community.librenms.org/c/announcements', 'https://github.com/librenms/librenms/pull/11915', 'https://github.com/librenms/librenms/releases/tag/1.65.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15877'} | null |
GHSA | GHSA-xmq7-7fxm-rr79 | Denial of Service in Tensorflow | ### Impact
By controlling the `fill` argument of [`tf.strings.as_string`](https://www.tensorflow.org/api_docs/python/tf/strings/as_string), a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/as_string_op.cc#L68-L74
This can result in unexpected output:
```python
In [1]: tf.strings.as_string(input=[1234], width=6, fill='-')
Out[1]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['1234 '], dtype=object)>
In [2]: tf.strings.as_string(input=[1234], width=6, fill='+')
Out[2]: <tf.Tensor: shape=(1,), dtype=string, numpy=array([' +1234'], dtype=object)>
In [3]: tf.strings.as_string(input=[1234], width=6, fill="h")
Out[3]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['%6d'], dtype=object)>
In [4]: tf.strings.as_string(input=[1234], width=6, fill="d")
Out[4]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['12346d'], dtype=object)>
In [5]: tf.strings.as_string(input=[1234], width=6, fill="o")
Out[5]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['23226d'], dtype=object)>
In [6]: tf.strings.as_string(input=[1234], width=6, fill="x")
Out[6]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['4d26d'], dtype=object)>
In [7]: tf.strings.as_string(input=[1234], width=6, fill="g")
Out[7]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['8.67458e-3116d'], dtype=object)>
In [8]: tf.strings.as_string(input=[1234], width=6, fill="a")
Out[8]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['0x0.00ff7eebb4d4p-10226d'], dtype=object)>
In [9]: tf.strings.as_string(input=[1234], width=6, fill="c")
Out[9]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['\xd26d'], dtype=object)>
In [10]: tf.strings.as_string(input=[1234], width=6, fill="p")
Out[10]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['0x4d26d'], dtype=object)>
In [11]: tf.strings.as_string(input=[1234], width=6, fill='m')
Out[11]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['Success6d'], dtype=object)>
```
However, passing in `n` or `s` results in segmentation fault.
### Patches
We have patched the issue in 33be22c65d86256e6826666662e40dbdfe70ee83 and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2020-15203'} | 2021-11-19T15:18:24Z | 2020-09-25T18:28:37Z | HIGH | 7.5 | {'CWE-20', 'CWE-134'} | {'https://github.com/advisories/GHSA-xmq7-7fxm-rr79', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15203', 'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'} | null |
GHSA | GHSA-455w-gv5p-wgg3 | Cross-site Scripting in pimcore | pimcore is vulnerable to Stored XSS at Name field in the setting tab of the Global Targeting Rules. | {'CVE-2022-0260'} | 2022-01-26T22:10:48Z | 2022-01-26T22:10:48Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/pimcore/pimcore/pull/11205', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0260', 'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109', 'https://huntr.dev/bounties/89e4ab60-21ec-4396-92ad-5b78d4c2897e', 'https://github.com/advisories/GHSA-455w-gv5p-wgg3'} | null |
GHSA | GHSA-m7xv-7p93-g6q8 | Malicious Package in libubx | Version 1.0.3 of `libubx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | null | 2020-09-03T00:35:35Z | 2020-09-03T00:35:35Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-m7xv-7p93-g6q8', 'https://www.npmjs.com/advisories/938'} | null |
GHSA | GHSA-qj2g-642f-4jrv | Malicious Package in carloprojectlesang | All versions of `carloprojectlesang` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company. | null | 2021-09-30T21:15:22Z | 2020-09-02T21:17:30Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-qj2g-642f-4jrv', 'https://www.npmjs.com/advisories/872'} | null |
GHSA | GHSA-m59c-jpc8-m2x4 | In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder | An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86. | {'CVE-2018-1336'} | 2022-04-27T13:38:07Z | 2018-10-17T16:32:18Z | HIGH | 7.5 | {'CWE-835'} | {'http://www.securitytracker.com/id/1041375', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2921', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-m59c-jpc8-m2x4', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1336', 'https://access.redhat.com/errata/RHSA-2018:2701', 'https://access.redhat.com/errata/RHSA-2018:2700', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://security.netapp.com/advisory/ntap-20180817-0001/', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2740', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://access.redhat.com/errata/RHSA-2018:2945', 'https://usn.ubuntu.com/3723-1/', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/104898', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHEA-2018:2188', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2018:2743', 'https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS', 'https://www.debian.org/security/2018/dsa-4281', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://access.redhat.com/errata/RHEA-2018:2189', 'https://access.redhat.com/errata/RHSA-2018:2930'} | null |
GHSA | GHSA-4574-qv3w-fcmg | Deserialization of Untrusted Data in codeception/codeception | This affects the package codeception/codeception from 4.0.0 before 4.1.22 and before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation. | {'CVE-2021-23420'} | 2021-09-01T18:36:15Z | 2021-09-01T18:36:15Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/Codeception/Codeception/blob/4.1/ext/RunProcess.php#L52', 'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71', 'https://github.com/advisories/GHSA-4574-qv3w-fcmg', 'https://snyk.io/vuln/SNYK-PHP-CODECEPTIONCODECEPTION-1324585', 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71', 'https://github.com/JinYiTong/poc', 'https://github.com/Codeception/Codeception/blob/4.1/CHANGELOG-4.x.md#4122', 'https://github.com/Codeception/Codeception/pull/6241', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23420'} | null |
GHSA | GHSA-hh7m-rx4f-4vpv | CSRF can expose users authentication token | ### Issue
The /login and /change endpoints can return the authenticated user's authentication token in response to a GET request. Since GET requests aren't protected with a CSRF token, this could lead to a malicious 3rd party site acquiring the authentication token.
### Patches
Version 3.4.5 and soon to be released 4.0.0 are patched.
### Workarounds
If you aren't using authentication tokens - you can set the SECURITY_TOKEN_MAX_AGE to "0" (seconds) which should make the token unusable.
### References
None | {'CVE-2021-21241'} | 2021-01-13T19:29:09Z | 2021-01-11T20:38:28Z | HIGH | 0 | {'CWE-352'} | {'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-hh7m-rx4f-4vpv', 'https://github.com/Flask-Middleware/flask-security/commit/61d313150b5f620d0b800896c4f2199005e84b1f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21241', 'https://github.com/Flask-Middleware/flask-security/pull/422', 'https://github.com/advisories/GHSA-hh7m-rx4f-4vpv', 'https://github.com/Flask-Middleware/flask-security/commit/6d50ee9169acf813257c37b75babe9c28e83542a', 'https://github.com/Flask-Middleware/flask-security/releases/tag/3.4.5', 'https://pypi.org/project/Flask-Security-Too'} | null |
GHSA | GHSA-jcq3-cprp-m333 | Privilege escalation in mysql-connector-jav | Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | {'CVE-2019-2692'} | 2021-09-22T18:47:46Z | 2020-07-01T17:12:20Z | MODERATE | 6.3 | {'CWE-843'} | {'https://github.com/advisories/GHSA-jcq3-cprp-m333', 'https://security.netapp.com/advisory/ntap-20190423-0002/', 'http://www.securityfocus.com/bid/107925', 'https://nvd.nist.gov/vuln/detail/CVE-2019-2692', 'https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'} | null |
GHSA | GHSA-f68h-hfqp-8rmv | Path Traversal in Crafter CMS Crafter Studio | Crafter CMS Crafter Studio 3.0.1 has a directory traversal vulnerability which allows unauthenticated attackers to view files from the operating system. | {'CVE-2017-15684'} | 2022-02-09T23:08:03Z | 2022-02-09T23:08:03Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/advisories/GHSA-f68h-hfqp-8rmv', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15684', 'http://crafter.com', 'https://docs.craftercms.org/en/3.0/security/advisory.html'} | null |
GHSA | GHSA-32rp-q37p-jg6w | Insecure plugin handling in Mattermost | Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabilities. | {'CVE-2022-1384'} | 2022-04-28T21:12:16Z | 2022-04-20T00:00:30Z | HIGH | 8.8 | {'CWE-862'} | {'https://github.com/advisories/GHSA-32rp-q37p-jg6w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1384', 'https://mattermost.com/security-updates/'} | null |
GHSA | GHSA-xmmp-hrmx-x5g7 | Malicious Package in bowe | Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T21:37:38Z | 2020-09-02T21:32:22Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/899', 'https://github.com/advisories/GHSA-xmmp-hrmx-x5g7'} | null |
GHSA | GHSA-4gfq-6m28-m5mg | Improper neutralization of arguments in freediskspace | This affects all versions of package freediskspace. The vulnerability arises out of improper neutralization of arguments in line 71 of freediskspace.js. | {'CVE-2020-7775'} | 2021-04-13T15:16:11Z | 2021-04-13T15:16:11Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7775', 'https://github.com/advisories/GHSA-4gfq-6m28-m5mg'} | null |
GHSA | GHSA-g9rq-x4fj-f5hx | Remote Code Execution Through Image Uploads in BookStack | ### Impact
A user could upload PHP files through image upload functions, which would allow them to execute code on the host system remotely. They would then have the permissions of the PHP process.
This most impacts scenarios where non-trusted users are given permission to upload images in any area of the application.
### Patches
The issue was addressed in a series of patches: v0.25.3, v0.25.4 and v0.25.5.
Users should upgrade to at least v0.25.5 to avoid this patch but ideally the latest BookStack version as previous versions are un-supported.
### Workarounds
Depending on BookStack version, you could use the [local_secure](https://www.bookstackapp.com/docs/admin/upload-config/#local-secure) image storage option, or use s3 or a similar compatible service.
Preventing direct execution of any `php` files, apart from the `public/index.php` file, though web-server configuration would also prevent this.
### References
[BookStack Beta v0.25.3](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.3)
[BookStack Beta v0.25.4](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.4)
[BookStack Beta v0.25.5](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.5)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the BookStack GitHub repository](BookStackApp/BookStack/issues).
* Ask on the [BookStack Discord chat](https://discord.gg/ztkBqR2).
* Follow the [BookStack Security advise](https://github.com/BookStackApp/BookStack#-security) to contact someone privately. | {'CVE-2020-5256'} | 2022-04-19T19:02:24Z | 2020-03-13T20:21:27Z | HIGH | 7.9 | {'CWE-95'} | {'https://github.com/advisories/GHSA-g9rq-x4fj-f5hx', 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.3', 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.5', 'https://github.com/BookStackApp/BookStack/security/advisories/GHSA-g9rq-x4fj-f5hx', 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5256'} | null |
GHSA | GHSA-v5jg-558j-q67c | Moderate severity vulnerability that affects actionpack | Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name. | {'CVE-2011-2931'} | 2021-09-20T15:11:54Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-79'} | {'http://secunia.com/advisories/45921', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', 'http://www.debian.org/security/2011/dsa-2301', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-v5jg-558j-q67c', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=731436', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2931'} | null |
GHSA | GHSA-3hrc-f439-727g | Moderate severity vulnerability that affects org.apache.camel:camel-core | XML external entity (XXE) vulnerability in the XML converter setup in converter/jaxp/XmlConverter.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allows remote attackers to read arbitrary files via an external entity in an SAXSource. | {'CVE-2015-0263'} | 2021-08-31T21:06:58Z | 2018-10-16T23:08:43Z | MODERATE | 0 | {'CWE-611'} | {'http://www.securitytracker.com/id/1032442', 'http://rhn.redhat.com/errata/RHSA-2015-1539.html', 'https://camel.apache.org/security-advisories.data/CVE-2015-0263.txt.asc', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0263', 'https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=7d19340bcdb42f7aae584d9c5003ac4f7ddaee36', 'http://rhn.redhat.com/errata/RHSA-2015-1538.html', 'http://rhn.redhat.com/errata/RHSA-2015-1041.html', 'https://github.com/advisories/GHSA-3hrc-f439-727g', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'} | null |
GHSA | GHSA-j6v9-xgvh-f796 | Command Injection in wxchangba | All versions of `wxchangba` are vulnerable to Command Injection. The package does not validate user input on the `reqPostMaterial` function, passing contents of the `file` parameter to an exec call. This may allow attackers to run arbitrary commands in the system.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-09-28T16:02:03Z | 2020-09-11T21:11:34Z | MODERATE | 0 | {'CWE-77'} | {'https://www.npmjs.com/advisories/960', 'https://github.com/advisories/GHSA-j6v9-xgvh-f796'} | null |
GHSA | GHSA-jmgf-p46x-982h | Moderate severity vulnerability that affects rails | CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function. | {'CVE-2008-5189'} | 2021-09-14T19:47:41Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-352'} | {'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html', 'http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d', 'http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk', 'http://www.securityfocus.com/bid/32359', 'https://nvd.nist.gov/vuln/detail/CVE-2008-5189', 'https://github.com/advisories/GHSA-jmgf-p46x-982h', 'http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing'} | null |
GHSA | GHSA-r6h7-5pq2-j77h | Insufficiently random values in Ansible | A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6. | {'CVE-2020-10729'} | 2021-12-13T14:30:45Z | 2021-06-15T16:10:11Z | MODERATE | 5 | {'CWE-330'} | {'https://www.debian.org/security/2021/dsa-4950', 'https://bugzilla.redhat.com/show_bug.cgi?id=1831089', 'https://github.com/advisories/GHSA-r6h7-5pq2-j77h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10729', 'https://github.com/ansible/ansible/blob/v2.9.6/changelogs/CHANGELOG-v2.9.rst', 'https://github.com/ansible/ansible/pull/67429/', 'https://github.com/ansible/ansible/issues/34144'} | null |
GHSA | GHSA-jfx5-7mr2-g8hg | Malicious Package in alico | All versions of `alico` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T18:35:27Z | 2020-09-03T17:31:41Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1047', 'https://github.com/advisories/GHSA-jfx5-7mr2-g8hg'} | null |
GHSA | GHSA-pxr8-w3jq-rcwj | Moderate severity vulnerability that affects rails_admin | An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability. | {'CVE-2017-12098'} | 2021-09-16T19:15:47Z | 2018-03-05T19:37:23Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-pxr8-w3jq-rcwj', 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12098', 'http://www.securityfocus.com/bid/102486'} | null |
GHSA | GHSA-9fh3-vh3h-q4g3 | Moderate severity vulnerability that affects activesupport | Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability." | {'CVE-2011-2932'} | 2021-09-07T21:32:10Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2932', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplain', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://github.com/advisories/GHSA-9fh3-vh3h-q4g3', 'http://secunia.com/advisories/45917', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd', 'https://bugzilla.redhat.com/show_bug.cgi?id=731435'} | null |
GHSA | GHSA-27qf-jwm8-g7f3 | FPE in LSH in TFLite | ### Impact
An attacker can craft a TFLite model that would trigger a division by zero error in LSH [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/lsh_projection.cc#L118).
```cc
int RunningSignBit(const TfLiteTensor* input, const TfLiteTensor* weight,
float seed) {
int input_item_bytes = input->bytes / SizeOfDimension(input, 0);
// ...
}
```
There is no check that the first dimension of the input is non zero.
### Patches
We have patched the issue in GitHub commit [0575b640091680cfb70f4dd93e70658de43b94f9](https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick thiscommit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security. | {'CVE-2021-37691'} | 2021-08-25T14:39:17Z | 2021-08-25T14:39:17Z | MODERATE | 5.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27qf-jwm8-g7f3', 'https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37691', 'https://github.com/advisories/GHSA-27qf-jwm8-g7f3'} | null |
GHSA | GHSA-2q4g-w47c-4674 | Unpreventable top-level navigation | ### Impact
The `will-navigate` event that apps use to prevent navigations to unexpected destinations [as per our security recommendations](https://www.electronjs.org/docs/tutorial/security) can be bypassed when a sub-frame performs a top-frame navigation across sites.
### Patches
* `11.0.0-beta.1`
* `10.0.1`
* `9.3.0`
* `8.5.1`
### Workarounds
Sandbox all your iframes using the [`sandbox` attribute](https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#attr-sandbox). This will prevent them creating top-frame navigations and is good practice anyway.
### For more information
If you have any questions or comments about this advisory:
* Email us at security@electronjs.org | {'CVE-2020-15174'} | 2022-04-19T19:02:34Z | 2020-10-06T14:24:04Z | HIGH | 7.5 | {'CWE-20', 'CWE-693'} | {'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15174', 'https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674', 'https://github.com/advisories/GHSA-2q4g-w47c-4674'} | null |
GHSA | GHSA-5hg3-6c2f-f3wr | Moderate severity vulnerability that affects django | django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect. | {'CVE-2018-14574'} | 2021-09-01T22:14:28Z | 2018-10-04T21:58:46Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/advisories/GHSA-5hg3-6c2f-f3wr', 'https://access.redhat.com/errata/RHSA-2019:0265', 'http://www.securityfocus.com/bid/104970', 'https://www.djangoproject.com/weblog/2018/aug/01/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14574', 'http://www.securitytracker.com/id/1041403', 'https://usn.ubuntu.com/3726-1/', 'https://www.debian.org/security/2018/dsa-4264'} | null |
GHSA | GHSA-wxc4-f4m6-wwqv | Excessive Platform Resource Consumption within a Loop in Kubernetes | The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML. | {'CVE-2019-11254'} | 2021-12-20T16:55:06Z | 2021-12-20T16:55:06Z | MODERATE | 6.5 | {'CWE-1050'} | {'https://github.com/kubernetes/kubernetes/pull/87467/commits/b86df2bec4f377afc0ca03482ffad2f0a49a83b8', 'https://github.com/advisories/GHSA-wxc4-f4m6-wwqv', 'https://github.com/kubernetes/kubernetes/issues/89535', 'https://security.netapp.com/advisory/ntap-20200413-0003/', 'https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ', 'https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11254'} | null |
GHSA | GHSA-jq42-hfch-42f3 | Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint | # Impact
Due to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint.
An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container.
Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint.
# Patches
All users should upgrade to Singularity 3.7.4 or later.
# Workarounds
Users who only interact with the default remote endpoint or do not use the library:// url are not affected.
Installations with an execution control list configured to restrict execution to containers signed with specific secure keys are not affected.
# Acknowledgements
This issue was found by Mike Frisch and brought to our attention by Sylabs. Sylabs is making a [coordinated disclosure](https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394).
# For more information
General questions about the impact of the advisory can be asked in the:
[Singularity Slack Channel](https://join.slack.com/t/hpcng/shared_invite/zt-qda4h1ls-OP0Uouq6sSmVE6i_0NrWdw)
[Singularity Mailing List](https://groups.google.com/a/lbl.gov/g/singularity)
Any sensitive security concerns should be directed to: [singularity-security@hpcng.org](mailto:singularity-security@hpcng.org)
| null | 2022-04-19T19:02:58Z | 2021-06-01T21:20:53Z | MODERATE | 6.3 | {'CWE-20'} | {'https://github.com/advisories/GHSA-jq42-hfch-42f3', 'https://github.com/hpcng/singularity/security/advisories/GHSA-jq42-hfch-42f3', 'https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394'} | null |
GHSA | GHSA-gwg9-rgvj-4h5j | Code Injection in morgan | Verisons of `morgan` before 1.9.1 are vulnerable to code injection when user input is allowed into the filter or combined with a prototype pollution attack.
## Recommendation
Update to version 1.9.1 or later. | {'CVE-2019-5413'} | 2021-01-08T18:45:38Z | 2019-03-25T18:03:23Z | MODERATE | 0 | {'CWE-94'} | {'https://github.com/advisories/GHSA-gwg9-rgvj-4h5j', 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5413', 'https://www.npmjs.com/advisories/736', 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/473.json', 'https://hackerone.com/reports/390881'} | null |
GHSA | GHSA-x7rp-74x2-mjf3 | Segfault in Tensorflow | ### Impact
The `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Thus, the [following code](https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L248-L265
) sets up conditions to cause a heap buffer overflow:
```cc
auto per_batch_counts = BatchedMap<W>(num_batches);
int batch_idx = 0;
for (int idx = 0; idx < num_values; ++idx) {
while (idx >= splits_values(batch_idx)) {
batch_idx++;
}
const auto& value = values_values(idx);
if (value >= 0 && (maxlength_ <= 0 || value < maxlength_)) {
per_batch_counts[batch_idx - 1][value] = 1;
}
}
```
A `BatchedMap` is equivalent to a vector where each element is a hashmap. However, if the first element of `splits_values` is not 0, `batch_idx` will never be 1, hence there will be no hashmap at index 0 in `per_batch_counts`. Trying to access that in the user code results in a segmentation fault.
### Patches
We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
We recommend users to upgrade to TensorFlow 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4) | {'CVE-2020-15200'} | 2021-11-19T15:19:14Z | 2020-09-25T18:28:32Z | MODERATE | 5.9 | {'CWE-20', 'CWE-787', 'CWE-122'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15200', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x7rp-74x2-mjf3', 'https://github.com/advisories/GHSA-x7rp-74x2-mjf3', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null |
GHSA | GHSA-3cqr-58rm-57f8 | Arbitrary Code Execution in Handlebars | Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS). | {'CVE-2019-20920'} | 2022-02-10T20:38:19Z | 2022-02-10T20:38:19Z | HIGH | 8.1 | {'CWE-94'} | {'https://www.npmjs.com/package/handlebars', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20920', 'https://www.npmjs.com/advisories/1316', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478', 'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e', 'https://github.com/advisories/GHSA-3cqr-58rm-57f8', 'https://www.npmjs.com/advisories/1324'} | null |
GHSA | GHSA-cg57-p69r-3m7p | Improper file handling in matrix-react-sdk | Matrix-React-SDK is a react-based SDK for inserting a Matrix chat/voip client into a web page. Before version 3.21.0, when uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file. This can only occur after several user interactions to open the preview in a separate tab. This only impacts the local user while in the process of uploading. It cannot be exploited remotely or by other users. This vulnerability is patched in version 3.21.0. | {'CVE-2021-32622'} | 2022-02-10T23:46:51Z | 2022-02-10T23:46:51Z | MODERATE | 4.2 | {'CWE-434', 'CWE-74'} | {'https://github.com/matrix-org/matrix-react-sdk/pull/5981', 'https://github.com/advisories/GHSA-cg57-p69r-3m7p', 'https://www.npmjs.com/package/matrix-react-sdk', 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-8796-gc9j-63rv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32622'} | null |
GHSA | GHSA-wq4r-8342-jmc9 | SQL injection in vhs (aka VHS: Fluid ViewHelpers) | The vhs (aka VHS: Fluid ViewHelpers) extension before 5.1.1 for TYPO3 allows SQL injection via isLanguageViewHelper. | {'CVE-2021-28381'} | 2021-03-29T20:24:44Z | 2021-03-29T20:24:44Z | CRITICAL | 5 | {'CWE-89'} | {'https://typo3.org/security/advisory/typo3-ext-sa-2021-001', 'https://github.com/advisories/GHSA-wq4r-8342-jmc9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28381'} | null |
GHSA | GHSA-cv7x-6rc6-pq5v | Double free in containers | An issue was discovered in the containers crate before 0.9.11 for Rust. When a panic occurs, a util::{mutate,mutate2} double drop can be performed. | {'CVE-2021-25907'} | 2021-08-25T20:53:05Z | 2021-08-25T20:53:05Z | CRITICAL | 9.8 | {'CWE-415'} | {'https://github.com/advisories/GHSA-cv7x-6rc6-pq5v', 'https://rustsec.org/advisories/RUSTSEC-2021-0010.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25907', 'https://github.com/strake/containers.rs/issues/2'} | null |
GHSA | GHSA-9qw8-ccq9-ffj9 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1139'} | 2021-03-29T20:57:53Z | 2021-03-29T20:57:53Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-9qw8-ccq9-ffj9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1139', 'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1139', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null |
GHSA | GHSA-hggx-3h72-49ww | Moderate severity vulnerability that affects Pillow | Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file. | {'CVE-2016-0740'} | 2021-09-14T17:17:46Z | 2018-07-24T20:03:51Z | MODERATE | 6.5 | {'CWE-119'} | {'http://www.debian.org/security/2016/dsa-3499', 'https://security.gentoo.org/glsa/201612-52', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0740', 'https://github.com/advisories/GHSA-hggx-3h72-49ww', 'https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst'} | null |
GHSA | GHSA-hx2x-85gr-wrpq | Out of bounds access in tensorflow-lite | ### Impact
In TensorFlow Lite models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reference_ops.h#L2625-L2631
Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `output_data` buffer.
This might result in a segmentation fault but it can also be used to further corrupt the memory and can be chained with other vulnerabilities to create more advanced exploits.
### Patches
We have patched the issue in 204945b and will release patch releases for all affected versions.
We recommend users to upgrade to TensorFlow 2.2.1, or 2.3.1.
### Workarounds
A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that the segment ids are all positive, although this only handles the case when the segment ids are stored statically in the model.
A similar validation could be done if the segment ids are generated at runtime between inference steps.
If the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been discovered from a variant analysis of [GHSA-p2cq-cprg-frvm](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2cq-cprg-frvm). | {'CVE-2020-15212'} | 2021-08-26T15:20:18Z | 2020-09-25T18:29:00Z | HIGH | 8.1 | {'CWE-787'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hx2x-85gr-wrpq', 'https://github.com/advisories/GHSA-hx2x-85gr-wrpq', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15212', 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'} | null |
GHSA | GHSA-xr2c-5w89-63pv | Untrusted Search Path in Poetry | Poetry prior to v1.1.9 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS. | {'CVE-2022-26184'} | 2022-03-30T21:05:22Z | 2022-03-23T00:00:24Z | CRITICAL | 9.8 | {'CWE-426'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-26184', 'https://github.com/python-poetry/poetry/releases/tag/1.1.9', 'https://github.com/advisories/GHSA-xr2c-5w89-63pv', 'https://github.com/python-poetry/poetry-core/pull/205/commits/fa9cb6f358ae840885c700f954317f34838caba7'} | null |
GHSA | GHSA-mp6f-p9gp-vpj9 | Array size is not checked in sized-chunks | An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with pair(). | {'CVE-2020-25792'} | 2021-08-25T20:46:06Z | 2021-08-25T20:46:06Z | HIGH | 0 | {'CWE-129'} | {'https://github.com/bodil/sized-chunks/issues/11', 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25792', 'https://github.com/advisories/GHSA-mp6f-p9gp-vpj9'} | null |
GHSA | GHSA-2xm2-xj2q-qgpj | receiving subscription objects with deleted session | Original Message:
Hi,
I create objects with one client with an ACL of all users with a specific column value. Thats working so far.
Then I deleted the session object from one user to look if he can receive subscription objects and he can receive them.
The client with the deleted session cant create new objects, which Parse restricts right.
The LiveQueryServer doesnt detect deleted sessions after the websocket connection was established.
There should be a mechanism that checks in an specific interval if the session exists.
I dont know if its true with expired sessions.
Any solutions?
Parse version: 4.3.0
Parse js SDK version: 2.17
Solution:
Hi guys.
I've found and fixed the problem. It happens because there are two caches in place for the session token:
- at Parse Server level, which, according with the docs, should be changed via cacheTTL option and defaults to 5 seconds;
- at Parse Live Query level, which, according with the docs, should be changed via liveQueryServerOptions.cacheTimeout and defaults to 30 days.
But there are three problems:
- cacheTTL has currently no effect over Live Query Server;
- cacheTimeout also has currently no effect over Live Query Server;
- cacheTimeout actually defaults to 1h.
So, currently, if you wait 1 hour after the session token was invalidated, the clients using the old session token are not able to receive the events.
What I did:
- Added a test case for the problem;
- Fixed cacheTTL for Live Query Server;
- Fixed cacheTimeout for Live Query Server;
- Changed the cacheTimeout to default 5s;
- Changed the docs to reflect the actual 5s default for cacheTimeout.
| {'CVE-2020-15270'} | 2022-04-19T19:02:40Z | 2020-10-27T19:15:19Z | MODERATE | 4.3 | {'CWE-672'} | {'https://github.com/advisories/GHSA-2xm2-xj2q-qgpj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15270', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2xm2-xj2q-qgpj', 'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58'} | null |
GHSA | GHSA-g99m-3m46-4gm9 | Infinite Loop in Apache Sanselan | Certain input files could make the code to enter into an infinite loop when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging. | {'CVE-2018-17202'} | 2021-08-03T21:31:14Z | 2019-05-14T04:00:47Z | HIGH | 7.5 | {'CWE-835'} | {'https://lists.apache.org/thread.html/69204376d12205b0d2d90e6fcbeebb99b894e6db88c8ff565c4e1efa@%3Cdev.commons.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17202', 'https://github.com/advisories/GHSA-g99m-3m46-4gm9'} | null |
GHSA | GHSA-3mgp-fx93-9xv5 | XSS vulnerability that affects bootstrap | In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute. | {'CVE-2018-20676'} | 2021-07-26T21:50:30Z | 2019-01-17T13:57:34Z | MODERATE | 6.1 | {'CWE-79'} | {'https://access.redhat.com/errata/RHSA-2020:0132', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0133', 'https://github.com/twbs/bootstrap/issues/27044', 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://github.com/advisories/GHSA-3mgp-fx93-9xv5', 'https://access.redhat.com/errata/RHBA-2019:1076', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://github.com/twbs/bootstrap/pull/27047', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20676', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628'} | null |
GHSA | GHSA-43fq-w8qq-v88h | Out-of-bounds read in Pillow | In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exist in the parsing of SGI image files, a different issue than CVE-2020-5311. | {'CVE-2020-11538'} | 2021-09-22T21:32:48Z | 2020-07-27T21:52:36Z | HIGH | 8.1 | {'CWE-125'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/', 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html', 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://github.com/python-pillow/Pillow/pull/4538', 'https://github.com/advisories/GHSA-43fq-w8qq-v88h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11538', 'https://usn.ubuntu.com/4430-2/', 'https://usn.ubuntu.com/4430-1/', 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574574', 'https://github.com/python-pillow/Pillow/pull/4504', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/', 'https://github.com/python-pillow/Pillow/commit/2ef59fdbaeb756bc512ab3f2ad15ac45665b303d', 'https://github.com/python-pillow/Pillow/blob/master/docs/releasenotes/7.1.0.rst#security'} | null |
GHSA | GHSA-77g4-36jp-5v3m | Remote Memory Disclosure in bittorrent-dht | Versions of `bittorrent-dht` prior to 5.1.3 are affected by a remote memory disclosure vulnerability. This vulnerability allows an attacker to send a specific series of of messages to a listening peer and get it to reveal internal memory.
There are two mitigating factors here, that slightly reduce the impact of this vulnerability:
1. Any modern kernel will zero out new memory pages before handing them off to a process. This means that only memory previously used and deallocated by the node process can be leaked.
1. Node.js manages Buffers by creating a few large internal SlowBuffers, and slicing them up into smaller Buffers which are made accessible in JS. They are not stored on V8's heap, because garbage collection would interfere. The result is that only memory that has been previously allocated as a Buffer can be leaked.
## Recommendation
Update to version 5.1.3 or later. | {'CVE-2016-10519'} | 2021-01-07T23:35:17Z | 2020-09-01T15:22:12Z | MODERATE | 0 | {'CWE-201'} | {'https://nodesecurity.io/advisories/68', 'https://www.npmjs.com/advisories/68', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10519', 'https://github.com/advisories/GHSA-77g4-36jp-5v3m', 'https://github.com/feross/bittorrent-dht/issues/87'} | null |
GHSA | GHSA-mcgw-5fhw-3fq8 | Incorrect Authorization in saleor | Incorrect Authorization in saleor prior to 3.1.2. | {'CVE-2022-0932'} | 2022-03-29T21:09:08Z | 2022-03-12T00:00:34Z | MODERATE | 6.5 | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0932', 'https://github.com/saleor/saleor/commit/521dfd6394f3926a77c60d8633c058e16d0f916d', 'https://huntr.dev/bounties/88ae4cbc-c697-401b-8b04-7dc4e03ad8eb', 'https://github.com/advisories/GHSA-mcgw-5fhw-3fq8'} | null |
GHSA | GHSA-3gx9-37ww-9qw6 | Code injection in Spring Cloud Gateway | In Spring Cloud Gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed, and unsecured. A remote attacker could make a maliciously crafted request resulting in arbitrary remote execution on the remote host. | {'CVE-2022-22947'} | 2022-04-26T20:56:54Z | 2022-03-04T00:00:15Z | CRITICAL | 10 | {'CWE-94'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22947', 'http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html', 'https://github.com/advisories/GHSA-3gx9-37ww-9qw6', 'https://tanzu.vmware.com/security/cve-2022-22947'} | null |
GHSA | GHSA-6jqp-j69q-pm62 | AWS Lambda parser is vulnerable to Regular Expression Denial of Service | index.js in the aws-lambda-multipart-parser NPM package before 0.1.2 has a Regular Expression Denial of Service (ReDoS) issue via a crafted multipart/form-data boundary string. | {'CVE-2018-7560'} | 2022-04-25T22:28:18Z | 2018-03-05T19:16:56Z | HIGH | 7.5 | {'CWE-20'} | {'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7560', 'https://github.com/advisories/GHSA-6jqp-j69q-pm62'} | null |
GHSA | GHSA-7vm7-j8p7-h346 | Code injection in blamer | Code injection vulnerability in blamer 1.0.0 and earlier may result in remote code execution when the input can be controlled by an attacker. | {'CVE-2020-8137'} | 2021-05-06T18:27:55Z | 2021-05-06T18:27:55Z | HIGH | 9.8 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8137', 'https://github.com/advisories/GHSA-7vm7-j8p7-h346', 'https://hackerone.com/reports/772448'} | null |
GHSA | GHSA-x457-cw4h-hq5f | High severity vulnerability that affects json | The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability." | {'CVE-2013-0269'} | 2021-09-21T22:07:56Z | 2017-10-24T18:33:37Z | HIGH | 0 | {'CWE-20'} | {'http://www.osvdb.org/90074', 'http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection', 'http://www.ubuntu.com/usn/USN-1733-1', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain', 'http://secunia.com/advisories/52075', 'http://www.openwall.com/lists/oss-security/2013/02/11/8', 'http://www.securityfocus.com/bid/57899', 'http://secunia.com/advisories/52774', 'http://rhn.redhat.com/errata/RHSA-2013-1147.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0269', 'http://www.openwall.com/lists/oss-security/2013/02/11/7', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html', 'https://github.com/advisories/GHSA-x457-cw4h-hq5f', 'http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862', 'http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed', 'http://rhn.redhat.com/errata/RHSA-2013-1028.html', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82010', 'https://puppet.com/security/cve/cve-2013-0269', 'http://secunia.com/advisories/52902', 'http://rhn.redhat.com/errata/RHSA-2013-0701.html', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'} | null |
GHSA | GHSA-5mf7-26mw-3rqr | Moderate severity vulnerability that affects org.apache.tika:tika-core | A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18. | {'CVE-2018-1338'} | 2021-09-01T22:17:58Z | 2018-10-17T15:50:45Z | MODERATE | 5.5 | {'CWE-835'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1338', 'https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932@%3Cdev.tika.apache.org%3E', 'https://github.com/advisories/GHSA-5mf7-26mw-3rqr', 'https://access.redhat.com/errata/RHSA-2018:2669'} | null |
GHSA | GHSA-hj5v-574p-mj7c | Regular expression denial of service in py | A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality. | {'CVE-2020-29651'} | 2021-04-21T20:27:10Z | 2021-04-20T16:39:57Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144', 'https://github.com/pytest-dev/py/pull/257', 'https://github.com/advisories/GHSA-hj5v-574p-mj7c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29651', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/', 'https://github.com/pytest-dev/py/issues/256'} | null |
GHSA | GHSA-r8fh-hq2p-7qhq | High severity vulnerability that affects activerecord | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 4.x before 4.0.7 and 4.1.x before 4.1.3 allows remote attackers to execute arbitrary SQL commands by leveraging improper range quoting. | {'CVE-2014-3483'} | 2021-09-17T14:42:50Z | 2017-10-24T18:33:36Z | HIGH | 0 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2014-3483', 'http://rhn.redhat.com/errata/RHSA-2014-0877.html', 'http://www.debian.org/security/2014/dsa-2982', 'http://secunia.com/advisories/60214', 'https://github.com/advisories/GHSA-r8fh-hq2p-7qhq', 'http://secunia.com/advisories/59971', 'http://www.securityfocus.com/bid/68341', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J', 'http://openwall.com/lists/oss-security/2014/07/02/5'} | null |
GHSA | GHSA-xrr9-rh8p-433v | Request smuggling is possible when both chunked TE and content length specified | ### Impact
Request smuggling is possible when running behind a proxy that doesn't handle Content-Length and Transfer-Encoding properly or doesn't handle alone \n as a headers separator.
### Patches
https://github.com/ktorio/ktor/pull/1547
### Workarounds
None except migrating to a better proxy.
### References
https://portswigger.net/web-security/request-smuggling
https://tools.ietf.org/html/rfc7230#section-9.5 | {'CVE-2020-5207'} | 2021-01-08T20:32:37Z | 2020-01-27T19:28:40Z | LOW | 5.4 | {'CWE-444'} | {'https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5207', 'https://github.com/advisories/GHSA-xrr9-rh8p-433v', 'https://github.com/ktorio/ktor/pull/1547'} | null |
GHSA | GHSA-g8m7-qhv7-9h5x | Path Traversal in serve-here.js | Versions of `serve-here.js` prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 1.2.0 or later. | null | 2021-09-22T18:35:24Z | 2019-07-05T21:07:14Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-g8m7-qhv7-9h5x', 'https://hackerone.com/reports/296254', 'https://github.com/vivaxy/here/pull/17', 'https://www.npmjs.com/advisories/554', 'https://hackerone.com/reports/569966', 'https://nodesecurity.io/advisories/554', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'} | null |
GHSA | GHSA-3h99-v4qw-p2h5 | Malicious Package in coinpayment | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:57:42Z | 2020-09-03T19:41:56Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1382', 'https://github.com/advisories/GHSA-3h99-v4qw-p2h5'} | null |
GHSA | GHSA-6c7m-qwxj-mvhp | Broken encryption in EdgeX Foundry | ### Summary
Broken encryption in app-functions-sdk “AES” transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors.
### Detailed Description
The app-functions-sdk exports an “aes” transform that user scripts can optionally call to encrypt data in the processing pipeline. No decrypt function is provided. Encryption is not enabled by default, but if used, the level of protection may be less than the user may expects due to a broken implementation in https://github.com/edgexfoundry/app-functions-sdk-go/blob/v1.0.0/pkg/transforms/encryption.go
Version v2.1.0 (EdgeX Foundry Jakarta release and later) of app-functions-sdk-go/v2 deprecates the “aes” transform and provides an improved “aes256” transform in its place. The broken implementation will remain in a deprecated state until it is removed in the next EdgeX major release to avoid breakage of existing software that depends on the broken implementation.
### Impact
As the broken transform is a library function that is not invoked by default, users who do not use the AES transform in their processing pipelines are unaffected. Those that are affected are urged to upgrade to the Jakarta EdgeX release and modify processing pipelines to use the new "aes256" transform.
#### Vulnerable go modules
- github.com/edgexfoundry/app-functions-sdk-go < v2.1.0
- github.com/edgexfoundry/app-functions-sdk-go/v2 < v2.1.0
- github.com/edgexfoundry/app-service-configurable < v2.1.0
#### Vulnerable containers
- https://hub.docker.com/r/edgexfoundry/app-service-configurable >= 2.0.0 < v2.1.0
- https://hub.docker.com/r/edgexfoundry/app-service-configurable-arm64 >= 2.0.0 < 2.1.0
- https://hub.docker.com/r/edgexfoundry/docker-app-service-configurable < 2.0.0
- https://hub.docker.com/r/edgexfoundry/docker-app-service-configurable-arm64 < 2.0.0
#### Vulnerable Snaps
- https://snapcraft.io/edgex-app-service-configurable >= 2.0.0 < 2.1.0
### Patches
Upgrade to 2.1.0 version of app-functions-sdk-go/v2, app-service-configurable, and related docker containers shown below and modify user scripts to use the new "aes256" transform in place of the existing "aes" transform.
#### Patched go modules
- github.com/edgexfoundry/app-functions-sdk-go/v2 v2.1.0
- github.com/edgexfoundry/app-service-configurable v2.1.0
Modification of user scripts is necessary for full remediation.
#### Patched containers
- https://hub.docker.com/r/edgexfoundry/app-service-configurable:>=2.1.0
- https://hub.docker.com/r/edgexfoundry/app-service-configurable-arm64:>=2.1.0
Modification of user scripts is necessary for full remediation.
#### Patched Snaps
- https://snapcraft.io/edgex-app-service-configurable >= 2.1.0
Modification of user scripts is necessary for full remediation.
### Workarounds
If unable to upgrade, change the processing pipeline to use an HTTPS (TLS 1.3) endpoint to export and skip encryption.
### References
* [2.0 documentation](https://docs.edgexfoundry.org/2.0/microservices/application/BuiltIn/#aes)
* [2.1 documentation](https://docs.edgexfoundry.org/2.1/microservices/application/BuiltIn/#encryption-deprecated)
* [GitHub issue](https://github.com/edgexfoundry/app-functions-sdk-go/issues/968)
### For more information
If you have any questions or comments about this advisory:
* Contact us in the [Slack #security channel](https://slack.edgexfoundry.org/)
* Open an issue in [edgex-go](https://github.com/edgexfoundry/edgex-go)
* Email us at [EdgeX-TSC-Security@lists.edgexfoundry.org](mailto:EdgeX-TSC-Security@lists.edgexfoundry.org) | {'CVE-2021-41278'} | 2022-04-19T19:03:14Z | 2021-11-19T20:55:16Z | MODERATE | 5.4 | {'CWE-327'} | {'https://github.com/edgexfoundry/app-functions-sdk-go/security/advisories/GHSA-6c7m-qwxj-mvhp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41278', 'https://github.com/edgexfoundry/app-functions-sdk-go/commit/8fa13c6388ce76a6b878b54490eac61aa7d81165', 'https://github.com/advisories/GHSA-6c7m-qwxj-mvhp'} | null |
GHSA | GHSA-m6j4-8r7p-wpp3 | BuddyPress privilege escalation via REST API | ### Impact
It's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the BuddyPress REST API members endpoint.
### Patches
The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.
### References
https://buddypress.org/2021/03/buddypress-7-2-1-security-release/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [HackerOne](https://hackerone.com/wordpress) | {'CVE-2021-21389'} | 2021-10-06T17:46:55Z | 2021-10-06T17:46:55Z | HIGH | 8.1 | {'CWE-863'} | {'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3', 'https://codex.buddypress.org/releases/version-7-2-1/', 'https://github.com/advisories/GHSA-m6j4-8r7p-wpp3', 'https://buddypress.org/2021/03/buddypress-7-2-1-security-release/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21389'} | null |
GHSA | GHSA-2gfx-95x2-5v3x | Heap buffer overflow in `QuantizedReshape` | ### Impact
An attacker can cause a heap buffer overflow in `QuantizedReshape` by passing in invalid thresholds for the quantization:
```python
import tensorflow as tf
tensor = tf.constant([], dtype=tf.qint32)
shape = tf.constant([], dtype=tf.int32)
input_min = tf.constant([], dtype=tf.float32)
input_max = tf.constant([], dtype=tf.float32)
tf.raw_ops.QuantizedReshape(tensor=tensor, shape=shape, input_min=input_min, input_max=input_max)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a324ac84e573fba362a5e53d4e74d5de6729933e/tensorflow/core/kernels/quantized_reshape_op.cc#L38-L55) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly:
```cc
const auto& input_min_float_tensor = ctx->input(2);
...
const float input_min_float = input_min_float_tensor.flat<float>()(0);
const auto& input_max_float_tensor = ctx->input(3);
...
const float input_max_float = input_max_float_tensor.flat<float>()(0);
```
However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow.
### Patches
We have patched the issue in GitHub commit [a324ac84e573fba362a5e53d4e74d5de6729933e](https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29536'} | 2021-05-21T14:22:32Z | 2021-05-21T14:22:32Z | LOW | 2.5 | {'CWE-787'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2gfx-95x2-5v3x', 'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29536', 'https://github.com/advisories/GHSA-2gfx-95x2-5v3x'} | null |
GHSA | GHSA-f8rq-m28h-8hxj | Cross-Site Scripting in htmr | Versions of `htmr` prior to 0.8.7 are vulnerable to Cross-Site Scripting (XSS). The package uses `innerHTML` to unescape HTML entities. This may lead to [DOM-based XSS](https://owasp.org/www-community/attacks/DOM_Based_XSS) through HTML-encoded XSS payloads. This may allow an attacker to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 0.8.7 or later. | null | 2021-10-04T21:07:39Z | 2020-09-03T15:50:29Z | HIGH | 0 | {'CWE-79'} | {'https://hackerone.com/reports/753971', 'https://github.com/advisories/GHSA-f8rq-m28h-8hxj', 'https://www.npmjs.com/advisories/1496'} | null |
GHSA | GHSA-338v-3958-8v8r | Information disclosure in JBoss Weld | Race condition in JBoss Weld before 2.2.8 and 3.x before 3.0.0 Alpha3 allows remote attackers to obtain information from a previous conversation via vectors related to a stale thread state. | {'CVE-2014-8122'} | 2021-08-30T13:39:37Z | 2020-06-10T20:54:15Z | MODERATE | 0 | {'CWE-362'} | {'https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65', 'http://rhn.redhat.com/errata/RHSA-2015-0850.html', 'http://rhn.redhat.com/errata/RHSA-2015-0217.html', 'http://rhn.redhat.com/errata/RHSA-2015-0773.html', 'http://rhn.redhat.com/errata/RHSA-2015-0216.html', 'http://rhn.redhat.com/errata/RHSA-2015-0851.html', 'https://github.com/advisories/GHSA-338v-3958-8v8r', 'https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100892', 'https://github.com/victims/victims-cve-db/blob/master/database/java/2014/8122.yaml', 'http://www.securityfocus.com/bid/74252', 'http://www.securitytracker.com/id/1031741', 'http://rhn.redhat.com/errata/RHSA-2015-0675.html', 'http://rhn.redhat.com/errata/RHSA-2015-0920.html', 'http://rhn.redhat.com/errata/RHSA-2015-0218.html', 'http://rhn.redhat.com/errata/RHSA-2015-0215.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8122', 'https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086'} | null |
GHSA | GHSA-76qm-4f93-fg6f | Improper Input Validation in xdLocalStorage | An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages. | {'CVE-2015-9545'} | 2022-04-19T19:03:27Z | 2021-12-09T19:30:29Z | MODERATE | 7.1 | {'CWE-20'} | {'https://github.com/advisories/GHSA-76qm-4f93-fg6f', 'https://github.com/ofirdagan/cross-domain-local-storage', 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19', 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9545', 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17'} | null |
GHSA | GHSA-55m5-whcv-c49c | Use of Uninitialized Resource in smallvec | An issue was discovered in the smallvec crate before 0.6.13 for Rust. It can create an uninitialized value of any type, including a reference type. | {'CVE-2018-25023'} | 2022-01-06T22:20:28Z | 2022-01-06T22:20:28Z | HIGH | 7.5 | {'CWE-908'} | {'https://rustsec.org/advisories/RUSTSEC-2018-0018.html', 'https://github.com/advisories/GHSA-55m5-whcv-c49c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25023', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/smallvec/RUSTSEC-2018-0018.md'} | null |
GHSA | GHSA-7qmg-qg53-mrp8 | Cross-site scripting in Apache JSPWiki | On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to InfoContent.jsp, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. | {'CVE-2019-12404'} | 2021-08-17T22:37:43Z | 2019-10-11T18:41:59Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-12404', 'https://github.com/advisories/GHSA-7qmg-qg53-mrp8', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-12404'} | null |
GHSA | GHSA-vhx6-cp8w-295m | Directory Traversal in serverliujiayi1 | Affected versions of `serverliujiayi1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16095'} | 2021-01-14T15:51:21Z | 2020-09-01T16:55:45Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-vhx6-cp8w-295m', 'https://nodesecurity.io/advisories/367', 'https://www.npmjs.com/advisories/367', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16095', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverliujiayi1'} | null |
GHSA | GHSA-9q3g-m353-cp4p | Denial of Service in Packetbeat | Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other PostgreSQL traffic. | {'CVE-2017-11480'} | 2022-04-12T22:39:26Z | 2022-02-15T01:57:18Z | HIGH | 7.5 | {'CWE-404'} | {'https://discuss.elastic.co/t/beats-5-6-4-security-update/106739', 'https://github.com/elastic/beats/pull/5457', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11480', 'https://github.com/advisories/GHSA-9q3g-m353-cp4p'} | null |
GHSA | GHSA-pc22-3g76-gm6j | Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory | ### Impact
On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory.
This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled.
#### Java Code
The method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability.
https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185
### Patches
Fix has been applied to the master branch with:
* https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89
included in release: 2.4.19
### References
* [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
* [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@swagger.io](mailto:security@swagger.io)
#### Original vulnerability report
> I'm performing OSS security research under the GitHub Security Lab Bug Bounty program.
> I've been using a custom CodeQL query to find local temporary directory vulnerabilities in OSS with three custom CodeQL queries.
>
> - https://github.com/github/codeql/pull/4388/files#diff-71d36c0f2bd0b08e32866f873f1c906cdc17277e0ad327c0c6cd2c882f30de4f
> - https://github.com/github/codeql/pull/4388/files#diff-1893a18a8bf43c011d61a7889d0139b998a5a78701a30fe7722eddd4c506aaac
> - https://github.com/github/codeql/pull/4473
>
> The code generated by the Swagger Generator contains a local information disclosure vulnerability. The system temporary directory, on unix-like systems is shared between multiple users. Information written to this directory, or directories created under this directory that do not correctly set the posix standard permissions can have these directories read/modified by other users.
>
> ---
>
> This vulnerability exists in the maven plugin.
>
> This vulnerability is distinctly different. This vulnerability is most likely a local privilege escalation vulnerability.
>
> https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185
>
> This vulnerability is very similar to this similar vulnerability I disclosed in the Eclipse Jetty project.
>
> https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
>
> This is due to a race condition between the call to `delete` and the call to `mkdirs`.
>
> ```java
> // ensure file will always be unique by appending random digits
> File outputFolder = File.createTempFile("codegen-", "-tmp"); // Attacker knows the full path of the file that will be generated
> // delete the file that was created
> outputFolder.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Swagger Code Generator.
> // and make a directory of the same name
> // SECURITY VULNERABILITY: Race Condition! - Attacker beats Swagger Code Generator and now owns this directory
> outputFolder.mkdirs();
> ```
>
> This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled.
>
> The fix here is to switch to the `Files` API for creating temporary directories. Which does not contain this race condition, and appropriately sets the correct file permissions.
> | {'CVE-2021-21363'} | 2022-04-19T19:02:48Z | 2021-03-11T03:09:16Z | LOW | 9.3 | {'CWE-379', 'CWE-378'} | {'https://github.com/advisories/GHSA-pc22-3g76-gm6j', 'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89', 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21363'} | null |
GHSA | GHSA-f523-2f5j-gfcg | Regular Expression Denial of Service in timespan | Affected versions of `timespan` are vulnerable to a regular expression denial of service when parsing dates.
The amplification for this vulnerability is significant, with 50,000 characters resulting in the event loop being blocked for around 10 seconds.
## Recommendation
No direct patch is available for this vulnerability.
Currently, the best available solution is to use a functionally equivalent alternative package.
It is also sufficient to ensure that user input is not being passed into `timespan`, or that the maximum length of such user input is drastically reduced. Limiting the input length to 150 characters should be sufficient in most cases. | {'CVE-2017-16115'} | 2021-01-08T18:54:54Z | 2018-08-29T23:04:14Z | LOW | 0 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16115', 'https://www.npmjs.com/advisories/533', 'https://github.com/indexzero/TimeSpan.js/issues/10', 'https://nodesecurity.io/advisories/533', 'https://github.com/advisories/GHSA-f523-2f5j-gfcg'} | null |
GHSA | GHSA-j977-g5vj-j27g | Cross-Site Scripting in scratch-svg-renderer | This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the _transformMeasurements function. | {'CVE-2020-7750'} | 2021-01-07T22:49:02Z | 2020-11-09T14:21:17Z | HIGH | 9.6 | {'CWE-79'} | {'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90', 'https://github.com/advisories/GHSA-j977-g5vj-j27g', 'https://snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7750'} | null |
GHSA | GHSA-pm9p-9926-w68m | Denial of Service in ecstatic | `ecstatic`, a simple static file server middleware, is vulnerable to denial of service. If a payload with a large number of null bytes (`%00`) is provided by an attacker it can crash ecstatic by running it out of memory.
[Results from the original advisory](https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/)
```
A payload of 22kB caused a lag of 1 second,
A payload of 35kB caused a lag of 3 seconds,
A payload of 86kB caused the server to crash
```
## Recommendation
Update to version 2.0.0 or later. | {'CVE-2016-10703'} | 2021-09-16T18:15:10Z | 2017-12-28T22:52:47Z | HIGH | 7.5 | {'CWE-20'} | {'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b5a88fb51675f1aa1065c093dce1ee', 'https://github.com/advisories/GHSA-pm9p-9926-w68m', 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01', 'https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/', 'https://advisory.checkmarx.net/advisory/CX-2016-4450', 'https://www.npmjs.com/advisories/553', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10703'} | null |
GHSA | GHSA-jppv-gw3r-w3q8 | OS Command Injection in Rake | There is an OS command injection vulnerability in Ruby Rake before 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`. | {'CVE-2020-8130'} | 2021-01-08T20:28:46Z | 2020-02-28T16:54:36Z | MODERATE | 0 | {'CWE-78'} | {'https://github.com/advisories/GHSA-jppv-gw3r-w3q8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8130', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html', 'https://usn.ubuntu.com/4295-1/', 'https://github.com/ruby/rake/commit/5b8f8fc41a5d7d7d6a5d767e48464c60884d3aee', 'https://hackerone.com/reports/651518'} | null |
GHSA | GHSA-q4p3-qw5c-mhpc | Multiple stored XSS in RBAC Admin screens in Apache Airflow | An issue was found in Apache Airflow versions 1.10.10 and below. It was discovered that many of the admin management screens in the new/RBAC UI handled escaping incorrectly, allowing authenticated users with appropriate permissions to create stored XSS attacks. | {'CVE-2020-11983'} | 2021-09-22T21:22:14Z | 2020-07-27T16:57:25Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11983', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-q4p3-qw5c-mhpc'} | null |
GHSA | GHSA-2vqq-jgxx-fxjc | Malicious Package in motiv.scss | Version 0.4.20 of `motiv.scss` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | null | 2021-09-30T22:07:26Z | 2020-09-11T21:24:33Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-2vqq-jgxx-fxjc', 'https://www.npmjs.com/advisories/939'} | null |
GHSA | GHSA-mgx3-27hr-mfgp | High severity vulnerability that affects httparty | The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156. | {'CVE-2013-1801'} | 2021-09-15T19:00:25Z | 2017-10-24T18:33:37Z | HIGH | 0 | null | {'http://www.securityfocus.com/bid/58260', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1801', 'https://bugzilla.redhat.com/show_bug.cgi?id=917229', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031', 'https://github.com/advisories/GHSA-mgx3-27hr-mfgp'} | null |
GHSA | GHSA-73jp-3c67-hjfv | Authentication Bypass in passport-azure-ad | Affected versions of `passport-azure-ad` do not recognize the `validateIssuer` setting, which allows remote attackers to bypass authentication via a crafted token.
## Recommendation
Version 1.x: Update to version 1.4.6 or later.
Version 2.x: Update to version 2.0.1 or later. | {'CVE-2016-7191'} | 2021-09-02T19:18:47Z | 2018-07-26T15:53:31Z | HIGH | 8.1 | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-7191', 'https://github.com/advisories/GHSA-73jp-3c67-hjfv', 'https://github.com/AzureAD/passport-azure-ad/blob/master/SECURITY-NOTICE.MD', 'https://support.microsoft.com/kb/3187742', 'https://www.npmjs.com/advisories/151', 'http://www.securityfocus.com/bid/93213', 'https://support.microsoft.com/en-us/kb/3187742', 'http://www.securitytracker.com/id/1036996'} | null |
GHSA | GHSA-vwrf-r5r4-7775 | Incorrect handling of CORS preflight request headers in hapi | Versions of `hapi` prior to 11.0.0 implement CORS incorrectly, allowing for configurations that at best return inconsistent headers, and at worst allow cross-origin activities that are expected to be forbidden.
If the connection has CORS enabled but one route has it off, and the route is not GET, the OPTIONS prefetch request will return the default CORS headers and then the actual request will go through and return no CORS headers. This defeats the purpose of turning CORS on the route.
## Recommendation
Update to version 11.0.0 or later. | {'CVE-2015-9236'} | 2021-01-08T01:57:13Z | 2018-06-07T19:43:25Z | MODERATE | 0 | {'CWE-284'} | {'https://github.com/hapijs/hapi/issues/2840', 'https://github.com/advisories/GHSA-vwrf-r5r4-7775', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9236', 'https://nodesecurity.io/advisories/45', 'https://github.com/hapijs/hapi/issues/2850', 'https://www.npmjs.com/advisories/45'} | null |
GHSA | GHSA-558x-2xjg-6232 | Allocation of Resources Without Limits or Throttling in Spring Framework | In Spring Framework versions 5.3.0 - 5.3.16, 5.2.0 - 5.2.19, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. | {'CVE-2022-22950'} | 2022-04-12T15:23:53Z | 2022-04-03T00:01:00Z | MODERATE | 6.5 | {'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-22950', 'https://tanzu.vmware.com/security/cve-2022-22950', 'https://github.com/advisories/GHSA-558x-2xjg-6232'} | null |
GHSA | GHSA-xgh6-85xh-479p | Regular Expression Denial of Service in npm-user-validate | `npm-user-validate` before version `1.0.1` is vulnerable to a Regular Expression Denial of Service (REDos). The regex that validates user emails took exponentially longer to process long input strings beginning with `@` characters.
### Impact
The issue affects the `email` function. If you use this function to process arbitrary user input with no character limit the application may be susceptible to Denial of Service.
### Patches
The issue is patched in version 1.0.1 by improving the regular expression used and also enforcing a 254 character limit.
### Workarounds
Restrict the character length to a reasonable degree before passing a value to `.emal()`; Also, consider doing a more rigorous sanitizing/validation beforehand. | null | 2020-10-16T18:56:26Z | 2020-10-16T18:56:26Z | LOW | 0 | null | {'https://github.com/advisories/GHSA-xgh6-85xh-479p', 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p'} | null |
GHSA | GHSA-6r86-2jm9-9mh4 | File upload restriction bypass in Zenario CMS | Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server. | {'CVE-2022-23043'} | 2022-03-04T21:39:12Z | 2022-02-25T00:01:07Z | HIGH | 7.2 | {'CWE-434'} | {'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19', 'https://github.com/advisories/GHSA-6r86-2jm9-9mh4', 'https://github.com/TribalSystems/Zenario/releases/tag/9.2.55826', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23043', 'https://fluidattacks.com/advisories/simone/'} | null |
GHSA | GHSA-38vq-cjh5-vw7x | Malicious Package in nodes.js | All versions of `nodes.js ` contain malicious code. The package searches and installs globally thousands of packages based on keywords `node`, `react`, `react-native`, `vue`, `angular` and `babel` to fill the system's memory.
## Recommendation
Remove the package from your environment and validate what packages are installed. | null | 2021-09-30T20:04:09Z | 2020-09-03T18:13:41Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-38vq-cjh5-vw7x', 'https://www.npmjs.com/advisories/1074'} | null |
GHSA | GHSA-pc32-x737-74cv | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | {'CVE-2022-0704'} | 2022-03-29T21:32:26Z | 2022-03-17T00:00:48Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0704', 'https://github.com/advisories/GHSA-pc32-x737-74cv', 'https://huntr.dev/bounties/4142a8b4-b439-4328-aaa3-52f6fedfd0a6'} | null |
GHSA | GHSA-gjhx-gxwx-jx9j | Cross-Site Scripting in jqtree | Affected versions of `jqtree` are vulnerable to cross-site scripting in the drag and drop functionality for modifying tree data.
When a user attempts to drag a node to a different position in the hierarchy, script content existing within the node will be executed.
## Recommendation
Update to 1.3.4 or later. | {'CVE-2016-1000234'} | 2021-09-23T21:33:50Z | 2020-09-01T15:35:22Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/mbraak/jqTree/issues/437', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000234', 'https://github.com/advisories/GHSA-gjhx-gxwx-jx9j', 'https://www.npmjs.com/advisories/132'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.